Skip to main content

Home/ Groups/ 91.113 Exploring the Internet
P Krolak

What is the future of the Internet - 0 views

  •  
    What is the future of the Internet? Where will the bandwidth be in 5 -10 years be and how will it effect the convergence of mobile devices? What apps will it allow not possible at today's communication networks? With the advent of cloud computing and storage capability rapidly expanding what information and or data bases become possible.
P Krolak

Facebook U-turns on data sharing - 0 views

  •  
    Facebook appears to have U-turned on plans to allow external websites to see users' addresses and mobile phone numbers. Security experts pointed out that such a system would be ripe for exploitation from rogue app developers. The feature has been put on "temporary hold", the social networking firm said in its developers blog.
P Krolak

Cleaning machines 'based on military robots' - 0 views

  •  
    Experts have been promising for decades to put a robot in everyone's home - and finally robots are beginning to make the transition from specialist to everyday use. Spencer Kelly discovers the similarities between robots used for cleaning and those used by soldiers in Afghanistan for a very different purpose.
P Krolak

Google begins Amazon Street View - 0 views

  •  
    Google is expanding its Street View service into some of the world's most remote places. It will photograph the Amazon and Rio Negro Rivers of northwest Brazil in partnership with charity Foundation for a Sustainable Amazon (FAS). Google will train local people to collect images, and will leave behind equipment so work continues long-term.
P Krolak

Art Project, powered by Google - 0 views

  •  
    The Google Art Project -- A Visitor Guide This project allows one to visit the great art museums of the world. It includes the art and a interactive walking tour of the museum.
P Krolak

Google Maps to charge for usage 31 October 2011 - 0 views

  •  
    Users of Google Map links for their websites will be charged for heavy usage of the service, it has been revealed. From 1 January 2012, Google will charge for the Google Maps API service when more than the limit of 25,000 map "hits" are made in a day. Websites, especially travel firms, use Google Maps to link customers to a view of the destinations they inquire about. Google is rumoured to be charging $4 per 1,000 views in excess of the limit.
P Krolak

Devs respond to Google Maps API limits - 0 views

  •  
    Google Maps has introduced usage limits. According to a blog post by Thor Mitchell, product manager, Google Maps API, developers must now reduce their usage below set limits, opt-in to paying for excess usage or purchase a Maps API Premier licence. Update: A Google spokesperson has provided .net with the following statement: "Non-profits are not subject to these usage limits. For example, a disaster relief map is not subject to the usage limits even if it has been developed and/or is hosted by a commercial entity. In addition we recommend that eligible non-profits apply for a Maps API Premier license through the Google Earth Outreach program. This provides a number of benefits, including the right to opt-out of advertising, higher quotas for Maps API web services, and technical support." "We understand that developers need time to evaluate their usage, determine if they are affected, and respond if necessary," said Mitchell, noting that enforcement will only occur as of early 2012. He reasoned as follows on the changes: "[For] continued growth in adoption of the Maps API we need to secure its long-term future by ensuring that even when used by the highest volume for-profit sites, the service remains viable." Developers we contacted were split on the decision. Matthew Budd of Yammayap told us he's "been using the Google Maps API for years and restrictions come and go". He said that Google realises its system is widely used and imposing restrictions is inevitable. "All this restriction does is clarify the reasoning behind using Google Maps as a solution and shouldn't affect general everyday usage, where a whole online application doesn't rely on it," he added, suggesting that if you do need to use Google Maps as the basis for a whole application for a client, it makes sense to purchase a Premier license to lift the restrictions.
P Krolak

'Nitro' Hackers Reportedly Attack Dozens of Companies in Chemical, Defense Industries ... - 0 views

  •  
    Hackers reportedly used an off-the-shelf computer attack created in China to compromise the computers of at least 48 companies, including in the chemical and defense industries -- an attack described as being similar to the notorious Stuxnet virus, if not as severe. The goal of the attacks, reported Monday by security software company Symantec, "appears to be to collect intellectual property such as design documents, formulas, and manufacturing processes." The purpose: "industrial espionage, collecting intellectual property for competitive advantage." Symantec dubbed the attack "Nitro" and said a total of 29 companies in the chemical industry were targeted, in addition to 19 in other sectors, starting in late July. Among the companies were some that develop materials used primarily in military vehicles. Read more: http://www.foxnews.com/scitech/2011/10/31/nitro-hackers-reportedly-attack-dozens-companies-in-chemical-defense-industries/?test=latestnews#ixzz1cTIClsp4
P Krolak

GCHQ chief reports 'disturbing' cyber-attacks on UK - 0 views

  •  
    yber attacks on the UK are at "disturbing" levels, according to the director of Britain's biggest intelligence agency. Government computers, along with defence, technology and engineering firms' designs have been targeted, Iain Lobban, the head of GCHQ, has said. China and Russia are thought to be among the worst culprits involved in cyber attacks. On Tuesday, the government hosts a two-day conference on the issue. Foreign Secretary William Hague convened the London Conference on Cyberspace after criticism that ministers are failing to take the threat from cyberwarfare seriously enough.
P Krolak

'Hackers' cut Palestinian phone and internet systems - 0 views

  •  
    The main phone network in the West Bank and Gaza has suffered a sustained attack by computer hackers, the Palestinian Authority (PA) says. It says most of the Palestinian territory has lost internet service. PA spokesman Ghassan Ghattib said the attacks started in the morning and came from multiple sources around the world. He said he did not know if the hacking was linked to the Palestinian leadership's successful bid to get membership of Unesco on Monday. The move by the UN's cultural and scientific organisation was strongly criticised by Israel and the United States. The US immediately announced it was cutting off all of its funding to UN body. Prolonged lack of access to the internet would prove costly to many Palestinian businesses.
P Krolak

Feds concerned about hackers opening prison doors - 0 views

  •  
    This almost reads like something out of a made for TV movie but is real.;-( Federal authorities are concerned about new research showing U.S. prisons are vulnerable to computer hackers, who could remotely open cell doors to aid jailbreaks. The Federal Bureau of Prisons is "aware of this research and taking it very seriously," spokesman Chris Burke told The Washington Times. Mr. Burke was reacting to research by private experts who found that the security systems in most American prisons are run by computer software vulnerable to hackers. "You could open every cell door, and the system would be telling the control room they are all closed," said John J. Strauchs, a former CIA operations officer who helped develop a cyber-attack on a simulated prison computer system and described it at a hackers' convention in Miami last week. The security systems in most American prisons are run by special computer equipment called industrial control systems, or ICS. They are also used to control power plants, water treatment facilities and other critical national infrastructure. ICS has increasingly been targeted by hackers because an attack on one such system successfully sabotaged Iran's nuclear program in 2009.
P Krolak

shred-financial-documents-mainstreet: Personal Finance News from Yahoo! Finance - 0 views

  •  
    by Matt BrownellFriday, October 21, 2011 According to financial services consulting firm Javelin Strategies and Research, identity theft affects 11 million people a year, at a cost of $54 billion. If you don't want to become a statistic, a good place to start is to get a shredder.
P Krolak

Foundations of security: what every programmer needs to know (Google eBook) - 0 views

  •  
    Foundations of Security: What Every Programmer Needs to Know teaches new and current software professionals state-of-the-art software security design principles, methodology, and concrete programming techniques they need to build secure software systems. Once youre enabled with the techniques covered in this book, you can start to alleviate some of the inherent vulnerabilities that make today's software so susceptible to attack. The book uses web servers and web applications as running examples throughout the book. For the past few years, the Internet has had a "wild, wild west" flavor to it. Credit card numbers are stolen in massive numbers. Commercial web sites have been shut down by Internet worms. Poor privacy practices come to light and cause great embarrassment to the corporations behind them. All these security-related issues contribute at least to a lack of trust and loss of goodwill. Often there is a monetary cost as well, as companies scramble to clean up the mess when they get spotlighted by poor security practices. It takes time to build trust with users, and trust is hard to win back. Security vulnerabilities get in the way of that trust. Foundations of Security: What Every Programmer Needs To Know helps you manage risk due to insecure code and build trust with users by showing how to write code to prevent, detect, and contain attacks. The lead author cofounded the Stanford Center for Professional Development Computer Security Certification. This book teaches you how to be more vigilant and develop a sixth sense for identifying and eliminating potential security vulnerabilities. Youll receive hands-on code examples for a deep and practical understanding of security. Youll learn enough about security to get the job done.
P Krolak

Robot wars 'still a long way off' - 0 views

  •  
    Despite the US Department of Defense once predicting that a third of US fighting strength would be composed of robots by 2015, experts warn that the machine wars seen in the movies will remain science fiction for quite some time yet.
P Krolak

Your digital rights at work a FAQ guide - 0 views

  •  
    The office is an area of evolving legal issues for digital rights. What postings on social media can get you fired? Who owns the email and what are your rights to privacy? These are only a few legal issues faced by employees.
P Krolak

Social Media and Law Enforcement: Who Gets What Data and When? - 0 views

  •  
    We have been investigating how the government seeks information from social networking sites such as Twitter and how the sites respond to these requests in our ongoing social networking Freedom of Information Act (FOIA) request, filed with the help of UC Berkeley's Samuelson Law, Technology & Public Policy Clinic. As part of our request to the Department of Justice and other federal agencies, we asked for copies of the guides the sites themselves send out to law enforcement explaining how agents can obtain information about a site's users and what kinds of information are available. The information we got back enabled us to make an unprecedented comparison of these critical documents, as most of the information was not available publicly before now.
P Krolak

How US Government Spies Use Facebook (Updated) - 0 views

  •  
    The US Department of Justice this week released slides from a presentation deck titled Obtaining and Using Evidence from Social Networking Sites. The document was released in response to a Freedom of Information Act request by the Electronic Frontier Foundation (EFF). The DoJ presentation describes Facebook as much more co-operative with law enforcement requests for user information than Twitter and MySpace are. Update: Facebook's Barry Schnitt contests this interpretation of the document, says the company is resistant to illegitimate government requests for user information and offers one example of that resistance in a comment posted below. The document also explains to officers what the advantages of going undercover on social networking sites are. The EFF posted IRS training documents for using various internet tools as well, including Google Street View, but those were much tamer than the Justice file.
P Krolak

Google releases tool to show government censorship requests - 0 views

  •  
    Google has hit out at state attempts to clamp down on the internet by revealing governments' requests to remove data from the web and get information about users. Tonight it released a web page with a map showing country by country where it has had government requests or court orders to remove content from the YouTube video service or its search results, or to provide details about users of its services.
P Krolak

Transparency Report - 0 views

  •  
    Like other technology and communications companies, Google regularly receives requests from government agencies and federal courts around the world to remove content from our services and hand over user data. Our Government Requests tool discloses the number of requests we receive from each government in six-month periods with certain limitations.
‹ Previous 21 - 40 Next › Last »
Showing 20 items per page