Skip to main content

Home/ Internetni praktikum/ Group items tagged critics

Rss Feed Group items tagged

inesmag

Apple value falls below $400bn, as Warren Buffett says 'ignore critics' | Technology | ... - 0 views

  • Apple is still embroiled in a legal tussle with Samsung, once its biggest supplier of phone parts. Photograph: Michaela Rehle/Reuters
  • The company is under increasing pressure from rivals including Google and smartphone manufacturers like South Korean electronics giant Samsung, whose Galaxy line has challenged iPhone's success.
  • Samsung used to be Apple's biggest supplier for phone parts, and Apple its largest customer. But in 2010, Jobs vowed to go to "thermonuclear war" over what he saw as copying of iPhone features by phones using Google's Android operating system.
Kaja Horvat

EU agencies to sanction Google over privacy violations - INTERNET - FRANCE 24 - 0 views

  • EU data-protection agencies will take action against internet giant Google after it failed to comply with EU privacy laws,
  • In October the data protection agencies warned Google that its new confidentiality policy did not comply with EU laws and gave it four months to make changes or face legal action.
  • Google rolled out the new privacy policy in March 2012, allowing it to track users across various services to develop targeted advertising, despite sharp criticism from US and European consumer advocacy groups.
  • ...4 more annotations...
  • It contends the move simplifies and unifies its policies across its various services such as Gmail, YouTube, Android mobile systems, social networks and Internet search.
  • But critics argue that the policy, which offers no ability to opt out aside from refraining from signing into Google services, gives the operator of the world's largest search engine unprecedented ability to monitor its users.
  • European data protection agencies had recommended to Google that it improve information provided to users, particularly on the categories of data being processed, and for what purposes and services.
  • changes are designed to improve the user experience across the various Google products, and give the firm a more integrated view of its users
Katja Jerman

Digital rights advocates wary of new 'six strikes' initiative for online piracy | Techn... - 0 views

  • The Copyright Alert System (CAS) was devised by a coalition of internet service providers (ISPs), content owners and the US government to curb illegal downloading by alerting "casual infringers" when illegal filesharing is detected on their IP address
  • Initially, the alerts are intended to be educational. They tell the customer what happened and how they can prevent it from happening again. If pirating continues to happen through the IP address, users will receive the message again, followed by messages that ask them to confirm they have seen the alerts. The fifth and sixth alert are called mitigation alerts and will temporarily slow users' internet speeds, depending on the ISP.
  • CAS has also been criticized because the person who audited the MarkMonitor software to ensure that it fairly identifies copyright violations is a former lobbyist for the Recording Industry Association of America (RIAA), one of the industry groups fronting money for system.
  • ...12 more annotations...
  • Jill Lesser, executive director of the Center for Copyright Information said in an interview with On the Media that the program is meant to abet the "casual infringer".
  • McSherry said that people engaged in wholesale commercial infringement wouldn't be fazed by the system because they are familiar with ways around the system.
  • The newest attempt to thwart illegal filesharing in the United States launched Monday and while the "six strikes and you're out" initiative seems to offer light penalties, digital rights advocates are concerned that it lacks transparency.
  • Copyright Alert System (CAS)
  • was devised by a coalition of internet service providers (ISPs), content owners and the US government to curb illegal downloading by alerting "casual infringers" when illegal filesharing is detected on their IP address.
  • Initially, the alerts are intended to be educational.
  • . If pirating continues to happen through the IP address, users will receive the message again, followed by messages that ask them to confirm they have seen the alerts. The fifth and sixth alert are called mitigation alerts and will temporarily slow users' internet speeds, depending on the ISP.
  • It's certainly not how we should be doing copyright policy,
  • it's a private copyright system and it doesn't have the protections and balances that the public copyright system has.
  • to ensure that it fairly identifies copyright violations is a former lobbyist
  • McSherry said that people engaged in wholesale commercial infringement wouldn't be fazed by the system because they are familiar with ways around the system
  • This failed to have a significant effect on pirating, and the industry stopped suing these type of casual users several years ago.
  •  
    article 1
Maj Krek

Kill the Internet-and Other Anti-SOPA Myths | The Nation - 0 views

  • in the wake of protests by dozens of websites and large numbers of their users, as well as a virtually unanimous chorus of criticism from leading progressive voices and outlets, including Michael Moore, Cenk Uygur, Keith Olbermann, Alternet, Daily Kos, MoveOn and many people associated with Occupy Wall Street. Judging by the fervor of the anti-SOPA/PIPA protests, a casual observer might think the advocates of the anti-piracy bills were in the same moral league as the torturers at Abu Ghraib.
  • But before we celebrate this “populist” victory, it’s worth remembering that the defeat of SOPA and PIPA was also a victory for the enormously powerful tech industry, which almost always beats the far smaller creative businesses in legislative disputes. (Google alone generated more than $37 billion in 2011, more than double the revenue of all record companies, major and indie combined.)
  • One example of anti-SOPA rhetorical over-reach was a tendency by some to invent sinister motives for the sponsors. On his usually brilliant show The Young Turks, Uygur said that SOPA’s sponsors were “pushing for a monopoly for the MPAA and to kill their competition on the Internet.” This is untrue. They wanted to kill those entities that steal their movies and make money off them, either directly or indirectly. There really is a difference
  • ...8 more annotations...
  • that stopped allowing children to put up their own drawings of characters like Mickey Mouse because of fear of copyright lawsuits. Examples such as this, or of a theoretical risk of parents being charged for the right to have kids sing “Happy Birthday”, are demagogic. The underlying issue is scale. There is a profound moral difference between loaning a friend a book and posting, without permission, the content of bestsellers for commercial gain—and people and legislators ought to take that distinction into account.
  • since iTunes and Amazon and are surviving, Napster’s original model was legally killed and Kim Dotcom was apprehended, no new laws are needed. The status quo may be what we end up with, but that doesn’t make it inevitable or right. Human beings have created the piracy problem and although, like any kind of crime, society can’t eliminate it entirely, we can decide whether or not to seriously try.  
  • What is good for Google and Facebook is not always going to be what’s best for the 99 percent. (And of course Microsoft and Apple et al. are extremely aggressive when it comes to protecting their intellectual property rights).
  • on the content of some of the Kool-Aid that has recently been served and help swing the pendulum back, if only a little, in a direction in which intellectual property can be nourished. Otherwise, we will be complicit in accelerating the trend of the last decade, in which those who write code get richly rewarded, while those who write the music, poetry, drama and journalism that are being encoded have to get day jobs.
  • To be sure, the legislators who crafted the ill-fated bills and the film industry lobbyists who supported them have little to be proud of.
  • In a widely viewed anti-SOPA/PIPA speech on Ted.com, Internet philosopher Clay Shirky similarly attributed dark motives to the studios. The targets are not Google and Yahoo
  • If he means a friend sharing Marianne Faithfull’s version of “Visions of Johanna” with me on Facebook, then the accusation is absurd.
  • ek in his 25,000-square-foot compound surrounded by a fleet of Merced
Anja Pirc

Online privacy: Difference Engine: Nobbling the internet | The Economist - 0 views

  • TWO measures affecting the privacy internet users can expect in years ahead are currently under discussion on opposite sides of the globe. The first hails from a Senate committee’s determination to make America’s online privacy laws even more robust. The second concerns efforts by the International Telecommunications Union (ITU), an intergovernmental body under the auspices of the United Nations, to rewrite its treaty for regulating telecommunications around the world, which dates from 1988, so as to bring the internet into its fief.
  • The congressional measure, approved overwhelmingly by the Senate Judiciary Committee on November 29th, would require criminal investigators to obtain a search warrant from a judge before being able to coerce internet service providers (ISPs) to hand over a person’s e-mail. The measure would also extend this protection to the rest of a person’s online content, including videos, photographs and documents stored in the "cloud"—ie, on servers operated by ISPs, social-network sites and other online provider
  • a warrant is needed only for unread e-mail less than six months old. If it has already been opened, or is more than six months old, all that law-enforcement officials need is a subpoena. In America, a subpoena does not need court approval and can be issued by a prosecutor. Similarly, a subpoena is sufficient to force ISPs to hand over their routing data, which can then be used to identify a sender’s various e-mails and to whom they were sent. That is how the FBI stumbled on a sex scandal involving David Petraeus, the now-ex director of the CIA, and his biographer.
  • ...7 more annotations...
  • No-one imagined that ISPs would one day offer gigabytes of online storage free—as Google, Yahoo!, Hotmail and other e-mail providers do today. The assumption back then was that if someone had not bothered to download and delete online messages within six months, such messages could reasonably be considered to be abandoned—and therefore not in need of strict protection.
  • wholesale access to the internet, powerful mobile phones and ubiquitous social networking have dramatically increased the amount of private data kept online. In the process, traditional thinking about online security has been rendered obsolete. For instance, more and more people nowadays keep their e-mail messages on third-party servers elsewhere, rather than on their own hard-drives or mobile phones. Many put their personal details, contacts, photographs, locations, likes, dislikes and inner thoughts on Google, Facebook, Twitter, Flickr, Dropbox and a host of other destinations. Bringing online privacy requirements into an age of cloud computing is only fit and proper, and long overdue.
  • the international telecoms treaty that emerged focused on how telephone traffic flows across borders, the rules governing the quality of service and the means operators could adopt to bill one another for facilitating international calls. As such, the regulations applied strictly to telecoms providers, the majority of which were state owned.
  • he goal of certain factions is to grant governments the authority to charge content providers like Amazon, Google, Facebook and Twitter for allowing their data to flow over national borders. If enacted, such proposals would most certainly deter investment in network infrastructure, raise costs for consumers, and hinder online access for precisely those people the ITU claims it wants to help.
  • a proposal sponsored by the United States and Canada to restrict the debate in Dubai strictly t
  • o conventional telecoms has met with a modicum of success, despite stiff opposition from Russia plus some African and Middle-Eastern countries. Behind closed doors, the conference has agreed not to alter the ITU’s current definition of “telecommunications” and to leave the introductory text concerning the existing treaty’s scope intact.
  • The sticking point has been what kind of organisations the treaty should apply to. Here, one word can make a huge difference. In ITU jargon, the current treaty relates only to “recognised operating agencies”—in other words, conventional telecoms operators. The ITU wants to change that to simply “operating agencies”. Were that to happen, not only would Google, Facebook and other website operators fall under the ITU’s jurisdiction, but so too would all government and business networks. It seems the stakes really are as high as the ITU’s critics have long maintained
Veronika Lavrenčič

How the Internet Gets Inside Us : The New Yorker - 0 views

  • The Information How the Internet gets inside us.
  • searc
  • engine Google was launched.
  • ...28 more annotations...
  • “Why is she doing that?” they whisper. “Why doesn’t she just Google it?”
  • the technological shifts in communication we’re living with are unprecedented
  • our technological revolution is the big social revolution that we live with.
  • the Never-Betters, the Better-Nevers, and the Ever-Wasers
  • the world
  • the brink of a new utopia
  • Better-Nevers
  • better off if the whole thing had never happened
  • uperior
  • is coming to an end
  • Never-Betters
  • s taking its place
  • Ever-Wasers
  • new way of organizing data and connecting users is always thrilling to some and chilling to others
  • is exactly what makes it a modern moment.
  • N.Y.U. professor Clay Shirk
  • something a little nervous going on underneath.
  • e are on the crest of an ever-surging wave of democratized information
  • Gutenberg printing press produced the Reformation, which produced the Scientific Revolution, which produced the Enlightenment, which produced the Internet,
  • he new connective technology
  • he Wired version of Whig history
  • is bound to make for more freedom
  • “Is the Internet Changing the Way You Think?,”
  • “We see all around us transformations in the making that will rival or exceed the printing revolution”
  • “Printing ignited the previously wasted intellectual potential of huge segments of the population. . . . Freedom of thought and speech—where they exist—were unforeseen offspring of the printing press.”
  • Never-Betterism has its excitements,
  • emerged at the end of the printing-press era
  • t wasn’t by some technological logic but because of parallel inventions,
  •  
    O tem, kako je tehnologija prišla v nas, kako jo bodo verjetno občutile mlajše generacije in kako je tehnologija vedno obstajala, le zavedali se je niso. 
Veronika Lavrenčič

The Internet Explained | Article by Sonet Digital - 0 views

  • The Internet Explained
  • Part: 1
  • The exponential growth of the Internet has been phenomenal. Or has it?
  • ...34 more annotations...
  • the ability to communicate
  • the Internet has now blossomed into a vehicle of expression
  • and research for the common person with hundreds of thousands, if not millions, of new pages being added to the World Wide Web every day
  • Vannevar Bush
  • a machine called a 'memex' might enhance human memory by the storage
  • 1945 essay, 'As We May Think'
  • ar less critical
  • Bush's contribution
  • Bush galvanised research into technology as the key determinant in winning the Second World War
  • A few years after the war the National Science Foundation (NSF) was setup
  • in 1958
  • the Advanced Research Projects Agency (ARPA) was created
  • employed a psychologist by the name of Joseph Licklider
  • in 1962
  • the development of the modern PC
  • built upon Bush's contributions
  • esponsible for penning 'Man Computer Symbiosis'
  • computer networking
  • and companies
  • he initiated research contracts with leading computer institutions
  • ay down the foundations of the first networked computing group.
  • he setup a research laboratory
  • Douglas Engelbart
  • to examine the human interface and storage and retrieval systems
  • the Augmentation Research Center
  • NLS (oNLine System
  • ARPA funding
  • hypertext
  • the developer of the first mouse or pointing device
  • the hardware giants were consolidating their computing initiatives
  • conceiving the use of packets, small chunks of a message which could be reconstituted at destination, upon which current internet transmission and reception is based
  • Paul Baran
  • Cold War technology
  • the idea of distributed networks comprising numerous interconnected nodes
  •  
    Prvi del članka, govori o krivcih, za obstajanje interneta.
Kaja Horvat

Online Shopping: More Popular (Yet Less Satisfying) Than Ever | TIME.com - 0 views

  • consumers are increasingly content to turn to the web to get their holiday shopping done.
  • Yet as more consumers turn to online shopping before and after the holidays, more critics are voicing their dissatisfaction with e-retail. The biggest argument in favor of online shopping is that it eliminates the hassle of having to go to a store, but still, online shopping is hardly without hassles.
  • Among the problems: Purchased items were shipped to the wrong people; presents that were supposed to be gift-wrapped never were; cards alerting the recipients where the goods came from were buried deep inside packages or weren’t included at all; and, of course, clearing up these matters with customer service was a maddening, time-consuming process. Among the larger problems that Ephron, and surely many others, have with online shopping is this:
  • ...2 more annotations...
  • On a 100-point satisfaction scale, e-retail as a whole received a score of 78, down from 80 in the 2011 holiday season
  • for the eight year in a row, Amazon received the highest overall customer satisfaction rating in ForeSee’s study.
alja polajžer

BBC News - Google cookies 'bypassed Safari privacy protection' - 0 views

  • Google cookies 'bypassed Safari privacy protection'
  • The Wall Street Journal said Google and other companies had worked around privacy settings designed to restrict cookies
  • Cookies are small text files stored by browsers which can record information about online activity, and help some online services work
  • ...8 more annotations...
  • The Safari browser is produced by Apple, and is the browser used by the iPhone.
  • y default Safari only allows cookies to be stored by the web page a user is visiting, not from third parties such as advertisers
  • esearcher Jonathan Mayer found that advertisers were still able to store cookies on the computers of internet users browsing with Safari.
  • We are aware that some third parties are circumventing Safari's privacy features and we are working to put a stop to it”
  • The Wall Street Journal reported that Google "disabled the code after being contacted by the paper".
  • Online privacy advocates were highly critical of Google's actions.
  • The Electronic Frontier Foundation wrote: "It's time for Google to acknowledge that it can do a better job of respecting the privacy of web users."
  • An Apple spokesman said in a statement: "We are aware that some third parties are circumventing Safari's privacy features and we are working to put a stop to it."
donnamariee

How social networks have changed our world | Techi.com - 0 views

  • How social networks have changed our world
  • social networks have evolved from simple communication hubs to veritable agents of change; galvanizing thousands of people over political discourse, creating and changing industries, and all in all, transforming people’s lives
  • Today, more than 600 million users worldwide are active on this website. Approximately 200 million people are active on twitter
  • ...11 more annotations...
  • None of these social networks even excited at the beginning of the decade. While these figures may be mere numbers for many people, the impact of social network goes far and deep. Here are a few areas in which social networks have had lasting and arguably permanent effects.
  • social networks have altered the operational model of politics and public service
  • Facebook
  • touchstone for how non-profit organizations, environmental activities, and political factions reach out to thousands of potential volunteers and donors
  • Twitter is being used by almost all progressive politicians to promote their causes. Thanks to the social networks, politics is no longer limited to the political elites; people voice their opinions, share their ideas, and even communicate with politicians on a one-on-one basis. It’s a technology lesson that progressive politicians have to learn or else, risk losing to the tech savvy youth of today.
    • donnamariee
       
      Twitter is being used by almost all progressive politicians to promote their causes. Thanks to the social networks, politics is no longer limited to the political elites; people voice their opinions, share their ideas, and even communicate with politicians on a one-on-one basis. It's a technology lesson that progressive politicians have to learn or else, risk losing to the tech savvy youth of today.
  • Marketing and advertising are transforming themselves from industries reliant on mass market channels to those that must embrace the power of the customer, and attempt to engage in conversations with them. Often, a “middle man” (such as news paper reporter) ultimately determined that what was written or said. The ability to bypass gatekeepers and facilitate direct interactions with consumers and communities is very important.
  • Some news websites already present visitors with a list of stories recommended by their friends because they realize an endorsement from ‘someone you know’ carries extra weight
  • From traffic updates, to natural riots, anyone and everyone who has access to social networking sites can report his/her version of such events. Sifting through the humongous amount of news, speculations and analysis are abilities that a New Media user must now possess.
  • It is not uncommon to see small or home grow businesses that operate solely through their Facebook accounts. In fact, for businesses, interaction via social network has almost become a yardstick to test out their customer service
  • With Google+ being launched recently, it is clear that all technology giants have realized the critical role that social networks will lay in shaping our lives. It is no longer about implementing the latest, cutting edge technology; it is about how seamlessly and organically a social network merges in our lives, and affects every aspect of it. The lines between real and virtual lives have now blurred to the extent of becoming invisible
  •  
    essay theme 2
petra funtek

Is the Devil in the Data? A Literature Review of Piracy Around the World - Kariithi - 2... - 1 views

  • This article examines the scholarly literature pertaining to music, film and software piracy around the world, with special attention to data sources, research scope and general findings. The article finds that the conspicuous absence of methodologies utilizing critical theory in this broad literature has constricted the world view of piracy, resulting in monolithic explanations of the causes and correlates of piracy. It further identifies systematic biases relating to the unjustified use of data published by the industry watchdog Business Software Alliance
1 - 12 of 12
Showing 20 items per page