Skip to main content

Home/ Groups/ CSIA 459
Jessica Riedel

Mozilla: Ad Networks Have No 'Constitutional Right' To Set Cookies - 2 views

  •  
    With all of the privacy issues running rampant today, it looks like Mozilla is taking a stand against third-party cookies. Essentially they want to stop the third-party cookies from collecting data about the user's browsing habits and create the Internet people expect. Even though it isn't mentioned I think its an excellent marketing strategy against other browsers, cough cough Google, that rely on these cookies to track user habits and provide/tailor their product. This is a short description of the article: Mozilla recently drew the ire of the online ad industry by announcing plans to move forward with a project to block third-party cookies in the Firefox browser. Randall Rothenberg, President and CEO of the Interactive Advertising Bureau, publicly called on the company to retreat, arguing that it shouldn't try to implement "economic and cultural policies."
  •  
    It's bad enough that retailers are looking into or actually using camera footage to capture our spending and shopping habits without posting any warning. Thanks for the artical posting.
  •  
    I give Monzilla credit for being the first to step up about this issue. If they could stop the third party cookies I am sure a lot of users would jump over to their browser. The problem is that data is used for advertising which is used by companies like Monzilla to sell advertising space
Jessica Riedel

Annotated Bibliograhpy Sources - 2 views

http://www.pewinternet.org/Reports/2012/Privacy-management-on-social-media/Summary-of-findings.aspx http://books.google.com/books?id=lX50qh2WRKoC&pg=PA146&dq=social+media+AND+privacy&hl=en&sa=X&ei...

bibliography annotated

started by Jessica Riedel on 04 Jul 13 no follow-up yet
Lee Bry

Spatial cloaking for anonymous location-based services in mobile peer-to-peer environments - 1 views

  •  
    Other applications of cloaking other than hiding information during transmission, is the hiding of communication source location(s); knowing where the communications are happening is a real threat for communicators. Spatial cloaking, ability to hide physical objects, in this instance loosely used, provides the ability to keep peer-to-peer (P2P) communication sources anonymous with regards to geographic constraints; however, temporal cloaking is also employed to hide a person's whereabouts during specified times.
Lee Bry

Vendor aims to 'cloak' WEP - 0 views

  •  
    Although quite dated, this reference provides the great disparity of what was thought to be cloaking in 2007 vs. in the present time. The article describes in some detail the need and proposed process for protecting WEP encryption for legacy devices in the protection of credit card users.
Lee Bry

'Temporal cloaking' could bring more secure optical communications - 0 views

  •  
    The process of temporal cloaking is better understood as written by this author. The invention of this technological advance dates back to 2012 by researches from Purdue University while Joseph Lukens, Daniel leaird and Andrew Weiner researched and achieved the capability using off-the-shelf technology commonly used commercial optical communications vs. complex, ultrafast-pulsing lasers. The researchers discovered that manipulating the timing of light pulse propagation causes a phase inversion of the light or zeroing (canceling the light intensity). The zero region is the hole where there is nothing; any data that is placed in the zero region would be cloaked.
Lisa Ruggiero

Time cloaking: how scientists opened a hidden gap in time - 0 views

  •  
    Scientists say they have achieved 'temporal cloaking' - manipulating light in a way that makes it appear as if 50 trillionths of a second never happened. Now, they'll try to expand the gap. By Pete Spotts , Staff writer / January 4, 2012 Forget wrapping an object - say, Harry Potter - in a cloak of invisibility.
Lisa Ruggiero

Temporal Cloaking for telecommunications - 0 views

  •  
    This is from the UMUC library and you will have to log in to see the abstract. I used doc express to get the complete article. It explains how temporal cloaking can be used for faster, secure communications.
Lisa Ruggiero

Demonstration of temporal cloaking - 0 views

  •  
    Abstract: Recent research has uncovered a remarkable ability to manipulate and control electromagnetic fields to produce effects such as perfect imaging and spatial cloaking. To achieve spatial cloaking, the index of refraction is manipulated to flow light from a probe around an object in such a way that a "hole" in space is created, and it remains hidden.
Lisa Ruggiero

Video on Temporal Cloaking - 0 views

  •  
    A video explaining temporal cloaking.
Lisa Ruggiero

Data Switch based on Temporal Cloaking - 1 views

  •  
    This is one of my sources for my emerging tech. I had to used doc express for the full article download, but this gives a good overview. You will have to log in to your UMUC account to view.
Amy Harding

Computer Visionary Who Invented the Mouse - NYTimes.com - 2 views

  •  
    Most of us would not consider the mouse emerging technology - but back in 1968 when the mouse was first introduced that technology was bleeding edge!
Bob Lloyd

Wi-Vi system uses Wi-Fi to see through walls - 0 views

shared by Bob Lloyd on 02 Jul 13 - No Cached
  •  
    Looks like another privacy issue in the near future.
GHISLAIN NCHOTU

Gizmo's Freeware | Find the best freeware fast - 0 views

  •  
    The best freeware independently reviewed and rated by the web's most popular freeware review site
Amy Harding

The Worst Cloud Outages of 2013 (So Far) CIO.com - 2 views

  •  
    Potential Information for your class project.
cpanagopulos

Memory Implants - 7 views

  •  
    Theodore Berger, a biomedical engineer and neuroscientist at the University of Southern California in Los Angeles, envisions a day in the not too distant future when a patient with severe memory loss can get help from an electronic implant. In people whose brains have suffered damage from Alzheimer's, stroke, or injury, disrupted neuronal networks often prevent long-term memories from forming.
  • ...3 more comments...
  •  
    That is awesome!!! Johnny Mnemonic is coming sooner than expected. I watched a grandfather suffer through Alzheimer's. It would be amazing if this could treat such a horrible condition.
  •  
    This is pretty amazing stuff! It would be wonderful if this could actually brought to practical application. We are slowly losing my mother-in-law to dementia or Alzheimer's and it's a terrible process. Losing memories of people is bad enough, but she has lost the ability to perform self-care functions.
  •  
    The fine line between "Crazy" and "Visionary" seems to be demonstrated with this developing technology. Being able to map and store long-term memories in an ailing brain seems remarkable. Achieving this not through drugs or some form of conventional treatment but rather through a silicone chip implanted in the brain is outstanding. I'll be interested in seeing where this development goes.
  •  
    WO!!!! Shut the front door this article is like a science fiction read but the technology if approved for humans can have a dramatic impact on folk who have family members with dementia/Alzheimer as this can possibly make life less stressful for caregivers. It would be nice to see parents and grandparents not have to suffer this dreaded disease if science and technology can provide solution. But I would like to have one myself as I can get all the help I can for TOTAL RECAL!!!
  •  
    Wow, this is crazy. I don't know if I should be terrified or excited. This reminds of the old movie Jonny Mneumonic in the 90s. All these new sciences are great. The only problem that I have is bad people getting a hold of such technologies to exploiting weaker humans. I'm thinking along the line of putting false memories into people's brain and turning them into someone that they are not.
Rumnea Kelly

Intel's TV 'Black Box Project' poised for big changes in debut - 0 views

  •  
    As new devices such as these come on-line, we have to take extra care on how we can secure these things. They are connected directly into our house bypassing any internet firewalls, etc...These devices such as slingbox can be remotely controlled so you're basically leaving the key to your network exposed to everyone around the World.
Joseph Walbert

DISA: Emerging Services - 0 views

  •  
    For the first week I've decided to share the Defense Information Systems Agency (DISA) Emerging Services webpage. This offers a non-DOD individual a chance to explore some of the technologies that are being looked at or currently used by our national assets (Federal and Military).
  •  
    I'm more of a fan to the PKI restricted content, stuff the public can get to seems to be a bulletin board for NG or GD to post their latest brochures.
scott thomas

A practical guide to biometric security technology - 1 views

  •  
    As organizations search for more secure authentication methods for user access, e-commerce. and other security applications, biometrics is gaining increasing attention. But should your company use biometrics? And, if so, which ones should you use and...
  •  
    I think biometrics are great, but really a buggy technology. The two biggest issues I see impeding the popularity of biometrics are consistency and getting people comfortable with the technology.
« First ‹ Previous 121 - 140 of 336 Next › Last »
Showing 20 items per page