Skip to main content

Home/ Future of the Web/ Group items tagged your how to

Rss Feed Group items tagged

Gonzalo San Gil, PhD.

How to decide what to measure in a community | Opensource.com - 0 views

  •  
    "Last month we discussed setting goals for your community metrics program. These goals serve as a constant reminder of what you want to achieve in the program and should be used as metrics themselves when deciding exactly what you are going to measure."
Gary Edwards

How HTML 5 Is Already Changing the Web - Webmonkey - 0 views

  •  
    HTML 5 represents the biggest leap forward in web standards in almost a decade. Unlike the specifications that came before it, HTML 5 is not merely intended to present content to a web browser. Its goal is to bring the web into maturity as a full-fledged application platform - a level playing field where video, sound, images, animations, and full interactivity with your computer are all standardized. And it may be a long way off still, but elements of HTML 5 are already reshaping the way we use the web.
Paul Merrell

Watch a message from Counselor to the President John Podesta. | The White House - 0 views

  • On January 17, President Obama spoke at the Justice Department about changes in the technology that we use for national security purposes, and what these technologies mean for our privacy broadly. He called on the administration to conduct a 90-day review of big data and privacy: how these areas affect the way we live, and the way we work — and how data is being used by universities, the private sector, and the government. This is a complicated issue that affects every American — and we want to hear your feedback. Learn more about this review, and if you like, share your thoughts.
  •  
    Please let them know what you think.
Paul Merrell

US spy lab hopes to geotag every outdoor photo on social media | Ars Technica - 0 views

  • Imagine if someone could scan every image on Facebook, Twitter, and Instagram, then instantly determine where each was taken. The ability to combine this location data with information about who appears in those photos—and any social media contacts tied to them—would make it possible for government agencies to quickly track terrorist groups posting propaganda photos. (And, really, just about anyone else.) That's precisely the goal of Finder, a research program of the Intelligence Advanced Research Projects Agency (IARPA), the Office of the Director of National Intelligence's dedicated research organization. For many photos taken with smartphones (and with some consumer cameras), geolocation information is saved with the image by default. The location is stored in the Exif (Exchangable Image File Format) data of the photo itself unless geolocation services are turned off. If you have used Apple's iCloud photo store or Google Photos, you've probably created a rich map of your pattern of life through geotagged metadata. However, this location data is pruned off for privacy reasons when images are uploaded to some social media services, and privacy-conscious photographers (particularly those concerned about potential drone strikes) will purposely disable geotagging on their devices and social media accounts.
Gonzalo San Gil, PhD.

5 Tips for Effectively Managing a LinkedIn Group | Social Media Examiner - 1 views

  •  
    [Are you currently managing your own LinkedIn group? Are you considering launching a LinkedIn group? Keep reading for five tips on how to better manage LinkedIn groups. ...]
Gonzalo San Gil, PhD.

Installing VLC Media Player in Fedora 20 | Abhishek's Blog - 0 views

  •  
    So you wish to install VLC Media Player in your Fedora ! Here's how: Step 1: Install RPM Fusion. RPM Fusion is a repository of add-on packages for Fedora and EL+EPEL maintained by a group of volunt...
Gonzalo San Gil, PhD.

How browser extensions steal logins & browsing habits; conduct corporate espionage / Bo... - 0 views

  •  
    "Seemingly harmless browser extensions that generate emojis, enlarge thumbnails, help you debug Javascript errors and other common utilities routinely run secret background processes that collect and retransmit your login credentials, private URLs that grant access to sensitive files, corporate secrets, full PDFs and other personally identifying, potentially compromising data."
Gonzalo San Gil, PhD.

Take Control of Your PC with UEFI Secure Boot | Linux Journal - 1 views

  •  
    "Nov 30, 2015 By Greig Paul in HOW-TOs Security UEFI (Unified Extensible Firmware Interface) is the open, multi-vendor replacement for the aging BIOS standard, which first appeared in IBM computers in 1976. The UEFI standard is extensive, covering the full boot architecture. This article focuses on a single useful but typically overlooked feature of UEFI: secure boot. "
Gonzalo San Gil, PhD.

How to Build an Attractive Business and Personal Brand - 0 views

  •  
    "Should you brand yourself or your business? The short answer is both. The better question is what should you brand first - your business or yourself?"
Paul Merrell

The Spectre of an Advertising Meltdown: What You Need to Know - Lawfare - 0 views

  • The information security world is focused on two new security vulnerabilities, “Spectre” and “Meltdown”, that represent vulnerabilities embedded in computer hardware. Lawfare readers should respond in two ways: keep their operating systems up to date and, critically, install an ad-blocker for your web browser. (Here are guides on how to do so in Chrome and Firefox.) In fact, a proper response to Spectre should involve ad-blocking on all government computers. Other than that, don’t worry. Readers who just wanted to know what to do can stop reading. But for those curious about some of the technical background on these vulnerabilities and why ad-blocking is an essential security measure for a modern computer, read on.
Paul Merrell

Facebook Quietly Notifies Public That Millions Of Instagram Users Had Passwords Exposed... - 0 views

  • While everyone was focused on the release of the Mueller report Thursday, Facebook quietly notified the public that the passwords of "millions of Instagram users" were stored in an unencrypted format on an internal server, and searchable by any employee.
  • In March, security expert Brian Krebs of KrebsonSecurity noted:  The Facebook source said the investigation so far indicates between 200 million and 600 million Facebook users may have had their account passwords stored in plain text and searchable by more than 20,000 Facebook employees. The source said Facebook is still trying to determine how many passwords were exposed and for how long, but so far the inquiry has uncovered archives with plain text user passwords dating back to 2012. My Facebook insider said access logs showed some 2,000 engineers or developers made approximately nine million internal queries for data elements that contained plain text user passwords. -KrebsonSecurity In short, if you believe Facebook that the passwords were not improperly accessed, rest well. If you don't believe them, and you use your Instagram password for other things, perhaps it's time to think of a new one.  
Gonzalo San Gil, PhD.

How to use GitHub organizations to grow your code club | Opensource.com - 0 views

  •  
    "For anything involving code, programming clubs often turn to GitHub, which has become the standard for open source project hosting for thousands of projects all over the world. "
  •  
    "For anything involving code, programming clubs often turn to GitHub, which has become the standard for open source project hosting for thousands of projects all over the world. "
Gary Edwards

Does your OS matter in a cloud? | It's the Business Process - not the Application! | Ta... - 0 views

  •  
    The question proposed is tha tof how OSS will be impacted by SaaS and Cloud Computing? My position, as stated in this reply, is that OSS will become even more important going forward. The comment includes WebKit, XAML, Client/Server, and the great transition to Client/ Web-Stack /server models.
Paul Merrell

Tim Berners-Lee, W3C Approve Work On DRM For HTML 5.1 - Slashdot - 1 views

  • "Danny O'Brien from the EFF has a weblog post about how the Encrypted Media Extension (EME) proposal will continue to be part of HTML Work Group's bailiwick and may make it into a future HTML revision." From O'Brien's post: "A Web where you cannot cut and paste text; where your browser can't 'Save As...' an image; where the 'allowed' uses of saved files are monitored beyond the browser; where JavaScript is sealed away in opaque tombs; and maybe even where we can no longer effectively 'View Source' on some sites, is a very different Web from the one we have today. It's a Web where user agents—browsers—must navigate a nest of enforced duties every time they visit a page. It's a place where the next Tim Berners-Lee or Mozilla, if they were building a new browser from scratch, couldn't just look up the details of all the 'Web' technologies. They'd have to negotiate and sign compliance agreements with a raft of DRM providers just to be fully standards-compliant and interoperable."
  •  
    From the Dept. of YouGottaBeKiddingMe. 
Paul Merrell

Tip: Use the new microformats API in your Firefox 3.0 Extensions - 0 views

  • The upcoming Firefox 3.0 release has built-in support for microformats in the form of an API that you can access from a Firefox extension. In this tip, you follow a simple example of how to use this API from within your extension code. You take a skeleton Hello World extension and give it the ability to store an hCard from any Web page and then use that stored hCard to populate a Web form.
  •  
    Like this http://www.hdfilmsaati.net Film,dvd,download,free download,product... ppc,adword,adsense,amazon,clickbank,osell,bookmark,dofollow,edu,gov,ads,linkwell,traffic,scor,serp,goggle,bing,yahoo.ads,ads network,ads goggle,bing,quality links,link best,ptr,cpa,bpa
Gonzalo San Gil, PhD.

The Big Debate: OK gloomsters, how can the music biz be FIXED? * The Register - 1 views

  •  
    [By Andrew Orlowski * Get more from this author Posted in Media, 25th October 2012 09:19 GMT Battle of Ideas 2012 I was an a panel at The Battle of Ideas conference on music at the weekend, and it went a bit beyond your usual digital music panel. There was a good turnout - considering there were six concurrent panels, all of them interesting. Everyone got to make a six-minute opening question. Here's mine, and the highlights of the rest of the panel. I've included all the audience questions and the best answers - not all questions were answered - for a reason. If you think the biggest problem with music is piracy, it isn't, and that becomes evident from the questions. Two of the panellists (Alan Miller and myself) address this in the closing remarks....]
Gonzalo San Gil, PhD.

Three ways to easily encrypt your data on Linux | howtoforge.com | [# ! Note] - 0 views

  •  
    "Data encryption is one very solid security measure/precaution that everyone who owns data with significant personal or objective value should perform."
lesleybrunner08

How To Niche Down, Find Your Thing and Own It! - 0 views

  •  
    After attending the 2015 New Media Europe Event, I noticed that all the speakers there had their own "thing". They had their specific and specialist area on what they would speak about.
tanyadurham

How Amazon using AI to shell out double money out of your pocket? - 1 views

  •  
    Machine Learning and Artificial Intelligence in Retail and E-Commerce : A Study of its Applications and Implications
« First ‹ Previous 161 - 179 of 179
Showing 20 items per page