New in iOS 8 you are able to create a Medical ID in the Health App. Even though the rest of the Health app is down, the Medical ID is fully functioning. The Medical ID is important because in case of an emergency, medical responders can look at your phone and know any allergies or […] http://ift.tt/eA8V8J
A co-founder of GGV Capital, one of Alibaba’s earliest investors, reflects on the lessons other companies can take from how the e-commerce giant grew in China and how Yahoo’s investment in the company can still be a model for Western companies looking to enter the Chinese market. Read More
We’ve all felt the sting of rejection. That perfectly crafted tweet gets no favorites. That smart and insightful Facebook post garners no comments. That amazingly timed Vine disappears into obscurity. No Likes Yet doesn’t want your Instagram pics to share a similar fate.
Once you connect your Instagram profile with the website, you enter a world of discarded social media ephemera—the posts that no one could take the time to like. The site’s most useful feature is its main feed, which gives you a robust survey of some of the strange, bland, and horribly framed food pics that exist on the platform, and a nice glimpse into what does and doesn’t jibe on Instagram.
On a more personal level, you can look at which of your friends photos also share the "no likes" curse as well as your own, so you can so you can stand together in Forever Alone solidarity. Of course, No More Like arms you with the tools to actually do something about your lack of Instagram engagement by allowing users to post a link via Twitter or Facebook accompanied with the pre-rendered phrase "Show some love to my Instagram photos that have never been liked." This seems a little too desperate for my tastes. If you’re not in love with the idea of your Instagram shortcomings being on display, if your profile on Instagram is set to private, then you should be getting any like from random strangers.
All in all, No Likes Yet scratches that same internet discovery itch that things like StumbleUpon and different random YouTube generators deliver. It’s a fun and unartistic way to pass the time, even if you are being entertained by the Instagram’s collective misery. [Yahoo via Wired]
It’s no secret the number of iPods that Apple has sold has significantly decreased over the last few years. As our smartphones have become more powerful and the types of tasks they’re capable of have grown, there’s been less of a need for having a device dedicated to only one type of activity. Is a dedicated portable MP3 player past its prime or does this type of device still have some life left? Visit the Engadget forums and let us know if you think the MP3 player can be saved.
wabrandsma writes with this excerpt from Wired: John Brooks, who is just 22 and a self-taught coder who dropped out of school at 13, was always concerned about privacy and civil liberties. Four years ago he began work on a program for encrypted instant messaging that uses Tor hidden services for the protected transmission of communications. The program, which he dubbed Ricochet, began as a hobby. But by the time he finished, he had a full-fledged desktop client that was easy to use, offered anonymity and encryption, and even resolved the issue of metadata—the "to" and "from" headers and IP addresses spy agencies use to identify and track communications—long before the public was aware that the NSA was routinely collecting metadata in bulk for its spy programs. The only problem Brooks had with the program was that few people were interested in using it. Although he’d made Ricochet’s code open source, Brooks never had it formally audited for security and did nothing to promote it, so few people even knew about it. Then the Snowden leaks happened and metadata made headlines. Brooks realized he already had a solution that resolved a problem everyone else was suddenly scrambling to fix. Though ordinary encrypted email and instant messaging protect the contents of communications, metadata allows authorities to map relationships between communicants and subpoena service providers for subscriber information that can help unmask whistleblowers, journalists’s sources and others.