Skip to main content

Home/ Internetni praktikum/ Group items tagged bill

Rss Feed Group items tagged

Katja Jerman

Five-year-old runs up £1,700 iPad bill in ten minutes - Telegraph - 0 views

  • Five-year-old runs up £1,700 iPad bill in ten minutes
  • "Danny was pestering us to let him have a go on the iPad. He kept saying it was a free game so my husband put in the passcode and handed it to him.
  • "He was crying, as the rest of the children were telling him we could have bought a house with the amount he had spent.
  • ...10 more annotations...
  • I'm not sure how I did it, I thought it was free.
  • I am still going to play games when I can, but I will be careful now."
  • turn off functionality such as purchasing from iTunes and the ability to turn off in-app purchases.
  • Apple have now told the family they will refund the money.
  • such incidents had to be reported as quickly as possible.
  • "All iOS devices (iPad, iPhone and iPod touch) have built in parental controls that give parents and guardians the ability to restrict access to content, eg internet access and age rated content such as music, games, apps, TV shows, movies etc.
  • "It was far too easy a thing for him to do and more should be done to limit stuff like this from happening. That game is very annoying - and who would spend more than £1,700 on a game?
  • Five-year-old runs up £1,700 iPad bill in ten minutes
  • Five-year-old runs up £1,700 iPad bill in ten minutes
  • But after downloading the free app Danny found his way into the game's online store and innocently ordered dozens of costly add-ons - totalling £1,710.43.
Katja Jerman

Rugby star's sons rack up £3,200 iPhone bill in three hours - Telegraph - 0 views

  • Rugby star's sons rack up £3,200 iPhone bill in three hours
  • Rugby star's sons rack up £3,200 iPhone bill in three hours
  • his sons, aged six and eight, were playing the game on his iPhone after memorising his password.
  • ...5 more annotations...
  • The boys spent more than £1,000 an hour creating their own mini monsters in the popular game.
  • During this time they bought virtual food for the monsters 54 times, paying up to £69.99 a time for a “mountain of food” for each monster.
  • The app for the iPhone is free to download but various extras, known as “in-app billing”, require cash payments to move up levels and develop monsters.
  • My kids did £3,200 playing a game called tiny monsters - it was £69 for some food for virtual monsters. Absolutely disgusting
  • The cash was eventually refunded after Tiny Monsters accepted the purchases were not authorised by the user.
Maj Krek

Kill the Internet-and Other Anti-SOPA Myths | The Nation - 0 views

  • in the wake of protests by dozens of websites and large numbers of their users, as well as a virtually unanimous chorus of criticism from leading progressive voices and outlets, including Michael Moore, Cenk Uygur, Keith Olbermann, Alternet, Daily Kos, MoveOn and many people associated with Occupy Wall Street. Judging by the fervor of the anti-SOPA/PIPA protests, a casual observer might think the advocates of the anti-piracy bills were in the same moral league as the torturers at Abu Ghraib.
  • But before we celebrate this “populist” victory, it’s worth remembering that the defeat of SOPA and PIPA was also a victory for the enormously powerful tech industry, which almost always beats the far smaller creative businesses in legislative disputes. (Google alone generated more than $37 billion in 2011, more than double the revenue of all record companies, major and indie combined.)
  • One example of anti-SOPA rhetorical over-reach was a tendency by some to invent sinister motives for the sponsors. On his usually brilliant show The Young Turks, Uygur said that SOPA’s sponsors were “pushing for a monopoly for the MPAA and to kill their competition on the Internet.” This is untrue. They wanted to kill those entities that steal their movies and make money off them, either directly or indirectly. There really is a difference
  • ...8 more annotations...
  • that stopped allowing children to put up their own drawings of characters like Mickey Mouse because of fear of copyright lawsuits. Examples such as this, or of a theoretical risk of parents being charged for the right to have kids sing “Happy Birthday”, are demagogic. The underlying issue is scale. There is a profound moral difference between loaning a friend a book and posting, without permission, the content of bestsellers for commercial gain—and people and legislators ought to take that distinction into account.
  • since iTunes and Amazon and are surviving, Napster’s original model was legally killed and Kim Dotcom was apprehended, no new laws are needed. The status quo may be what we end up with, but that doesn’t make it inevitable or right. Human beings have created the piracy problem and although, like any kind of crime, society can’t eliminate it entirely, we can decide whether or not to seriously try.  
  • What is good for Google and Facebook is not always going to be what’s best for the 99 percent. (And of course Microsoft and Apple et al. are extremely aggressive when it comes to protecting their intellectual property rights).
  • on the content of some of the Kool-Aid that has recently been served and help swing the pendulum back, if only a little, in a direction in which intellectual property can be nourished. Otherwise, we will be complicit in accelerating the trend of the last decade, in which those who write code get richly rewarded, while those who write the music, poetry, drama and journalism that are being encoded have to get day jobs.
  • To be sure, the legislators who crafted the ill-fated bills and the film industry lobbyists who supported them have little to be proud of.
  • In a widely viewed anti-SOPA/PIPA speech on Ted.com, Internet philosopher Clay Shirky similarly attributed dark motives to the studios. The targets are not Google and Yahoo
  • If he means a friend sharing Marianne Faithfull’s version of “Visions of Johanna” with me on Facebook, then the accusation is absurd.
  • ek in his 25,000-square-foot compound surrounded by a fleet of Merced
Anja Pirc

Google aims to replace passwords with ID ring - Telegraph - 0 views

  • a ring that can confirm your identity online
  • passwords are both inherently insecure and increasingly impractical.
  • YubiKey, a tiny USB stick that implements highly secure “one time pad” cryptography to log in to Google services
  • ...2 more annotations...
  • , as a replacement for passwords
  • Bill Gates predicted the death of passwords at a security conference in 2004.
mancamikulic

Why the Internet Is About to Replace TV as the Most Important Source of News - Derek Th... - 1 views

  • "There are now signs that television news is increasingly vulnerable
  • But the larger story is the rise of the Web, which has surpassed newspapers and radio to become the second most popular source of news for Americans, after TV
  • TV channels get affiliate fees
  • ...5 more annotations...
  • Radio is supported by some donations and public financing.
  • As this Mary Meeker slide shows, we spend more time engaging with mobile devices than reading print, but print publications still get 25-times more ad money than mobile.
  • For younger people, the Internet is the new cable news.
  • For advertisers, cable news is still cable news.
  • An equal share said they saw news headlines from Facebook
Jan Majdič

China to Web Users: Great Firewall? Just Be Glad We're Not North Korea - David Caraglia... - 1 views

  • Last week, Google Executive Chairman Eric Schmidt urged North Korean leaders to embrace the Internet. Only a small proportion of that country's 24 million people can access the World Wide Web, and the majority of the 1.5 million mobile phones there belong to political and military elites.
  • Meanwhile, in China, a country that has embraced the Internet to a much greater extent, the big story was about censorship, both online and off.
  • For Chinese social media users, the irony here was too perfect to go unnoticed
  • ...5 more annotations...
  • A number of social networking and sharing websites are blocked in China, including Facebook, Twitter, Youtube, Wikipedia, and certain Google applications
  • "China's progress must be viewed in the context of its unique historical and cultural circumstances.
  • Web users engage with and identify as part of a broader, sometimes international, online community
  • Chinese public preferences are shifting from broadcast media to networked media; with that shift, the expectation for public participation is growing.
  • Knowing well the impact and viral nature of social networking, editors loyal to propaganda authorities took control of the newspaper's microblogging account not long after the scandal broke.
Miha Naprudnik

Controlling the web - Fault Lines - Al Jazeera English - 0 views

  • SOPA, the Stop Online Piracy Act, and PIPA, the Protect Intellectual Property Act, were meant to crack down on the illegal sharing of digital media. The bills were drafted on request of the content industry, Hollywood studios and major record labels. 
  • The US government says it must be able to fight against piracy and cyber attacks. And that means imposing more restrictions online. But proposed legislation could seriously curb freedom of speech and privacy, threatening the internet as we know it.
  • Can and should the internet be controlled? Who gets that power? How far will the US government go to gain power over the web? And will this mean the end of a free and global internet?
Anja Pirc

Online privacy: Difference Engine: Nobbling the internet | The Economist - 0 views

  • TWO measures affecting the privacy internet users can expect in years ahead are currently under discussion on opposite sides of the globe. The first hails from a Senate committee’s determination to make America’s online privacy laws even more robust. The second concerns efforts by the International Telecommunications Union (ITU), an intergovernmental body under the auspices of the United Nations, to rewrite its treaty for regulating telecommunications around the world, which dates from 1988, so as to bring the internet into its fief.
  • The congressional measure, approved overwhelmingly by the Senate Judiciary Committee on November 29th, would require criminal investigators to obtain a search warrant from a judge before being able to coerce internet service providers (ISPs) to hand over a person’s e-mail. The measure would also extend this protection to the rest of a person’s online content, including videos, photographs and documents stored in the "cloud"—ie, on servers operated by ISPs, social-network sites and other online provider
  • a warrant is needed only for unread e-mail less than six months old. If it has already been opened, or is more than six months old, all that law-enforcement officials need is a subpoena. In America, a subpoena does not need court approval and can be issued by a prosecutor. Similarly, a subpoena is sufficient to force ISPs to hand over their routing data, which can then be used to identify a sender’s various e-mails and to whom they were sent. That is how the FBI stumbled on a sex scandal involving David Petraeus, the now-ex director of the CIA, and his biographer.
  • ...7 more annotations...
  • No-one imagined that ISPs would one day offer gigabytes of online storage free—as Google, Yahoo!, Hotmail and other e-mail providers do today. The assumption back then was that if someone had not bothered to download and delete online messages within six months, such messages could reasonably be considered to be abandoned—and therefore not in need of strict protection.
  • wholesale access to the internet, powerful mobile phones and ubiquitous social networking have dramatically increased the amount of private data kept online. In the process, traditional thinking about online security has been rendered obsolete. For instance, more and more people nowadays keep their e-mail messages on third-party servers elsewhere, rather than on their own hard-drives or mobile phones. Many put their personal details, contacts, photographs, locations, likes, dislikes and inner thoughts on Google, Facebook, Twitter, Flickr, Dropbox and a host of other destinations. Bringing online privacy requirements into an age of cloud computing is only fit and proper, and long overdue.
  • the international telecoms treaty that emerged focused on how telephone traffic flows across borders, the rules governing the quality of service and the means operators could adopt to bill one another for facilitating international calls. As such, the regulations applied strictly to telecoms providers, the majority of which were state owned.
  • he goal of certain factions is to grant governments the authority to charge content providers like Amazon, Google, Facebook and Twitter for allowing their data to flow over national borders. If enacted, such proposals would most certainly deter investment in network infrastructure, raise costs for consumers, and hinder online access for precisely those people the ITU claims it wants to help.
  • a proposal sponsored by the United States and Canada to restrict the debate in Dubai strictly t
  • o conventional telecoms has met with a modicum of success, despite stiff opposition from Russia plus some African and Middle-Eastern countries. Behind closed doors, the conference has agreed not to alter the ITU’s current definition of “telecommunications” and to leave the introductory text concerning the existing treaty’s scope intact.
  • The sticking point has been what kind of organisations the treaty should apply to. Here, one word can make a huge difference. In ITU jargon, the current treaty relates only to “recognised operating agencies”—in other words, conventional telecoms operators. The ITU wants to change that to simply “operating agencies”. Were that to happen, not only would Google, Facebook and other website operators fall under the ITU’s jurisdiction, but so too would all government and business networks. It seems the stakes really are as high as the ITU’s critics have long maintained
Rok Urbancic

Would you buy a 'No internet. No video. No music' laptop? - News - Gadgets & Tech - The... - 0 views

  • wouldn't it be nice to have a phone that just does phone calls?
  • at the Buckeye Tool Expo in Dalton, Ohio there is unusual demand for devices that do less.
  • the exhibition is a draw for the Amish community, whose access to technology is restricted by their faith.
  • ...8 more annotations...
  • You don't have to wear a bonnet, however, to seek low-technology in a world still gripped by the race to offer enough bells and brushed
  • The Amish laptop is at the extreme end of a quiet drive for digital simplicity
  • The 105 has real buttons, makes calls, sends texts, costs £13 and has, wait for it, a battery life of 35 days
  • Less-smart phones are also winning fans wishing to liberate their fingers and minds from hours of distraction from forgotten pursuits, like reading books, and their wallets from £80 phone bills.
  • The needs of users aren't always the priority of tech giants more often guided by marketing departments.
  • Clutter is banished from screen and keyboard, which features dedicated "copy" and "paste" keys.
  • Ordissimo will compete with SimplicITy, laptops with just six functions launched in 2009
  • The majority of people only want a computer to send emails, Skype their family, browse the web and write documents
pina bitenc

BBC - Lancashire - Features - Protect yourself on the internet - 0 views

  • Bill Westhead - explains online dangers and gives valuable tips on Internet safety and improving your Internet security.
  • always ensure that the website connection you are using is secured
  • always be cautious about offers which seem to be too good.
  • ...5 more annotations...
  • Often the information on your computer can be more valuable to a criminal than the computer itself
  • Antivirus
  • Firewall
  • Anti-spyware
  • always be cautious; don't do anything you wouldn't do face-to-face; and be careful what information you give out about yourself.
alja polajžer

BBC News - Be careful what you tweet - 0 views

  • Nothing said online is really private, says Bill Thompson
  • Twitter and Facebook create a social space that encourages informality, rapid responses and the sort of conversation that typically takes place between friends in contexts that are either private or public-private, like the street, pub or cafe.
  • any services make comments visible to large numbers of people and search engines ensure that a permanent record is kept of every inane observation, spiteful aside or potentially libellous comment on a respected public figure.
  • ...3 more annotations...
  • This is something that TV nutritionist Gillian McKeith has just discovered the hard way
  • weets have no legal immunity
  • We may eventually develop a set of social rules and legal conventions that acknowledge that an angry tweet is less likely to be considered defamatory than a published article, but we are not there yet.
1 - 11 of 11
Showing 20 items per page