Skip to main content

Home/ Internetni praktikum/ Group items tagged email

Rss Feed Group items tagged

Anja Vasle

Mailbox: the free iPhone app that will change how you use email - Features - Gadgets & ... - 0 views

  • Mailbox is a free iPhone app that aims to change the way you use email.
  • an overflowing inbox is deeply inefficient and it's important to scuttle the unimportant stuff away to stop it from distracting you from the crucial bits.
  • A quick swipe right and emails that you don't need but shouldn't be deleted are swept into an archive, symbolised by a green tick.
  • ...4 more annotations...
  • A slow swipe right, however, and the tick turns into a red X, telling you that email has been deleted.
  • You can do all these swipes without even opening an email, reading the first two lines of the message in the inbox list.
  • This is a fantastic app, though there are some downsides – mostly to do with the fact that it won't work for everyone. For a start, it's iPhone-only – there's no Android, Windows Phone or BlackBerry version for now.
  • This is a remarkable app that can really make a difference to the way you use email.
anonymous

SaneBox: Email Management Tool Review | Inc.com - 0 views

  • It's like Gmail's Priority Inbox feature in that it looks at your messages and prior history engaging with those senders and decides which emails you're likely to deem most important.
  • Priority Inbox is trainable in this way, as well; the more you move stuff around, the better it gets at categorization. But I prefer SaneBox.
  • SaneBox gives you a custom dashboard including a timeline that graphs how many important and less important emails you get every day. My current average, according to SaneBox, is 81 a day. If I took a minute to read, digest, and respond to each one of them, that's nearly an hour and a half a day going through email. If you figure there's at least 250 work days in a year, I'm spending 375 hours annually on email. That's not acceptable.
  • ...2 more annotations...
  • And it also has a nifty feature that lets you CC or BCC a message to @SaneBox.com to remind you if someone doesn't respond.
  • SaneBox also creates an @SaneRemindMe folder that lets you keep track of all the messages to which you still need replies. Use oneweek@SaneBox.com, June5@SaneBox.com or 5minutes@SaneBox.com; it doesn't matter, SaneBox will figure out the time frame you need.
Gabrijela Vrbnjak

Brain-to-brain interface lets rats share information via internet | Science | The Guardian - 0 views

  • News Science Neuroscience Brain-to-brain interface lets rats share information via internet Rats thousands of miles apart collaborate on simple tasks with their brains connected through the internet Share 9893 inShare61 Email Ian Sample, science correspondent The Guardian, Friday 1 March 2013 jQ(document).ready(function(){ jQ.ajax({ url : 'http://resource.guim.co.uk/global/static/file/discussion/5/fill-comment-counts-swimlaned.js', dataType : 'script', type : 'get', crossDomain : true, cache: true }); }); Jump to comments (449) A rat with a brain-to-brain implant responds to a light (circled) by pressing a lever. Its motor cortex was connected to that of another rat. Photograph: Scientific Reports Scientists have connected the brains of a pair of animals and allowed them to share sensory information
  • US team fitted two rats with devices called brain-to-brain interfaces that let the animals collaborate on simple tasks to earn rewards
  • experiments showed that we have established a sophisticated, direct communication linkage between brains
  • ...10 more annotations...
  • In one radical demonstration of the technology, the scientists used the internet to link the brains of two rats separated
  • If the receiving rat failed at the task, the first rat was not rewarded with a drink, and appeared to change its behaviour to make the task easier for its partner.
  • an organic computer
  • we are creating
  • Even though the animals were on different continents
  • they could still communicate
  • we could create a workable network of animal brains distributed in many different locations
  • you could imagine that a combination of brains could provide solutions that individual brains cannot achieve by themselves
  • the work was "very important" in helping to understand how brains encode information
  • Very little is known about how thoughts are encoded and how they might be transmitted into another person's brain – so that is not a realistic prospect any time soon
Jernej Prodnik

Google raises privacy fears as personal details are released to app developers | Techno... - 0 views

  • Google raises privacy fears as personal details are released to app developers Campaigner says tech giant's policies don't make it clear that Google Play users who buy apps give over information
  • Charles Arthur guardian.co.uk, Monday 25 February 2013 14.39 GMT
  • Google Play: the personal details of app buyers are released to developers Google could face a third privacy row in a two years, after a leading campaigner called for the US government to investigate the fact that the names, geographic region and email addresses of people who buy apps from its Play store are passed on to the app developers without users' explicit permission.
  • ...5 more annotations...
  • Ben Edelman, an associate professor at Harvard Business School, says that analysis of Google's terms and conditions relating to its Google Play store and Google Wallet transaction system (used for buying apps) doesn't show any clauses where users are specifically told that their emails will be sent on to the developer. He also warns that developers could use that information to "track and harass" people who have given apps low ratings or requested refunds. And hackers – or malicious developers – could create personalised emails to send out to people to steal passwords (phishing) or install "updates" that were actually malware.
  • Google says it has to provide some location data about which country apps are bought in so developers can calculate the correct amount of tax to pay. But that does not explain why it passes on buyers' names and email addresses, which together with a postcode could be used to identify a person's location and address."Google's prior privacy blunders have put [it] under higher scrutiny," Edelman says, pointing to the 20-year consent order with the US Federal Trade Commission that Google signed in March 2011 in the wake of its Buzz social network fiasco – followed by a record $22.5m fine in August 2012 for hacking Apple users' browsers to install tracking cookies. It has also been fiercely criticised in Europe for its changes in March 2012 to its privacy policies, which data protection chiefs said could mean "uncontrolled" use of personal data.
  • Eric Butler, a freelance software developer of the Tapchat and Farebot apps, tweeted in July 2012 "I wonder if most Android users realise that when you buy an app in the Play Store the seller [of the app] can see your name, email address and phone."Following the row, he has noted on his blog that "Because the entire experience of purchasing Android apps is so sloppy, it's not unreasonable to assume that this privacy issue was actually an oversight." But, he says, "Google should follow Apple's lead and offer users and developers better privacy protection."
  • Another developer, Jesse Wilson, pointed out the same problem in November on Google+, and was quickly echoed by Chris Lacy, who said that "as a developer I never asked for this information, I have no need for it, and I simply do not want to be a custodian of such information."Lacy added that "As a consumer, this is distressing on many levels: there is no fair warning that this information will be transferred … trusting my personal information to Google is one thing. But with this system, users are unknowingly having to trust their information to a third party. There's no way to know what security measures that third party might have in place." He added that it meant that the app developer "has gained my personal information without requesting the appropriate permissions via the app."
  • Google has said that passing on the details does not breach its privacy conditions. In a quote to Siliconvalley.com, a representative told the site that "Google Wallet shares the information necessary to process a transaction, which is clearly spelled out in the Google Wallet privacy notice."
Katja Kotnik

Me and my data: how much do the internet giants really know? | Technology | The Guardian - 0 views

  • Google is not only the world's largest search engine, it's one of the top three email providers, a social network, and owner of the Blogger platform and the world's largest video site, YouTube. Facebook has the social contacts, messages, wallposts and photos of more than 750 million people.
  • The site also lists my most recent sent and received emails (in both cases a "no subject" conversation thread with a colleague).
  • The big relief comes when I note Google isn't tracking the internet searches I've made on my work account
  • ...12 more annotations...
  • only around 29% of the information Facebook possesses on any given user is accessible through the site's tools.
  • The Facebook extended archive is a little creepier, including "poke info", each instance of tracking cookies they possess, previous names, and full login and logout info
  • Looking through anyone's list of searches gives a distressing degree of insight into odder parts of their personality.
  • how much do the internet giants really know?
  • sell us stuff
  • picked up by hackers
  • how much the internet giants know about us.
  • Google isn't totally unhelpfu
  • Every event to which I've ever been invited is neatly listed, alongside its location, time, and whether I said I would attend .
  • One piece of information – a supposed engagement to a schoolfriend, Amy Holmes – stands out. A Facebook "joke" that seemed faintly funny for about a week several years ago was undone by hiding it from any and all Facebook users, friends or otherwise (to avoid an "… is now single!" status update). The forgotten relationship helpfully explains why Facebook has served me up with badly targeted bridalwear adverts for several years, and reassures me that Facebook doesn't know quite everything.
  • This is the core of the main comfort
  • despite their mountain of data, Google and Facebook seem largely clueless, too – they've had no more luck making any sense out of it than I have. And that, for now, is a relief.
Urška Cerar

Apple blocks emails containing phrase 'barely legal teen' from iCloud in new 'anti-porn... - 0 views

  • Apple is deleting all emails on its iCloud service that contain the phrase 'barely legal teen,
  • He's a barely legal teenage driver
  • He's barely a legal teenage driver
  • ...7 more annotations...
  • only the second one got through.
  • The phrase 'barely legal teen' is used in pornographic searches
  • some would consider the phrase to have a strong association with paedophilia
  • Though Apple has no legal obligation to block the phrase 'barely legal teen', its terms of service state that it has every right to do so.
  • Occasionally, automated spam filters may incorrectly block legitimate email
  • The iBookstore rejected an e-book submission on the hippie movement because it contained photographs of naked people.
  • People do not have to use Apple's iCloud service
Gabrijela Vrbnjak

BBC News - Web code weakness allows data dump on PCs - 0 views

  • The loophole exploits a feature of HTML 5 which defines how websites are made and what they can do.
  • Developer Feross Aboukhadijeh found the bug and set up a demo page that fills visitors' hard drives with pictures of cartoon cats. In one demo, Mr Aboukhadijeh managed to dump one gigabyte of data every 16 seconds onto a vulnerable Macbook. Clever code Most major browsers, Chrome, Internet Explorer, Opera and Safari, were found to be vulnerable to the bug, said Mr Aboukhadijeh. While most websites are currently built using version 4 of the Hyper Text Markup Language (HTML), that code is gradually being superseded by the newer version 5. One big change brought in with HTML 5 lets websites store more data locally on visitors' PCs. Safeguards built into the "local storage" specification should limit how much data can be stored. Different browsers allow different limits but all allow at least 2.5 megabytes to be stored. However, Mr Aboukhadijeh found a way round this cap by creating lots of temporary websites linked to the one a person actually visited. He found that each one of these associated sites was allowed to store up to the limit of data because browser makers had not written code to stop this happening. By endlessly creating new, linked websites the bug can be used to siphon huge amounts of data onto target PCs. Only Mozilla's Firefox capped storage at 5MB and was not vulnerable, he found. "Cleverly coded websites have effectively unlimited storage space on visitor's computers," wrote Mr Aboukhadijeh in a blogpost about the bug. Code to exploit the bug has been released by Mr Aboukhadijeh and he set up a website, called Filldisk that, on vulnerable PCs, dumps lots of images of cats on to the hard drive. So far, no malicious use of the exploits has been observed. In a bid to solve the problem, bug reports about the exploit have been filed with major browser makers. More on This Story .related-links-list li { position: relative; } .related-links-list .gvl3-icon { position: absolute; top: 0; left: 0; } Related Stories Firefox smartphone partners revealed 24 FEBRUARY 2013, TECHNOLOGY Flash Player exits Android store 15 AUGUST 2012, TECHNOLOGY HTML 5 target for cybercriminals 02 DECEMBER 2011, TECHNOLOGY $render("page-see-also","ID"); $render("page-newstracker","ID"); Related Internet links Feross Aboukhadijeh The BBC is not responsible for the content of external Internet sites $render("page-related-items","ID"); Share this pageShare this page1.4KShareFacebookTwitter Email Print In association with $render("advert","advert-sponsor-module","page-bookmark-links"); $render("advert-post-script-load"); $render("advert-post-script-load"); More Technology stories RSS Computer glitch hits Mars rover Nasa's Curiosity Mars rover is put into "safe mode" after a computer glitch caused by corrupted files. US plans small-ship drone launches Hackers breach Evernote security $render("advert","advert-mpu-high"); $render("advert-post-script-load"); Top Stories http://news.bbcimg.co.uk/media/images/6618
  • found the bug and set up a demo page that fills visitors' hard drives with pictures of cartoon cats.
  • ...6 more annotations...
  • because browser makers had not written code to stop this happening. By endlessly creating new, linked websites the bug can be used to siphon huge amounts of data onto target PCs.
  • found a way round this cap by creating lots of temporary websites linked to the one a person actually visited
  • Most major browsers, Chrome, Internet Explorer, Opera and Safari, were found to be vulnerable to the bug
  • was not vulnerable
  • Mozilla's Firefox
  • bug reports about the exploit have been filed with major browser makers.
Rebeka Aščerič

BBC News - Children 'must know web limits' says Wales commissioner - 0 views

  • Adults must impose the necessary checks and balances to keep children safe online, says the children's commissioner for Wales.
  • "All children and young people don't seem much of a distinction between their online and offline lives,"
  • Mr Towler told BBC Radio Wales. "It's all just one thing and they get really excited by the opportunities the internet affords and sometimes parents get a little scared about that and worried about what their children are accessing." 'Crossing the road' Continue reading the main story “Start Quote They're all running around with handheld computers these days, they're not just on phones ” End Quote Keith Towler Children's commissioner Mr Towler said he talks to children in lots of different settings and they "still enjoy playing outside as much as they ever did". He said we need to recognise that the internet provides fantastic opportunities for education and learning and its making sure that children access that safely. He said that was a real challenge for parents and carers. "It's a bit like crossing the road, you try to teach your children the best way of crossing the road well. We need to teach our children the best way of using this fantastic resource. "I think too many parents are very very scared of the internet and because they're so scared they will say 'Oh I don't understand it'". Handheld computers The commissioner also praised Hwb, the virtual learning environment, which he said provides protection for children using the web in schools. Mr Towler said: "We've got to get parents and carers to recognise that children do operate in the digital world. They're all running around with handheld computers these days, they're not just on phones. "They can access whatever they want whenever they want and parents need to engage on that. " "We need to remember that children and young people are much more savvy than sometimes we think they are, and they are much more responsible than sometimes adults think they are so its not all doom and gloom. "What we need to do is put the right checks and balances in place and what children always want from parents and carers is to understand what the boundaries are, and that's our job to do that." Sangeet Bhullar, executive director of Wise Kids, added that the digital landscape was "evolving rapidly" and up-to-date data was needed on how children and young people in Wales related to it. More on This Story .related-links-list li { position: relative; } .related-links-list .gvl3-icon { position: absolute; top: 0; left: 0; } Related Stories Web safety lessons urged for infants 05 FEBRUARY 2013, EDUCATION &amp; FAMILY Online chat 'should be monitored' 22 JANUARY 2013, TECHNOLOGY Body to promote digital teaching 22 JUNE 2012, WALES $render("page-see-also","ID"); $render("page-newstracker","ID"); Related Internet links Children's Commissioner for Wales The BBC is not responsible for the content of external Internet sites $render("page-related-items","ID"); Share this pageShare this pageShareFacebookTwitter Email Print In association with $render("advert","advert-sponsor-module","page-bookmark-links"); $render("advert-post-script-load"); $render("advert-post-script-load"); More Wales stories RSS Army base shuts in defence shake-up An Army base in Pembrokeshire is to close with 600 troops transferred to St Athan in the Vale of Glamorgan. Soldiers' conman jailed three years Wales recall Warburton and Jones <!--
  • ...2 more annotations...
  • "I think too many parents are very very scared of the internet and because they're so scared they will say 'Oh I don't understand it'".
  • "What we need to do is put the right checks and balances in place and what children always want from parents and carers is to understand what the boundaries are, and that's our job to do that."
Urška Cerar

What Does Google Do If the Government Comes Looking for Your Emails? - Rebecca J. Rosen... - 0 views

  • Every single day, dozens of requests from law-enforcement officials, courts, and other government agencies pour into Google's offices, requesting that Google hand over different pieces of information its users have amassed
  • many of these requests are legitimate
  • It's important for law enforcement agencies to pursue illegal activity and keep the public safe.
  • ...5 more annotations...
  • once a request has been deemed valid, Google will notify users when possible.
  • Google says, "When we receive such a request, our team reviews the request to make sure it satisfies legal requirements and Google's policies.
  • Google will not provide a user's search-query information or the contents of a user's account (email content, pictures, documents, etc.) without a warrant.
  • Google has advocated for updating ECPA, "so the same protections that apply to your personal documents that you keep in your home also apply to your email and online documents."
  • If Google can establish clear practices now that somehow balance the competing needs of law-enforcement agencies and private users, that effort will pay off
nensic

Over 800,000 on waiting list for Mailbox iPhone app - News - Gadgets & Tech - The Indep... - 0 views

  • More than 800,000 people are waiting to access a new iPhone app that aims to transform their email experience by helping them achieve the elusive "inbox zero" -- a fully processed and empty inbox.
  • The ability to "snooze" an email, which is to defer it to another time, whether later in the day, on the weekend, or until the following week, is one of the main features of the app.
  • "We want to decide ‘do I need to reply now', ‘can I deal with this later', or ‘should I get it out of the way and never deal with it again?'"
  • ...2 more annotations...
  • The system outlines a rule of "do it, delegate it, defer it, drop it" to help people maintain empty inboxes.
  • The app provides many new features over the native iPhone mail app, however it lacks the ability to multi-edit or multi-delete emails.
nensic

Under the regime of precarity: bring your own device | openDemocracy - 0 views

  • At one and the same time technocracy and financial oligarchies find here an ideal medium to extend their influence and their control of individuals in space and time.
  • At one and the same time technocracy and financial oligarchies find here an ideal medium to extend their influence and their control of individuals in space and time. This explains the fierce struggle going on among key market players.
  • Today large communities use devices like smartphones, tablets, e-readers and ultrabooks to navigate this new ecosystem.
  • ...26 more annotations...
  • The growing dynamic of mobile internet, today accounting for 12% of all internet traffic,[ii] signals a new ecosystem where living bodies, machines, networks, code, data, territory and time interact.
  • The first iPhone, in 2007, inaugurated the new phase of the cognitive era, just as the PC heralded the decline of the industrial phase. Five years later, Apple no longer has a monopoly: hundreds of millions of smartphones and tablets are sold every year and the total number of these active devices will be soon 2 billion. It took the PC thirty years to reach this level of diffusion.
  • The hundreds of thousands of apps, available in just a few years, originate from the intersection of two factors:
  • The desire and necessity to have simple, functional and fast devices able to do specific tasks on the go.
  • the operative skills to develop apps for popular mobile platforms such as Iphone Operating System (IOS) or Google Android.&nbsp;
  • Apps galore
  • Apple likes to play on the ambiguity in a form of propaganda that exalts the “revolutionary” spirit of technological innovation
  • as a way of consolidating their strictly neoliberal economic policy.
  • War over the immaterial
  • Often these machines play opposite functions: as a tool to create new forms of horizontal communication and social interaction or as bait for a capillary exploitation.
  • A political analysis of mobile devices
  • Marketing and communication campaigns portray these devices as commodity fetishes, characterizing a new phase of capitalism often described as cognitive because based on knowledge.
  • In the following phase, the spread of the first mobile devices – cellphones and laptops – provided an initial impulse for a blurring of life and work, imposing with mobile calls, emails or SMS a new type of real-time processing, regulating the rhythms of life
  • In the new biohypermedia environment, the key change lies in the combination of miniaturizing and mobilizing these pieces of equipment, allowing them to always be within the body’s reach in any context.
  • they augment physical reality[ix] with every kind of information – commercial, cultural, ecological – and act more and more as biomedical sets for the control, correction and support of our vital biological functions.
  • The PC has a central function as the medium for linguistic and written processes - its typical uses often tied to the logical concatenation of thought and the priority management of sequences over time.
  • But mobile devices concentrate complex perception of stimuli in terms of spatial organization and intervene in emotional responses. PC work in this way occupies our left hemisphere, while the continual interactions of a smartphone engage the right hemisphere.
  • In contemporary neoliberalism, these devices become an essential means of rent and profit, through a fine capture of what we generate by living with them and using them. At one and the same time technocracy and financial oligarchies find here an ideal medium to extend their influence and their control of individuals in space and time.
  • The PC became a liberating tool for social cooperation in the workplace of a booming third-sector.
  • In the sphere of multinational ICT[x] Corporations a war is being waged over the design and deployment of immaterial enclosures
  • Even though all this is based on freeware and open source, they trick us into believing that the iPhone 5, Windows 8 or Jellybean[xi] are miracles that descend from Mount Olympus and for which we should be grateful as to the gods.
  • Unlike automobiles or, to a lesser degree, PCs, the use value of new mobile devices is no longer determined merely by the initial design but can be moulded by the final user.
  • The innumerable websites, blogs and forums in every language globally blooming and growing are a workshop for worldwide exchange where the digital means are developed that could be used to withdraw workers both from precarity and &nbsp;from total submission to a life of labour. &nbsp;
  • Microsoft is no less defensive of its monopoly: with Intel and other accomplices, they introduced a new firmware to boot Windows 8 PCs that, substituting the old BIOS,[xv] makes it impossible or very complicated to install Linux or other operating systems on new laptops.
  • Despite hesitations related to “security” problems, today companies allow or even oblige people to use their own devices
  • So, if you were one of those many who found the latest tablet, smartphone or hybrid touch device under the tree this year, be aware that you won’t be the only one pleased: under the regime of precarity, bring your own device if you want to survive.&nbsp;
  •  
    "Bring your own device (BYOD) is a business policy whereby employees bring personally owned mobile devices to their place of work and use them to access privileged company resources such as email, file servers and databases as well as their personal applications and data."
Urška Cerar

BBC News - Evernote says security has been breached by hackers - 0 views

  • hackers
  • hackers
  • website
  • ...7 more annotations...
  • network
  • Twitter
  • It said user names, email addresses and encrypted passwords were accessed.
  • online personal organiser, with users able to save data such as video clips, images, web pages, notes and itineraries in an external storage system commonly known as the cloud.
  • The firm apologised "for the annoyance" caused by the breach, which it said is becoming "far more common" at other "large services".
  • Apple revealed a "small number" of its computers had been hacked
  • micro-blogging website Twitter announced it had been the victim of a security breach which compromised the accounts of 250,000 users.
Jan Sekavčnik

Twitter in Pyongyang: how North Korea got the mobile internet | Technology | guardian.c... - 1 views

  • the secretive country begins allowing tourists to use the mobile internet
  • it was believed to be the first tweet sent from a mobile phone using the country's new 3G mobile data service.
  • photographer David Guttenfelder uploaded an image to Instagram of a tour guide at a mountain temple, geotagged to Pyongyang.
  • ...17 more annotations...
  • rists visiting
  • ere strict for to
  • th Kore
  • he past, rule
  • In 2009, I did not offer up my iPhone as we went through customs
  • We'd leave our mobile phones at the airport but use locally purchased phones with SIM cards
  • broadband internet that may be installed on request at our hotel, which is for international visitors.
  • But they cannot surf the "international" internet
  • sim cards are €50,
  • calls to Switzerland are an inexplicably cheap €0.38 a minute
  • Our North Korean colleagues watched with surprise as we showed them we could surf the internet from our phones.
  • Not all North Koreans have local mobile phones
  • The world wide web remains strictly off limits for most North Koreans
  • 3G mobile internet would be available within a week only for foreigners.
  • North Korean universities have their own fairly sophisticated Intranet system
  • Students say they can email one another, but they can't send emails outside the country.
  • Kim Jong Un has pushed science and technology as major policy directives, and we're starting to see more laptops in North Korean offices
  •  
    "Ads by Browse to Save Twitter in Pyongyang: how North Korea got the mobile internet"
Janja Petek

Forty years of the internet: how the world changed for ever | Technology | The Guardian - 1 views

  • In October 1969, a student typed 'LO' on a computer - and the internet was born
  • Towards the end of the summer of 1969
  • a large grey metal box was delivered to the office of Leonard Kleinrock, a professor at the University of California in Los Angeles.
  • ...32 more annotations...
  • At 10.30pm, as Kleinrock's fellow professors and students crowded around, a computer was connected to the IMP, which made contact with a second IMP, attached to a second computer, several hundred miles away at the Stanford Research Institute, and an undergraduate named Charley Kline tapped out a message.
  • It's impossible to say for certain when the internet began, mainly because nobody can agree on what, precisely, the internet is.
  • It's interesting to compare how much has changed in computing and the internet since 1969 with, say, how much has changed in world politics.
  • On the other hand, the breakthrough accomplished that night in 1969 was a decidedly down-to-earth one
  • Twelve years after Charley Kline's first message on the Arpanet, as it was then known, there were still only 213 computers on the network; but 14 years after that, 16 million people were online, and email was beginning to change the world; the first really usable web browser wasn't launched until 1993, but by 1995 we had Amazon, by 1998 Google, and by 2001, Wikipedia, at which point there were 513 million people online. Today the figure is more like 1.7 billion.
  • on New Year's Day 1994 –&nbsp;only yesterday, in other words –&nbsp;there were an estimated 623 websites.
  • On the one hand, they were there because of the Russian Sputnik satellite launch, in 1957, which panicked the American defence establishment, prompting Eisenhower to channel millions of dollars into scientific research, and establishing Arpa, the Advanced Research Projects Agency, to try to win the arms technology race. The idea was "that we would not get surprised again,"
  • "In a few years, men will be able to communicate more effectively through a machine than face to face," they declared.
  • The few outsiders who knew of the box's existence couldn't even get its name right: it was an IMP, or "interface message processor"
  • It was already possible to link computers by telephone lines, but it was glacially slow, and every computer in the network had to be connected, by a dedicated line, to every other computer, which meant you couldn't connect more than a handful of machines without everything becoming monstrously complex and costly.
  • The solution, called "packet switching" – which owed its existence to the work of a British physicist, Donald Davies – involved breaking data down into blocks that could be routed around any part of the network that happened to be free, before getting reassembled at the other end.
  • Still, Kleinrock recalls a tangible sense of excitement that night as Kline sat down at the SDS Sigma 7 computer, connected to the IMP, and at the same time made telephone contact with his opposite number at Stanford. As his colleagues watched, he typed the letter L, to begin the word LOGIN.
  • One of the most intriguing things about the growth of the internet is this: to a select group of technological thinkers, the surprise wasn't how quickly it spread across the world, remaking business, culture and politics – but that it took so long to get off the ground.
  • In 1945, the American presidential science adviser, Vannevar Bush, was already imagining the "memex", a device in which "an individual stores all his books, records, and communications", which would be linked to each other by "a mesh of associative trails", like weblinks.
  • And in 1946, an astonishingly complete vision of the future appeared in the magazine Astounding Science Fiction. In a story entitled A Logic Named Joe, the author Murray Leinster envisioned a world in which every home was equipped with a tabletop box that he called a "logic":
  • Instead of smothering their research in the utmost secrecy – as you might expect of a cold war project aimed at winning a technological battle against Moscow – they made public every step of their thinking, in documents known as Requests For Comments.
  • Deliberately or not, they helped encourage a vibrant culture of hobbyists on the fringes of academia –&nbsp;students and rank amateurs who built their own electronic bulletin-board systems and eventually FidoNet, a network to connect them to each other.
  • n argument can be made that these unofficial tinkerings did as much to create the public internet as did the Arpanet. Well into the 90s, by the time the Arpanet had been replaced by NSFNet, a larger government-funded network,
  • It was the hobbyists, making unofficial connections into the main system, who first opened the internet up to allcomers.
  • This was the software known as TCP/IP, which made it possible for networks to connect to other networks, creating a "network of networks", capable of expanding virtually infinitely
  • Nevertheless, by July 1992, an Essex-born businessman named Cliff Stanford had opened Demon Internet, Britain's first commercial internet service provider.
  • After a year or so, Demon had between 2,000 and 3,000 users,
  • the @ symbol was introduced in 1971, and the first message, according to the programmer who sent it, Ray Tomlinson, was "something like QWERTYUIOP".
  • A couple of years later I got my first mobile phone, which came with two batteries: a very large one, for normal use, and an extremely large one, for those occasions on which you might actually want a few hours of power
  • For most of us, though, the web is in effect synonymous with the internet, even if we grasp that in technical terms that's inaccurate: the web is simply a system that sits on top of the internet, making it greatly easier to navigate the information there, and to use it as a medium of sharing and communication.
  • The first ever website was his own, at CERN: info.cern.ch.
  • The idea that a network of computers might enable a specific new way of thinking about information, instead of just allowing people to access the data on each other's terminals, had been around for as long as the idea of the network itself: it's there in Vannevar Bush's memex, and Murray Leinster's logics.
  • Web browsers crossed the border into mainstream use far more rapidly than had been the case with the internet itself: Mosaic launched in 1993 and Netscape followed soon after, though it was an embarrassingly long time before Microsoft realised the commercial necessity of getting involved at all. Amazon and eBay were online by 1995. And in 1998 came Google, offering a powerful new way to search the proliferating mass of information on the web.
  • Google, and others, saw that the key to the web's future would be helping users exclude almost everything on any given topic,&nbsp;restricting search results to the most relevant pages.
  • It is absurd – though also unavoidable here – to compact the whole of what happened from then onwards into a few sentences: the dotcom boom, the historically unprecedented dotcom bust, the growing "digital divide", and then the hugely significant flourishing, over the last seven years, of what became known as Web 2.0.
  • The most confounding thing of all is that in a few years' time, all this stupendous change will probably seem like not very much change at all.
  • Will you remember when the web was something you accessed primarily via a computer? Will you remember when there were places you couldn't get a wireless connection? Will you remember when "being on the web" was still a distinct concept, something that described only a part of your life, instead of permeating all of it? Will you remember Google?
Blaž Gobec

Everything you need to know about the internet | Technology | The Observer - 0 views

  • The internet has quietly infiltrated our lives, and yet we seem to be remarkably unreflective about it.
  • All of which might lead a detached observer to ask: if the internet is such a disaster, how come 27% of the world's population (or about 1.8 billion people) use it happily every day, while billions more are desperate to get access to it?
  • THE WEB ISN'T THE NET
  • ...8 more annotations...
  • So the thing to remember is this: the web is huge and very important, but it's just one of the many things that run on the internet. The net is much bigger and far more important than anything that travels on it.
  • On the internet, web pages are only one of the many kinds of traffic that run on its virtual tracks.
  • 5 COMPLEXITY IS THE NEW REALITY
  • 6 THE NETWORK IS NOW THE COMPUTER
  • 7 THE WEB IS CHANGING
  • But in fact, the web has gone through at least three phases of evolution – from the original web 1.0, to the web 2.0 of "small pieces, loosely joined" (social networking, mashups, webmail, and so on) and is now heading towards some kind of web 3.0 – a global platform based on Tim Berners-Lee's idea
  • For baby-boomers, a computer was a standalone PC running Microsoft software.
  • First, the companies (Yahoo, Google, Microsoft) who provided search also began to offer "webmail" – email provided via programs that ran not on your PC but on servers in the internet "cloud".
Rebeka Aščerič

The internet comes of age | Comment is free | guardian.co.uk - 0 views

  • Comment is free The internet comes of age Older people are using the web as never before.
  • Silver surfers, defined as internet users over the age of 65, spend more time on the web (42 hours a month) than any other group,
  • A lot of older people still do not realise that once you have fixed up a broadband connection (which admittedly can be dodgy with some service providers) it is very easy to buy or sell things on the auction space eBay (the most popular one in the UK); to buy a book from Amazon or the wonderful abebooks; or to Google or email.
  • ...1 more annotation...
  • They do want to keep up with old friends, but they also want to make contact with other people of whatever age with whom they share a common interest.
donnamariee

Technology in schools: saving money with cloud, open source and consortia | Teacher Net... - 0 views

  • largest elements of a school's budget,
  • with the role of technology as a teaching tool and in society at large growing all the time, the trick is delivering savings without damaging pupils' education or putting them at a disadvantage in the world outside school.
  • open source software,
  • ...7 more annotations...
  • The change is saving around £3,000 a year in licensing costs, according to the schools' ICT manager Phil Jones.
  • The school has also moved to open source for its virtual learning environment (VLE), now run through Moodle.
  • While open source has brought benefits in terms of flexibility, there is no doubt that the reduced cost is a major attraction, however. "ICT is always a big drain on a school budget, and any way we can save money is a massive help,"
  • Open source is also one of the solutions adopted at Notre Dame High in Sheffield, where it is used for email and management systems, as well as the school's VLE, again on Moodle. One of the advantages of open source is its flexibility, but this is only appealing if the school has the technical know-how to tweak it according to its needs
  • Changes in the educational landscape, such as the emergence and growth of federations, academy chains and clusters of headteachers working together, may resolve this in the future, but in the meantime the benefits of the external support that come from a proprietorial system may outweigh the savings of free software
  • "One of the risks is schools that go very heavily into open source end up with a system that is so bespoke only the school's technical manager can understand it
  • Technology in schools: saving money with cloud, open source and consortia
Mateja Žnidaršič

British internet users double in six years - Telegraph - 0 views

  • British internet users double in six years
  • The number of British adults using the internet every day has doubled in the last six years, according to new data.
  • In 2012, 33 million adults used the internet daily
  • ...3 more annotations...
  • The most popular online activity was sending and receiving email
  • followed by researching goods and services and reading the news.
  • Social networking activity is lower among older age groups, with just one in 10 over 65s saying that they use social networks.
Rok Urbancic

Would you buy a 'No internet. No video. No music' laptop? - News - Gadgets & Tech - The... - 0 views

  • wouldn't it be nice to have a phone that just does phone calls?
  • at the Buckeye Tool Expo in Dalton, Ohio there is unusual demand for devices that do less.
  • the exhibition is a draw for the Amish community, whose access to technology is restricted by their faith.
  • ...8 more annotations...
  • You don't have to wear a bonnet, however, to seek low-technology in a world still gripped by the race to offer enough bells and brushed
  • The Amish laptop is at the extreme end of a quiet drive for digital simplicity
  • The 105 has real buttons, makes calls, sends texts, costs £13 and has, wait for it, a battery life of 35 days
  • Less-smart phones are also winning fans wishing to liberate their fingers and minds from hours of distraction from forgotten pursuits, like reading books, and their wallets from £80 phone bills.
  • The needs of users aren't always the priority of tech giants more often guided by marketing departments.
  • Clutter is banished from screen and keyboard, which features dedicated "copy" and "paste" keys.
  • Ordissimo will compete with SimplicITy, laptops with just six functions launched in 2009
  • The majority of people only want a computer to send emails, Skype their family, browse the web and write documents
1 - 20 of 25 Next ›
Showing 20 items per page