Workaround: Barnes and Noble Nook e-reader app no longer available for PC, Mac #BarnesAndNoble

I discovered after a Mac OS X update that my very old Nook e-reader app for Mac OS X no longer works – and that Nook discontinued the app for PC and Mac desktops in 2013. Barnes and Noble says we should use their cloud-based/web-based app from a browser (presumably this means we must have an Internet connection in order to read?)

Problem 1 – Barnesandnoble.com Inaccessible

Unfortunately, an attempt to access the Barnes and Noble web site returns

This page is unavailable due to either geographic restrictions or other restrictions in place at this time. NOTE: other restrictions can be a result of our security platform detecting potential malicious activity. Please try again later as the restrictions may be lifted, or contact your service provider if the issue persists.

ID: 8387029820181080074

As best I can tell, this means Barnes and Noble has blocked our IP address for unknown reasons. Their recommended solution is to reboot our Internet access modem and/or attempt to request a new IP address. This is absurd. Our IP address works fine for accessing all other web sites.

Problem 2 – No Nook E-Reader app available – Work Around

I installed the Nox Android emulator app on my Macbook. After dealing with odd user interface issues, I went into the Google folder and opened Google Play, and then downloaded and installed the Nook e-reader app for Android. I ran that and was able to synchronize my library of purchased e-books and can now read them using the Nook app for Android running in an emulator on my Macbook. The emulator seems to be a bit hard on the battery – may want to use this solution when you can plug in the notebook computer to AC.

I had the same IP address when I synchronized the Nook library, pointing to something very weird (and possibly very stupid) in Barnes and Noble’s web site operation.

 

 

 

Advertisements

AccuWeather app continues spying on user’s location #privacy

New tests reveal that while one privacy-invading feature was removed in an app update, the app still shares precise geolocation coordinates with advertisers.

Source: Despite privacy outrage, AccuWeather still shares precise location data with ad firms | ZDNet

This is done without the user’s consent.

Accuweather says it uses one’s location data to provide local weather forecasts but it appears the primary purpose is to optimize ad revenue. A side effect is that a dossier of our movement is constantly maintained by corporations.

With Android, if you use the GPS location features of the phone for any purpose what so ever, Google logs your location in the cloud. You cannot opt out of this – your choice is to use location services and be surveiled by Google, or not to use any GPS location features.

We now use an offline Garmin navigation product which presumably is not logging our location as it is only connected to the Internet a few times per year to update the software. But we really don’t know – may be Garmin is also logging our location albeit with a months long delay.

As tech companies regulate speech, will they lose their safe harbor?

Source: Silicon Valley escalates its war on white supremacy despite free speech concerns – The Washington Post

Tech companies have long argued they are not responsible for the content posted by others on their platforms. Under this view, a tech company is not responsible if someone posts threats to kill others or instructions for building a bomb or details on how to hack into government computers.

Companies have stood behind this principle, especially in regards to users posting defamatory content to online forums. They have argued that they are not responsible for the content and that it would be impossible for them to police the content of their forums.

Now however, the tech companies, including social media companies, are arguing that they can and do police all speech on their platforms. This implies that they do, in fact, control and have responsibility for the speech on their platform. These actions are likely to emerge in future anti-defamation suits filed against online tech firms and they could find themselves liable for all types of infringing speech conducted on their platforms.

Tech companies can certainly condemn offensive speech[1]. But censoring offensive speech puts tech companies into a area that may have legal ramifications.

Related from St. Louis Dispatch:

“A law that can be directed against speech found offensive to some portion of the public can be turned against minority and dissenting views to the detriment of all. The First Amendment does not entrust that power to the government’s benevolence. Instead, our reliance must be on the substantial safeguards of free and open discussion in a democratic society.” — Justice Anthony Kennedy

Continue reading

Google spies on you, recording your voice when you are not expecting it to

CCTV surveillance monitoring

Android devices have an “Ok, Google” voice activation feature. This enables voice input of search and other functions on your Android device.

Google also records a copy of the audio when it does this. Google also occasionally records incidental audio having nothing to do with a search. It certainly has for me.

You can manually delete the records, one by one, which is very time consuming. You need to go to this Google page and log in, and then click on Manage Activity and go through Google’s cloud-based storage of your conversations in the past.

Google also records your location as you travel about, and even identifies what businesses or properties you have entered. Google’s Chrome logs every web site and page you visit in to the Google cloud.

In the past couple of weeks, Microsoft has come under fire for its Windows 10 keystroke logger, that when enabled, records you keystrokes and sends those to Microsoft. That means account names, passwords, personal search requests (even if using Tor) and so forth. You can disable their keystroke spying logger by going to Settings | Privacy and switch off the item labeled “Send Microsoft info about how I write to help us improve typing and writing in the future”.

Whenever someone else wants your personal data, you need to ask:

  • who has access to this data?
  • how will this data be stored securely?
  • how long will this data be stored?
  • how will the data being disposed of when it is no longer being stored?

If you do not know the answer to those questions, then you must be leery of donating your personal data to others. This also applies to non-computer world. When you are asked to fill out a paper form with lots of personal data, say to make a credit purchase, you should ask them how they will use the data, keep it secure, and how will they dispose of it?

Similarly, Microsoft’s docs.com web site for publishing and sharing your files makes all files public, by default. The result is that the docs.com search function readily unearths a lot of private data files that users probably do not even realize are posted online. These include school transcripts, medical records, passwords, credit card and other account data, banking statements and more.

THE PRIMARY PURPOSE OF THE INTERNET IS TO SPY ON EVERYONE.

 

 

Botnot of #IOT devices used in #DDoS attack on web site

Preliminary indications are that the DDoS attack used, in part, a network of unsecured IoT devices.

The 620 Gbps DDoS attack was built on a massive botnet.

Source: Renowned blog KrebsOnSecurity hit with massive DDoS attack – Computer Business Review

The role of the CIO in the future

With high tech readily available “off the shelf” and probably from an outsourced cloud service, what is the role of the CIO in 10 or 15 years?

A world where IT is perceived as essential but not strategic is an ugly place to be.

Source: The CIO is becoming the HVAC guy | Computerworld

The author suggests the role of the future CIO is to provide a smorgasbord of IT options from which others can select, and to gracefully manage the end of life and shutdown of legacy systems. Plus, as technology advances, much of it has also been simplified to the point that end users make their own decisions (for better or worse). But think: Once upon a time, we hired a group to develop, say, a manufacturing cost analysis software project. Then users began to develop practically the same thing in Excel using VBA – all by themselves. Today, they just buy something from the cloud.

The challenge of health information data normalization

Different facilities and doctors use different terminology to describe the same things which makes the exchange of patient data difficult:

Until the data is normalized, the true potential of HIEs will be stunted. That potential lies in the ability to instantaneously act on the exchanged information. Ideally, two doctors sharing the same patient will be able to automatically absorb each other’s separate patient data.

via Health Information Exchanges Lack Standards – Healthcare –.

Providers used to jot down their diagnosis on a paper chart. Today, diagnoses are entered into an electronic medical record (EMR) and then may be transferred between providers – where the method of encoding the data is different. This problem is far more challenging than it seems on the surface (having studied graduate medical informatics, I have been introduced to the complexity).