Lady Gaga to Little Monsters: 'start asking for IPADS FOR XMAS!!'
- 06 September, 2012 19:40
Apple even has the benefit of Lady Gaga fanning hype around its iPad and smartphone leading into next week's anticipated iPhone 5 announcement. The singer this week encouraged her fans (a.k.a. Little Monsters) to "start asking for IPADS FOR XMAS!!" in order to showcase her upcoming album, dubbed ARTPOP.
Following her original website post titled "ARTPOP is not just an ALBUM its a PROJECT," Lady Gaga did comfort her Little Monsters that they actually will be able to enjoy her new album even if they don't have an iPad or iPhone, as it will also be available in traditional formats and as an app on platforms such as Android. "Do not fret!" she wrote in a post following up her original announcement.
The singer is promising a full-flung multimedia experience, including films to go with each song, fashion updates, games and more. She cited Iceland's Bjork as the pioneer in delivering an album as an app.
Lady Gaga's latest iPad reference is far more positive than iPad headlines involving her late last year, when her Twitter and Facebook accounts were hacked for the purpose of leading followers to a scam website offering a free iPad 2.
Also last year, two German men were sentenced in a Duisberg court for hacking computers containing material belonging to Lady Gaga, Dr. Dre and other musicians, stealing their banking data and accessing email accounts.
Gaga has incorporated technology efforts into much of her work, and she has even worked as a creative director for Polaroid, showing off combination sunglasses/camera at the Consumer Electronics Show in 2011.
Bob Brown tracks network research in his Alpha Doggs blog and Facebook page, as well on Twitter and Google +.
Read more about data center in Network World's Data Center section.
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.
Larry Page wants to see your medical records
Dual-Persona Smartphones Not a BYOD Panacea
After two-year hiatus, EFF accepts bitcoin donations again
CIOs struggle to deliver timely mobile business apps: survey
Spiceworks' free management software gets integrated MDM
Detecting APT Activity with Network Traffic Analysis
Today’s successful targeted attacks use a combination of social engineering, malware, and backdoor activities. This research paper will discuss how advanced detection techniques can be used to identify malware command-and control (C&C) communications related to these attacks, illustrating how even the most high-profile and successful attacks of the past few years could have been discovered.
Hybrid IT Service Management: A Requirement for Virtualisation and Cloud Computing
When competition is tough and resources are limited, corporate leaders are depending on growing their existing capabilities in order to grow their business. Information technology can be a unique catalyst for business growth, delivering a competitive advantage when creatively applied to established and emerging problems. Read more on what trends are accelerating the value of IT.
Advanced Malware Exposed
This handbook shines a light on the dark corners of advanced malware, both to educate as well as to spark renewed efforts against these stealthy and persistent threats. By understanding the tools being used by criminals, we can better defend our nations, our critical infrastructures and our citizens. This ebook will provide readers with a new understanding of the rapidly developing cyber threat landscape and practical insights into how they can protect their data and computing infrastructures. Download now.