Skip to main content

Home/ Internetni praktikum/ Group items tagged international

Rss Feed Group items tagged

Patricija Čelik

International cooperation is needed to make the internet safe for the world - Telegraph - 0 views

  • However, a severe downside is the challenge to data security and personal privacy. The internet is now overrun with cyber attacks and hackers. Internet security has become a very serious and common concern for the entire world.
  • Recently the American company Mandiant published a report on cyber security. This report accuses China of being the origin of most cyber attacks and portrays China as an arch-hacker.
  • Cyber attacks by nature are transnational, anonymous and deceptive. It is extremely difficult to ascertain the source of any attack. Cyber attacks launched from stolen or faked IP addresses take place around the world on daily basis.
  • ...3 more annotations...
  • China is a serious victim of cyber attacks.
  • The Chinese government is committed to international cooperation against cyber crime.
  • In September 2011 China and Russia jointly submitted to the United Nations a draft International Code of Conduct for Information Security. China is deeply sincere in seeking cooperation to tackle cyber crime. This common threat needs the participation of the whole international community.
sintija

BBC News - Viewpoint: Changing the way the internet is governed is risky - 0 views

  • Viewpoint: Changing the way the internet is governed is risky
  • the US Department of Commerce has the power to decide how the internet works
  • internet is already governed
  • ...15 more annotations...
  • It's important to realise that without governance the internet could not function.
  • avoid two different web sites having the same name
  • International Corporation for Assigned Names and Numbers (Icann)
  • governance of the internet is effectively done by multiple stakeholders
  • WGIG would report on a solution acceptable to all but would move governance to an international body.
  • US government ultimately "controls" the internet
  • The internet overseers
  • UN summit
  • US refused to relinquish control of the Root Zone file, which is basically the key to governing the internet.
  • formed the Working Group on Internet Governance (WGIG).
  • in 2003 in Geneva
  • Russians
  • International Telecommunications Union (ITU), another UN agency, to be given responsibility for internet governanc
  • A great advantage of the current governance structure is that it supports rapid developments, provided that the US Department of Commerce remains at arm's length
  • internet governance needs to help the internet evolve rather than dictate how it must develop.
Anja Pirc

Online privacy: Difference Engine: Nobbling the internet | The Economist - 0 views

  • TWO measures affecting the privacy internet users can expect in years ahead are currently under discussion on opposite sides of the globe. The first hails from a Senate committee’s determination to make America’s online privacy laws even more robust. The second concerns efforts by the International Telecommunications Union (ITU), an intergovernmental body under the auspices of the United Nations, to rewrite its treaty for regulating telecommunications around the world, which dates from 1988, so as to bring the internet into its fief.
  • The congressional measure, approved overwhelmingly by the Senate Judiciary Committee on November 29th, would require criminal investigators to obtain a search warrant from a judge before being able to coerce internet service providers (ISPs) to hand over a person’s e-mail. The measure would also extend this protection to the rest of a person’s online content, including videos, photographs and documents stored in the "cloud"—ie, on servers operated by ISPs, social-network sites and other online provider
  • a warrant is needed only for unread e-mail less than six months old. If it has already been opened, or is more than six months old, all that law-enforcement officials need is a subpoena. In America, a subpoena does not need court approval and can be issued by a prosecutor. Similarly, a subpoena is sufficient to force ISPs to hand over their routing data, which can then be used to identify a sender’s various e-mails and to whom they were sent. That is how the FBI stumbled on a sex scandal involving David Petraeus, the now-ex director of the CIA, and his biographer.
  • ...7 more annotations...
  • No-one imagined that ISPs would one day offer gigabytes of online storage free—as Google, Yahoo!, Hotmail and other e-mail providers do today. The assumption back then was that if someone had not bothered to download and delete online messages within six months, such messages could reasonably be considered to be abandoned—and therefore not in need of strict protection.
  • wholesale access to the internet, powerful mobile phones and ubiquitous social networking have dramatically increased the amount of private data kept online. In the process, traditional thinking about online security has been rendered obsolete. For instance, more and more people nowadays keep their e-mail messages on third-party servers elsewhere, rather than on their own hard-drives or mobile phones. Many put their personal details, contacts, photographs, locations, likes, dislikes and inner thoughts on Google, Facebook, Twitter, Flickr, Dropbox and a host of other destinations. Bringing online privacy requirements into an age of cloud computing is only fit and proper, and long overdue.
  • the international telecoms treaty that emerged focused on how telephone traffic flows across borders, the rules governing the quality of service and the means operators could adopt to bill one another for facilitating international calls. As such, the regulations applied strictly to telecoms providers, the majority of which were state owned.
  • he goal of certain factions is to grant governments the authority to charge content providers like Amazon, Google, Facebook and Twitter for allowing their data to flow over national borders. If enacted, such proposals would most certainly deter investment in network infrastructure, raise costs for consumers, and hinder online access for precisely those people the ITU claims it wants to help.
  • a proposal sponsored by the United States and Canada to restrict the debate in Dubai strictly t
  • o conventional telecoms has met with a modicum of success, despite stiff opposition from Russia plus some African and Middle-Eastern countries. Behind closed doors, the conference has agreed not to alter the ITU’s current definition of “telecommunications” and to leave the introductory text concerning the existing treaty’s scope intact.
  • The sticking point has been what kind of organisations the treaty should apply to. Here, one word can make a huge difference. In ITU jargon, the current treaty relates only to “recognised operating agencies”—in other words, conventional telecoms operators. The ITU wants to change that to simply “operating agencies”. Were that to happen, not only would Google, Facebook and other website operators fall under the ITU’s jurisdiction, but so too would all government and business networks. It seems the stakes really are as high as the ITU’s critics have long maintained
Jan Majdič

China to Web Users: Great Firewall? Just Be Glad We're Not North Korea - David Caraglia... - 1 views

  • Last week, Google Executive Chairman Eric Schmidt urged North Korean leaders to embrace the Internet. Only a small proportion of that country's 24 million people can access the World Wide Web, and the majority of the 1.5 million mobile phones there belong to political and military elites.
  • Meanwhile, in China, a country that has embraced the Internet to a much greater extent, the big story was about censorship, both online and off.
  • For Chinese social media users, the irony here was too perfect to go unnoticed
  • ...5 more annotations...
  • A number of social networking and sharing websites are blocked in China, including Facebook, Twitter, Youtube, Wikipedia, and certain Google applications
  • "China's progress must be viewed in the context of its unique historical and cultural circumstances.
  • Web users engage with and identify as part of a broader, sometimes international, online community
  • Chinese public preferences are shifting from broadcast media to networked media; with that shift, the expectation for public participation is growing.
  • Knowing well the impact and viral nature of social networking, editors loyal to propaganda authorities took control of the newspaper's microblogging account not long after the scandal broke.
Jan Sekavčnik

Twitter in Pyongyang: how North Korea got the mobile internet | Technology | guardian.c... - 1 views

  • the secretive country begins allowing tourists to use the mobile internet
  • it was believed to be the first tweet sent from a mobile phone using the country's new 3G mobile data service.
  • photographer David Guttenfelder uploaded an image to Instagram of a tour guide at a mountain temple, geotagged to Pyongyang.
  • ...17 more annotations...
  • rists visiting
  • ere strict for to
  • th Kore
  • he past, rule
  • In 2009, I did not offer up my iPhone as we went through customs
  • We'd leave our mobile phones at the airport but use locally purchased phones with SIM cards
  • broadband internet that may be installed on request at our hotel, which is for international visitors.
  • 3G mobile internet would be available within a week only for foreigners.
  • sim cards are €50,
  • calls to Switzerland are an inexplicably cheap €0.38 a minute
  • Our North Korean colleagues watched with surprise as we showed them we could surf the internet from our phones.
  • Not all North Koreans have local mobile phones
  • The world wide web remains strictly off limits for most North Koreans
  • But they cannot surf the "international" internet
  • North Korean universities have their own fairly sophisticated Intranet system
  • Students say they can email one another, but they can't send emails outside the country.
  • Kim Jong Un has pushed science and technology as major policy directives, and we're starting to see more laptops in North Korean offices
  •  
    "Ads by Browse to Save Twitter in Pyongyang: how North Korea got the mobile internet"
Jernej Prodnik

Facebook Now Allows Friends To Promote Posts, But Privacy Concerns Arise - Internationa... - 0 views

  • Facebook Now Allows Friends To Promote Posts, But Privacy Concerns Arise
  • By Ian Kar | February 16, 2013 8:27 AM EST On average, Facebook posts are seen by approximately 16 percent of your friends; with Facebook’s newest feature, however, more of your friends may start seeing your best moments on the social network more often, because users can now pay to promote their friend’s posts.
  • Facebook hopes that with this new service, quality content supported by you and your friends will  be featured at the top of your News Feed. Some users have already received the new feature, but the gradual rollout will continue with Facebook users with fewer than 5,000 total friends and subscribers. 
  • ...4 more annotations...
  • Facebook has dealt with many privacy issues in its nine years on the Web, but unlike most of the past issues that deal with broader concerns like “data mining,” the new promoted posts service could have a greater impact on individuals, like its increased potential for cyberbullying.One problem is your friend doesn’t need your explicit permission to promote your posts. So, for instance, if one of my friends from college decides to promote an old embarrassing photo of me, I won’t be able to prevent the picture from getting to the top of the News Feed for a large percentage of my friends.
  • We’ve reached out to Facebook to talk about any safeguards that will be put in place to prevent cyber bullying, but they didn’t get back to us by the time this article went up.In addition, there’s no way to determine who promoted the post, so, as TechCrunch notes, a friend promoting an article written by me could be perceived as a shameless plug by me in an effort get more of my friends to check out my article (which is totally true by the way).However, Facebook notes there are a lot of benefits to the service. A Facebook spokesperson released a statement to AllFacebook on Friday, describing the feature:
  • “If your friend is running a marathon for charity and has posted that information publicly, you can help that friend by promoting their post to all of your friends,” the post said. “Or if your friend is renting their apartment out and she tells her friends on Facebook, you can share the post with the people you and your friend have in common so that it shows up higher in news feed and more people notice it.”As you can see, Facebook’s new feature has a number of potentially beneficial uses like fundraising for a friends’ charity or publicizing events to increase attendance, and can even make somewhat tedious tasks like finding an apartment be a little less difficult.
  • Facebook will want to monitor this new feature to see how it’s used. It has the potential to be really lucrative and turn Facebook into a network more like Reddit, where popular posts dominate the front page on a merit basis, but it could be used maliciously to embarrass or play pranks on friends – only time will tell. Facebook is planning on emphasizing its mobile platform in 2013, and it will be interesting to see if the Promoted Posts feature will be included in its mobile plans. In the company’s most recent earnings report, Facebook said mobile ad revenue accounts for 23 percent of its total ad revenue. To contact the editor, e-mail: editor@ibtimes.com
metapavlin

European Parliament Rejects Anti-Piracy Treaty - NYTimes.com - 1 views

  • rejected an international treaty to crack down on digital piracy, a vote that Internet freedom groups hailed as a victory for democracy but that media companies lamented as a setback for the creative industries.
  • European legislators
  • Anti-Counterfeiting Trade Agreement, or ACTA, which has been signed by the United States, Japan, Canada, Australia, South Korea and a number of individual E.U. members.
  • ...4 more annotations...
  • unauthorized sharing of music, movies and other digital media. Treaty opponents had rallied tens of thousands of protesters to the streets of European capitals last winter, dangling the threat that approval of the pact would lead to the proliferation of anti-piracy measures.
  • “Hello democracy, goodbye ACTA.”
  • The vote, they added, would hurt efforts to reduce online copyright theft, potentially costing Europe jobs at a time when it desperately needs them.
  • “It’s a political symbol on an enormous scale, in which citizens of the world, connected by the Internet, have managed to defeat these powerful, entrenched industries.”
sergeja perklič

The European Union Closes in on Data Privacy Legislation - SPIEGEL ONLINE - 0 views

  • The European Union is seeking to increase the private sphere of its citizens by strengthening data protection laws for the web. Large Internet firms and lobbyists are fighting the plans.
  • Gmail and Facebook may be forced to abandon their ad-supported models and start charging their customers in Europe or stop providing them with these popular services altogether.
  • Take Facebook, for example, which has its European headquarters in Ireland. The Irish government's data protection commissioner would then be responsible for the concerns of all EU citizens relating to the company's privacy policies.
  • ...2 more annotations...
  • Under exi
  • sting privacy regulations, data protection supervision in EU countries must be conducted entirely independently of public authorities, and data protection controllers are not under the supervision of the European Commission. But the EU wants to weaken this policy and install itself as the data protection agencies' supervisory authority.
Gabrijela Vrbnjak

BBC News - Web code weakness allows data dump on PCs - 0 views

  • The loophole exploits a feature of HTML 5 which defines how websites are made and what they can do.
  • Developer Feross Aboukhadijeh found the bug and set up a demo page that fills visitors' hard drives with pictures of cartoon cats. In one demo, Mr Aboukhadijeh managed to dump one gigabyte of data every 16 seconds onto a vulnerable Macbook. Clever code Most major browsers, Chrome, Internet Explorer, Opera and Safari, were found to be vulnerable to the bug, said Mr Aboukhadijeh. While most websites are currently built using version 4 of the Hyper Text Markup Language (HTML), that code is gradually being superseded by the newer version 5. One big change brought in with HTML 5 lets websites store more data locally on visitors' PCs. Safeguards built into the "local storage" specification should limit how much data can be stored. Different browsers allow different limits but all allow at least 2.5 megabytes to be stored. However, Mr Aboukhadijeh found a way round this cap by creating lots of temporary websites linked to the one a person actually visited. He found that each one of these associated sites was allowed to store up to the limit of data because browser makers had not written code to stop this happening. By endlessly creating new, linked websites the bug can be used to siphon huge amounts of data onto target PCs. Only Mozilla's Firefox capped storage at 5MB and was not vulnerable, he found. "Cleverly coded websites have effectively unlimited storage space on visitor's computers," wrote Mr Aboukhadijeh in a blogpost about the bug. Code to exploit the bug has been released by Mr Aboukhadijeh and he set up a website, called Filldisk that, on vulnerable PCs, dumps lots of images of cats on to the hard drive. So far, no malicious use of the exploits has been observed. In a bid to solve the problem, bug reports about the exploit have been filed with major browser makers. More on This Story .related-links-list li { position: relative; } .related-links-list .gvl3-icon { position: absolute; top: 0; left: 0; } Related Stories Firefox smartphone partners revealed 24 FEBRUARY 2013, TECHNOLOGY Flash Player exits Android store 15 AUGUST 2012, TECHNOLOGY HTML 5 target for cybercriminals 02 DECEMBER 2011, TECHNOLOGY $render("page-see-also","ID"); $render("page-newstracker","ID"); Related Internet links Feross Aboukhadijeh The BBC is not responsible for the content of external Internet sites $render("page-related-items","ID"); Share this pageShare this page1.4KShareFacebookTwitter Email Print In association with $render("advert","advert-sponsor-module","page-bookmark-links"); $render("advert-post-script-load"); $render("advert-post-script-load"); More Technology stories RSS Computer glitch hits Mars rover Nasa's Curiosity Mars rover is put into "safe mode" after a computer glitch caused by corrupted files. US plans small-ship drone launches Hackers breach Evernote security $render("advert","advert-mpu-high"); $render("advert-post-script-load"); Top Stories http://news.bbcimg.co.uk/media/images/6618
  • found the bug and set up a demo page that fills visitors' hard drives with pictures of cartoon cats.
  • ...6 more annotations...
  • because browser makers had not written code to stop this happening. By endlessly creating new, linked websites the bug can be used to siphon huge amounts of data onto target PCs.
  • found a way round this cap by creating lots of temporary websites linked to the one a person actually visited
  • Most major browsers, Chrome, Internet Explorer, Opera and Safari, were found to be vulnerable to the bug
  • was not vulnerable
  • Mozilla's Firefox
  • bug reports about the exploit have been filed with major browser makers.
Rebeka Aščerič

BBC News - Children 'must know web limits' says Wales commissioner - 0 views

  • Adults must impose the necessary checks and balances to keep children safe online, says the children's commissioner for Wales.
  • "All children and young people don't seem much of a distinction between their online and offline lives,"
  • Mr Towler told BBC Radio Wales. "It's all just one thing and they get really excited by the opportunities the internet affords and sometimes parents get a little scared about that and worried about what their children are accessing." 'Crossing the road' Continue reading the main story “Start Quote They're all running around with handheld computers these days, they're not just on phones ” End Quote Keith Towler Children's commissioner Mr Towler said he talks to children in lots of different settings and they "still enjoy playing outside as much as they ever did". He said we need to recognise that the internet provides fantastic opportunities for education and learning and its making sure that children access that safely. He said that was a real challenge for parents and carers. "It's a bit like crossing the road, you try to teach your children the best way of crossing the road well. We need to teach our children the best way of using this fantastic resource. "I think too many parents are very very scared of the internet and because they're so scared they will say 'Oh I don't understand it'". Handheld computers The commissioner also praised Hwb, the virtual learning environment, which he said provides protection for children using the web in schools. Mr Towler said: "We've got to get parents and carers to recognise that children do operate in the digital world. They're all running around with handheld computers these days, they're not just on phones. "They can access whatever they want whenever they want and parents need to engage on that. " "We need to remember that children and young people are much more savvy than sometimes we think they are, and they are much more responsible than sometimes adults think they are so its not all doom and gloom. "What we need to do is put the right checks and balances in place and what children always want from parents and carers is to understand what the boundaries are, and that's our job to do that." Sangeet Bhullar, executive director of Wise Kids, added that the digital landscape was "evolving rapidly" and up-to-date data was needed on how children and young people in Wales related to it. More on This Story .related-links-list li { position: relative; } .related-links-list .gvl3-icon { position: absolute; top: 0; left: 0; } Related Stories Web safety lessons urged for infants 05 FEBRUARY 2013, EDUCATION &amp; FAMILY Online chat 'should be monitored' 22 JANUARY 2013, TECHNOLOGY Body to promote digital teaching 22 JUNE 2012, WALES $render("page-see-also","ID"); $render("page-newstracker","ID"); Related Internet links Children's Commissioner for Wales The BBC is not responsible for the content of external Internet sites $render("page-related-items","ID"); Share this pageShare this pageShareFacebookTwitter Email Print In association with $render("advert","advert-sponsor-module","page-bookmark-links"); $render("advert-post-script-load"); $render("advert-post-script-load"); More Wales stories RSS Army base shuts in defence shake-up An Army base in Pembrokeshire is to close with 600 troops transferred to St Athan in the Vale of Glamorgan. Soldiers' conman jailed three years Wales recall Warburton and Jones <!--
  • ...2 more annotations...
  • "I think too many parents are very very scared of the internet and because they're so scared they will say 'Oh I don't understand it'".
  • "What we need to do is put the right checks and balances in place and what children always want from parents and carers is to understand what the boundaries are, and that's our job to do that."
donnamariee

Firefox OS won't magically succeed just because it's open source - see webOS | Technolo... - 0 views

  • Firefox OS won't magically succeed just because it's open source - see webOS The siren song of open source means some people think Firefox OS could take the smartphone market by storm - but that's what they thought about webOS
  • Open source" operating systems are the siren call of the internet. For years, we were promised, Linux was going to be the Next Big Thing on the desktop; the tired old empires of Windows and MacOS were going to be pushed aside, and everyone was going to embrace Linux (though quite which distro wasn't clear). From infants to grannies, they would all see the light, and install software that was built with the user in mind - as long as the user was someone who could hold the idea of the concentric circles of file ownership (root/wheel/std) in their head
  • Despite the fevered imaginings of a fair number at the time, there was simply no chance that webOS was going to go anywhere without direct help from HP; and HP wasn't going to give it that help, since it had plenty of troubles of its own.
  • ...8 more annotations...
  • LG has indicated that it will be using webOS in its Smart TV line (which, in passing, suggests that Google's hopes of having a multi-manufacturer-pronged assault on the living room with Google TV are being chipped away; Samsung has gone its own way, Sony offers a mixture of Google and its own smart TV offerings, and now it looks like LG isn't exactly all-in). Though that might, in time, become something that it uses on phones or tablets, you'd be crazy to bet on it. LG is smart enough to know that TVs are a world away from phones and tablets, both in terms of the user interaction experience, and the demands that they make for user acceptance.
  • But the siren song of open source OSs becomes deafening when you look at the other announcement to come out of Mobile World Congress, in which Mozilla is touting its Firefox OS as the anathema to the world's ills - or at least those afflicting the smartphone industry. What does Moziila chief executive Gary Kovacs think is going to be the unique selling point of the Firefox OS phones that he expects to see in 2014? "Our goal is to level the playing field and usher in an explosion of content and services that will meet the diverse needs of the next two billion people online," he said in Barcelona, adding "We're not trying to get in the middle of an operating system fight; what we are trying to do is be the catalyst to drive more development around the open web."
  • The problem for Firefox OS is that it doesn't have a dedicated hardware backer. Sure, Sony has said that it will make some phones using it. ZTE and Alcatel say they will build hardware that will run it. And Kovacs points to the fact that Firefox OS will run HTML5 apps - not "native" apps (in the sense that iOS or Android apps run natively). That might put a questionmark over whether, by some analysts' measure, the FFOS phone is truly a "smartphone", since their definition for that includes "running apps on a native API". (That's why Gartner and IDC don't class Nokia's Asha phones as smartphones.)
  • So how did Android succeed? Three things. First, Google get a vibrant app ecosystem going even before there was a single phone: it had competitions for apps, with a $10m fund to seed developer ideas. By April 2008 there were almost 2,000 Android applications; two-third came from outside the US. Among the offerings: photo-enhanced driving, on-the-fly party mashups with maps, maintaining passive surveillance on your family's whereabouts. (Some things never change.) Second, it was able to go to Verizon, which was looking enviously at how AT&amp;T was able to offer the iPhone, and suggest that Android phones - when they came along - could be the answer to that competitive challenge. And third, it was Google - the gigantic search-engine-and-everything-else company with the international reputation. If Google was doing a new generation of smartphone software (and if Apple had validated the idea), then it looked like a good deal for everyone. And handset manufacturers were eager to find an alternative to Microsoft.
  • Android is gigantic - some version of it might be on a billion phones this year - meaning there's no obvious need for another open source OS. What, after all, is FFOS actually going to do that Android doesn't, or that iOS or Windows Phone or BlackBerry can't? Yes, we've heard that the target isn't the west, but the developing world; that still doesn't explain why a Chinese handset manufacturer would deploy FFOS rather than Android, whether the Google version or a forked one that could connect to a local app store.
  • Even worse, FFOS is at an immediate competitive disadvantage because the principal browser on smartphones now is based on WebKit. Chrome uses it, MobileSafari uses it, BlackBerry uses it, and Opera uses it too now. That leaves only Internet Explorer on Windows Phone standing alone. Developers writing HTML5 apps will naturally write for compatibility with WebKit, which is always going to behave slightly differently from Firefox's Gecko rendering engine. For FFOS's sake, you have to hope the differences aren't big.
  • That's the trouble with the magical thinking that often attaches to open source projects. Making webOS open source didn't solve its problems; it simply shoved them off into a siding. Having an open source mobile OS didn't guarantee Android's success; the efforts of Google, and the timing in the market, did that.
  • Perhaps for that reason, people have high expectations for the Ubuntu OS and phone, with its fabulously complex array of gestures for control. Bad news, dreamers: it's going to fail in the market too if Canonical attempts to market it as a hardware-software combination - that is, sells Ubuntu phones at retail.
Jan Keček

Cyber-security: To the barricades | The Economist - 0 views

  • European Commission and the White House have set out a series of new rules designed to stem the rising tide of cyber-attacks against public and private victims.
  • Alongside his state-of-the-union message on February 11th, Barack Obama released an executive order intended to plug the gap left by the failure of Congress to pass cyber-security legislation that matches the growing threat.
  • By contrast, the European Commission’s cyber-security strategy is at an earlier stage. It wants member countries to introduce laws compelling important firms in industries such as transport, telecoms, finance and online infrastructure to disclose details of any attack they suffer to a national authority, known as a CERT (Computer Emergency Response Team). Each CERT will be responsible for defending vital infrastructure-providers against online attacks and sharing information with its counterparts, law-enforcement agencies and data-protection bodies.
  • ...1 more annotation...
  • What neither the European nor American measures deal with directly is the shortage of cyber-security specialists. A gloomy review of the British government’s strategy by the National Audit Office, a spending watchdog, said the skills gap could take 20 years to bridge.
Rok Urbancic

Microsoft faces hefty EU fine | Technology | guardian.co.uk - 0 views

  • European commission expected to fine Microsoft hundreds of millions of euros after software company broke antitrust promise
  • The EU competition commissioner, Joaquín Almunia, is expected to use the fine – which could run into hundreds of millions of euros – to set an example after the US software giant became the first company to break a promise made to end an antitrust probe
  • The fines relate to an antitrust battle in Europe more than a decade ago. In order to avoid a penalty then, Microsoft promised to offer European consumers a choice of rival browsers.
  • ...4 more annotations...
  • EU rules mean the company could be penalised $7.4bn (£4.9bn) – or 10% of its fiscal 2012 revenues
  • this did not happen for a period during February 2011 and July 2012, a lapse Microsoft blamed on a technical error. It has said it since tightened internal procedures to avoid a repeat.
  • The European commission has already fined Microsoft €1.6bn (£1.4bn)
  • Microsoft's share of the European browser market has roughly halved since 2008 to 24% in January, below the 35% held by Google's Chrome and Mozilla's 29% share
nensic

Zračenja iz mobitela i antena uništavaju našu DNK i stvaraju rak | 2012 Trans... - 0 views

  • Za sve one koji negativni utjecaj iz elektroničkih uređaja smatraju običnom teorijom zavjere bez ikakve veze s istinom donosimo najnovija znanstvena otkrića koja pokazuju vezu između novootkrivenih svojstava deoksiribonukleinske kiseline i bežičnih tehnologija.
  • DNK ima dvije strukturalne karakteristike fraktalnih antena: elektroničku kondukciju i samo-simetriju.
  • Kada se DNK našla u doticaju s EMF-om i RF-om, prvo su se pojavili visoki nivoi stresnih proteina u heliskima DNK, a nakon toga su znanstvenici promatrali kako se spirale DNK razdvajaju i raspadaju. Drugim riječima ne-ionizrajuće zračenje uništava ljudsku DNK.
  • ...13 more annotations...
  • Ljudska DNK je najburnije reagirala na ELF-ove (extreme low frequencies) ili radio valove ekstremno niske frekvencije, iako su efekti slični kao i s drugim oblicima RF i EMF zračenja, u slučaju ELF-ova reakcije su postajale puno kompleksnije.
  • povećanje različitih vrsta zračenja siguran razlog u povećanju kancerogene epidemiologije
  • povećanje broja kancerogenih oboljenja možemo zahvaliti različitim zračenjima iz okoliša koja su oštetila i još uvijek oštećuju našu DNK.
  • za 40% povećava rizik od dobivanja raka mozga u slučaju da korisnici provedu telefonirajući više od 1640 sati. U neovisnom istraživanju iz 2007., godine, koje je obavio tim iz Švedske je otkriveno kako se za 540% povećava rizik od dobivanja raka ako se mobilni telefoni koriste više od 2000 sati.
  • Svijet se treba osloboditi od mobilne telefonije, ne samo da je ova tehnologija opasna, ona je smrtonosna. Biološki učinak mobilnih telefona na ljudsko tijelo ne leži u jakosti signala već u njegovoj eratičnoj prirodi koja uništava rezonancu DNK i njenu mogućnost obnavljanja. Ovo je i najjednostavniji razlog zašto mobilna tehnologija stvara kancerogena oboljenja.
  • Izraelski znanstvenici su preko 30 godina istraživali povećanje tumora na parotidnoj žlijezdi, između 1970-te i 2006-te godine broj tumora se povećao za 400%.
  • dr. Siegal Sadetcki, glavni istražitelj senata SAD-a, je uspio identificirati glavnog krivca za tumore zaušne žlijezde. U njegovom izvješću stoji kako su mobilni telefoni glavni i najčešći krivci za: 34% povećanja rizika od tumora zaušne žlijezde ako se mobilni telefon koristi na regularnoj bazi u vremenu od pet godina. 58% povećanja rizika od tumora zaušne žlijezde ako se mobilni telefon koristi s više od 5500 poziva za vrijeme ljudskog života. 49% povećanja rizika od tumora zaušne žlijezde ako se mobilni telefon koristi za više od 266,3 sata za vrijeme ljudskog života.
  • 03.05.2011., godine, WHO i IARC (International Agency for Research on Cancer) ili Internacionalna agencija za istraživanja raka, su priznale kako mobilna telefonija zaista uzrokuje rak, te su zračenje iz mobilnih telefona stavili u 2B rizičnu skupinu za ljude.
  • U istraživanju koje je objavljeno 2008., godine je otkriveno kako su trudnice i njihova nerođena djeca posebno osjetljiva na zračenje iz mobitela. Znanstvenici su analizirali 13 tisuća djece i otkrili su kako je zračenje iz bežične tehnologije uzrokovalo brojne probleme za vrijeme trudnoće te da je na koncu povećalo rizik od poremećaja koji izazivaju hiperaktivnost, nedostatak pažnje, probleme s emocijama, stvaranjem i održavanjem veza s ljudima i druge bihevioralne anomalije. Rizik je postajao još veći ako su djeca koristila mobilne telefone prije navršene sedme godine života. Sve trudnice koje su koristile mobilne telefone su imale 54% povećan rizik od različitih fizičkih i psihičkih anomalija u zdravlju i razvoju njihove djece.
  • U nedavnim istraživanjima se potvrdilo kako su djeca, pa čak i ona nerođena u najvećoj opasnosti od zračenja uzrokovanog bežičnom tehnologijom i mobilnim telefonima.
  • osobe koje su počele koristiti mobitel kao tinejdžeri imaju 400-500% veću mogućnost od razvijanja raka mozga u dobi od 20-te do 30-te godine.
  • U znanstvenom istraživanju koje je objavljeno 2009., godine se pokazalo kako nošenje mobitela u džepu hlača uništava kosti karlice, točnije stvara osteoporozu. Muškarci koji su nosili mobitele okačene o opasač ili unutar džepa od hlača su unutar šest godina ove prakse izgubili gustoću kostiju karlice.
  • RF-EMR (radio frekvencije i elektromagnetsko zračenje) bez obzira na jakost i frekvenciju mobilnih telefona, uništava mitohondrijsku generaciju kisika unutar ljudskih spermija, na taj se način smanjuje njihova pokretljivost, dok s druge strane uništava DNK i fragmentira je. Ovo istraživanje ima jasnu implikaciju o tome koliko je opasno korištenje mobilnih telefona za muškarce koji imaju namjeru imati djecu. Mobiteli potencijalno utječu na plodnost muškaraca i zdravlje njihovih potomaka.
petra funtek

ScienceDirect.com - International Journal of Human-Computer Studies - A new look at sof... - 1 views

  • Soft lifting refers to the process whereby a legally licensed software program is installed or copied in violation of its licensing agreement. Previous research on this pervasive kind of unethical computer use has mainly focused on the determinants of this unethical act, which are rooted in personal, economic, technological, cultural, socio-political, or legal domains. However, little is known about the symbolic power that soft lifting has on the sense of self. Based on recent advances in behavioral priming, we hypothesized that soft lifting can influence the signals one sends to oneself; more specifically, soft lifting may prime individuals to experience an inauthentic sense of self, which, in turn, prompts further unethical behavior. In Study 1, we showed that participants, primed with the memory of a recent soft lifting experience, cheated more than participants recalling a recent experience of purchasing authentic software or than control participants. Moreover, feelings of inauthenticity mediated the priming effect of soft lifting on dishonest behavior. In Study 2, participants primed with soft lifting showed a greater willingness to purchase a wide range of counterfeit products over authentic products. Besides those antecedents or correlates of soft lifting already identified in the literature, educators should pay more attention to the negative impact of soft lifting on the self-images of users, which may go beyond computer-related behaviors. Priming may provide a new direction for HCI researchers to examine the impact of computer-use-related factors on users' perceptions, motivations, and behaviors.
1 - 15 of 15
Showing 20 items per page