Skip to main content

Home/ Internetni praktikum/ Group items tagged control

Rss Feed Group items tagged

nensic

Under the regime of precarity: bring your own device | openDemocracy - 0 views

  • At one and the same time technocracy and financial oligarchies find here an ideal medium to extend their influence and their control of individuals in space and time.
  • At one and the same time technocracy and financial oligarchies find here an ideal medium to extend their influence and their control of individuals in space and time. This explains the fierce struggle going on among key market players.
  • Today large communities use devices like smartphones, tablets, e-readers and ultrabooks to navigate this new ecosystem.
  • ...26 more annotations...
  • The growing dynamic of mobile internet, today accounting for 12% of all internet traffic,[ii] signals a new ecosystem where living bodies, machines, networks, code, data, territory and time interact.
  • as a way of consolidating their strictly neoliberal economic policy.
  • The hundreds of thousands of apps, available in just a few years, originate from the intersection of two factors:
  • The desire and necessity to have simple, functional and fast devices able to do specific tasks on the go.
  • the operative skills to develop apps for popular mobile platforms such as Iphone Operating System (IOS) or Google Android. 
  • Apps galore
  • Apple likes to play on the ambiguity in a form of propaganda that exalts the “revolutionary” spirit of technological innovation
  • The first iPhone, in 2007, inaugurated the new phase of the cognitive era, just as the PC heralded the decline of the industrial phase. Five years later, Apple no longer has a monopoly: hundreds of millions of smartphones and tablets are sold every year and the total number of these active devices will be soon 2 billion. It took the PC thirty years to reach this level of diffusion.
  • War over the immaterial
  • Often these machines play opposite functions: as a tool to create new forms of horizontal communication and social interaction or as bait for a capillary exploitation.
  • A political analysis of mobile devices
  • The PC became a liberating tool for social cooperation in the workplace of a booming third-sector.
  • In the following phase, the spread of the first mobile devices – cellphones and laptops – provided an initial impulse for a blurring of life and work, imposing with mobile calls, emails or SMS a new type of real-time processing, regulating the rhythms of life
  • In the new biohypermedia environment, the key change lies in the combination of miniaturizing and mobilizing these pieces of equipment, allowing them to always be within the body’s reach in any context.
  • they augment physical reality[ix] with every kind of information – commercial, cultural, ecological – and act more and more as biomedical sets for the control, correction and support of our vital biological functions.
  • The PC has a central function as the medium for linguistic and written processes - its typical uses often tied to the logical concatenation of thought and the priority management of sequences over time.
  • But mobile devices concentrate complex perception of stimuli in terms of spatial organization and intervene in emotional responses. PC work in this way occupies our left hemisphere, while the continual interactions of a smartphone engage the right hemisphere.
  • In contemporary neoliberalism, these devices become an essential means of rent and profit, through a fine capture of what we generate by living with them and using them. At one and the same time technocracy and financial oligarchies find here an ideal medium to extend their influence and their control of individuals in space and time.
  • Marketing and communication campaigns portray these devices as commodity fetishes, characterizing a new phase of capitalism often described as cognitive because based on knowledge.
  • In the sphere of multinational ICT[x] Corporations a war is being waged over the design and deployment of immaterial enclosures
  • Even though all this is based on freeware and open source, they trick us into believing that the iPhone 5, Windows 8 or Jellybean[xi] are miracles that descend from Mount Olympus and for which we should be grateful as to the gods.
  • Unlike automobiles or, to a lesser degree, PCs, the use value of new mobile devices is no longer determined merely by the initial design but can be moulded by the final user.
  • The innumerable websites, blogs and forums in every language globally blooming and growing are a workshop for worldwide exchange where the digital means are developed that could be used to withdraw workers both from precarity and  from total submission to a life of labour.  
  • Microsoft is no less defensive of its monopoly: with Intel and other accomplices, they introduced a new firmware to boot Windows 8 PCs that, substituting the old BIOS,[xv] makes it impossible or very complicated to install Linux or other operating systems on new laptops.
  • Despite hesitations related to “security” problems, today companies allow or even oblige people to use their own devices
  • So, if you were one of those many who found the latest tablet, smartphone or hybrid touch device under the tree this year, be aware that you won’t be the only one pleased: under the regime of precarity, bring your own device if you want to survive. 
  •  
    "Bring your own device (BYOD) is a business policy whereby employees bring personally owned mobile devices to their place of work and use them to access privileged company resources such as email, file servers and databases as well as their personal applications and data."
sintija

BBC News - Viewpoint: Changing the way the internet is governed is risky - 0 views

  • Viewpoint: Changing the way the internet is governed is risky
  • the US Department of Commerce has the power to decide how the internet works
  • internet is already governed
  • ...15 more annotations...
  • It's important to realise that without governance the internet could not function.
  • avoid two different web sites having the same name
  • International Corporation for Assigned Names and Numbers (Icann)
  • governance of the internet is effectively done by multiple stakeholders
  • WGIG would report on a solution acceptable to all but would move governance to an international body.
  • US government ultimately "controls" the internet
  • The internet overseers
  • UN summit
  • US refused to relinquish control of the Root Zone file, which is basically the key to governing the internet.
  • formed the Working Group on Internet Governance (WGIG).
  • in 2003 in Geneva
  • Russians
  • International Telecommunications Union (ITU), another UN agency, to be given responsibility for internet governanc
  • A great advantage of the current governance structure is that it supports rapid developments, provided that the US Department of Commerce remains at arm's length
  • internet governance needs to help the internet evolve rather than dictate how it must develop.
Miha Naprudnik

Controlling the web - Fault Lines - Al Jazeera English - 0 views

  • SOPA, the Stop Online Piracy Act, and PIPA, the Protect Intellectual Property Act, were meant to crack down on the illegal sharing of digital media. The bills were drafted on request of the content industry, Hollywood studios and major record labels. 
  • The US government says it must be able to fight against piracy and cyber attacks. And that means imposing more restrictions online. But proposed legislation could seriously curb freedom of speech and privacy, threatening the internet as we know it.
  • Can and should the internet be controlled? Who gets that power? How far will the US government go to gain power over the web? And will this mean the end of a free and global internet?
Miha Naprudnik

The internet drugs market has spun out of our control - Telegraph - 0 views

  • An inquest heard last week that the gifted student had bought a drug over the internet that is used for lethal injections on America’s Death Row, and taken her own life.
  • What has been described by the coroner as a “matter of public concern”, though, is that she found a dark side of the internet that gave vent to such feelings, and offered tips on suicide and the drugs that would kill her.
  • Teenage party invitations now come with links to internet drugs sites.
  • ...1 more annotation...
  • The sprawling internet has become the modern day Wild West. A badlands existing outside of normal rules and controls.
nikasvajncer

Addicted! Scientists show how internet dependency alters the human brain - Science - Ne... - 0 views

  • Internet addiction
  • changes in the brain similar to those seen in people addicted to alcohol, cocaine and cannabis.
  • We are doing it because modern life requires us to link up over the net in regard to jobs, professional and social connections – but not in an obsessive way.
  • ...9 more annotations...
  • "The majority of people we see with serious internet addiction are gamers – people who spend long hours in roles in various games that cause them to disregard their obligations. I have seen people who stopped attending university lectures, failed their degrees or their marriages broke down because they were unable to emotionally connect with anything outside the game."
  • spent many hours on the internet,
  • you know they have a problem
  • "The limitations [of this study] are that it is not controlled, and it's possible that illicit drugs, alcohol or other caffeine-based stimulants might account for the changes. The specificity of 'internet addiction disorder' is also questionable."
  • emotional processing, attention, decision making and cognitive control.
  • "internet addiction disorder"
  • In a groundbreaking study, researchers used MRI scanners to reveal abnormalities in the brains of adolescents who spent many hours on the internet, to the detriment of their social and personal lives.
  • An estimated 5 to 10 per cent of internet users are thought to be addicted – meaning they are unable to control their use.
  • "The majority of people we see with serious internet addiction are gamers – people who spend long hours in roles in various games that cause them to disregard their obligations.
Jernej Prodnik

Amazon 'used neo-Nazi guards to keep immigrant workforce under control' in Germany - Eu... - 0 views

  • Amazon 'used neo-Nazi guards to keep immigrant workforce under control' in Germany Internet giant investigates abuse claims by foreign workers in its German warehouses Tony Paterson Berlin
  • Amazon is at the centre of a deepening scandal in Germany as the online shopping giant faced claims that it employed security guards with neo-Nazi connections to intimidate its foreign workers. Germany’s ARD television channel made the allegations in a documentary about Amazon’s treatment of more than 5,000 temporary staff from across Europe to work at its German packing and distribution centres.The film showed omnipresent guards from a company named HESS Security wearing black uniforms, boots and with military haircuts. They were employed to keep order at hostels and budget hotels where foreign workers stayed. “Many of the workers are afraid,” the programme-makers said.The documentary provided photographic evidence showing that guards regularly searched the bedrooms and kitchens of foreign staff. “They tell us they are the police here,” a Spanish woman complained. Workers were  allegedly frisked to check they had not walked away with breakfast rolls.
  • Another worker called Maria said she was thrown out of the cramped chalet she shared with five others  because she had dried her wet clothes on a wall heater. She said she was confronted by a muscular, tattooed security man and told to leave. The guards then shone car headlights at her in her chalet while she packed in an apparent attempt to intimidate her.Several guards were shown wearing Thor Steinar clothing – a Berlin-based designer brand synonymous with the far-right in Germany. The Bundesliga football association and the federal parliament have both banned the label because of its neo-Nazi associations. Ironically, Amazon stopped selling the clothing for the same reasons in 2009.ARD suggested that the name “HESS Security” was an allusion to Adolf Hitler’s deputy, Rudolf Hess. It alleged that its director was a man, named only as Uwe L, who associated with football hooligans and convicted neo-Nazis who were known to police. The programme-makers, who booked in at one of the budget hotels where Amazon staff were housed, said they were arrested by HESS Security guards after being caught using cameras. They were ordered to hand over their film and, when they refused, were held for nearly an hour before police arrived and freed them. The film showed HESS guards scuffling with the camera crew and trying to cover their lenses.
  • ...1 more annotation...
  • ARD said Amazon’s temporary staff worked eight-hour shifts packing goods at the company’s logistics centres in Bad Hersfeld, Konstanz and Augsburg. Many walked up to 17 kilometres per shift and all those taken on could be fired at will. On arrival in Germany, most were told their pay had been cut to below the rate promised when they applied for jobs at Amazon.  “They don’t see any way of complaining,” said Heiner Reimann, a spokesman for the United Services Union (Ver.di). “They are all too frightened of being sent home without a job.”Silvina, a Spanish mother of three in her 50s, who lost her job as an art teacher, was featured in the film. She applied for three months’ work with Amazon to earn some badly needed cash. “It’s like being in a machine and we are just a small part in this machine,” she told the programme.HESS Security did not respond to the allegations made by ARD.Amazon employs 7,700 full-time staff at seven distrubution centres in Germany. The accusations led to the company’s Facebook site being inundated with angry complaints.The company said: “Although the security firm was not contracted by Amazon we are, of course, currently examining the allegations concerning the behaviour of security guards and will take the appropriate measures immediately. We do not tolerate discrimination or intimidation.”
Patricija Čelik

Internet pornography: safety plans do not go far enough - charities - Telegraph - 0 views

  • The Government yesterday launched a consultation on a possible change in the law to give parents more control over the material their children are viewing online.
  • Internet service providers have been in talks with the Government about ways of enabling parents to block sites containing sexually or gambling as well as forums glorify suicide and self-harm.
  • a report by MPs who called for a full “opt-in” which would automatically block adult material unless the user chose to deactivate it. Google has argued that an automatic block as a “mistake”, while Virgin Media, BT, TalkTalk and Sky have developed versions of the “active choice” system which makes users chose whether they want parental controls when they sign up, rather than imposing them automatically.
  • ...1 more annotation...
  • Claire Walker, head of policy, at the charity Family Lives, which this week published a hard hitting report on online dangers, said parents would be more secure with an automatic block.
Neža Zidanič

Warning over social networking 'snooping' technology - Telegraph - 0 views

  • New stalking software capable of tracking people’s movements and predicting future behaviour using data from social networking websites has been developed, it emerged today.
  • The sophisticated technology relies on websites such as Facebook and Twitter to build a detailed picture of people’s lives in a move that could raise concerns over breach of privacy and civil liberties.
  • t was claimed that the technology could be transformed into a "Google for spies" and used by governments as a means of monitoring and controlling people online.
  • ...1 more annotation...
  • Users may be posting information that they believe will be viewed only by their friends, but instead, it is being viewed by government officials or pulled in by data collection services like the Riot search."
Veronika Lavrenčič

The Arpanet, Ethernet Explained | Article by Sonet Digital - 0 views

  • Arpanet, Ethernet
  • Part: 2
  • Larry Roberts
  • ...27 more annotations...
  • linking computers via telephone lines
  • university and research sites would be connected
  • to build Interface Message Processors
  • smaller computers
  • File Transfer Protocol
  • to handle the interfacing between their hosts and the Network
  • ARPANET in 1969
  • The '70s saw the emergence of the first networks
  • o facilitate communications
  • Network Control Protocol (NCP)
  • a user-transparent mechanism for sharing files between host computers
  • the first Terminal Interface Processor (TIP) is implemented
  • common language
  • 1972 Vinton Cerf is called to the chairmanship
  • Inter-Networking Group (INWG)
  • to develop standards for the ARPANET
  • NCP communications system
  • TCP (Transmission-Control Protocol)
  • Users at various sites could log on to the Network and request data from a number of host computers
  • They conceived of a protocol that could be adopted by all gateway computers and hosts alike
  • In this way different networks could be linked together to form a network of networks
  • By the late '70s the final protocol was developed - TCP/IP (Internet Protocol) - which would become the standard for internet communications.
  • Bob Metcalfe's: Ethernet
  • packet switching networks
  • a dissertation on the ARPANET
  • marketed his invention as Ethernet
  • the '80s witnessed the explosion of Local Area Networks (LANs)
  •  
    Drugi del serije člankov. 
alja polajžer

BBC News - Clarity call for mobile and internet privacy - 0 views

  • Clarity call for mobile and internet privacy
  • The Communications Consumer Panel said that people should have control over which information is shared.
  • Data doubts
  • ...5 more annotations...
  • The panel, which was set up to advise communications regulator Ofcom about consumers' interests, wants more control for shoppers over their data.
  • Consumers using their mobile phones can allow businesses to collect data about their location and the products and services they are interested in.
  • the Information Commissioner raised concerns over people's awareness of data privacy.
  • "It has never been more important to protect your personal information. Whether you are surfing the net, shopping online or signing up to social networking sites, it is crucial that people are thinking about how their information might be used," said Christopher Graham, the Information Commissioner.
  • From employers looking up potential employees on Facebook to cyber-criminals hacking into unsecured wi-fi networks, not protecting your personal information can cause serious harm and distress."
Katja Jerman

Five-year-old runs up £1,700 iPad bill in ten minutes - Telegraph - 0 views

  • Five-year-old runs up £1,700 iPad bill in ten minutes
  • "Danny was pestering us to let him have a go on the iPad. He kept saying it was a free game so my husband put in the passcode and handed it to him.
  • "He was crying, as the rest of the children were telling him we could have bought a house with the amount he had spent.
  • ...10 more annotations...
  • I am still going to play games when I can, but I will be careful now."
  • I'm not sure how I did it, I thought it was free.
  • turn off functionality such as purchasing from iTunes and the ability to turn off in-app purchases.
  • "It was far too easy a thing for him to do and more should be done to limit stuff like this from happening. That game is very annoying - and who would spend more than £1,700 on a game?
  • such incidents had to be reported as quickly as possible.
  • "All iOS devices (iPad, iPhone and iPod touch) have built in parental controls that give parents and guardians the ability to restrict access to content, eg internet access and age rated content such as music, games, apps, TV shows, movies etc.
  • Apple have now told the family they will refund the money.
  • Five-year-old runs up £1,700 iPad bill in ten minutes
  • Five-year-old runs up £1,700 iPad bill in ten minutes
  • But after downloading the free app Danny found his way into the game's online store and innocently ordered dozens of costly add-ons - totalling £1,710.43.
sergeja perklič

The European Union Closes in on Data Privacy Legislation - SPIEGEL ONLINE - 0 views

  • The European Union is seeking to increase the private sphere of its citizens by strengthening data protection laws for the web. Large Internet firms and lobbyists are fighting the plans.
  • Gmail and Facebook may be forced to abandon their ad-supported models and start charging their customers in Europe or stop providing them with these popular services altogether.
  • Take Facebook, for example, which has its European headquarters in Ireland. The Irish government's data protection commissioner would then be responsible for the concerns of all EU citizens relating to the company's privacy policies.
  • ...2 more annotations...
  • Under exi
  • sting privacy regulations, data protection supervision in EU countries must be conducted entirely independently of public authorities, and data protection controllers are not under the supervision of the European Commission. But the EU wants to weaken this policy and install itself as the data protection agencies' supervisory authority.
Gabrijela Vrbnjak

BBC News - Web code weakness allows data dump on PCs - 0 views

  • The loophole exploits a feature of HTML 5 which defines how websites are made and what they can do.
  • Developer Feross Aboukhadijeh found the bug and set up a demo page that fills visitors' hard drives with pictures of cartoon cats. In one demo, Mr Aboukhadijeh managed to dump one gigabyte of data every 16 seconds onto a vulnerable Macbook. Clever code Most major browsers, Chrome, Internet Explorer, Opera and Safari, were found to be vulnerable to the bug, said Mr Aboukhadijeh. While most websites are currently built using version 4 of the Hyper Text Markup Language (HTML), that code is gradually being superseded by the newer version 5. One big change brought in with HTML 5 lets websites store more data locally on visitors' PCs. Safeguards built into the "local storage" specification should limit how much data can be stored. Different browsers allow different limits but all allow at least 2.5 megabytes to be stored. However, Mr Aboukhadijeh found a way round this cap by creating lots of temporary websites linked to the one a person actually visited. He found that each one of these associated sites was allowed to store up to the limit of data because browser makers had not written code to stop this happening. By endlessly creating new, linked websites the bug can be used to siphon huge amounts of data onto target PCs. Only Mozilla's Firefox capped storage at 5MB and was not vulnerable, he found. "Cleverly coded websites have effectively unlimited storage space on visitor's computers," wrote Mr Aboukhadijeh in a blogpost about the bug. Code to exploit the bug has been released by Mr Aboukhadijeh and he set up a website, called Filldisk that, on vulnerable PCs, dumps lots of images of cats on to the hard drive. So far, no malicious use of the exploits has been observed. In a bid to solve the problem, bug reports about the exploit have been filed with major browser makers. More on This Story .related-links-list li { position: relative; } .related-links-list .gvl3-icon { position: absolute; top: 0; left: 0; } Related Stories Firefox smartphone partners revealed 24 FEBRUARY 2013, TECHNOLOGY Flash Player exits Android store 15 AUGUST 2012, TECHNOLOGY HTML 5 target for cybercriminals 02 DECEMBER 2011, TECHNOLOGY $render("page-see-also","ID"); $render("page-newstracker","ID"); Related Internet links Feross Aboukhadijeh The BBC is not responsible for the content of external Internet sites $render("page-related-items","ID"); Share this pageShare this page1.4KShareFacebookTwitter Email Print In association with $render("advert","advert-sponsor-module","page-bookmark-links"); $render("advert-post-script-load"); $render("advert-post-script-load"); More Technology stories RSS Computer glitch hits Mars rover Nasa's Curiosity Mars rover is put into "safe mode" after a computer glitch caused by corrupted files. US plans small-ship drone launches Hackers breach Evernote security $render("advert","advert-mpu-high"); $render("advert-post-script-load"); Top Stories http://news.bbcimg.co.uk/media/images/6618
  • found the bug and set up a demo page that fills visitors' hard drives with pictures of cartoon cats.
  • ...6 more annotations...
  • because browser makers had not written code to stop this happening. By endlessly creating new, linked websites the bug can be used to siphon huge amounts of data onto target PCs.
  • found a way round this cap by creating lots of temporary websites linked to the one a person actually visited
  • Most major browsers, Chrome, Internet Explorer, Opera and Safari, were found to be vulnerable to the bug
  • was not vulnerable
  • Mozilla's Firefox
  • bug reports about the exploit have been filed with major browser makers.
Patricija Čelik

As 'Do Not Track' Effort Seems to Stall, Web Companies Race to Look Privacy-Friendly - ... - 0 views

  • Increasingly, Internet companies are pushing each other to prove to consumers that their data is safe and in their control.
  • In some instances, established companies are trying to gain market advantage by casting themselves as more privacy-friendly than their rivals.
  • “It’s not just privacy advocates and regulators pushing,” Mr. Lynch said. “Increasingly, people are concerned more about privacy as technology intersects their life.”
  • ...2 more annotations...
  • To some degree, these developments signal that the industry is working hard to stave off government regulation, which is moving at a glacial pace anyway. There seems to be no movement on broad privacy legislation on Capitol Hill, and no consensus has been reached on standards for “Do Not Track,” a browser setting that would let Internet users indicate that they did not want their activity tracked by marketers.
  • Whether Internet users are ready to pay to protect their personal data is unclear, though surveys have repeatedly pointed to consumer anxiety.
Rebeka Aščerič

BBC News - Children 'must know web limits' says Wales commissioner - 0 views

  • Adults must impose the necessary checks and balances to keep children safe online, says the children's commissioner for Wales.
  • "All children and young people don't seem much of a distinction between their online and offline lives,"
  • Mr Towler told BBC Radio Wales. "It's all just one thing and they get really excited by the opportunities the internet affords and sometimes parents get a little scared about that and worried about what their children are accessing." 'Crossing the road' Continue reading the main story “Start Quote They're all running around with handheld computers these days, they're not just on phones ” End Quote Keith Towler Children's commissioner Mr Towler said he talks to children in lots of different settings and they "still enjoy playing outside as much as they ever did". He said we need to recognise that the internet provides fantastic opportunities for education and learning and its making sure that children access that safely. He said that was a real challenge for parents and carers. "It's a bit like crossing the road, you try to teach your children the best way of crossing the road well. We need to teach our children the best way of using this fantastic resource. "I think too many parents are very very scared of the internet and because they're so scared they will say 'Oh I don't understand it'". Handheld computers The commissioner also praised Hwb, the virtual learning environment, which he said provides protection for children using the web in schools. Mr Towler said: "We've got to get parents and carers to recognise that children do operate in the digital world. They're all running around with handheld computers these days, they're not just on phones. "They can access whatever they want whenever they want and parents need to engage on that. " "We need to remember that children and young people are much more savvy than sometimes we think they are, and they are much more responsible than sometimes adults think they are so its not all doom and gloom. "What we need to do is put the right checks and balances in place and what children always want from parents and carers is to understand what the boundaries are, and that's our job to do that." Sangeet Bhullar, executive director of Wise Kids, added that the digital landscape was "evolving rapidly" and up-to-date data was needed on how children and young people in Wales related to it. More on This Story .related-links-list li { position: relative; } .related-links-list .gvl3-icon { position: absolute; top: 0; left: 0; } Related Stories Web safety lessons urged for infants 05 FEBRUARY 2013, EDUCATION &amp; FAMILY Online chat 'should be monitored' 22 JANUARY 2013, TECHNOLOGY Body to promote digital teaching 22 JUNE 2012, WALES $render("page-see-also","ID"); $render("page-newstracker","ID"); Related Internet links Children's Commissioner for Wales The BBC is not responsible for the content of external Internet sites $render("page-related-items","ID"); Share this pageShare this pageShareFacebookTwitter Email Print In association with $render("advert","advert-sponsor-module","page-bookmark-links"); $render("advert-post-script-load"); $render("advert-post-script-load"); More Wales stories RSS Army base shuts in defence shake-up An Army base in Pembrokeshire is to close with 600 troops transferred to St Athan in the Vale of Glamorgan. Soldiers' conman jailed three years Wales recall Warburton and Jones <!--
  • ...2 more annotations...
  • "I think too many parents are very very scared of the internet and because they're so scared they will say 'Oh I don't understand it'".
  • "What we need to do is put the right checks and balances in place and what children always want from parents and carers is to understand what the boundaries are, and that's our job to do that."
manca_

North Korea's 3G network won't be censored for foreigners | The Verge - 1 views

  • long maintained tight control over the flow of information within its borders
  • foreigners
  • unfettered mobile access to the web
  • ...7 more annotations...
  • thanks to new policies implemented by supreme leader Kim Jong Un
  • that required foreigners to hand over their devices to authorities.
  • country has finally begun opening its doors to the outside world,
  • some 3G services, including text messaging, video calls, and subscriptions to state-run newspapers, but their mobile internet will remain tightly filtered, since North Koreans are still "governed by a separate set of telecommunication rules,"
  • two parallel internets — one for foreigners, one for citizens
  • visitors
  • about $300 for the cheapest 2GB data package.
Jan Majdič

China to Web Users: Great Firewall? Just Be Glad We're Not North Korea - David Caraglia... - 1 views

  • Last week, Google Executive Chairman Eric Schmidt urged North Korean leaders to embrace the Internet. Only a small proportion of that country's 24 million people can access the World Wide Web, and the majority of the 1.5 million mobile phones there belong to political and military elites.
  • Meanwhile, in China, a country that has embraced the Internet to a much greater extent, the big story was about censorship, both online and off.
  • For Chinese social media users, the irony here was too perfect to go unnoticed
  • ...5 more annotations...
  • A number of social networking and sharing websites are blocked in China, including Facebook, Twitter, Youtube, Wikipedia, and certain Google applications
  • "China's progress must be viewed in the context of its unique historical and cultural circumstances.
  • Web users engage with and identify as part of a broader, sometimes international, online community
  • Chinese public preferences are shifting from broadcast media to networked media; with that shift, the expectation for public participation is growing.
  • Knowing well the impact and viral nature of social networking, editors loyal to propaganda authorities took control of the newspaper's microblogging account not long after the scandal broke.
Miha Naprudnik

ACTA error: Democracy not found - RT News - 1 views

  • As European parliaments reject the Anti-Counterfeiting trade Agreement on human rights grounds, some are asking why it was signed in the first place.
  • The question is&nbsp;– why was the agreement signed in the first place, if its chances of being ratified are dropping by the day?
  • The pretext was the protection of intellectual property, and to control Internet resources that could be used by terrorists or to incite riots and other criminal activity.
  • ...1 more annotation...
  • There's an argument to be made that freedom and security are usually in opposition; the most secured people are in prison, where they hardly have any freedom. Usually, security comes at the price of freedom&nbsp;– and that’s exactly the cost of ACTA.
Jan Majdič

Boot up: China's Android worry, Microsoft's new browser fine, PC decline forecast and m... - 1 views

  • is strictly controlled by Google."
  • to allow European users of its Windows operating system to choose among competing browsers, according to a Reuters report citing three anonymous sources.
  • A recently discovered flaw in the HTML 5 coding language could allow websites to bombard users with gigabytes of junk data, with a number of popular browsers being open to the vulnerability
1 - 20 of 36 Next ›
Showing 20 items per page