Skip to main content

Home/ Future of the Web/ Group items tagged digital

Rss Feed Group items tagged

Gonzalo San Gil, PhD.

The Linux Digital DJ - 0 views

  •  
    "BeatForce a computer DJ system for two players with independent playlists, song databases, mixers, samplers, et cetera BpmDj very interesting set of programs for the Linux DJ DBMix software DJ digital audio mixing system DJ Krazy a neat MP3/CD mixer for the Linux DJ in us all... DJPlay "aims to be a high-class live DJing application for Linux" Final Scratch pro-audio computerized DJ system from Stanton Magnetics GDAM Geoff & Dave's Audio Mixer, a new mixer for the Linux digital DJ Jay'O'Rama cool DJ tool for PCM/MP3/OGG playback and manipulation Mixxx a cool DJ mixer from the Andersen brothers MP3Mixer a system for mixing multiple MPEG audio streams in realtime Oolaboola virtual turntable fun with Eric Tiedemann's "open-source cyber-shamanic noise-maker" OpenJay dedicated site for open-source DJs OpenJay Development Krew Forum a site dedicated to discussing "...problems, code, techniques, tips & tricks and all issues related to the computer DJing world" UltraMixer very cool virtual DJ mixing software, requires Java terminatorX enables hip-hop style "scratching" of WAV files "
Gonzalo San Gil, PhD.

Cómo ordenar tu identidad digital | Internautas.org - 0 views

  •  
    [Como en cualquier faceta de nuestra vida, llegan momentos en los que necesitamos pararnos a pensar para reorganizar las ideas y así volver a enfocar hacia nuestro objetivo y seguir nuestro camino. 17-12-2012 - En nuestra vida 2.0, nuestra identidad digital va creciendo con el paso del tiempo. En esta evolución pasamos por diferentes etapas: exploración, iniciación, crecimiento, madurez y declive.]
Gonzalo San Gil, PhD.

This lawsuit could be the beginning of the end for DRM | Defective by Design - 1 views

  •  
    Submitted by Zak Rogoff on August 17, 2016 - 9:20am Our friends at the Electronic Frontier Foundation (EFF) recently filed a lawsuit challenging Section 1201 of the US's Digital Millenium Copyright Act, which provides legal reinforcement to the technical shackles of Digital Restrictions Management (DRM). Defective by Design applauds this lawsuit and agrees with the EFF that Section 1201 violates the right to freedom of speech. We hope that excising Section 1201 from US law can be the beginning of the end for DRM.
Gonzalo San Gil, PhD.

What is Blockchain Technology? A Step-by-Step Guide For Beginners - 0 views

  •  
    "The blockchain is an undeniably ingenious invention - the brainchild of a person or group of people known by the pseudonym Satoshi Nakamoto. By allowing digital information to be distributed but not copied, blockchain technology created the backbone of a new type of internet. Originally devised for the digital currency, Bitcoin, the tech community is now finding other potential uses for the technology."
Paul Merrell

He Was a Hacker for the NSA and He Was Willing to Talk. I Was Willing to Listen. - 2 views

  • he message arrived at night and consisted of three words: “Good evening sir!” The sender was a hacker who had written a series of provocative memos at the National Security Agency. His secret memos had explained — with an earthy use of slang and emojis that was unusual for an operative of the largest eavesdropping organization in the world — how the NSA breaks into the digital accounts of people who manage computer networks, and how it tries to unmask people who use Tor to browse the web anonymously. Outlining some of the NSA’s most sensitive activities, the memos were leaked by Edward Snowden, and I had written about a few of them for The Intercept. There is no Miss Manners for exchanging pleasantries with a man the government has trained to be the digital equivalent of a Navy SEAL. Though I had initiated the contact, I was wary of how he might respond. The hacker had publicly expressed a visceral dislike for Snowden and had accused The Intercept of jeopardizing lives by publishing classified information. One of his memos outlined the ways the NSA reroutes (or “shapes”) the internet traffic of entire countries, and another memo was titled “I Hunt Sysadmins.” I felt sure he could hack anyone’s computer, including mine. Good evening sir!
  • The sender was a hacker who had written a series of provocative memos at the National Security Agency. His secret memos had explained — with an earthy use of slang and emojis that was unusual for an operative of the largest eavesdropping organization in the world — how the NSA breaks into the digital accounts of people who manage computer networks, and how it tries to unmask people who use Tor to browse the web anonymously. Outlining some of the NSA’s most sensitive activities, the memos were leaked by Edward Snowden, and I had written about a few of them for The Intercept. There is no Miss Manners for exchanging pleasantries with a man the government has trained to be the digital equivalent of a Navy SEAL. Though I had initiated the contact, I was wary of how he might respond. The hacker had publicly expressed a visceral dislike for Snowden and had accused The Intercept of jeopardizing lives by publishing classified information. One of his memos outlined the ways the NSA reroutes (or “shapes”) the internet traffic of entire countries, and another memo was titled “I Hunt Sysadmins.” I felt sure he could hack anyone’s computer, including mine.
  • I got lucky with the hacker, because he recently left the agency for the cybersecurity industry; it would be his choice to talk, not the NSA’s. Fortunately, speaking out is his second nature.
  • ...7 more annotations...
  • He agreed to a video chat that turned into a three-hour discussion sprawling from the ethics of surveillance to the downsides of home improvements and the difficulty of securing your laptop.
  • In recent years, two developments have helped make hacking for the government a lot more attractive than hacking for yourself. First, the Department of Justice has cracked down on freelance hacking, whether it be altruistic or malignant. If the DOJ doesn’t like the way you hack, you are going to jail. Meanwhile, hackers have been warmly invited to deploy their transgressive impulses in service to the homeland, because the NSA and other federal agencies have turned themselves into licensed hives of breaking into other people’s computers. For many, it’s a techno sandbox of irresistible delights, according to Gabriella Coleman, a professor at McGill University who studies hackers. “The NSA is a very exciting place for hackers because you have unlimited resources, you have some of the best talent in the world, whether it’s cryptographers or mathematicians or hackers,” she said. “It is just too intellectually exciting not to go there.”
  • The Lamb’s memos on cool ways to hunt sysadmins triggered a strong reaction when I wrote about them in 2014 with my colleague Ryan Gallagher. The memos explained how the NSA tracks down the email and Facebook accounts of systems administrators who oversee computer networks. After plundering their accounts, the NSA can impersonate the admins to get into their computer networks and pilfer the data flowing through them. As the Lamb wrote, “sys admins generally are not my end target. My end target is the extremist/terrorist or government official that happens to be using the network … who better to target than the person that already has the ‘keys to the kingdom’?” Another of his NSA memos, “Network Shaping 101,” used Yemen as a theoretical case study for secretly redirecting the entirety of a country’s internet traffic to NSA servers.
  • “If I turn the tables on you,” I asked the Lamb, “and say, OK, you’re a target for all kinds of people for all kinds of reasons. How do you feel about being a target and that kind of justification being used to justify getting all of your credentials and the keys to your kingdom?” The Lamb smiled. “There is no real safe, sacred ground on the internet,” he replied. “Whatever you do on the internet is an attack surface of some sort and is just something that you live with. Any time that I do something on the internet, yeah, that is on the back of my mind. Anyone from a script kiddie to some random hacker to some other foreign intelligence service, each with their different capabilities — what could they be doing to me?”
  • “You know, the situation is what it is,” he said. “There are protocols that were designed years ago before anybody had any care about security, because when they were developed, nobody was foreseeing that they would be taken advantage of. … A lot of people on the internet seem to approach the problem [with the attitude of] ‘I’m just going to walk naked outside of my house and hope that nobody looks at me.’ From a security perspective, is that a good way to go about thinking? No, horrible … There are good ways to be more secure on the internet. But do most people use Tor? No. Do most people use Signal? No. Do most people use insecure things that most people can hack? Yes. Is that a bash against the intelligence community that people use stuff that’s easily exploitable? That’s a hard argument for me to make.”
  • I mentioned that lots of people, including Snowden, are now working on the problem of how to make the internet more secure, yet he seemed to do the opposite at the NSA by trying to find ways to track and identify people who use Tor and other anonymizers. Would he consider working on the other side of things? He wouldn’t rule it out, he said, but dismally suggested the game was over as far as having a liberating and safe internet, because our laptops and smartphones will betray us no matter what we do with them. “There’s the old adage that the only secure computer is one that is turned off, buried in a box ten feet underground, and never turned on,” he said. “From a user perspective, someone trying to find holes by day and then just live on the internet by night, there’s the expectation [that] if somebody wants to have access to your computer bad enough, they’re going to get it. Whether that’s an intelligence agency or a cybercrimes syndicate, whoever that is, it’s probably going to happen.”
  • There are precautions one can take, and I did that with the Lamb. When we had our video chat, I used a computer that had been wiped clean of everything except its operating system and essential applications. Afterward, it was wiped clean again. My concern was that the Lamb might use the session to obtain data from or about the computer I was using; there are a lot of things he might have tried, if he was in a scheming mood. At the end of our three hours together, I mentioned to him that I had taken these precautions—and he approved. “That’s fair,” he said. “I’m glad you have that appreciation. … From a perspective of a journalist who has access to classified information, it would be remiss to think you’re not a target of foreign intelligence services.” He was telling me the U.S. government should be the least of my worries. He was trying to help me. Documents published with this article: Tracking Targets Through Proxies & Anonymizers Network Shaping 101 Shaping Diagram I Hunt Sys Admins (first published in 2014)
Gonzalo San Gil, PhD.

Music Downloads Post Their Worst Decline EVER - 0 views

  •  
    "Last month, sources pointed Digital Music News to double-digit declines in music download sales, with drops potentially exceeding 20 percent year-on-year. But actual figures released early this morning show a sharper drop than imagined. According to Nielsen Soundscan first-half figures, music downloads dropped an astounding 23.9%, with total sales landed at 404.9 million."
Gonzalo San Gil, PhD.

Glossary of Terms | About.com >> Digital Music - 1 views

  •  
    About.com Digital Music Glossary of Terms A list of definitions explaining some of the terminology that is used in this guide.
Gonzalo San Gil, PhD.

Angel Investors and Venture Capitalists Say They Will Stop Funding Some Internet Start-... - 1 views

  •  
    [ A large majority of the angel investors and venture capitalists who took part in a Booz & Company study say they will not put their money in digital content intermediaries (DCIs) if governments pass tough new rules allowing websites to be sued or fined for pirated digital content posted by users. More than 70% of angel investors reported they would be deterred from investing if anti-piracy regulations against "user uploaded" websites were increased. ...]
Gonzalo San Gil, PhD.

Copyright, Copyleft y Creative Commons, la jungla de los derechos de autor - OvToaster - 0 views

  •  
    "Piratear contenido digital es algo cada vez mas perseguido y condenado, descargas ilegales, cierres de paginas webs, denuncias de grandes empresas y gobiernos…. todo esto se a vuelto el día a día del contenido digital, pero no todo en Internet funciona bajo una misma licencia, aprender a diferenciar los diferentes derechos de autor que existen nos puede servir para saber cuando podemos utilizar cierto contenido sin problemas y cuando no. Todo el mundo conoce la famosa Copyright, pero esta no es la única opción que existe, también están las licencias Copyleft y Creative Commons. En este articulo vamos a intentar explicar el funcionamiento de estas licencias junto a los pros y contras de cada una."
Gonzalo San Gil, PhD.

Elements for the reform of copyright and related cultural policies | La Quadrature du Net - 0 views

  •  
    " copyright creative contribution LQDN's proposals mutualised funding Net neutrality proposal Printer-friendly version Send by email Français Now that the ACTA treaty has been rejected by the European Parliament, a period opens during which it will be possible to push for a new regulatory and policy framework adapted to the digital era. Many citizens and MEPs support the idea of reforming copyright in order to make possible for all to draw the benefits of the digital environment, engage into creative and expressive activities and share in their results. In the coming months and years, the key questions will be: What are the real challenges that this reform should address? How can we address them?"
Gonzalo San Gil, PhD.

Informe sobre el impacto del libro electrónico en el sector editorial « PROCURA - 0 views

  •  
    "Realizado por el Grupo de Trabajo del Observatorio de la Lectura y el Libro, pone de manifiesto la necesidad de adaptación del marco legal al entorno digital. Durante este año y 2011 se prevé una entrada decidida del sector del libro en la edición digital. El crecimiento de la edición electrónica en España supera el 48% en 2009 respecto al año anterior"
Gonzalo San Gil, PhD.

Fcforum 2013 | Free Culture Forum 2013 - 0 views

  •  
    [ "Once again this year we gather at the FCForum in Barcelona, ready to analyse the advances of the past twelve months and consider the future outlook in the struggle for democracy in the digital era, free culture and net neutrality. For several years at the FCForum we've worked tirelessly around the tools and problems of network democracy. Since the emergence of Web 2.0, user-generated content has gone from being an interesting social experiment to the digital reality that we immerse ourselves in each day. Meanwhile, the content generated by former "big" media outlets makes up less than 5% of Internet traffic in societies such as Spain." ...]
Gonzalo San Gil, PhD.

Internet Governance - Council of Europe - 0 views

  •  
    "(27/01/2014) Conference on "Shaping the digital environment - ensuring our rights on the Internet" Proceedings Austria will organise within the framework of the Austrian chairmanship of the Committee of Ministers of the Council of Europe a Conference entitled "Shaping the Digital Environment - Ensuring our Rights on the Internet". The Conference will take place on 13 and 14 March 2014 in Graz (Austria) and will be held in the Aula of the Old University. It will look at the current challenges and responses to make the internet and inclusive and people-centred space in the follow-up of the Council of Europe Internet Governance Strategy 2012-2015, adopted in 2012. It will also discuss challenges and best practices in the light of recent developments in the field of Internet governance and address inter alia:"
Gonzalo San Gil, PhD.

Digital Marketing Transit Map | Gartner Digital Marketing - 0 views

  •  
    "trailblazer"
Gonzalo San Gil, PhD.

Teaching kids game design with open source software | Opensource.com - 2 views

  •  
    "Youth Digital just moved into their new offices, tucked away in a nondescript office park in Chapel Hill, North Carolina. It's a big step up from their humble beginnings, when company founder and director Justin Richards hauled a laptop to his students' houses, tutoring them on web and graphic design. "
  •  
    "Youth Digital just moved into their new offices, tucked away in a nondescript office park in Chapel Hill, North Carolina. It's a big step up from their humble beginnings, when company founder and director Justin Richards hauled a laptop to his students' houses, tutoring them on web and graphic design. "
Gonzalo San Gil, PhD.

Breaking: A2IM Advises Against Licensing Apple Music... - Digital Music NewsDigital Mus... - 0 views

  •  
    "Yesterday, Digital Music News published a leaked Apple Music contract confirming that no royalties will be paid to rights owners during a three-month trial period. In response, highly-influential independent label organization A2IM offered this word if caution to its members."
  •  
    "Yesterday, Digital Music News published a leaked Apple Music contract confirming that no royalties will be paid to rights owners during a three-month trial period. In response, highly-influential independent label organization A2IM offered this word if caution to its members."
Paul Merrell

International Digital Publishing Forum (formerly Open eBook Forum) - 0 views

shared by Paul Merrell on 29 May 08 - Cached
  • EPUB Support from list of Publishers An Open Letter from AAP to IDPF
  • What is EPUB, .epub, OPS/OCF & OEB? ".epub" is the file extension of an XML format for reflowable digital books and publications. ".epub" is composed of three open standards, the Open Publication Structure (OPS), Open Packaging Format (OPF) and Open Container Format (OCF), produced by the IDPF. "EPUB" allows publishers to produce and send a single digital publication file through distribution and offers consumers interoperability between software/hardware for unencrypted reflowable digital books and other publications. The Open eBook Publication Structure or "OEB", originally produced in 1999, is the precursor to OPS. For the latest on IDPF standards, sample files and companies who have implemented our specifications, please visit our public forums.  Getting started? Visit our FAQ's.
  •  
    Will ePub be the standard that converges the desktop, the server, devices, and the Web? ePub is an implementation of the W3C Compound Document Formats interoperability framework with excellent packaging, container, and markup components. ePub is also strongly integrated with Daisy XML for accessibility, "talking books," and document structure, hinting at a voice-interactive future for publishing. ePub has been developed as a vendor-neutral standard and is being implemented by a large number of major book publishers globally, a factor that should spur major development of both editing and rendering software and devices.
  •  
    Like this http://www.hdfilmsaati.net Film,dvd,download,free download,product... ppc,adword,adsense,amazon,clickbank,osell,bookmark,dofollow,edu,gov,ads,linkwell,traffic,scor,serp,goggle,bing,yahoo.ads,ads network,ads goggle,bing,quality links,link best,ptr,cpa,bpa
Paul Merrell

Anti link-rot SaaS for web publishers -- WebCite - 0 views

  • The Problem Authors increasingly cite webpages and other digital objects on the Internet, which can "disappear" overnight. In one study published in the journal Science, 13% of Internet references in scholarly articles were inactive after only 27 months. Another problem is that cited webpages may change, so that readers see something different than what the citing author saw. The problem of unstable webcitations and the lack of routine digital preservation of cited digital objects has been referred to as an issue "calling for an immediate response" by publishers and authors [1]. An increasing number of editors and publishers ask that authors, when they cite a webpage, make a local copy of the cited webpage/webmaterial, and archive the cited URL in a system like WebCite®, to enable readers permanent access to the cited material.
  • What is WebCite®? WebCite®, a member of the International Internet Preservation Consortium, is an on-demand archiving system for webreferences (cited webpages and websites, or other kinds of Internet-accessible digital objects), which can be used by authors, editors, and publishers of scholarly papers and books, to ensure that cited webmaterial will remain available to readers in the future. If cited webreferences in journal articles, books etc. are not archived, future readers may encounter a "404 File Not Found" error when clicking on a cited URL. Try it! Archive a URL here. It's free and takes only 30 seconds. A WebCite®-enhanced reference is a reference which contains - in addition to the original live URL (which can and probably will disappear in the future, or its content may change) - a link to an archived copy of the material, exactly as the citing author saw it when he accessed the cited material.
  •  
    Free service spun off from the University of Toronto's University Health Network. Automagic archiving of cited internet content, generation of citations that include the url for the archived copy. Now if Google would just make it easier to use its search cache copies for the same purpose ...
Maluvia Haseltine

Center for Information Technology Policy - 1 views

  •  
    The Center for Information Technology Policy uses Princeton's unique strengths to promote an informed public discussion of digital technologies. Combining faculty expertise in technology and engineering, public policy, and the social sciences with a strong University tradition of service, the Center's research, teaching, and public programs address digital technologies as they interact with policy, markets and society.
« First ‹ Previous 41 - 60 of 347 Next › Last »
Showing 20 items per page