Skip to main content

Home/ Future of the Web/ Group items matching "book" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
1More

FORA.tv - Steven Johnson and Kevin Kelly at the NYPL - 0 views

  •  
    In a world of rapidly accelerating change, from iPads to eBooks to genetic mapping to MagLev trains, we can't help but wonder if technology is our servant or our master, and whether it is taking us in a healthy direction as a society.* What forces drive the steady march of innovation?* How can we build environments in our schools, our businesses, and in our private lives that encourage the creation of new ideas--ideas that build on the new technology platforms in socially responsible ways?Kevin Kelly and Steven Johnson look at where technology is taking us. One of the co-founders of Wired Magazine, Kelly's new Book, What Technology Wants, makes the argument that technology as a whole is not a jumble of wires and metal but a living, evolving organism that has its own unconscious needs and tendencies. Johnson's new Book, Where Good Ideas Come From, explains why certain spaces, from 18th-century coffeehouses to the World Wide Web, have an uncanny talent for encouraging innovative thinking.
4More

Sony Reader Opens to EPUB Format for Digital Books - OhmyNews International - 0 views

  • Sony Reader Opens to EPUB Format for Digital Books Adobe offers Digital Editions as display for portable documents William Pollard (will789)     Email Article  Print Article  Published 2008-07-28 16:36 (KST)    A new version of the Sony Reader for digital Books will support the EPUB format and the Digital Editions software from Adobe. The PRS-505 will be available with new software in the United States during August. Current owners can update through a download.
  • A new version of the Sony Reader for digital books will support the EPUB format and the Digital Editions software from Adobe. The PRS-505 will be available with new software in the United States during August. Current owners can update through a download.
  • Version 1.74 is still regarded as experimental and there is still no easy way to create EPUB files from an Open Document in Open Office. Discussion on the DocBook Wiki suggests that not all DocBook features are currently supported and the installation for Open Office may not be easy enough for most people to follow.
  •  
    Most quality online stores. Know whether you are a trusted online retailer in the world. Whatever we can buy very good quality. and do not hesitate. Everything is very high quality. Including clothes, accessories, bags, cups. Highly recommended. This is one of the trusted online store in the world. View now www.retrostyler.com
1More

["Copyleft-all rights reversed." | Don Hopkins] | About the GNU Project - FSF.org - 0 views

  •  
    "by Richard Stallman Originally published in the book Open Sources. Richard Stallman was never a supporter of "open source", but contributed this article so that the ideas of the free software movement would not be entirely absent from that book. Why it is even more important than ever insist that the software we use be free. "
1More

Techdirt Reading List: The Idealist: Aaron Swartz And The Rise Of Free Culture On The I... - 0 views

  •  
    "from the free-culture-matters dept We're back again with another in our weekly reading list posts of books we think our community will find interesting and thought provoking. Once again, buying the book via the Amazon links in this story also helps support Techdirt. "
3More

Open Source Life: How the open movement will change everything - 1 views

    • Gonzalo San Gil, PhD.
       
      Via, TY x #share, Gabriel Newlee @ FB https://www.facebook.com/gabriel.newlee?fref=nf
  •  
    Dániel Szőke July 6, 2016 Lifestyle | Values, Topics Consider this: in just a few short years, the open-source encyclopedia Wikipedia has made closed-source encyclopedias obsolete - both the hard-bound kind and the CD-ROM or commercial online kind. Goodbye World Book and Brittanica.
  •  
    Dániel Szőke July 6, 2016 Lifestyle | Values, Topics Consider this: in just a few short years, the open-source encyclopedia Wikipedia has made closed-source encyclopedias obsolete - both the hard-bound kind and the CD-ROM or commercial online kind. Goodbye World Book and Brittanica.
1More

Smarter Than You Think | The Book - 1 views

  •  
    "It's undeniable: technology is changing the way we think. But is it for the better? Amid a chorus of doomsayers, Clive Thompson votes "yes". The Internet age, he argues, has produced bold new forms of human cognition, worthy of both celebration and investigation. We learn more and retain the information longer, write and think with global audiences, and even gain an ESP-like awareness of the world around us."
2More

How To Make Pirate Bay Users Pay For Content | TorrentFreak - 0 views

  •  
    " Ernesto on April 27, 2014 C: 52 News Pirate Bay users are generally not known to pay cash for the content they grab from the site. However, a recent promo for a bundle of Indie sci-fi games, books and videos raked in more than $5,000. So what's needed to make these people pay for content?"
  •  
    " Ernesto on April 27, 2014 C: 52 News Pirate Bay users are generally not known to pay cash for the content they grab from the site. However, a recent promo for a bundle of Indie sci-fi games, books and videos raked in more than $5,000. So what's needed to make these people pay for content?"
2More

Florida Man, Accused of Terrorism Based on Book Collection, Set Free - The Intercept - 1 views

    • Gonzalo San Gil, PhD.
       
      [# ! Va Janet Innes-Kirkwood's LinkedIn]
  •  
    [The U.S. government had produced "snippets of information from various sources, out of context, to weave together a narrative of terrorist ideation," a Florida judge said Friday, ordering the release of Marcus Dwayne Robertson, an Orlando-based Islamic scholar who stood accused of supporting terrorism. ...]
1More

Opera proposal brings a book look to the Web | Deep Tech - CNET News - 0 views

  • At the company's Up North Web press event here, CTO Haakon Wium Lie showed off a new standard he proposed that could give Web pages more of the feel of printed pages. A document too big for a single screen, instead of getting a scroll bar, would be split across several pages, and people can navigate among them with gestures--swiping left and right to go forward and backward or swiping up to return to an earlier page. "Doing pages on a screen I think will be very important, especially for tablets," he said.
5More

Reset The Net - Privacy Pack - 1 views

  • This June 5th, I pledge to take strong steps to protect my freedom from government mass surveillance. I expect the services I use to do the same.
  • Fight for the Future and Center for Rights will contact you about future campaigns. Privacy Policy
  •  
    I wound up joining this campaign at the urging of the ACLU after checking the Privacy Policy. The Reset the Net campaign seems to be endorsed by a lot of change-oriented groups, from the ACLU to Greenpeac to the Pirate Party. A fair number of groups with a Progressive agenda, but certainly not limited to them. The right answer to that situation is to urge other groups to endorse, not to avoid the campaign. Single-issue coalition-building is all about focusing on an area of agreement rather than worrying about who you are rubbing elbows with.  I have been looking for a a bipartisan group that's tackling government surveillance issues via mass actions but has no corporate sponsors. This might be the one. The reason: Corporate types like Google have no incentive to really butt heads with the government voyeurs. They are themselves engaged in massive surveillance of their users and certainly will not carry the battle for digital privacy over to the private sector. But this *is* a battle over digital privacy and legally defining user privacy rights in the private sector is just as important as cutting back on government surveillance. As we have learned through the Snowden disclosures, what the private internet companies have, the NSA can and does get.  The big internet services successfully pushed in the U.S. for authorization to publish more numbers about how many times they pass private data to the government, but went no farther. They wanted to be able to say they did something, but there's a revolving door of staffers between NSA and the big internet companies and the internet service companies' data is an open book to the NSA.   The big internet services are not champions of their users' privacy. If they were, they would be featuring end-to-end encryption with encryption keys unique to each user and unknown to the companies.  Like some startups in Europe are doing. E.g., the Wuala.com filesync service in Switzerland (first 5 GB of storage free). Compare tha
  •  
    "This June 5th, I pledge to take strong steps to protect my freedom from government mass surveillance. I expect the services I use to do the same."
  •  
    I wound up joining this campaign at the urging of the ACLU after checking the Privacy Policy. The Reset the Net campaign seems to be endorsed by a lot of change-oriented groups, from the ACLU to Greenpeac to the Pirate Party. A fair number of groups with a Progressive agenda, but certainly not limited to them. The right answer to that situation is to urge other groups to endorse, not to avoid the campaign. Single-issue coalition-building is all about focusing on an area of agreement rather than worrying about who you are rubbing elbows with.  I have been looking for a a bipartisan group that's tackling government surveillance issues via mass actions but has no corporate sponsors. This might be the one. The reason: Corporate types like Google have no incentive to really butt heads with the government voyeurs. They are themselves engaged in massive surveillance of their users and certainly will not carry the battle for digital privacy over to the private sector. But this *is* a battle over digital privacy and legally defining user privacy rights in the private sector is just as important as cutting back on government surveillance. As we have learned through the Snowden disclosures, what the private internet companies have, the NSA can and does get.  The big internet services successfully pushed in the U.S. for authorization to publish more numbers about how many times they pass private data to the government, but went no farther. They wanted to be able to say they did something, but there's a revolving door of staffers between NSA and the big internet companies and the internet service companies' data is an open book to the NSA.   The big internet services are not champions of their users' privacy. If they were, they would be featuring end-to-end encryption with encryption keys unique to each user and unknown to the companies.  Like some startups in Europe are doing. E.g., the Wuala.com filesync service in Switzerland (first 5 GB of storage free). Com
2More

Online Store Can Sell 'Used' Ebooks, Court Rules | TorrentFreak - 0 views

  •  
    " Ernesto on July 23, 2014 C: 68 News A Dutch marketplace for second hand eBooks is being allowed to continue operating after the Amsterdam Court dismissed complaints from Book publishers. The Court ruled that "Tom Kabinet" operates in a legal gray area which requires further investigation. Meanwhile the used eBook business is booming. "
  •  
    " Ernesto on July 23, 2014 C: 68 News A Dutch marketplace for second hand eBooks is being allowed to continue operating after the Amsterdam Court dismissed complaints from Book publishers. The Court ruled that "Tom Kabinet" operates in a legal gray area which requires further investigation. Meanwhile the used eBook business is booming. "
2More

Network as though it was the first days of a better nation - Boing Boing - 0 views

  •  
    "To celebrate the release of my new book, Information Doesn't Want to Be Free: Laws for the Internet Age, I've invited some of my favorite creators and thinkers to write about their philosophy on the arts and the Internet. Today, Martha Lane Fox, founder of lastminute.com and UK Champion for Digital Inclusion, talks about the promise of an Internet-enabled fairer world. -Cory" [ # ! #Pieces for #Understanding.]
  •  
    "To celebrate the release of my new book, Information Doesn't Want to Be Free: Laws for the Internet Age, I've invited some of my favorite creators and thinkers to write about their philosophy on the arts and the Internet. Today, Martha Lane Fox, founder of lastminute.com and UK Champion for Digital Inclusion, talks about the promise of an Internet-enabled fairer world. -Cory"
2More

Press corner | European Commission - 0 views

  • The European Commission has opened formal antitrust investigations to assess whether Apple's rules for app developers on the distribution of apps via the App Store violate EU competition rules. The investigations concern in particular the mandatory use of Apple's own proprietary in-app purchase system and restrictions on the ability of developers to inform iPhone and iPad users of alternative cheaper purchasing possibilities outside of apps. The investigations concern the application of these rules to all apps, which compete with Apple's own apps and services in the European Economic Area (EEA). The investigations follow-up on separate complaints by Spotify and by an e-book/audiobook distributor on the impact of the App Store rules on competition in music streaming and e-books/audiobooks.
  • iPhone and iPad users can only download native (non web-based) apps via the App Store. The Commission will investigate in particular two restrictions imposed by Apple in its agreements with companies that wish to distribute apps to users of Apple devices: (i)   The mandatory use of Apple's own proprietary in-app purchase system “IAP” for the distribution of paid digital content. Apple charges app developers a 30% commission on all subscription fees through IAP. (ii)  Restrictions on the ability of developers to inform users of alternative purchasing possibilities outside of apps. While Apple allows users to consume content such as music, e-books and audiobooks purchased elsewhere (e.g. on the website of the app developer) also in the app, its rules prevent developers from informing users about such purchasing possibilities, which are usually cheaper.
6More

Commentary: Don't be so sure Russia hacked the Clinton emails | Reuters - 0 views

  • By James Bamford Last summer, cyber investigators plowing through the thousands of leaked emails from the Democratic National Committee uncovered a clue.A user named “Феликс Эдмундович” modified one of the documents using settings in the Russian language. Translated, his name was Felix Edmundovich, a pseudonym referring to Felix Edmundovich Dzerzhinsky, the chief of the Soviet Union’s first secret-police organization, the Cheka.It was one more link in the chain of evidence pointing to Russian President Vladimir Putin as the man ultimately behind the operation.During the Cold War, when Soviet intelligence was headquartered in Dzerzhinsky Square in Moscow, Putin was a KGB officer assigned to the First Chief Directorate. Its responsibilities included “active measures,” a form of political warfare that included media manipulation, propaganda and disinformation. Soviet active measures, retired KGB Major General Oleg Kalugin told Army historian Thomas Boghart, aimed to discredit the United States and “conquer world public opinion.”As the Cold War has turned into the code war, Putin recently unveiled his new, greatly enlarged spy organization: the Ministry of State Security, taking the name from Joseph Stalin’s secret service. Putin also resurrected, according to James Clapper, the U.S. director of national intelligence, some of the KGB’s old active- measures tactics. On October 7, Clapper issued a statement: “The U.S. Intelligence community is confident that the Russian government directed the recent compromises of emails from U.S. persons and institutions, including from U.S. political organizations.” Notably, however, the FBI declined to join the chorus, according to reports by the New York Times and CNBC.A week later, Vice President Joe Biden said on NBC’s Meet the Press that "we're sending a message" to Putin and "it will be at the time of our choosing, and under the circumstances that will have the greatest impact." When asked if the American public would know a message was sent, Biden replied, "Hope not." Meanwhile, the CIA was asked, according to an NBC report on October 14, “to deliver options to the White House for a wide-ranging ‘clandestine’ cyber operation designed to harass and ‘embarrass’ the Kremlin leadership.”But as both sides begin arming their cyberweapons, it is critical for the public to be confident that the evidence is really there, and to understand the potential consequences of a tit-for-tat cyberwar escalating into a real war. 
  • This is a prospect that has long worried Richard Clarke, the former White House cyber czar under President George W. Bush. “It’s highly likely that any war that began as a cyberwar,” Clarke told me last year, “would ultimately end up being a conventional war, where the United States was engaged with bombers and missiles.”The problem with attempting to draw a straight line from the Kremlin to the Clinton campaign is the number of variables that get in the way. For one, there is little doubt about Russian cyber fingerprints in various U.S. campaign activities. Moscow, like Washington, has long spied on such matters. The United States, for example, inserted malware in the recent Mexican election campaign. The question isn’t whether Russia spied on the U.S. presidential election, it’s whether it released the election emails.Then there’s the role of Guccifer 2.0, the person or persons supplying WikiLeaks and other organizations with many of the pilfered emails. Is this a Russian agent? A free agent? A cybercriminal? A combination, or some other entity? No one knows.There is also the problem of groupthink that led to the war in Iraq. For example, just as the National Security Agency, the Central Intelligence Agency and the rest of the intelligence establishment are convinced Putin is behind the attacks, they also believed it was a slam-dunk that Saddam Hussein had a trove of weapons of mass destruction. Consider as well the speed of the political-hacking investigation, followed by a lack of skepticism, culminating in a rush to judgment. After the Democratic committee discovered the potential hack last spring, it called in the cybersecurity firm CrowdStrike in May to analyze the problem.
  • CrowdStrike took just a month or so before it conclusively determined that Russia’s FSB, the successor to the KGB, and the Russian military intelligence organization, GRU, were behind it. Most of the other major cybersecurity firms quickly fell in line and agreed. By October, the intelligence community made it unanimous. That speed and certainty contrasts sharply with a previous suspected Russian hack in 2010, when the target was the Nasdaq stock market. According to an extensive investigation by Bloomberg Businessweek in 2014, the NSA and FBI made numerous mistakes over many months that stretched to nearly a year. “After months of work,” the article said, “there were still basic disagreements in different parts of government over who was behind the incident and why.”  There was no consensus­, with just a 70 percent certainty that the hack was a cybercrime. Months later, this determination was revised again: It was just a Russian attempt to spy on the exchange in order to design its own. The federal agents also considered the possibility that the Nasdaq snooping was not connected to the Kremlin. Instead, “someone in the FSB could have been running a for-profit operation on the side, or perhaps sold the malware to a criminal hacking group.” Again, that’s why it’s necessary to better understand the role of Guccifer 2.0 in releasing the Democratic National Committee and Clinton campaign emails before launching any cyberweapons.
  • ...2 more annotations...
  • t is strange that clues in the Nasdaq hack were very difficult to find ― as one would expect from a professional, state-sponsored cyber operation. Conversely, the sloppy, Inspector Clouseau-like nature of the Guccifer 2.0 operation, with someone hiding behind a silly Bolshevik cover name, and Russian language clues in the metadata, smacked more of either an amateur operation or a deliberate deception.Then there’s the Shadow Brokers, that mysterious person or group that surfaced in August with its farcical “auction” to profit from a stolen batch of extremely secret NSA hacking tools, in essence, cyberweapons. Where do they fit into the picture? They have a small armory of NSA cyberweapons, and they appeared just three weeks after the first DNC emails were leaked. On Monday, the Shadow Brokers released more information, including what they claimed is a list of hundreds of organizations that the NSA has targeted over more than a decade, complete with technical details. This offers further evidence that their information comes from a leaker inside the NSA rather than the Kremlin. The Shadow Brokers also discussed Obama’s threat of cyber retaliation against Russia. Yet they seemed most concerned that the CIA, rather than the NSA or Cyber Command, was given the assignment. This may be a possible indication of a connection to NSA’s elite group, Tailored Access Operations, considered by many the A-Team of hackers.“Why is DirtyGrandpa threating CIA cyberwar with Russia?” they wrote. “Why not threating with NSA or Cyber Command? CIA is cyber B-Team, yes? Where is cyber A-Team?” Because of legal and other factors, the NSA conducts cyber espionage, Cyber Command conducts cyberattacks in wartime, and the CIA conducts covert cyberattacks. 
  • The Shadow Brokers connection is important because Julian Assange, the founder of WikiLeaks, claimed to have received identical copies of the Shadow Brokers cyberweapons even before they announced their “auction.” Did he get them from the Shadow Brokers, from Guccifer, from Russia or from an inside leaker at the NSA?Despite the rushed, incomplete investigation and unanswered questions, the Obama administration has announced its decision to retaliate against Russia.  But a public warning about a secret attack makes little sense. If a major cyber crisis happens in Russia sometime in the future, such as a deadly power outage in frigid winter, the United States could be blamed even if it had nothing to do with it. That could then trigger a major retaliatory cyberattack against the U.S. cyber infrastructure, which would call for another reprisal attack ― potentially leading to Clarke’s fear of a cyberwar triggering a conventional war. President Barack Obama has also not taken a nuclear strike off the table as an appropriate response to a devastating cyberattack.
  •  
    Article by James Bamford, the first NSA whistleblower and author of three books on the NSA.
1More

Linux Servers Security: Hack and Defend - Free Sample Chapter - Chris Binnie - 0 views

  •  
    "I'm delighted to be able to offer the first chapter of my brand new book, Linux Server Security: Hack and Defend, for free as a downloadable PDF."
1More

Download & Streaming : Audio Archive : Internet Archive - 0 views

  •  
    "Download or listen to free music and audio This library contains recordings ranging from alternative news programming, to Grateful Dead concerts, to Old Time Radio shows, to book and poetry readings, to original music uploaded by our users. Many of these audios and MP3s are available for free download. Check our FAQ for more information. Contribute Your Audio Please feel free to upload your audio (Uploaders, please set a Creative Commons license as part of the upload process, so people know what they can do with your audio - thanks!) "
1More

A Perfect Guide To Buy The Ideal Kindle For e-Readers - 0 views

  •  
    Digital book arrangement by an Amazon kindle has been an incredible accomplishment in the field of computerized hardware. If you are looking for Amazon Kindle Support then check www.technicalbulls.com
1More

Internet Archive Seeks to Defend Against Wrongful Copyright Takedowns - TorrentFreak [#... - 0 views

  •  
    " By Andy on March 23, 2016 C: 25 Breaking As a non-profit library of millions of free books, movies, software and music, the Internet Archive has a keen interest in copyright law. In a submission to the U.S. Copyright Office the Archive says since the major studios often send invalid notices, they're suggesting a change in the law to allow content to remain up while disputes are settled."
1More

P2P Lab ← research hub - 0 views

  •  
    "About P2P Lab is an independent media lab interested in interdisciplinary research on free/open source technologies and practices. Our mission is to: strive for integrative insights on the open technologies and the peer-to-peer practices. provide consultancy support to organisations and institutions regarding open technologies and relevant socio-economic trends. produce innovative, global techno-economic solutions to local problems. write, edit and publish articles, reports and books in the diverse range of topics we investigate. organise open events for reflection and action as well as to educate people about critical and creative tools for society-changing. We are constantly on the look-out for co-operation on interesting projects. See our facility and equipment."
1More

Free Culture in Relation to Software Freedom - P2P Foundation - 1 views

  •  
    "Essay by Mike Linksvayer. Chapter 2 of the book Free Beer. The article is licensed under Creative Commons BY-SA 2.5 [1] Contents 1 Text 1.1 1. Obvious Software, Ubiquitous Culture 1.2 2. Freedom 1.3 3. Relative Progress of Free Software and Free Culture 1.4 4. How Free Can We Be? 2 References"
‹ Previous 21 - 40 of 91 Next › Last »
Showing 20 items per page