Google major sponsor of CPAC?

The left-leaning, White House shoulder-rubbing Google will be quite visible at a leading conservative event this month. What’s up with that? Google will be a major sponsor of this year’s Conservative Political Action Committee annual conference in Washington, D.C., this week.

Conservative blogger Sean Hackbarth observed, “This is Google’s most aggressive attempt at reaching out to the conservative movement. I saw an effort first-hand at the 2008 GOP convention when Eric Schmidt had a meet-and-greet with conservative webloggers. It went fine, but there was no follow-up. The distance and distrust between the company and the right continued.

“Throwing money around and talking up G+ won’t be enough to connect,” Hackbarth predicts. “They have to make a concerted effort towards activists, take their concerns and issues serious, and answer their questions when they’re having problems with Google services.”

As an “oh by the way,” Google spent approximately $390,000 (out of $3,760,000.00 total) on SOPA and PIPA lobbying, which included attempts to educate lawmakers on SOPA and the DMCA. The filing with the Federal Election Committee is available online in a PDF here.

ChiComs cut Internet over Tibetan unrest

When newspapers and radio were the only means of mass communication, it was easy for the Chinese Communists to censor and control the dissemination of whatever was happening within their borders. Today, all they have to do is pull the plug. And that’s what the Chinese government has done, cutting off the Internet and mobile phone signals for 30 miles around the scene where many were shot dead amid clashes in Tibetan Sichuan. It’s not the first time China has put up a “great wall.”

“In 2009, China cut off Internet and text messaging services across the north-western region of Xinjiang after ethnic riots in the capital, Urumqi, left almost 200 dead,” London’s Guardian reported.

Hawaii may track visited Internet sites

Hawaii’s legislature is moving toward requiring Aloha State residents’ Internet providers to track every website their customers visit and save that info for two years.

H.B. 2288 (PDF) would require IP providers to create a virtual dossier on state residents, including Internet destination history information and subscriber information, such as name and address.

Democratic Rep. John Mizuno of Oahu, who also introduced H.B. 2287, a computer-crime bill, is the lead sponsor.

Oscars vulnerable to cyber attacks, some say

The Academy of Arts and Sciences has decided to use computerized voting for the 2013 Oscars, switching from paper to electronic ballots. But that has many computer experts concerned that this leaves the Oscar voting process open to hacking and other methods of foul play. Here’s what they’re saying.

This year’s 84th Academy Awards ceremony will take place Feb. 26 at the Kodak Theatre in Hollywood, California, and will be televised on ABC.

U.K. Sun says tweets and blogs threaten its future

If you’re still taking the paper, have you noticed how much it has shrunk? The numbers of pages and their actual size, along with readership and advertising dollars, are rapidly reducing.

“We are competing for eyeballs with social media,” says Dominic Mohan, editor of The Sun. Twitter and celeb-focused blogs are giving newspapers like The Sun a run for their money, providing immediate scandal items and other news content once exclusively the realm of the tabloids and other papers.

One hundred million of them. Here are ten.

What do a famous 80-year-old, a young entrepreneur, a holy Tibetan and the Pope have in common? You’ll never guess, so you might as well click here to find out who, of 100 million, are actively engaged in it.

Who’s your most valuable follower?

A new app called MVF helps you determine who your most valuable Twitter follower is. The value is measured by the ratio of number of your followers to the number of people you follow. Why would you need that info? Follow this valuable link to find out.

Why are teens leaving Facebook for Twitter?

It’s the age-old reason: Privacy. Privacy? On Twitter??? Yep, teens have realized that Facebook allows Mom and Dad and Grandma and other family members to see what they’re posting. Twitter, on the other hand, allows them to use pseudonyms and lock their accounts so only friends have access. It’s where they can fly anonymously, something young adults crave.

Twitter is oh, so enticing …

What’s more tempting than sex or sleep? Believe it or not, experts who measure these things say it is tweeting. Really. It’s low cost, low risk and easy to do anywhere.

“A team from the University of Chicago’s Booth School of Business that conducted an experiment with more than 200 people to try to gauge what tempts them most. Lead researcher Wilhelm Hofmann explained to the Guardian that the participants, located in the German city of Wurtzburg, were pinged seven times a day via their BlackBerrys and asked to report any desires they had experienced in the past 30 minutes, as well as the intensity of each want.”

Read more to find out what they said.

Yet as alluring as Twitter is, not all Tweets are worth reading. In fact, a study shows that fully a quarter of them – 25 percent – aren’t worth the time spent reading them.

“Researchers at Carnegie Mellon University, the Massachusetts Institute of Technology and the Georgia Institute of Technology found that users say only a little more than a third of the tweets they receive are worthwhile. Other tweets are either so-so or, in one out of four cases, not worth reading at all,” Carnegie Mellon reports.

Learn how you can make your tweets more alluring in these nine easy lessons.

“Who Gives a Tweet?” was created to collect readers’ tweet evaluations, which will be presented at the Feb. 13 Association for Computing Machinery’s Conference on Computer Supported Cooperative Work in Seattle.

Note: Read our discussion guidelines before commenting.