Microsoft Vows to Contest ‘Illegal’ Surveillance via the Kinect

While Microsoft’s statement may quell some fears in regards to these “new laws”, it does little to avoid the facts that the Kinect and similar devices with internet connected microphones and cameras littered throughout our homes these days, is causing people to steer away from these potentially and extremely intrusive devices. Cleary Xbox fans and developers alike had mixed reactions since the truth about the US governments illegal breaches of liberty and basic privacy, combined with the announcement of the presumably always-on aspect of the Kinect, which will be packaged with the launch of the Xbox One. For many, this truth is more than they can swallow. So how will all this affect sales and possible game development? Time will tell, but one thing is for sure, legal or illegal, it doesn’t matter much anymore. Read the full story here.



Comments

  • There are no comments yet. Be the first to comment!

Leave a Comment
  • Your email address will not be published. All fields are required.

Top White Papers and Webcasts

  • Storage is changing, so get ready to step up to a bigger and more significant role within your organization. By taking control of all storage traffic, you can overcome your current daily challenges. And you can deliver the kind of service that will transform storage from a necessary cog to a strategic asset. So, are you ready to make your role, your network, and your organization more valuable? Read this eBook to learn how you can transform IP storage into a strategic business enabler, simply and effectively.

  • How to Implement Sound Security at the VM Level Once your organization is leveraging multiple clouds to power and scale data, services and applications, it may be time to evaluate your business's approach to instance/virtual machine (VM) security. This paper explains the need to ensure each VM's contents are safeguarded through a combination of vulnerability mitigation and attack detection methods. Explore the advantages of outsourcing some or most VM security control responsibilities to a cloud service …

Most Popular Programming Stories

More for Developers

RSS Feeds

Thanks for your registration, follow us on our social networks to keep up-to-date