Skip to main content

Home/ beyondwebct/ Group items tagged yahoo

Rss Feed Group items tagged

Barbara Lindsey

Top 10 Ways to Find Better Answers Online (that Aren't Google) - 0 views

  •  
    I don't think the author does a good job explaining some of the search engines, for example, Duck Duck Go, or uses a good example with Yahoo answers (that would turn me off right away if I didn't know more about Yahoo answers), but some of these engines are worth exploring.
Barbara Lindsey

Jetliner grounded in San Francisco after threat - Yahoo! News - 0 views

  •  
    What's really interesting is the real-time information and interaction of passengers with those outside the grounded airplane that even prompts airline to response tweet a passenger.
Barbara Lindsey

Protests, cyber-skirmishes rage over WikiLeaks - Yahoo! News - 0 views

  •  
    Mutton said the number of computers spewing out spam had jumped from 400 to 2,000 machines on Wednesday - relatively small numbers, he said, but still apparently enough to overwhelm MasterCard and Visa. "I've been surprised at how effective its been," he said. "You don't need huge numbers of people to carry out an attack like that."
Barbara Lindsey

Open university: Joi Ito plans a radical reinvention of MIT's Media Lab (Wired UK) - 0 views

  • They have a maker space in a church, a place where the kids can learn how to build a computer, a bike shop where they can learn how to do repairs. The kid who runs this place, Jeff Sturges, is awesome.We're sending a bunch of Media Lab people to Detroit to work with local innovators already doing stuff on the ground."
  • in which any bright talent anywhere, academically qualified or not, can be part of the world's leading "antidisciplinary" research lab. "Opening up the lab is more about expanding our reach and creating our network," explains Ito, appointed director in April 2011.
  • as Ito sees it, the formal channels of academia today inhibit progress. "In the old days, being relevant was writing academic papers. Today, if people can't find you on the internet, if they're not talking about you in Rwanda, you're irrelevant. That's the worst thing in the world for any researcher. The people inventing things might be in Kenya, and they go to the internet and search. Funders do the same thing. The old, traditional academic channel is not a good channel for attracting attention, funding, people, or preventing other people from competing with you.
  • ...10 more annotations...
  • You can't actually tell people to think for themselves, or be creative. You have to work with them and have them learn it themselves."
  • "Being open, you're much less likely to have someone competitive emerge and you're also much more likely to find somebody who wants to come to work with you. Innovation is happening everywhere -- not just in the Ivy League schools. And that's why we're working with you guys [at Wired] too -- in the old days, academics didn't want to be in popular magazines. Openness is a survival trait."
  • It was, according to a 1984 briefing document by Negroponte, "designed to be a place where people of dramatically different backgrounds can simultaneously use and invent new media, and where the computer itself is seen as a medium -- part of a communications network of people and machines -- not just an object in front of which one sits."
  • As Ito sees it, the lab's mission "is to come up with ideas that would never be able to occur anywhere else because most places are incremental, directed and disciplinary".
  • There are lots of kids who are not happy with this massive consumerism, this unsustainable growth, but who have really smart science and technology values. That's a type of person we can draw into what I think will become a movement."
  • "We aim to capture serendipity. You don't get lucky if you plan everything -- and you don't get serendipity unless you have peripheral vision and creativity.
  • Our funding model allows our students to do anything they want without asking permission. It's like venture capital: we don't expect every experiment to succeed -- in fact, a lot are failures. But that's great -- failure is another word for discovery. We're very much against incrementalism -- we look for unexplored spaces, and our key metrics for defining a good project are uniqueness, impact and magic."
  • Ito set out some of his key principles. These included: "Encourage rebellion instead of compliance"; "Practice instead of theory"; " Constant learning instead of education"; "Compass over map". "The key principles include disobedience -- no one ever won a Nobel prize by doing as they're told," he explains later. "And it's about resilience versus strength -- you don't try to resist failure, you allow failure and bounce back. And compass over map is important -- you need to know where you're going, but the cost of planning often exceeds the cost of actually trying. The maps you have are often wrong. These principles affect and apply to just about any organisation."
  • In the old days, you needed hundreds of millions of dollars and armies of people to do anything that mattered. Today a couple of kids using open-source software, a generic PC and the internet can create a Google, a Yahoo! and a Facebook in their dorm room, and plug it in and it's working even before they've raised money. That takes all the innovation from the centre and pushes it to the edges -- into the little labs inside the Media Lab; inside dorm rooms; even inside terrorist cells. Suddenly the world is out of control -- the people innovating, disrupting, creating these tools, they're not scholars. They don't care about disciplines. They're antidisciplinary."
  • So when Ito was appointed, Negroponte wanted the press release headlined: "University dropout named director of Media Lab". "But," he says with raised eyebrows, "the fact that he didn't have a degree was buried near the last paragraph. That's the good Peter Thiel -- if you do drop out and do something creative, more power to you."
Barbara Lindsey

Shirky: A Group Is Its Own Worst Enemy - 1 views

  • April 24, 2003
  • I want to talk about a pattern I've seen over and over again in social software that supports large and long-lived groups.
  • definition of social software
  • ...59 more annotations...
  • It's software that supports group interaction
  • how radical that pattern is. The Internet supports lots of communications patterns, principally point-to-point and two-way, one-to-many outbound, and many-to-many two-way.
  • Prior to the Internet, the last technology that had any real effect on the way people sat down and talked together was the table.
  • We've had social software for 40 years at most, dated from the Plato BBS system, and we've only had 10 years or so of widespread availability, so we're just finding out what works. We're still learning how to make these kinds of things.
  • If it's a cluster of half a dozen LiveJournal users, on the other hand, talking about their lives with one another, that's social. So, again, weblogs are not necessarily social, although they can support social patterns.
  • So email doesn't necessarily support social patterns, group patterns, although it can. Ditto a weblog. If I'm Glenn Reynolds, and I'm publishing something with Comments Off and reaching a million users a month, that's really broadcast.
  • So there's this very complicated moment of a group coming together, where enough individuals, for whatever reason, sort of agree that something worthwhile is happening, and the decision they make at that moment is: This is good and must be protected. And at that moment, even if it's subconscious, you start getting group effects. And the effects that we've seen come up over and over and over again in online communities.
  • You are at a party, and you get bored. You say "This isn't doing it for me anymore. I'd rather be someplace else.
  • The party fails to meet some threshold of interest. And then a really remarkable thing happens: You don't leave.
  • That kind of social stickiness is what Bion is talking about.
  • Twenty minutes later, one person stands up and gets their coat, and what happens? Suddenly everyone is getting their coats on, all at the same time. Which means that everyone had decided that the party was not for them, and no one had done anything about it, until finally this triggering event let the air out of the group, and everyone kind of felt okay about leaving.
  • This effect is so steady it's sometimes called the paradox of groups.
  • what's less obvious is that there are no members without a group.
  • there are some very specific patterns that they're entering into to defeat the ostensible purpose of the group meeting together. And he detailed three patterns.
  • The first is sex talk,
  • second basic pattern
  • The identification and vilification of external enemies.
  • So even if someone isn't really your enemy, identifying them as an enemy can cause a pleasant sense of group cohesion. And groups often gravitate towards members who are the most paranoid and make them leaders, because those are the people who are best at identifying external enemies.
  • third pattern Bion identified: Religious veneration
  • The religious pattern is, essentially, we have nominated something that's beyond critique.
  • So these are human patterns that have shown up on the Internet, not because of the software, but because it's being used by humans. Bion has identified this possibility of groups sandbagging their sophisticated goals with these basic urges. And what he finally came to, in analyzing this tension, is that group structure is necessary. Robert's Rules of Order are necessary. Constitutions are necessary. Norms, rituals, laws, the whole list of ways that we say, out of the universe of possible behaviors, we're going to draw a relatively small circle around the acceptable ones.
  • He said the group structure is necessary to defend the group from itself. Group structure exists to keep a group on target, on track, on message, on charter, whatever. To keep a group focused on its own sophisticated goals and to keep a group from sliding into these basic patterns. Group structure defends the group from the action of its own members.
  • technical and social issues are deeply intertwined. There's no way to completely separate them.
  • Some of the users wanted the system to continue to exist and to provide a forum for discussion. And other of the users, the high school boys, either didn't care or were actively inimical. And the system provided no way for the former group to defend itself from the latter.
  • What matters is, a group designed this and then was unable, in the context they'd set up, partly a technical and partly a social context, to save it from this attack from within. And attack from within is what matters.
  • This pattern has happened over and over and over again. Someone built the system, they assumed certain user behaviors. The users came on and exhibited different behaviors. And the people running the system discovered to their horror that the technological and social issues could not in fact be decoupled.
  • nd the worst crisis is the first crisis, because it's not just "We need to have some rules." It's also "We need to have some rules for making some rules." And this is what we see over and over again in large and long-lived social software systems. Constitutions are a necessary component of large, long-lived, heterogenous groups.
  • As a group commits to its existence as a group, and begins to think that the group is good or important, the chance that they will begin to call for additional structure, in order to defend themselves from themselves, gets very, very high.
  • The downside of going for size and scale above all else is that the dense, interconnected pattern that drives group conversation and collaboration isn't supportable at any large scale. Less is different -- small groups of people can engage in kinds of interaction that large groups can't. And so we blew past that interesting scale of small groups. Larger than a dozen, smaller than a few hundred, where people can actually have these conversational forms that can't be supported when you're talking about tens of thousands or millions of users, at least in a single group.
  • So the first answer to Why Now? is simply "Because it's time." I can't tell you why it took as long for weblogs to happen as it did, except to say it had absolutely nothing to do with technology. We had every bit of technology we needed to do weblogs the day Mosaic launched the first forms-capable browser. Every single piece of it was right there. Instead, we got Geocities. Why did we get Geocities and not weblogs? We didn't know what we were doing.
  • It took a long time to figure out that people talking to one another, instead of simply uploading badly-scanned photos of their cats, would be a useful pattern. We got the weblog pattern in around '96 with Drudge. We got weblog platforms starting in '98. The thing really was taking off in 2000. By last year, everyone realized: Omigod, this thing is going mainstream, and it's going to change everything.
  • Why was there an eight-year gap between a forms-capable browser and the Pepys diaries? I don't know. It just takes a while for people to get used to these ideas. So, first of all, this is a revolution in part because it is a revolution. We've internalized the ideas and people are now working with them. Second, the things that people are now building are web-native.
  • A weblog is web-native. It's the web all the way in. A wiki is a web-native way of hosting collaboration. It's lightweight, it's loosely coupled, it's easy to extend, it's easy to break down. And it's not just the surface, like oh, you can just do things in a form. It assumes http is transport. It assumes markup in the coding. RSS is a web-native way of doing syndication. So we're taking all of these tools and we're extending them in a way that lets us build new things really quickly.
  • Third, in David Weinberger's felicitous phrase, we can now start to have a Small Pieces Loosely Joined pattern.
  • You can say, in the conference call or the chat: "Go over to the wiki and look at this."
  • It's just three little pieces of software laid next to each other and held together with a little bit of social glue. This is an incredibly powerful pattern. It's different from: Let's take the Lotus juggernaut and add a web front-end.
  • And finally, and this is the thing that I think is the real freakout, is ubiquity.
  • In many situations, all people have access to the network. And "all" is a different kind of amount than "most." "All" lets you start taking things for granted.
  • But for some groups of people -- students, people in high-tech offices, knowledge workers -- everyone they work with is online. Everyone they're friends with is online. Everyone in their family is online.
  • And this pattern of ubiquity lets you start taking this for granted.
  • There's a second kind of ubiquity, which is the kind we're enjoying here thanks to Wifi. If you assume whenever a group of people are gathered together, that they can be both face to face and online at the same time, you can start to do different kinds of things. I now don't run a meeting without either having a chat room or a wiki up and running. Three weeks ago I ran a meeting for the Library of Congress. We had a wiki, set up by Socialtext, to capture a large and very dense amount of technical information on long-term digital preservation.
  • The people who organized the meeting had never used a wiki before, and now the Library of Congress is talking as if they always had a wiki for their meetings, and are assuming it's going to be at the next meeting as well -- the wiki went from novel to normal in a couple of days.
  • It really quickly becomes an assumption that a group can do things like "Oh, I took my PowerPoint slides, I showed them, and then I dumped them into the wiki. So now you can get at them." It becomes a sort of shared repository for group memory. This is new. These kinds of ubiquity, both everyone is online, and everyone who's in a room can be online together at the same time, can lead to new patterns.
  • "What is required to make a large, long-lived online group successful?" and I think I can now answer with some confidence: "It depends."
  • The normal experience of social software is failure. If you go into Yahoo groups and you map out the subscriptions, it is, unsurprisingly, a power law. There's a small number of highly populated groups, a moderate number of moderately populated groups, and this long, flat tail of failure. And the failure is inevitably more than 50% of the total mailing lists in any category. So it's not like a cake recipe. There's nothing you can do to make it come out right every time.
  • Of the things you have to accept, the first is that you cannot completely separate technical and social issues.
  • So the group is real. It will exhibit emergent effects. It can't be ignored, and it can't be programmed, which means you have an ongoing issue. And the best pattern, or at least the pattern that's worked the most often, is to put into the hands of the group itself the responsibility for defining what value is, and defending that value, rather than trying to ascribe those things in the software upfront.
  • Members are different than users. A pattern will arise in which there is some group of users that cares more than average about the integrity and success of the group as a whole. And that becomes your core group, Art Kleiner's phrase for "the group within the group that matters most."
  • But in all successful online communities that I've looked at, a core group arises that cares about and gardens effectively. Gardens the environment, to keep it growing, to keep it healthy.
  • The core group has rights that trump individual rights in some situations
  • And absolute citizenship, with the idea that if you can log in, you are a citizen, is a harmful pattern, because it is the tyranny of the majority. So the core group needs ways to defend itself -- both in getting started and because of the effects I talked about earlier -- the core group needs to defend itself so that it can stay on its sophisticated goals and away from its basic instincts.
  • All groups of any integrity have a constitution. The constitution is always partly formal and partly informal. A
  • If you were going to build a piece of social software to support large and long-lived groups, what would you design for? The first thing you would design for is handles the user can invest in.
  • Second, you have to design a way for there to be members in good standing. Have to design some way in which good works get recognized. The minimal way is, posts appear with identity.
  • Three, you need barriers to participation.
  • It has to be hard to do at least some things on the system for some users, or the core group will not have the tools that they need to defend themselves.
  • The user of social software is the group, not the individual.
  • Reputation is not necessarily portable from one situation to another
  • If you want a good reputation system, just let me remember who you are. And if you do me a favor, I'll remember it. And I won't store it in the front of my brain, I'll store it here, in the back. I'll just get a good feeling next time I get email from you; I won't even remember why. And if you do me a disservice and I get email from you, my temples will start to throb, and I won't even remember why. If you give users a way of remembering one another, reputation will happen,
Barbara Lindsey

Overview (Powerful Ingredients for Blended Learning) - 0 views

  • Before selecting, creating and using online accounts for this course, students are encouraged to consider the benefits of establishing and maintaining a professional digital footprint.
  • By using an alias or screename unrelated to their actual name, students can maintain public anonymity on the websites and in the web content created to fulfill course requirements.
  • Students are encouraged, but not required, to create a consistent, professional digital footprint through the completion of these course requirements. For more thoughts along these lines, see: Darren Kuropatwa's post, "Google Never Forgets"Jen Wagner's post, "If You Lead….Are You Ready For Them To Follow" Clarence Fisher's post, "Losing Your Footprint Sucks" Wesley Fryer's post, "Google Profiles, Online Reputation Management, and Digital Footprints" Notes from Robyn Treyvaud's presentation, "Our 21st Century Challenge: Developing Responsible, Ethical and Resilient Digital Citizens"Yahoo's Safety website: FAQs about your Digital Reputation The YouTube video, "Digital Footprints – Digital Dossier"
  •  
    Wesley Fryer's course overview. Includes a terrific section on thoughts about student digital footprints, privacy and information disclosure.
Barbara Lindsey

Teaching in Social and Technological Networks « Connectivism - 0 views

  • Students are not confined to interacting with only the ideas of a researcher or theorist. Instead, a student can interact directly with researchers through Twitter, blogs, Facebook, and listservs. The largely unitary voice of the traditional teacher is fragmented by the limitless conversation opportunities available in networks. When learners have control of the tools of conversation, they also control the conversations in which they choose to engage.
  • Traditional courses provide a coherent view of a subject. This view is shaped by “learning outcomes” (or objectives).
  • This cozy comfortable world of outcomes-instruction-assessment alignment exists only in education. In all other areas of life, ambiguity, uncertainty, and unkowns reign.
  • ...21 more annotations...
  • However, in order for education to work within the larger structure of integrated societal systems, clear outcomes are still needed.
  • How can we achieve learning targets when the educator is no longer able to control the actions of learners?
  • I’ve come to view teaching as a critical and needed activity in the chaotic and ambiguous information climate created by networks. In the future, however, the role of the teacher, the educator, will be dramatically different from the current norm. Views of teaching, of learner roles, of literacies, of expertise, of control, and of pedagogy are knotted together. Untying one requires untying the entire model.
  • Most likely, a teacher will be one of the more prominent nodes in a learner’s network. Thoughts, ideas, or messages that the teacher amplifies will generally have a greater probability of being seen by course participants.
  • A curatorial teacher acknowledges the autonomy of learners, yet understands the frustration of exploring unknown territories without a map. A curator is an expert learner. Instead of dispensing knowledge, he creates spaces in which knowledge can be created, explored, and connected.
  • The curator, in a learning context, arranges key elements of a subject in such a manner that learners will “bump into” them throughout the course. Instead of explicitly stating “you must know this”, the curator includes critical course concepts in her dialogue with learners, her comments on blog posts, her in-class discussions, and in her personal reflections. As learners grow their own networks of understanding, frequent encounters with conceptual artifacts shared by the teacher will begin to resonate.
    • Barbara Lindsey
       
      Can you see this as a viable possibility?
  • When I first started learning about the internet (pre-web days), I felt like I had stepped into a alternate realm with its own norms of behaviour and conduct. Bulletin boards and chat rooms presented a challenging mix of navigating social protocols while developing technical skills. By engaging with these conversation spaces – and forming a few tentative connections with others – I was able to find a precarious foothold in the online medium.
  • Today’s social web is no different – we find our way through active exploration. Designers can aid the wayfinding process through consistency of design and functionality across various tools, but ultimately, it is the responsibility of the individual to click/fail/recoup and continue.
  • Social structures are filters. As a learner grows (and prunes) her personal networks, she also develops an effective means to filter abundance. The network becomes a cognitive agent in this instance – helping the learner to make sense of complex subject areas by relying not only on her own reading and resource exploration, but by permitting her social network to filter resources and draw attention to important topics. In order for these networks to work effectively, learners must be conscious of the need for diversity and should include nodes that offer critical or antagonistic perspectives on all topic areas. Sensemaking in complex environments is a social process.
  • Imagine a course where the fragmented conversations and content are analyzed (monitored) through a similar service. Instead of creating a structure of the course in advance of the students starting (the current model), course structure emerges through numerous fragmented interactions. “Intelligence” is applied after the content and interactions start, not before. This is basically what Google did for the web – instead of fully defined and meta-described resources in a database, organized according to subject areas (i.e. Yahoo at the time), intelligence was applied at the point of search. Aggregation should do the same – reveal the content and conversation structure of the course as it unfolds, rather than defining it in advance.
    • Barbara Lindsey
       
      This would really change how courses are currently taught. How would current course, program, departmental, school-wide assessments, evaluations react?
  • Educators often have years or decades of experience in a field. As such, they are familiar with many of the concepts, pitfalls, confusions, and distractions that learners are likely to encounter. As should be evident by now, the educator is an important agent in networked learning. Instead of being the sole or dominant filter of information, he now shares this task with other methods and individuals.
  • Filtering can be done in explicit ways – such as selecting readings around course topics – or in less obvious ways – such as writing summary blog posts around topics. Learning is an eliminative process. By determining what doesn’t belong, a learner develops and focuses his understanding of a topic. The teacher assists in the process by providing one stream of filtered information. The student is then faced with making nuanced selections based on the multiple information streams he encounters. The singular filter of the teacher has morphed into numerous information streams, each filtered according to different perspectives and world views.
  • During CCK08/09, one of Stephen’s statements that resonated with many learners centers on modelling as a teaching practice: “To teach is to model and to demonstrate. To learn is to practice and to reflect.”
  • Apprenticeship learning models are among the most effective in attending to the full breadth of learning. Apprenticeship is concerned with more than cognition and knowledge (to know about) – it also addresses the process of becoming a carpenter, plumber, or physician.
  • Without an online identity, you can’t connect with others – to know and be known. I don’t think I’m overstating the importance of have a presence in order to participate in networks. To teach well in networks – to weave a narrative of coherence with learners – requires a point of presence.
  • In CCK08/09, we used The Daily, the connectivism blog, elearnspace, OLDaily, Twitter, Facebook, Ning, Second Life, and numerous other tools to connect with learners. Persistent presence in the learning network is needed for the teacher to amplify, curate, aggregate, and filter content and to model critical thinking and cognitive attributes that reflect the needs of a discipline.
  • We’re
  • We’re still early in many of these trends. Many questions remain unanswered about privacy, ethics in networks, and assessment. My view is that change in education needs to be systemic and substantial. Education is concerned with content and conversations. The tools for controlling both content and conversation have shifted from the educator to the learner. We require a system that acknowledges this reality.
  • Aggregation had so much potential. And yet has delivered relatively little over the last decade.
  • Perhaps we need to spend more time in information abundant environments before we turn to aggregation as a means of making sense of the landscape.
  • I’d like a learning system that functions along the lines of RescueTime – actively monitoring what I’m doing – but then offers suggestions of what I should (or could) be doing additionally. Or a system that is aware of my email exchanges over the last several years and can provide relevant information based on the development of my thinking and work.
    • Barbara Lindsey
       
      Would you welcome this kind of feedback on your private exchanges?
Barbara Lindsey

The New Gold Mine: Your Personal Information & Tracking Data Online - WSJ.com - 0 views

  • the tracking of consumers has grown both far more pervasive and far more intrusive than is realized by all but a handful of people in the vanguard of the industry. • The study found that the nation's 50 top websites on average installed 64 pieces of tracking technology onto the computers of visitors, usually with no warning. A dozen sites each installed more than a hundred. The nonprofit Wikipedia installed none.
  • the Journal found new tools that scan in real time what people are doing on a Web page, then instantly assess location, income, shopping interests and even medical conditions. Some tools surreptitiously re-spawn themselves even after users try to delete them. • These profiles of individuals, constantly refreshed, are bought and sold on stock-market-like exchanges that have sprung up in the past 18 months.
  • Advertisers once primarily bought ads on specific Web pages—a car ad on a car site. Now, advertisers are paying a premium to follow people around the Internet, wherever they go, with highly specific marketing messages.
  • ...22 more annotations...
  • "It is a sea change in the way the industry works," says Omar Tawakol, CEO of BlueKai. "Advertisers want to buy access to people, not Web pages."
  • The Journal found that Microsoft Corp.'s popular Web portal, MSN.com, planted a tracking file packed with data: It had a prediction of a surfer's age, ZIP Code and gender, plus a code containing estimates of income, marital status, presence of children and home ownership, according to the tracking company that created the file, Targus Information Corp.
  • Tracking is done by tiny files and programs known as "cookies," "Flash cookies" and "beacons." They are placed on a computer when a user visits a website. U.S. courts have ruled that it is legal to deploy the simplest type, cookies, just as someone using a telephone might allow a friend to listen in on a conversation. Courts haven't ruled on the more complex trackers.
  • tracking companies sometimes hide their files within free software offered to websites, or hide them within other tracking files or ads. When this happens, websites aren't always aware that they're installing the files on visitors' computers.
  • Often staffed by "quants," or math gurus with expertise in quantitative analysis, some tracking companies use probability algorithms to try to pair what they know about a person's online behavior with data from offline sources about household income, geography and education, among other things. The goal is to make sophisticated assumptions in real time—plans for a summer vacation, the likelihood of repaying a loan—and sell those conclusions.
  • Consumer tracking is the foundation of an online advertising economy that racked up $23 billion in ad spending last year. Tracking activity is exploding. Researchers at AT&T Labs and Worcester Polytechnic Institute last fall found tracking technology on 80% of 1,000 popular sites, up from 40% of those sites in 2005.
  • The Journal found tracking files that collect sensitive health and financial data. On Encyclopaedia Britannica Inc.'s dictionary website Merriam-Webster.com, one tracking file from Healthline Networks Inc., an ad network, scans the page a user is viewing and targets ads related to what it sees there.
    • Barbara Lindsey
       
      Tracking you an targeting ads to you on a popular dictionary site!
  • Beacons, also known as "Web bugs" and "pixels," are small pieces of software that run on a Web page. They can track what a user is doing on the page, including what is being typed or where the mouse is moving.
  • The majority of sites examined by the Journal placed at least seven beacons from outside companies. Dictionary.com had the most, 41, including several from companies that track health conditions and one that says it can target consumers by dozens of factors, including zip code and race.
  • After the Journal contacted the company, it cut the number of networks it uses and beefed up its privacy policy to more fully disclose its practices.
  • Flash cookies can also be used by data collectors to re-install regular cookies that a user has deleted. This can circumvent a user's attempt to avoid being tracked online. Adobe condemns the practice.
  • Most sites examined by the Journal installed no Flash cookies. Comcast.net installed 55.
  • Wittingly or not, people pay a price in reduced privacy for the information and services they receive online. Dictionary.com, the site with the most tracking files, is a case study.
  • Think about how these technologies and the associated analytics can be used in other industries and social settings (e.g. education) for real beneficial impacts. This is nothing new for the web, the now that it has matured, it can be a positive game-changer.
  • Media6Degrees Inc., whose technology was found on three sites by the Journal, is pitching banks to use its data to size up consumers based on their social connections. The idea is that the creditworthy tend to hang out with the creditworthy, and deadbeats with deadbeats.
  • "There are applications of this technology that can be very powerful," says Tom Phillips, CEO of Media6Degrees. "Who knows how far we'd take it?"
  • Hidden inside Ashley Hayes-Beaty's computer, a tiny file helps gather personal details about her, all to be put up for sale for a tenth of a penny.
  • "We can segment it all the way down to one person," says Eric Porres, Lotame's chief marketing officer.
  • One of the fastest-growing businesses on the Internet, a Wall Street Journal investigation has found, is the business of spying on Internet users.
  • Yahoo Inc.'s ad network,
  • "Every time I go on the Internet," she says, she sees weight-loss ads. "I'm self-conscious about my weight," says Ms. Reid, whose father asked that her hometown not be given. "I try not to think about it…. Then [the ads] make me start thinking about it."
  • Information about people's moment-to-moment thoughts and actions, as revealed by their online activity, can change hands quickly. Within seconds of visiting eBay.com or Expedia.com, information detailing a Web surfer's activity there is likely to be auctioned on the data exchange run by BlueKai, the Seattle startup.
  •  
    a New York company that uses sophisticated software called a "beacon" to capture what people are typing on a website
1 - 12 of 12
Showing 20 items per page