Queensland scraps Go Card e-ticket scheme | The Australian
Queensland scraps Go Card e-ticket scheme
Times paywall plunge less than expected – ABC News (Australian Broadcasting Corporation)
Times paywall plunge less than expected
News Corp’s Times of London has lost less than 90 per cent of its online audience since it started charging readers on the web, fewer than it had feared, it said on Tuesday.
The Times is the first major consumer newspaper to put its online content behind a so-called paywall and the three-month-old exercise is being closely watched by an industry
Readers are charged 1 pound ($1.60) for a day or 2 pounds for a week’s access to Times and Sunday Times online.
The app for the iPad costs 9.99 pounds ($16) per month.
The New York Times plans to start charging for some of its online content next year after readers exhaust a certain amount of free articles.
Yahoo!7 signs deal to host ABC TV shows – ABC News (Australian Broadcasting Corporation)
Yahoo!7 signs deal to host ABC TV shows
Yahoo says over the next 12 months, 80 hours of ABC content will be available on the service, including shows like The Gruen Transfer and The Cook and the Chef.
Since we launched our catch-up TV service at the start of 2010, there have been over 12.7 million full-episode streams of our shows,” she said.
Microsoft Wants You to Manage Your Gmail from Your Hotmail
Microsoft Wants You to Manage Your Gmail from Your Hotmail
Hotmail has released a cool new feature today: the ability to receive and send e-mails from other addresses, including ones from Gmail or Yahoo Mail.
Hotmail users already have the ability to send e-mails from another address through the “Send As” feature, but today’s update provides a more complete e-mail management experience.
With nearly 350 million users, Hotmail is still by far the most popular webmail service around,
‘Cell phone’ spotted in silent film from 1928 – CNN.com
‘Cell phone’ spotted in silent film from 1928
The clip — a DVD extra spotted by filmmaker George Clarke — shows a woman holding what some say appears to be a mobile phone to her ear and talking.
The only explanation: She’s a time traveler.
Charlie Chaplin’s “The Circus”
FTC ends Google ‘Street View’ investigation without fines – CNN.com
FTC ends Google ‘Street View’ investigation without fines
The U.S. Federal Trade Commission has called off its investigation of Google’s “Street View” mapping program without issusing fines to the company, according to a letter sent from the FTC to Google on Wednesday.
The federal agency had been investigating the fact that Google collected communications, including passwords and e-mails, from people who used open Wi-Fi networks in their homes.
The data collections, which Google says were inadvertent, happened while Google was driving around taking pictures for the Street View function on Google Maps, the Mountain View, California, company said.
The FTC said Google has sufficiently addressed the problem.
Girl’s toy used to hack RFID
From “weaponised” iPhone software to hacked toys and leaked cookies, researchers at the ToorCon security conference over the weekend showed how easy it can be to poke holes in software and hardware with the right tools, know-how and curiosity.
This IM-Me instant messaging toy for teen girls can be turned into a wireless tool for opening garage doors, cloning RFID tags and other less innocent activities. (Credit: Elinor Mills/CNET)
One researcher demonstrated how to take control of an iPhone using an exploit that targets a hole in Safari, which has been patched. The iPhone had an app installed that allowed it to process credit card numbers, which could then be stolen if this were an attack in the wild.
Eric Monti, a senior security researcher at Trustwave, “weaponised” an exploit that was launched as the Jailbreakme.com program this year, designed to allow iPhone owners to use unauthorised apps.
For the demo, he directed the “victim” iPhone to a web address that opened a PDF file that contained the exploit code. Then a rootkit was downloaded giving him complete control of the iPhone. Once a rootkit is downloaded an attacker has access to all data, emails, voicemails and text messages, as well as the microphone and speaker. “You can easily eavesdrop on someone if you’re on their iPhone remotely,” Monti said.
If the iPhone has the free Square app installed, which is used for processing credit card numbers, the attacker could also steal those numbers, he said, adding that there is not a security issue with the Square app. “We will see people processing credit cards in stores using iPhone apps”, transactions using highly sensitive data that should be on only secured devices, Monti told CNET in an interview after his talk.
Two researchers gave a light-hearted talk, titled “Real Men Carry Pink Pagers”, about how they turned a toy into a wireless tool that could be used to open garage doors and clone RFID tags used for inventory control on shipping docks and RFID-based passports, among other uses. The pink plastic IM-Me device, with a “Girl Tech” brand on it, was designed to allow young girls to send instant messages with friends on a private network.
The IM-Me device also uses the same wireless chip that some smart meters use and could be turned into a diagnostic tool to test the security of those devices, said wireless researcher Michael Ossman. He worked on the project with Travis Goodspeed, who wrote software that gives the IM-Me functionality that most teen girls can’t fathom.
“We took old hardware and re-purposed it … It’s fun to turn it into something useful and to learn about it,” Ossman said, summing up a core element of the true hacker spirit.
This isn’t the first toy Ossman has worked his hack magic on. During Defcon in August, he used the hackable badge from the event to try to turn a toy guitar into an electric instrument. The guitar, which he played for a select audience this weekend, remains acoustic at this point, but Ossman did manage to create a very cool electronic light oscillator for tuning the strings using LEDs.
Two other presenters showed how limited encryption used on many popular sites on the web — like Facebook, Twitter, Hotmail and Flickr (but not Google) — can put user accounts at risk of compromise by someone snooping on session traffic between the user’s computer and the site’s server. Sites typically encrypt the username and password as they are transmitted, but unless the entire web session is encrypted with “https”, or secure hypertext transfer protocol, someone sniffing the network could capture the cookie information and use that to access the accounts, according to security researchers Eric Butler and Ian Gallagher.
Web surfers don’t even have to be on one of the sites to have their cookie data exposed. Any site that even just hosts a Facebook or Twitter widget or has a Flickr image embedded can leak a user’s cookie data if the user is logged into the relevant host site, they said. “The cookie allows you to do everything you can with a password,” Butler said. “It is hard for users to protect themselves.”
You might be interested in:
So-called HTTP session hijacking, or “sidejacking”, is not new; another researcher released a tool last year to enable this on Facebook. But Butler and Gallagher said users will be vulnerable to such attacks until websites move to full session, end-to-end encryption and configure sites to indicate that browsers only should send data over encrypted channels. They are releasing a tool that automates an attack and said that they hope that doing so will bring attention to the problem and motivate website owners to use encryption more broadly.
(Credit: Elinor Mills/CNET)
“Any motivated attacker could do this without this tool,” Butler said. “We think this will shine light on the issue.”
Another researcher talked about the security problems with the Absolute Manage (formerly LANrev) software, which was designed to remotely update software and which was used to secretly take photos of high school students in Philadelphia earlier this year. Joel Ross, security consultant at Leviathan, said it took him only 48 hours to develop a proof of concept and another dozen hours to create a working exploit to break the encryption on the software.
Ross’ exploit renders all computers with the Absolute Manage client software installed vulnerable to compromise by an attacker who could not only spy on the computers, but even run malware on them. Ross informed the company about the problem in July but the current release of the software does not resolve the issue, he said. “It’s bad for anyone to be running software that is that insecure,” he said, adding that he is not releasing the exploit. Absolute Manage could not be reached for comment on Sunday.
Developers need to be aware of the privacy implications of the software they create, said David Kane-Perry, a principal security consultant at Leviathan Security Group. His talk focused on potential unintended privacy issues related to location-based mobile apps, like Google Maps, in which the data is not encrypted between the consumer’s device and the app server. He also noted, for example, that mobile photos uploaded to sites like Facebook can be geo-tagged to reveal the coordinates of where the photo was taken, unbeknownst to the picture taker.
And in a keynote at the event, Dan Kaminsky, who discovered a security flaw with authentication in the internet’s Domain Name System last year and an even more serious problem the year before, talked about the need for the industry to adopt DNSSEC, which stands for Domain Name System Security Extensions. DNSSEC deployment has been slow because it’s not easy to do, he said.
To solve that problem Kaminsky has developed software he jokingly dubbed “Phreebird” that allows DNSSEC to be deployed as an upgrade to the existing infrastructure without having to “massively change their processes”, he said. A test version of the software will be released at Black Hat Abu Dhabi in November. Meanwhile, a member of the Google Chrome team has developed an “unofficial, unsanctioned” build of Chrome that uses DNSSEC to validate websites, he said.
“There’s a huge bug in one of the core concepts of the internet,” Kaminsky said in an interview. “DNSSEC is a fix, but we need to deploy it.”
NBN batteries to cost $150m a year | The Australian
NBN batteries to cost $150m a year
PROVIDING back-up batteries for 11 million phone subscribers to the National Broadband Network will cost taxpayers up to $150 million a year.
Back-up battery units will be made mandatory on the NBN after industry concerns over consumers’ ability to place emergency calls during a power outage.
Once the NBN is fully operational, about 2 million to 4 million back-up batteries are expected to be disposed of annually.
The McKinsey-KPMG implementation study into the NBN said it would cost an “additional $90m to $150m each year” to give all phone service users the emergency back-up batteries.
“This estimate is based on a high-quality sealed lead acid battery, which costs approximately $40 and has an operational life of three to five years,” the implementation study said.
The price was based on heavily discounted wholesale rates for lead batteries of between 66 per cent and 79 per cent.
The study’s $43 billion costing of the NBN did not include the price of a power supply unit to house the batteries. It also advised against mandatory back-up batteries because of the environmental hazards of battery disposal.
NBN Co, the company charged with building the fibre network, initially said back-ups would be optional.
Its own technical documents state that NBN Co would not supply, install or maintain a back-up battery, and that the power supply unit could be ordered as an optional component.
However, the government recently instructed NBN Co to make back-ups mandatory, after industry concerns over the ability to place emergency calls on the NBN during a power outage.
An NBN spokeswoman has confirmed residents would not be slugged with additional fees to purchase back-ups.
“NBN Co has factored the cost of the battery back-up into its business case,” she said. “It will come at no cost to end-users.
“Additional details in relation to technical and operational issues are subject to further development by NBN Co, following feedback on the technical specifications. Further information will be released in due course.”
The McKinsey study said NBN Co should not be required to provide battery back-ups to all Australians but should “provide a PSU with the option to insert a back-up battery for all FTTP (fibre to the premises) customers”.
It warned of potential environmental problems related to the battery program.
“Providing batteries universally would involve disposing of approximately 2-4 million batteries annually,” it said. “This could cause an environmental hazard if toxic lead-acid batteries used are not recycled or disposed of safely.
“If a battery back-up approach is pursued, NBN Co should explore available technologies to reduce the cost of the solution, for example, batteries that automatically enter stand-by mode unless a call is in progress.”
Taxpayers are expected to pay for about $26bn of the total spending for the planned high-speed broadband project.
The government has yet to respond to the McKinsey report.
Judge attacks ‘tricky’ Optus | The Australian
Judge attacks ‘tricky’ Optus
A FEDERAL Court judge has branded Optus “tricky” for misleading customers over the fine print in its high-speed internet plans.
The Australian Competition and Consumer Commission yesterday revealed it had successfully prosecuted the telecommunications giant for misleading and deceptive conduct through advertising of its “Think Bigger” and “Supersonic” internet plans.
The ACCC alleged Optus had failed to sufficiently disclose that the service would be “speed limited” to 64 kilobytes per second — too slow for Facebook and Youtube — once users exceeded their peak data allowance.
In his judgment, judge Nye Perram ruled that Optus’s television advertisements were “misleading, in my opinion, seriously so”.
“The contravention here is a serious one and the public should be protected from any further repetition of it,” he said.
Justice Perram said there was “no hope” that viewers of the TV advertisement would have seen the words “speed limited if peak data exceeded”.
“Only by the most astute watching of the advertisement and the frequent use of the pause button was I able to make them out at all,” he said.
ACCC chairman Graeme Samuel said yesterday consumers and the ACCC “are, frankly, tired of telcos using complex, confusing and deceptive advertising to fool customers”.
Justice Perram ordered yesterday that Optus be restrained from engaging in similar conduct for the next three years, and that Optus pay the ACCC’s legal costs to date.
An Optus spokeswoman yesterday said the company had never intended to mislead its customers.
Penalties against Optus will be announced on Friday.
Mum killed baby for interrupting Farmville | News.com.au
Mum killed baby for interrupting Farmville
A Florida mum said her son’s head “could have” hit the computer while she abused him. Picture courtesy Zynga/Facebook
A FLORIDA mother charged with shaking her baby to death after he interrupted her Farmville game has pleaded guilty to second-degree murder.
Alexandra V. Tobias, 22, could face life in prison, the Florida Times-Union reported, after the January death of three-month-old Dylan Lee Edmondson.
Angered that the baby was crying while she played FarmVille, a game that uses Facebook as its platform, she allegedly started shaking the baby.
Tobias told investigators she then laid Dylan on the living room couch and smoked a cigarette to compose herself.
The family dog apparently knocked the baby off the couch, causing him to cry some more and Tobias shook Dylan again until he stopped breathing.
She told investigators the boy’s head “could have” hit the computer while she abused him, according to police reports.
Prosecutor Richard Mantei told the Times-Union that Tobias’ plea will help the family avoid reliving the tragedy during a jury trial.
Florida state guidelines call for 25 to 50 years in prison for a second-degree murder charge, but Tobias could face a life sentence, the paper said.
Read more about the child who died for interrupting Farmville at the Florida Times-Union
Man who claims to have found Chaplin ‘time-traveller’ says Chuck Norris not responsible |
Man who claims to have found Chaplin ‘time-traveller’ says Chuck Norris not responsible
Did this woman stumble through a space-time continuum created by a Chuck Norris roundhouse kick?
- 1928 film shows ‘time-traveller’
- Filmmaker answers critics
- “Maybe Norris messed up”
IF Chuck Norris scissor kicked a hole in the space-time continuum, why hasn’t Jean Claude Van Damme patched it up?
Time traveller on film?
Is that a woman talking into a mobile phone in the background of Charlie Chaplin’s 1928 film The Circus?
Herald Sun27 October 2010
Time traveller on film?
Is that a woman talking into a mobile phone in the background of Charlie Chaplin’s 1928 film The Circus?
27 October 2010Herald Sun
The footage – which appears to show an old woman talking on a mobile phone – was taken at the launch of a Charlie Chaplin film, The Circus, and features in the Extras section of a DVD release of the movie.
Since posting his narration of the footage on YouTube along with his claims that time travelling can be the only explanation, Mr Clarke’s star is rising.
Hits for the YouTube video doubled overnight to more than a million, with viewer responses evenly divided between amazement and scorn.
“The biggest surprise I’ve gotten from the public is the fact that some forums and threads have been going strong for the whole week,” Mr Clarke told NEWS.com.au.
“They are still discussing the footage, still sending me theories, and I mean thousands and thousands.”
Mr Clarke said he was happy to answer his critics and took some time to respond to NEWS.com.au readers’ comments, which mainly fell into four variations:
The “no mobile towers or satellites” comment
Matt – “No cell towers means no phones….idiots!”
George Clarke – “Well, the no cell towers theory lets me see how small-minded a lot of people can be in relation to the subject. The fact that the video is focusing on what could be a time traveller, should instantly point out that if that someone had the technology and ability to do so, then they would also have the technology to communicate without the needs we have today for mobile networks.”
The “why release it now” comment
Nick – “This guy says he had the footage a year ago…yet he’s just showing it now?”
George Clarke – “When I first saw the footage, I was more or less happy enough to show it to family and friends to get their views and enjoy their reactions on the piece. This went on for some time, then at my film festival in August I screened to an audience of 100 and again, got the same reactions. I’m a busy boy with my own films, festivals and such, and was always hoping to get something made for Youtube a lot sooner, but only last week – at 1:30am – was I able to do so.”
The “good question”
Les – “if you could time travel, why would waste your time at a Charlie Chaplin premiere?”
George Clarke – “Who says the person in question went back to see the Chaplin premiere? How about, the person went back to an earlier period and got stuck there or was in town doing something else and just happened to stroll on by?”
The “CGI” comment
Alf – “I own the same box set he shows in the clip. I have watched the extra’s portion of The Circus and regret to advise the lady isn’t there. It seems the lady was added by computer graphic imagery by someone in 2010 and agree with the comment that this was done as publicity to promote the filmmaker. Please note if you look at the supposed lady on mobile phone, you can see through her. Her image on film has a slight ghostly effect. She was added into the film.”
George Clarke – “Alf obviously has a different version of the release. The extra feature in question is the 1928 Hollywood Premiere. It’s on my DVD and a number of others from those who have contacted me. In fact, one of those other people put the full six-minute premiere footage on Youtube available through my account as a favourite. I can assure you that I didn’t personally add anything – if I did, why would I hold up the cover, point out the DVD label and urge people to get their own? As for the guys that released the film, I honestly wouldn’t think they would go to so much trouble for a two-second clip. So as for the ghostly effect – well, I can only say it strengthens the mystery of the visitor.”
Mr Clarke says he hasn’t had any feedback about the footage from anyone who might have been close to the original production, but with it spreading through Hollywood “like wildfire”, he expected something soon.
Until then, the prize for the best theory comes from Gully Bill, who suggests that Chuck Norris “scissor kicked a hole in the space-time continuum and the old lady just walked on through on the way to the shops”.
However, Mr Clarke thinks he’s probably learnt enough about time travel this week to provide a plausible explanation for Norrisites.
“Why hasn’t Jean Claude Van Damme went after her and ‘timecopped’ her ass back to where she belongs?” he said.
“It’s possible Chuck messed up, and who knows, if he reads this he just might step up and admit to it.”
We have the technology – astronauts want spaceship to rear-end asteroids and save Earth | Space,
We have the technology – astronauts want spaceship to rear-end asteroids and save Earth
COUNTRIES around the world must team up to help prevent an asteroid, or giant speeding rock, from slamming into Earth, scientists and former astronauts said.
NASA has tracked nearly 7000 near-Earth objects that are bigger than several feet across.
Of those, 1157 are considered “potentially hazardous asteroids”.
“We can’t escape the conclusion that one could happen tomorrow,” former NASA astronaut Thomas D. Jones said of a possible asteroid strike.
“If it happens in the wrong place, it can be deadly. But we now have the technology to prevent them from happening.”
To the experts, risky asteroids are those that come within seven million kilometres of Earth’s orbit. NASA said that currently none of these were near enough or big enough for public concern.
Mr Jones spoke at the European Space Agency’s operational centre in Darmstadt, Germany, where former NASA astronauts and scientists from space agencies across the globe pushed for international space agencies to band together to address the issue from within the UN.
Mr Jones and his colleagues proposed that a group involving the world’s space agencies be established to pool resources to prevent such an asteroid’s impact and to better inform the public of the possible threat.
Russell Schweickart, a former Apollo 9 astronaut, compared the asteroid threat to that of space debris hitting the International Space Station, which he said is “small enough that we can move it out of the way”.
The technology exists that would effectively allow scientists to send a craft into space to rear-end an asteroid, and slightly change its velocity.
“We can’t move the Earth, (so) we have to go up and change the orbit of the asteroid,” Mr Schweickart said.
“It’s the same problem, all relative motion, but it’s a massive undertaking.”
So far, NASA is the only space agency that spends any substantial funds on asteroid research, $US4 million a year, but follow-up research also is conducted by other space agencies.
Any attempt to intercept an asteroid would require the approval of many nations.
“It threatens all parts of the planet, so the solution involves crossing international borders,” Mr Jones said.
Haynes offers Star Trek fans chance to get inside the Enterprise engine room | News.com.au
Haynes offers Star Trek fans chance to get inside the Enterprise engine room
The Haynes manual breaks down the many various USS Enterprise models. Picture courtesy Haynes Source: Supplied
Space technology – unreliable in bridge meltdowns. Someone hand Scotty a Haynes. Source: Supplied
1 of 2
Haynes says its USS Enterprise manual will be available for Christmas in Australia. Picture courtesy Haynes Source: Supplied
IT’S the owners’ manual that any self-respecting starship engineer in the year 2151 wouldn’t be seen without.
As Earth’s first warp-five capable starship in the Federation fleet, there’s a lot to get your head around in the engine room of the USS Enterprise, but one trusty British company has come up with a decidedly low-tech solution.
Haynes, whose iconic range of automobile user manuals help teens and devotees alike keep their cars on the road 10 years after it is sensible to do so, have published a DIY guide to the most famous space voyager of them all.
The 160-page guide covers the entire range of USS Enterprise models, from Captain Jonathan Archer’s original NX-01 from the most recent TV series through to the NCC-1701 under the control of Captain Kirk and her replacement, the NNC-1701-E.
While it might be 140-odd years ahead of its time, the manual will be available this month, guaranteeing Trekkies a perfect Christmas Day of ignoring the family and poring over the details of Triton-class spatial torpedoes and polarised duranium hulls.
“Haynes Enterprise Manual covers the various Enterprises – some in more depth than others – at a level that is accessible to anyone,” Haynes Publishing Book Division editor Derek Smith told the official Star Trek website.
“So it was really about getting the level of technical detail just right.
“What’s also important is that the book shows how the design of these ships evolved from NX-01 through to NCC-1701-E.
“Along the way we go into more detail about the key technologies used on board. People want to know how warp engines work. We explain that.
“People want to know how transporters work. We explain that.”
Haynes even hired the graphic designer who wrote the technical manual for Star Trek scriptwriters – Michael Okuda – to watch over the project and ensure the technology was consistent throughout their special edition.
Each Enterprise model gets the full Haynes cutaway treatment, with details of the bridge, engines and transporter rooms.
Aspiring Scottys even get a step-by-step guide to stripping down their starcraft and rebuilding her for those awkward moments when Zefram Cochrane’s warp drive fails to make the jump into hyperspace.
Haynes said it hoped the manual would be available in Australia “some time in November”.
It will retail for $32.95 and will be available at www.haynes.com.au and through Dymocks, A&R, Borders and speciality bookstores.
GoldenEye’s back – and it’s a Wii classic | Online Video Games Reviews & News | News.com.au
GoldenEye’s back – and it’s a Wii classic
Classic villains, loads of weapons, new choices – all you James Bond wannabes, the game GoldenEye 007 may not be the licence to kill but it…
Herald Sun7 October 2010
Replay: GoldenEye 007
Share this video
Watch More Video
Share: GoldenEye 007
Multiplayer was always the strength of the N64’s GoldenEye – it bigger and better here. Picture: IGN
ACTIVISION, the current owner of the James Bond video game franchise, has approached this, one of the most coveted Bond games, in the same way movie studios are tackling the growing trend of remakes and reboots.
GoldenEye 007 on Wii is sort of a gaming hybrid of what’s happened with Star Trek, Nightmare on Elm Street and Batman Begins, where a popular brand has been given a second go with a new cast, crew, and direction.
What could have ended up a game that cruised on autopilot and simply relied on a name to sell it has turned out to be one of the best first-person shooters on Wii.
GoldenEye has a fantastic single-player campaign that feels both fresh and familiar, and the multiplayer attention – something most GoldenEye Nintendo 64 fans hold near and dear to their hearts – is incredible and something rarely seen on the Nintendo console.
Like it or lump it, for GoldenEye 007 Activision has ousted Pierce Brosnan in favour of the current Bond, Daniel Craig, for the role of 007.
The Craig rendition of Bond is one of the biggest alterations to the character, giving the Ian Fleming spy a much more brutal, thug-like personality than his Connery/Moore/Dalton/Brosnan precursors, and with this single change comes a ripple effect: all the existing roles have been recast, some characters have been removed, and key moments – while true to the GoldenEye film – have been altered to work within the Daniel Craig style of Bond.
The GoldenEye experience itself has also been changed, this time with the upgrade in action – other than being a first-person shooter, this game bears little resemblance to the Nintendo 64 design.
It’s pretty clear that Eurocom looked at the current generation for inspiration, namely the Call of Duty and Halo franchises, so GoldenEye has been updated to appeal to today’s gamer than those latched onto dated decade-and-a-half gameplay.
The game has some of the best Wii Remote controller support seen in a first-person shooter, and with practice it’s clear that the quick and direct aiming of the Wii pointer is the true way to play this game.
There’s a fantastic balance between stealth play and firefights, and in most cases, as long as you don’t alert the enemy to your presence, you can play through much of the game crouched down and sneaking around with stealth melee takedowns and silenced headshots.
But once a guard knows you’re there, it’s an all-out gunfight.
Gunshots connect with a gratifying “thok!” with enemy characters reacting with visual cues of motion captured animation.
Take an enemy down and it’s clear as to whether he’ll stay down or if he’s just wounded.
The multiplayer focus – the portion that’s more than just a wink and a nod to the classic N64 experience – is just as fun and satisfying as the single-player campaign.
Maybe even more so. Don’t expect the same maps from the N64 game, but do expect some brilliant maps designed specifically for the Wii edition.
Every kill, headshot, and kill streak you pull off here is recorded and rewarded via experience points that unlock additional modes and modifications.
Again, it’s nothing new to first-person shooters but it works awesomely in the GoldenEye design.
Verdict: I can understand there’s a bit of resistance to the idea that GoldenEye 007 on Wii is anything but a cash-in for Activision, but believe it when I say that this game is one of the best Wii games of the year.
We’re sorry for claiming Captain Kirk was in command of Captain Picard’s starship | News.com.au
We’re sorry for claiming Captain Kirk was in command of Captain Picard’s starship
Captain Jean Luc Picard was in command of the USS Enterprises D and E. And they never made hyperspace. Source: The Daily Telegraph
- There were many USS Enterprises
- Kirk didn’t captain them all
- Patrick Stewart is handsome
YESTERDAY, a news.com.au article incorrectly stated that the Star Trek starship USS Enterprise-E, otherwise known as model NNC-1701-E, was the successor to Captain Kirk’s original USS Enterprise.
It has since been brought to our attention that the NNC-1701-E in fact came two models after Captain Kirk retired and was under the command of Captain Jean Luc Picard.
User “Your Mum’s Lunch” led the charge of those who correctly pointed out that after losing the original Enterprise to the Klingons, Captain Kirk was given the Excelsior Class Enterprise-B as a stop-gap measure until the refit of the Enterprise-A was completed.
Kirk’s last ship was the Ambassador Class Enterprise-C.
Enterprise-D and Enterprise-E were in fact, the first of the Galaxy Class models and were under the command of Captain Picard.
There were also some concerns about whether the incorrect use of the term “hyperspace” in describing warp drive technology may harm the original Star Trek concept, particularly the books.
News.com.au apologises unreservedly for the error.
There was no intention whatsoever to suggest Captain Kirk may have commanded the Galaxy Class Starships Enterprise-D and Enterprise-E.
Any damage to the Star Trek brand incurred by the use of the term “hyperspace” is regretful.
No malice was intended and a correction to the original article will be made.
We also agree that Patrick Stewart is a handsome man, a sentiment expressed by several readers.
Addendum – We’re also sorry for any errors in this apology.