Skip to main content

Home/ Internetni praktikum/ Group items tagged launch

Rss Feed Group items tagged

Gabrijela Vrbnjak

BBC News - Web code weakness allows data dump on PCs - 0 views

  • The loophole exploits a feature of HTML 5 which defines how websites are made and what they can do.
  • Developer Feross Aboukhadijeh found the bug and set up a demo page that fills visitors' hard drives with pictures of cartoon cats. In one demo, Mr Aboukhadijeh managed to dump one gigabyte of data every 16 seconds onto a vulnerable Macbook. Clever code Most major browsers, Chrome, Internet Explorer, Opera and Safari, were found to be vulnerable to the bug, said Mr Aboukhadijeh. While most websites are currently built using version 4 of the Hyper Text Markup Language (HTML), that code is gradually being superseded by the newer version 5. One big change brought in with HTML 5 lets websites store more data locally on visitors' PCs. Safeguards built into the "local storage" specification should limit how much data can be stored. Different browsers allow different limits but all allow at least 2.5 megabytes to be stored. However, Mr Aboukhadijeh found a way round this cap by creating lots of temporary websites linked to the one a person actually visited. He found that each one of these associated sites was allowed to store up to the limit of data because browser makers had not written code to stop this happening. By endlessly creating new, linked websites the bug can be used to siphon huge amounts of data onto target PCs. Only Mozilla's Firefox capped storage at 5MB and was not vulnerable, he found. "Cleverly coded websites have effectively unlimited storage space on visitor's computers," wrote Mr Aboukhadijeh in a blogpost about the bug. Code to exploit the bug has been released by Mr Aboukhadijeh and he set up a website, called Filldisk that, on vulnerable PCs, dumps lots of images of cats on to the hard drive. So far, no malicious use of the exploits has been observed. In a bid to solve the problem, bug reports about the exploit have been filed with major browser makers. More on This Story .related-links-list li { position: relative; } .related-links-list .gvl3-icon { position: absolute; top: 0; left: 0; } Related Stories Firefox smartphone partners revealed 24 FEBRUARY 2013, TECHNOLOGY Flash Player exits Android store 15 AUGUST 2012, TECHNOLOGY HTML 5 target for cybercriminals 02 DECEMBER 2011, TECHNOLOGY $render("page-see-also","ID"); $render("page-newstracker","ID"); Related Internet links Feross Aboukhadijeh The BBC is not responsible for the content of external Internet sites $render("page-related-items","ID"); Share this pageShare this page1.4KShareFacebookTwitter Email Print In association with $render("advert","advert-sponsor-module","page-bookmark-links"); $render("advert-post-script-load"); $render("advert-post-script-load"); More Technology stories RSS Computer glitch hits Mars rover Nasa's Curiosity Mars rover is put into "safe mode" after a computer glitch caused by corrupted files. US plans small-ship drone launches Hackers breach Evernote security $render("advert","advert-mpu-high"); $render("advert-post-script-load"); Top Stories http://news.bbcimg.co.uk/media/images/6618
  • found the bug and set up a demo page that fills visitors' hard drives with pictures of cartoon cats.
  • ...6 more annotations...
  • because browser makers had not written code to stop this happening. By endlessly creating new, linked websites the bug can be used to siphon huge amounts of data onto target PCs.
  • Most major browsers, Chrome, Internet Explorer, Opera and Safari, were found to be vulnerable to the bug
  • found a way round this cap by creating lots of temporary websites linked to the one a person actually visited
  • was not vulnerable
  • Mozilla's Firefox
  • bug reports about the exploit have been filed with major browser makers.
Janja Petek

Forty years of the internet: how the world changed for ever | Technology | The Guardian - 1 views

  • In October 1969, a student typed 'LO' on a computer - and the internet was born
  • Towards the end of the summer of 1969
  • a large grey metal box was delivered to the office of Leonard Kleinrock, a professor at the University of California in Los Angeles.
  • ...32 more annotations...
  • On the other hand, the breakthrough accomplished that night in 1969 was a decidedly down-to-earth one
  • It's impossible to say for certain when the internet began, mainly because nobody can agree on what, precisely, the internet is.
  • It's interesting to compare how much has changed in computing and the internet since 1969 with, say, how much has changed in world politics.
  • At 10.30pm, as Kleinrock's fellow professors and students crowded around, a computer was connected to the IMP, which made contact with a second IMP, attached to a second computer, several hundred miles away at the Stanford Research Institute, and an undergraduate named Charley Kline tapped out a message.
  • Twelve years after Charley Kline's first message on the Arpanet, as it was then known, there were still only 213 computers on the network; but 14 years after that, 16 million people were online, and email was beginning to change the world; the first really usable web browser wasn't launched until 1993, but by 1995 we had Amazon, by 1998 Google, and by 2001, Wikipedia, at which point there were 513 million people online. Today the figure is more like 1.7 billion.
  • on New Year's Day 1994 – only yesterday, in other words – there were an estimated 623 websites.
  • On the one hand, they were there because of the Russian Sputnik satellite launch, in 1957, which panicked the American defence establishment, prompting Eisenhower to channel millions of dollars into scientific research, and establishing Arpa, the Advanced Research Projects Agency, to try to win the arms technology race. The idea was "that we would not get surprised again,"
  • "In a few years, men will be able to communicate more effectively through a machine than face to face," they declared.
  • The few outsiders who knew of the box's existence couldn't even get its name right: it was an IMP, or "interface message processor"
  • One of the most intriguing things about the growth of the internet is this: to a select group of technological thinkers, the surprise wasn't how quickly it spread across the world, remaking business, culture and politics – but that it took so long to get off the ground.
  • The solution, called "packet switching" – which owed its existence to the work of a British physicist, Donald Davies – involved breaking data down into blocks that could be routed around any part of the network that happened to be free, before getting reassembled at the other end.
  • Still, Kleinrock recalls a tangible sense of excitement that night as Kline sat down at the SDS Sigma 7 computer, connected to the IMP, and at the same time made telephone contact with his opposite number at Stanford. As his colleagues watched, he typed the letter L, to begin the word LOGIN.
  • It was already possible to link computers by telephone lines, but it was glacially slow, and every computer in the network had to be connected, by a dedicated line, to every other computer, which meant you couldn't connect more than a handful of machines without everything becoming monstrously complex and costly.
  • In 1945, the American presidential science adviser, Vannevar Bush, was already imagining the "memex", a device in which "an individual stores all his books, records, and communications", which would be linked to each other by "a mesh of associative trails", like weblinks.
  • Web browsers crossed the border into mainstream use far more rapidly than had been the case with the internet itself: Mosaic launched in 1993 and Netscape followed soon after, though it was an embarrassingly long time before Microsoft realised the commercial necessity of getting involved at all. Amazon and eBay were online by 1995. And in 1998 came Google, offering a powerful new way to search the proliferating mass of information on the web.
  • Instead of smothering their research in the utmost secrecy – as you might expect of a cold war project aimed at winning a technological battle against Moscow – they made public every step of their thinking, in documents known as Requests For Comments.
  • Deliberately or not, they helped encourage a vibrant culture of hobbyists on the fringes of academia – students and rank amateurs who built their own electronic bulletin-board systems and eventually FidoNet, a network to connect them to each other.
  • n argument can be made that these unofficial tinkerings did as much to create the public internet as did the Arpanet. Well into the 90s, by the time the Arpanet had been replaced by NSFNet, a larger government-funded network,
  • It was the hobbyists, making unofficial connections into the main system, who first opened the internet up to allcomers.
  • This was the software known as TCP/IP, which made it possible for networks to connect to other networks, creating a "network of networks", capable of expanding virtually infinitely
  • Nevertheless, by July 1992, an Essex-born businessman named Cliff Stanford had opened Demon Internet, Britain's first commercial internet service provider.
  • After a year or so, Demon had between 2,000 and 3,000 users,
  • the @ symbol was introduced in 1971, and the first message, according to the programmer who sent it, Ray Tomlinson, was "something like QWERTYUIOP".
  • A couple of years later I got my first mobile phone, which came with two batteries: a very large one, for normal use, and an extremely large one, for those occasions on which you might actually want a few hours of power
  • For most of us, though, the web is in effect synonymous with the internet, even if we grasp that in technical terms that's inaccurate: the web is simply a system that sits on top of the internet, making it greatly easier to navigate the information there, and to use it as a medium of sharing and communication.
  • The first ever website was his own, at CERN: info.cern.ch.
  • The idea that a network of computers might enable a specific new way of thinking about information, instead of just allowing people to access the data on each other's terminals, had been around for as long as the idea of the network itself: it's there in Vannevar Bush's memex, and Murray Leinster's logics.
  • And in 1946, an astonishingly complete vision of the future appeared in the magazine Astounding Science Fiction. In a story entitled A Logic Named Joe, the author Murray Leinster envisioned a world in which every home was equipped with a tabletop box that he called a "logic":
  • Google, and others, saw that the key to the web's future would be helping users exclude almost everything on any given topic, restricting search results to the most relevant pages.
  • It is absurd – though also unavoidable here – to compact the whole of what happened from then onwards into a few sentences: the dotcom boom, the historically unprecedented dotcom bust, the growing "digital divide", and then the hugely significant flourishing, over the last seven years, of what became known as Web 2.0.
  • The most confounding thing of all is that in a few years' time, all this stupendous change will probably seem like not very much change at all.
  • Will you remember when the web was something you accessed primarily via a computer? Will you remember when there were places you couldn't get a wireless connection? Will you remember when "being on the web" was still a distinct concept, something that described only a part of your life, instead of permeating all of it? Will you remember Google?
Katja Jerman

Digital rights advocates wary of new 'six strikes' initiative for online piracy | Techn... - 0 views

  • The Copyright Alert System (CAS) was devised by a coalition of internet service providers (ISPs), content owners and the US government to curb illegal downloading by alerting "casual infringers" when illegal filesharing is detected on their IP address
  • Initially, the alerts are intended to be educational. They tell the customer what happened and how they can prevent it from happening again. If pirating continues to happen through the IP address, users will receive the message again, followed by messages that ask them to confirm they have seen the alerts. The fifth and sixth alert are called mitigation alerts and will temporarily slow users' internet speeds, depending on the ISP.
  • CAS has also been criticized because the person who audited the MarkMonitor software to ensure that it fairly identifies copyright violations is a former lobbyist for the Recording Industry Association of America (RIAA), one of the industry groups fronting money for system.
  • ...12 more annotations...
  • Jill Lesser, executive director of the Center for Copyright Information said in an interview with On the Media that the program is meant to abet the "casual infringer".
  • McSherry said that people engaged in wholesale commercial infringement wouldn't be fazed by the system because they are familiar with ways around the system.
  • The newest attempt to thwart illegal filesharing in the United States launched Monday and while the "six strikes and you're out" initiative seems to offer light penalties, digital rights advocates are concerned that it lacks transparency.
  • Copyright Alert System (CAS)
  • was devised by a coalition of internet service providers (ISPs), content owners and the US government to curb illegal downloading by alerting "casual infringers" when illegal filesharing is detected on their IP address.
  • Initially, the alerts are intended to be educational.
  • . If pirating continues to happen through the IP address, users will receive the message again, followed by messages that ask them to confirm they have seen the alerts. The fifth and sixth alert are called mitigation alerts and will temporarily slow users' internet speeds, depending on the ISP.
  • It's certainly not how we should be doing copyright policy,
  • it's a private copyright system and it doesn't have the protections and balances that the public copyright system has.
  • to ensure that it fairly identifies copyright violations is a former lobbyist
  • McSherry said that people engaged in wholesale commercial infringement wouldn't be fazed by the system because they are familiar with ways around the system
  • This failed to have a significant effect on pirating, and the industry stopped suing these type of casual users several years ago.
  •  
    article 1
donnamariee

BBC News - How the cloud helps firms cope with ups and downs of IT - 0 views

  • Imagine running a business where most of your customers arrive during two weeks of the year.
  • Welcome to the world of Doug Clark, the IBM executive responsible for the infrastructure that runs the website of the Wimbledon tennis championships.
  • Spikiness is a common problem in the information technology world. It refers to the surges in demand for computing power and information storage. Retailers suffer from spikiness. They expect their website to be swamped in the run-up to Christmas.
  • ...5 more annotations...
  • Instead of buying huge amounts of computing power and storage that may be unused for most of the year, companies can get what they need in a more flexible way.
  • IBM has allotted enough computing resources to cope with the surge during the tournament.
  • Cloud computing has another useful feature. Instead of being locked into long contracts, firms can buy their IT over much shorter time frames. It can even be metered. This is extremely useful for companies that are launching one-off projects or perhaps start-up firms that are not sure how successful they are going to be. Extra capacity can be bought online and paid for as needed. Zoopla is a UK property website which allows users to search for homes.
  • Zoopla uses Amazon Web Services (AWS), which launched in 2006 and is the biggest player in cloud computing.
  • Analysts at Tier1 Research estimate that just 2% of total spending on information technology is on cloud services. Daniel Beazer, a hosting and cloud analyst at Tier1 Research, said: "Most companies have been around for a lot longer than the internet and have systems that are decades old." "Mostly what they have works, just about, so why bother shifting it? The savings from virtualisation and the cloud aren't currently big enough to justify it," he said.
anonymous

Facebook and Google join forces to launch new £10m 'Nobel prize' for science ... - 0 views

  • Facebook founder Mark Zuckerberg and his wife Priscilla Chan are working alongside Google co-founder Sergey Brin and his wife Anne Wojcicki to create the Breakthrough Prize in Life Sciences. The project's aim is to reward research aimed at extending human life.
  • Russian entrepreneur Yuri Milner asked the group to create the award after deciding to model a prize on a physics award he set up in 2012. To top the line-up of internet greats behind the prize, Apple chairman Art Levinson is heading up the board.
Patricija Čelik

International cooperation is needed to make the internet safe for the world - Telegraph - 0 views

  • However, a severe downside is the challenge to data security and personal privacy. The internet is now overrun with cyber attacks and hackers. Internet security has become a very serious and common concern for the entire world.
  • Recently the American company Mandiant published a report on cyber security. This report accuses China of being the origin of most cyber attacks and portrays China as an arch-hacker.
  • Cyber attacks by nature are transnational, anonymous and deceptive. It is extremely difficult to ascertain the source of any attack. Cyber attacks launched from stolen or faked IP addresses take place around the world on daily basis.
  • ...3 more annotations...
  • China is a serious victim of cyber attacks.
  • The Chinese government is committed to international cooperation against cyber crime.
  • In September 2011 China and Russia jointly submitted to the United Nations a draft International Code of Conduct for Information Security. China is deeply sincere in seeking cooperation to tackle cyber crime. This common threat needs the participation of the whole international community.
mancamikulic

Why We All Have 'Internet-Addiction Genes' - Robert Wright - The Atlantic - 0 views

  • : A gene that seems to be (very modestly) correlated with internet addiction also plays a role in nicotine addiction.
  • A gene that seems to be (very modestly) correlated with internet addiction also plays a role in nicotine addiction.
  • internet addiction is not a figment of our imagination
  • ...16 more annotations...
  • Whether heavy internet use deserves to be called an addiction or just a hard-to-break habit is a question about a behavior pattern and its attendant psychological states.
  • To answer it we ask such things as how strong the cravings for the internet are, what lengths a person will go to in order to satisfy them, and so on.
  • Human beings are biochemical machines "designed" by natural selection to, among other things, form habits.
  • The habit-forming machinery involves the release of reward chemicals, such as dopamine, that make us feel good upon attaining these goals
  • In the modern world, there are shortcuts to getting these rewards
  • And there's some evidence (though here I'm approaching the limits of my comprehension of the science) that people with a particular variant of a gene involved in building acetylcholine receptors are more susceptible to nicotine addiction than other people
  • the main point is this: the biochemical mechanisms (including genes) involved in chemical addictions will naturally be the mechanisms involved in habit formation more generally since habit formation is what they were originally designed for.
  • whether it's a habit or an addiction, it is going to involve pleasure-dispensing biochemical mechanisms of the sort that can get us addicted to such chemicals as nicotine and cocaine
  • After all, the internet, like these chemicals, allows us to trigger our neuronal reward mechanisms with much less work,
  • it wasn't possible, in a very small and technologically primitive social universe, to at any time of day launch an observation or joke
  • the internet, like a pack of cigarettes or lots of cocaine, lets you just sit in a room and repeatedly trigger reward chemicals that
  • And all of us have lots and lots of these genes--genes that make us susceptible to internet addiction.
  • some of these genes may vary from person to person in ways that make some people particularly susceptible to internet addiction
  • In fact, there will turn out to be so many genes which are so modestly correlated with internet addiction
  • that if journalists write stories every time such a gene is found, or is thought to have been found, they will find that they're not shedding much actual light on the situation.
  • These genes are really just genes for being human.
Patricija Čelik

Internet pornography: safety plans do not go far enough - charities - Telegraph - 0 views

  • The Government yesterday launched a consultation on a possible change in the law to give parents more control over the material their children are viewing online.
  • Internet service providers have been in talks with the Government about ways of enabling parents to block sites containing sexually or gambling as well as forums glorify suicide and self-harm.
  • a report by MPs who called for a full “opt-in” which would automatically block adult material unless the user chose to deactivate it. Google has argued that an automatic block as a “mistake”, while Virgin Media, BT, TalkTalk and Sky have developed versions of the “active choice” system which makes users chose whether they want parental controls when they sign up, rather than imposing them automatically.
  • ...1 more annotation...
  • Claire Walker, head of policy, at the charity Family Lives, which this week published a hard hitting report on online dangers, said parents would be more secure with an automatic block.
Jan Majdič

Free speech on the internet | Technology | guardian.co.uk - 0 views

  • Freedom of expression has long been regarded as one of the fundamental principles of modern democracies, in which civil liberties are honoured and regarded as a prerequisite for individual development and fulfilment.
  • It is this classic liberal argument that is still used by civil liberties' campaigners on the internet, like Hatewatch, which argues that those "hate speak" groups, such as neo-Nazis, must still speak freely, if only to expose and discredit themselves
  • It is not simply a case of "same old issue, new technology" with free speech and the internet. With its low start-up costs and global reach, the internet enables almost anyone in the West, in theory, to speak and be heard around the world, as well as hear others' speech.
  • ...11 more annotations...
  • particularly when they originate from, and are hosted in, foreign countries.
  • China have successfully prevented their citizens from receiving a huge quantity of (pro-democratic) material on the internet.
  • seeking to regulate and control its immense, potential, power.
  • The anti-censorship pressure group, Campaign Against Censorship of the Internet in Britain, was created in response Scotland Yard's request to ISPs to censor their news feeds
  • Governments in the USA, Germany and France, have all taken significant steps to curtail free speech on the internet
  • US is several years ahead of Britain
  • industry self-regulation
  • Technology is used to censor and evade censorship, although it seems likely that censorship tools will grow in sophistication and use as legislators struggle to censor the internet.
  • In December 1997, a 200-strong internet industry group agreed to accept a common standard of labelling called PICS - the Platform for Internet Content Selection
  • Millions of internet users in big offices, cybercafés, education institutions and libraries will use machines or ISPs which have filters installed in them.
  • In 1999, the EU launched an action plan, "Promoting Safer Use of the Internet", which provides for a hotline, where people can report sites which have caused offence
donnamariee

BBC News - O2's Tu Go aims to challenge Skype and other Voip apps - 0 views

  • O2 has launched an app which lets users make and receive phone calls and texts via a tablet, computer or smartphone. Tu Go is available for Android, Apple's iOS devices and Windows 7 PCs but limited to "pay monthly" subscribers - so excludes corporate accounts.
  • Users can be logged into the service on up to five devices at once - meaning all will ring if they receive a call - including handsets using Sim cards associated with different networks and internet enabled gadgets such as iPods.
  • The effort represents the telecom industry's latest attempt to tackle competition from Skype and other third-party Voip services. These typically do not charge for app-to-app calls, but do require the user to buy credit if they want to call or send a text to a standard mobile or landline number.
  • ...2 more annotations...
  • But the scale of the threat was highlighted earlier this week when the chairman of China Mobile - the world's largest telecom carrier - said his firm was now more concerned about the challenge posed by Microsoft's Skype and Tencent's WeChat services than it was about competition from China's rival mobile networks.
  • There are already dozens of Voip apps on the market including lesser-known names such as Tango, Fring, Bria and Zerofone as well as manufacturer's own services including BlackBerry BBM and Apple's Facetime.
Katja Saje

Readers' privacy is under threat in the digital age | Books | The Guardian - 1 views

  • Every time you read a newspaper on your computer or buy an ebook, you can leave an electronic trail behind you. That trail is potentially lucrative for business, and is a new source of surveillance for government and law enforcement.
  • Retailers and search engines, most notably Amazon and Google, can now gather an astonishingly detailed portrait of our book-reading habits: what we buy, what we browse, the amount of time we spend on a page and even the annotations we make in an ebook.
  • Amazon also reserves the right to disclose information when it "believes release is appropriate to comply with the law". A stronger protection for our privacy should require a warrant before personal data is released.
  • ...2 more annotations...
  • Awareness of the problem is growing, from Google's catastrophic launch of its social network Buzz in 2010, which shared users' contacts without their permission, to the revelation last year that Facebook was still tracking users' browsing information after they had logged out.
  • The new possibilities for surveillance undermine the fundamental privacy of the act of reading.
Mirna Čorak

The Perils of Perfection - NYTimes.com - 0 views

  • LivesOn, a soon-to-launch service that promises to tweet on your behalf even after you die. By analyzing your earlier tweets
  • Seesaw, the app lets you run instant polls of your friends and ask for advice on anything: what wedding dress to buy, what latte drink to order and soon, perhaps, what political candidate to support.
  • Take Google Glass, the company’s overhyped “smart glasses,” which can automatically snap photos of everything we see and store them for posterity.
  • ...4 more annotations...
  • Jim Gemmell, “Total Recall: How the E-Memory Revolution Will Change Everything.”
  • All these efforts to ease the torments of existence might sound like paradise to Silicon Valley. But for the rest of us, they will be hell.
  • SUCH predisposition makes it harder to notice that not all problems are problems
  • After all, saving the world might be a price worth paying for destroying everyone’s privacy, while a larger-than-life mission might convince young and idealistic employees that they are not wasting their lives tricking gullible consumers to click on ads for pointless products.
Anja Vasle

Even Google won't be around for ever, let alone Facebook | Technology | The Observer - 0 views

  • At the moment, the four leading monsters are Apple, Google, Facebook and Amazon. Yet 18 years ago, Apple was weeks away from extinction, Amazon had just launched, Google was still three years away from incorporation and Facebook lay nine years into the future.
  • We understand pretty well the factors that determine the fortunes of companies that make things people buy – which is why, for example, one can predict thatApple won't be able indefinitely to sustain its huge profit margins on its iDevices.
  • This leaves Facebook, a company that has one billion products (called users) and earns its living by selling information about them to advertisers.
  • ...11 more annotations...
  • The two key factors that will determine Facebook's future are the power of network effects and the "stickiness" of its service – ie, the extent to which it can dissuade users from leaving.
  • he key determinants of success or failure were (i) the average number of friends that users have and (ii) whether the difficulty of using the site comes to outweigh the perceived benefits.
  • Facebook users will constitute a captive market and will be correspondingly exploited. And the company will be regulated as a monopoly.
  • How much exploitation will users tolerate before they decide to quit?
  • n fact, it is now so dominant that millions of people around the world think that Facebook is the internet.
  • At one point in the conversation, the Google boys noticed that their collaborator had suddenly gone rather quiet.
  • But the number of commercial companies that are more than a century old is vanishingly small.
  • in the technology world one can go from zero to hero is a very short time
  • Google has a well understood and currently profitable business model and a huge technical infrastructure but ultimately is vulnerable to a well-resourced competitor armed with better search technology.
  • A telephone network with a million subscribers is infinitely more valuable then one with only 10. In technological ecosystems, network effects are very powerful: they explain, for example, how Microsoft came to dominate the market for desktop operating and office systems.
  • If you put your faith in network effects, therefore, Facebook looks like a good investment because it'll be around for the long term.
Rok Urbancic

Would you buy a 'No internet. No video. No music' laptop? - News - Gadgets & Tech - The... - 0 views

  • wouldn't it be nice to have a phone that just does phone calls?
  • at the Buckeye Tool Expo in Dalton, Ohio there is unusual demand for devices that do less.
  • the exhibition is a draw for the Amish community, whose access to technology is restricted by their faith.
  • ...8 more annotations...
  • You don't have to wear a bonnet, however, to seek low-technology in a world still gripped by the race to offer enough bells and brushed
  • The Amish laptop is at the extreme end of a quiet drive for digital simplicity
  • The 105 has real buttons, makes calls, sends texts, costs £13 and has, wait for it, a battery life of 35 days
  • Less-smart phones are also winning fans wishing to liberate their fingers and minds from hours of distraction from forgotten pursuits, like reading books, and their wallets from £80 phone bills.
  • The needs of users aren't always the priority of tech giants more often guided by marketing departments.
  • Clutter is banished from screen and keyboard, which features dedicated "copy" and "paste" keys.
  • Ordissimo will compete with SimplicITy, laptops with just six functions launched in 2009
  • The majority of people only want a computer to send emails, Skype their family, browse the web and write documents
Veronika Lavrenčič

How the Internet Gets Inside Us : The New Yorker - 0 views

  • The Information How the Internet gets inside us.
  • searc
  • engine Google was launched.
  • ...28 more annotations...
  • “Why is she doing that?” they whisper. “Why doesn’t she just Google it?”
  • the technological shifts in communication we’re living with are unprecedented
  • our technological revolution is the big social revolution that we live with.
  • the Never-Betters, the Better-Nevers, and the Ever-Wasers
  • the world
  • the brink of a new utopia
  • Better-Nevers
  • better off if the whole thing had never happened
  • uperior
  • is coming to an end
  • Never-Betters
  • s taking its place
  • Ever-Wasers
  • new way of organizing data and connecting users is always thrilling to some and chilling to others
  • is exactly what makes it a modern moment.
  • N.Y.U. professor Clay Shirk
  • something a little nervous going on underneath.
  • e are on the crest of an ever-surging wave of democratized information
  • Gutenberg printing press produced the Reformation, which produced the Scientific Revolution, which produced the Enlightenment, which produced the Internet,
  • he new connective technology
  • he Wired version of Whig history
  • is bound to make for more freedom
  • “Is the Internet Changing the Way You Think?,”
  • “We see all around us transformations in the making that will rival or exceed the printing revolution”
  • “Printing ignited the previously wasted intellectual potential of huge segments of the population. . . . Freedom of thought and speech—where they exist—were unforeseen offspring of the printing press.”
  • Never-Betterism has its excitements,
  • emerged at the end of the printing-press era
  • t wasn’t by some technological logic but because of parallel inventions,
  •  
    O tem, kako je tehnologija prišla v nas, kako jo bodo verjetno občutile mlajše generacije in kako je tehnologija vedno obstajala, le zavedali se je niso. 
Veronika Lavrenčič

Google Buzz aims to crack the social web - News - Gadgets & Tech - The Independent - 0 views

  • Google Buzz aims to crack the social web
  • Google Buzz
  • share messages, web links and photos with friends and colleagues directly within Gmail
  • ...24 more annotations...
  • smartphones based on Google's Android operating system.
  • Google's new technology mimics some of the key features of popular social networking services like Twitter and Facebook
  • Gmail is the third most popular web-based email in the world
  • the large pool of Gmail users.
  • There's always been a giant social network underneath Gmail,"
  • Todd Jackson
  • 176.5 million unique visitors in December
  • Forrester Research social media analyst Augie Ray
  • flag as viewable to everyone
  • utomatically indexed by Google's search engine
  • be available within Google's recently launched real-time search results.
  • users can also keep messages private by sharing only with customized groups of friends and colleagues.
  • users can easily share content from various Google online properties like photo-sharing service Picasa and video site YouTube.
  • Content from certain third-party services such as Twitter can also be shared
  • Buzz is not currently able to display messages that originated on Facebook
  • "The fact that Gmail did not connect and allow broadcasts out to Twitter and Facebook could be a real challenge to them
  • Google hopes to jumpstart its social networking push
  • the Orkut social network in 2004
  • Google has tried to ride the social networking wave before
  • ailed to attract as many users as social giants like Facebook and MySpace in the United States.
  • Google is following in the footsteps of Yahoo
  • has seen lackluster results according to analysts.
  • Google appears to be putting a heavy emphasis on mobile and location-based capabilities
  • a special mobile application for Buzz that will run on smartphones based on Google's Android software, Windows Mobile and the Symbian operating system.
  •  
    Kako si Google prizadeva ustvariti podobno socialno omrežje, kot sta Facebook in Twitter.
Nuša Gregoršanec

BBC News - Five times more internet crime in the West Midlands - 0 views

  • Five times more internet crime in the West Midlands
  • In 2012 West Midlands Police received almost 500 reports of online crime compared to 100 in 2008.
  • Sgt Gregory said: "One of the first big cases was around indecent images of young children a decade ago and in the UK every police force got involved in that and it was a matter of playing catch-up and realising what the internet was being used for.
  • ...3 more annotations...
  • "Each force has now got its own child protection team and organisations are working together to try to protect young people, not just on sexual offending matters and grooming but also bullying."
  • For Safer Internet Day, the BBC has launched a "Share Take Care" campaign to highlight the risks of sharing information online.
  • The BBC has published a number of guides online, advising social media users to provide minimum information online and use privacy settings.
Katja Jerman

Facebook's new promoted-post feature sparks privacy concerns | Technology | guardian.co.uk - 0 views

  • new feature allows its users to promote their friends' posts
  • Facebook announced the launch of a new feature on Friday that allows users to pay to promote their friends' posts. In return for a fee, Facebook promotes the post so that more people see it
  • already sparked privacy concerns because you don't have to give your consent for a post to be promoted by one of your friends.
  • ...4 more annotations...
  • feature is intended to be helpful to users
  • But users could just as easily promote embarrassing status updates in jest or out of cruelty.
  • applies to users with fewer than 5,000 friends and subscribers
  • pay the $7 fee
Katja Jerman

Will Apple's iWatch introduce the age of wearable technology? - Telegraph - 0 views

  • Apple is developing a smart watch as it seeks to repeat its trick with the iPhone and iPad and spur a new market
  • curved touchscreen made from a new type of flexible glass, an array of sensors to monitor exercise patterns and heart rate, “wave and pay” function, access to maps, voice control and wireless integration with the iPhone.
  • That could allow the wearer to take calls and read messages without having to delve into their pocket or bag, or mean the iphone would know when it was in its owner’s hand an unlock automatically.
  • ...8 more annotations...
  • it is beyond the experimentation phase and heading towards production
  • that the age of “wearable technology” is nigh
  • “Apple can launch a new product like no other company because it owns its own retail channel, has privileged real estate in other retailers, and has a brand that’s recognized even by two-year-olds.”
  • There were mobile phones with internet access, mapping software and even touchscreens before the iPhone was introduced in 2007, they just failed to capture mainstream attention.
  • Likewise, wearable technology and smart watches are not Apple ideas. The firm in fact already benefits from third party wearable accessories such as the Nike FuelBand and FitBit, which link to the iPhone and track exercise.
  • All the main technologies – screens, processors, GPS, mobile software, Bluetooth wireless networking – are already mature and in mass use. The problem is cramming them into something small enough to look stylish on a wrist
  • its rival is working on a computer you wear on your face. Google Glass, a project led by Google co-founder Sergey Brin, suggests a near future in which reality is augmented via a pair of spectacles with all the capabilities of a smartphone.
  • Already in public testing, Google Glass’ tiny screen projects the web into your field of vision, while “bone conduction” headphones transmit sound directly through your skull, allowing you to hear your environment at the same time through your ears.
1 - 20 of 22 Next ›
Showing 20 items per page