Skip to main content

Home/ Groups/ CSIA 459
Jessica Riedel

Mozilla: Ad Networks Have No 'Constitutional Right' To Set Cookies - 2 views

  •  
    With all of the privacy issues running rampant today, it looks like Mozilla is taking a stand against third-party cookies. Essentially they want to stop the third-party cookies from collecting data about the user's browsing habits and create the Internet people expect. Even though it isn't mentioned I think its an excellent marketing strategy against other browsers, cough cough Google, that rely on these cookies to track user habits and provide/tailor their product. This is a short description of the article: Mozilla recently drew the ire of the online ad industry by announcing plans to move forward with a project to block third-party cookies in the Firefox browser. Randall Rothenberg, President and CEO of the Interactive Advertising Bureau, publicly called on the company to retreat, arguing that it shouldn't try to implement "economic and cultural policies."
  •  
    It's bad enough that retailers are looking into or actually using camera footage to capture our spending and shopping habits without posting any warning. Thanks for the artical posting.
  •  
    I give Monzilla credit for being the first to step up about this issue. If they could stop the third party cookies I am sure a lot of users would jump over to their browser. The problem is that data is used for advertising which is used by companies like Monzilla to sell advertising space
Jessica Riedel

Annotated Bibliograhpy Sources - 2 views

http://www.pewinternet.org/Reports/2012/Privacy-management-on-social-media/Summary-of-findings.aspx http://books.google.com/books?id=lX50qh2WRKoC&pg=PA146&dq=social+media+AND+privacy&hl=en&sa=X&ei...

bibliography annotated

started by Jessica Riedel on 04 Jul 13 no follow-up yet
Michael Madrzykowski

Annotated Bibliography sources - 0 views

Percy Kendrick

ANNOTATED BIBLIOGRAPHY SOURCES - 0 views

  •  
    Article discusses ideas on securing processes on outsourcing into the cloud which may be a good ideas as most folk or companies will require a vendor to perform cloud services.
Percy Kendrick

ANNOTATED BIBLIOGRAPHY SOURCES - 0 views

  •  
    How to secure a robust cloud storage with cryptography and access control.
Percy Kendrick

ANNOTATED BIBLOGRAPHY SOURCES - 0 views

  •  
    A review of security on the cloud.
scott thomas

Fingerprint Biometrics Allow Hospitals to Securely Access e-Prescriptions, EHRs - 0 views

  •  
    By Brian T. Horowitz | Posted 2011-03-02 Email Print Biometrics firms Bio-key and Lumidigm aid Genesis HealthCare System in Ohio in implementing finger-based biometrics for e-prescriptions and electronic health records.
Lee Bry

Spatial cloaking for anonymous location-based services in mobile peer-to-peer environments - 1 views

  •  
    Other applications of cloaking other than hiding information during transmission, is the hiding of communication source location(s); knowing where the communications are happening is a real threat for communicators. Spatial cloaking, ability to hide physical objects, in this instance loosely used, provides the ability to keep peer-to-peer (P2P) communication sources anonymous with regards to geographic constraints; however, temporal cloaking is also employed to hide a person's whereabouts during specified times.
Lee Bry

Vendor aims to 'cloak' WEP - 0 views

  •  
    Although quite dated, this reference provides the great disparity of what was thought to be cloaking in 2007 vs. in the present time. The article describes in some detail the need and proposed process for protecting WEP encryption for legacy devices in the protection of credit card users.
Lee Bry

'Temporal cloaking' could bring more secure optical communications - 0 views

  •  
    The process of temporal cloaking is better understood as written by this author. The invention of this technological advance dates back to 2012 by researches from Purdue University while Joseph Lukens, Daniel leaird and Andrew Weiner researched and achieved the capability using off-the-shelf technology commonly used commercial optical communications vs. complex, ultrafast-pulsing lasers. The researchers discovered that manipulating the timing of light pulse propagation causes a phase inversion of the light or zeroing (canceling the light intensity). The zero region is the hole where there is nothing; any data that is placed in the zero region would be cloaked.
Amy Harding

Computer Visionary Who Invented the Mouse - NYTimes.com - 2 views

  •  
    Most of us would not consider the mouse emerging technology - but back in 1968 when the mouse was first introduced that technology was bleeding edge!
Lisa Ruggiero

Data Switch based on Temporal Cloaking - 1 views

  •  
    This is one of my sources for my emerging tech. I had to used doc express for the full article download, but this gives a good overview. You will have to log in to your UMUC account to view.
Lisa Ruggiero

Video on Temporal Cloaking - 0 views

  •  
    A video explaining temporal cloaking.
Lisa Ruggiero

Demonstration of temporal cloaking - 0 views

  •  
    Abstract: Recent research has uncovered a remarkable ability to manipulate and control electromagnetic fields to produce effects such as perfect imaging and spatial cloaking. To achieve spatial cloaking, the index of refraction is manipulated to flow light from a probe around an object in such a way that a "hole" in space is created, and it remains hidden.
Lisa Ruggiero

Temporal Cloaking for telecommunications - 0 views

  •  
    This is from the UMUC library and you will have to log in to see the abstract. I used doc express to get the complete article. It explains how temporal cloaking can be used for faster, secure communications.
Lisa Ruggiero

Time cloaking: how scientists opened a hidden gap in time - 0 views

  •  
    Scientists say they have achieved 'temporal cloaking' - manipulating light in a way that makes it appear as if 50 trillionths of a second never happened. Now, they'll try to expand the gap. By Pete Spotts , Staff writer / January 4, 2012 Forget wrapping an object - say, Harry Potter - in a cloak of invisibility.
Lee Bry

A temporal cloak at telecommunication data rate - 1 views

  •  
    The authors describe the most recent interactions with temporal cloaking and how it hides events in time altered spatial gaps that are not detected. The thought is that data can be hidden in the gaps, and thus providing a practical method for securing information during transmissions.
  •  
    Lee thank you for the summary. I read the article and was pretty amazed at the possibility. I seemed like something from a science fiction movie or a Star Trek show. The minds that can study these things are absolutely amazing.
1 - 20 Next › Last »
Showing 20 items per page