Skip to main content

Home/ Internetni praktikum/ Group items tagged networking

Rss Feed Group items tagged

donnamariee

How social networks have changed our world | Techi.com - 0 views

  • How social networks have changed our world
  • social networks have evolved from simple communication hubs to veritable agents of change; galvanizing thousands of people over political discourse, creating and changing industries, and all in all, transforming people’s lives
  • Today, more than 600 million users worldwide are active on this website. Approximately 200 million people are active on twitter
  • ...11 more annotations...
  • None of these social networks even excited at the beginning of the decade. While these figures may be mere numbers for many people, the impact of social network goes far and deep. Here are a few areas in which social networks have had lasting and arguably permanent effects.
  • social networks have altered the operational model of politics and public service
  • Facebook
  • touchstone for how non-profit organizations, environmental activities, and political factions reach out to thousands of potential volunteers and donors
  • Twitter is being used by almost all progressive politicians to promote their causes. Thanks to the social networks, politics is no longer limited to the political elites; people voice their opinions, share their ideas, and even communicate with politicians on a one-on-one basis. It’s a technology lesson that progressive politicians have to learn or else, risk losing to the tech savvy youth of today.
    • donnamariee
       
      Twitter is being used by almost all progressive politicians to promote their causes. Thanks to the social networks, politics is no longer limited to the political elites; people voice their opinions, share their ideas, and even communicate with politicians on a one-on-one basis. It's a technology lesson that progressive politicians have to learn or else, risk losing to the tech savvy youth of today.
  • Marketing and advertising are transforming themselves from industries reliant on mass market channels to those that must embrace the power of the customer, and attempt to engage in conversations with them. Often, a “middle man” (such as news paper reporter) ultimately determined that what was written or said. The ability to bypass gatekeepers and facilitate direct interactions with consumers and communities is very important.
  • Some news websites already present visitors with a list of stories recommended by their friends because they realize an endorsement from ‘someone you know’ carries extra weight
  • From traffic updates, to natural riots, anyone and everyone who has access to social networking sites can report his/her version of such events. Sifting through the humongous amount of news, speculations and analysis are abilities that a New Media user must now possess.
  • It is not uncommon to see small or home grow businesses that operate solely through their Facebook accounts. In fact, for businesses, interaction via social network has almost become a yardstick to test out their customer service
  • With Google+ being launched recently, it is clear that all technology giants have realized the critical role that social networks will lay in shaping our lives. It is no longer about implementing the latest, cutting edge technology; it is about how seamlessly and organically a social network merges in our lives, and affects every aspect of it. The lines between real and virtual lives have now blurred to the extent of becoming invisible
  •  
    essay theme 2
Janja Petek

Forty years of the internet: how the world changed for ever | Technology | The Guardian - 1 views

  • In October 1969, a student typed 'LO' on a computer - and the internet was born
  • Towards the end of the summer of 1969
  • a large grey metal box was delivered to the office of Leonard Kleinrock, a professor at the University of California in Los Angeles.
  • ...32 more annotations...
  • At 10.30pm, as Kleinrock's fellow professors and students crowded around, a computer was connected to the IMP, which made contact with a second IMP, attached to a second computer, several hundred miles away at the Stanford Research Institute, and an undergraduate named Charley Kline tapped out a message.
  • It's impossible to say for certain when the internet began, mainly because nobody can agree on what, precisely, the internet is.
  • It's interesting to compare how much has changed in computing and the internet since 1969 with, say, how much has changed in world politics.
  • On the other hand, the breakthrough accomplished that night in 1969 was a decidedly down-to-earth one
  • Twelve years after Charley Kline's first message on the Arpanet, as it was then known, there were still only 213 computers on the network; but 14 years after that, 16 million people were online, and email was beginning to change the world; the first really usable web browser wasn't launched until 1993, but by 1995 we had Amazon, by 1998 Google, and by 2001, Wikipedia, at which point there were 513 million people online. Today the figure is more like 1.7 billion.
  • on New Year's Day 1994 – only yesterday, in other words – there were an estimated 623 websites.
  • On the one hand, they were there because of the Russian Sputnik satellite launch, in 1957, which panicked the American defence establishment, prompting Eisenhower to channel millions of dollars into scientific research, and establishing Arpa, the Advanced Research Projects Agency, to try to win the arms technology race. The idea was "that we would not get surprised again,"
  • "In a few years, men will be able to communicate more effectively through a machine than face to face," they declared.
  • The few outsiders who knew of the box's existence couldn't even get its name right: it was an IMP, or "interface message processor"
  • It was already possible to link computers by telephone lines, but it was glacially slow, and every computer in the network had to be connected, by a dedicated line, to every other computer, which meant you couldn't connect more than a handful of machines without everything becoming monstrously complex and costly.
  • The solution, called "packet switching" – which owed its existence to the work of a British physicist, Donald Davies – involved breaking data down into blocks that could be routed around any part of the network that happened to be free, before getting reassembled at the other end.
  • Still, Kleinrock recalls a tangible sense of excitement that night as Kline sat down at the SDS Sigma 7 computer, connected to the IMP, and at the same time made telephone contact with his opposite number at Stanford. As his colleagues watched, he typed the letter L, to begin the word LOGIN.
  • One of the most intriguing things about the growth of the internet is this: to a select group of technological thinkers, the surprise wasn't how quickly it spread across the world, remaking business, culture and politics – but that it took so long to get off the ground.
  • In 1945, the American presidential science adviser, Vannevar Bush, was already imagining the "memex", a device in which "an individual stores all his books, records, and communications", which would be linked to each other by "a mesh of associative trails", like weblinks.
  • And in 1946, an astonishingly complete vision of the future appeared in the magazine Astounding Science Fiction. In a story entitled A Logic Named Joe, the author Murray Leinster envisioned a world in which every home was equipped with a tabletop box that he called a "logic":
  • Instead of smothering their research in the utmost secrecy – as you might expect of a cold war project aimed at winning a technological battle against Moscow – they made public every step of their thinking, in documents known as Requests For Comments.
  • Deliberately or not, they helped encourage a vibrant culture of hobbyists on the fringes of academia – students and rank amateurs who built their own electronic bulletin-board systems and eventually FidoNet, a network to connect them to each other.
  • n argument can be made that these unofficial tinkerings did as much to create the public internet as did the Arpanet. Well into the 90s, by the time the Arpanet had been replaced by NSFNet, a larger government-funded network,
  • It was the hobbyists, making unofficial connections into the main system, who first opened the internet up to allcomers.
  • This was the software known as TCP/IP, which made it possible for networks to connect to other networks, creating a "network of networks", capable of expanding virtually infinitely
  • Nevertheless, by July 1992, an Essex-born businessman named Cliff Stanford had opened Demon Internet, Britain's first commercial internet service provider.
  • After a year or so, Demon had between 2,000 and 3,000 users,
  • the @ symbol was introduced in 1971, and the first message, according to the programmer who sent it, Ray Tomlinson, was "something like QWERTYUIOP".
  • A couple of years later I got my first mobile phone, which came with two batteries: a very large one, for normal use, and an extremely large one, for those occasions on which you might actually want a few hours of power
  • For most of us, though, the web is in effect synonymous with the internet, even if we grasp that in technical terms that's inaccurate: the web is simply a system that sits on top of the internet, making it greatly easier to navigate the information there, and to use it as a medium of sharing and communication.
  • The first ever website was his own, at CERN: info.cern.ch.
  • The idea that a network of computers might enable a specific new way of thinking about information, instead of just allowing people to access the data on each other's terminals, had been around for as long as the idea of the network itself: it's there in Vannevar Bush's memex, and Murray Leinster's logics.
  • Web browsers crossed the border into mainstream use far more rapidly than had been the case with the internet itself: Mosaic launched in 1993 and Netscape followed soon after, though it was an embarrassingly long time before Microsoft realised the commercial necessity of getting involved at all. Amazon and eBay were online by 1995. And in 1998 came Google, offering a powerful new way to search the proliferating mass of information on the web.
  • Google, and others, saw that the key to the web's future would be helping users exclude almost everything on any given topic, restricting search results to the most relevant pages.
  • It is absurd – though also unavoidable here – to compact the whole of what happened from then onwards into a few sentences: the dotcom boom, the historically unprecedented dotcom bust, the growing "digital divide", and then the hugely significant flourishing, over the last seven years, of what became known as Web 2.0.
  • The most confounding thing of all is that in a few years' time, all this stupendous change will probably seem like not very much change at all.
  • Will you remember when the web was something you accessed primarily via a computer? Will you remember when there were places you couldn't get a wireless connection? Will you remember when "being on the web" was still a distinct concept, something that described only a part of your life, instead of permeating all of it? Will you remember Google?
Veronika Lavrenčič

The Arpanet, Ethernet Explained | Article by Sonet Digital - 0 views

  • Arpanet, Ethernet
  • Part: 2
  • Larry Roberts
  • ...27 more annotations...
  • linking computers via telephone lines
  • university and research sites would be connected
  • to build Interface Message Processors
  • smaller computers
  • File Transfer Protocol
  • to handle the interfacing between their hosts and the Network
  • ARPANET in 1969
  • The '70s saw the emergence of the first networks
  • o facilitate communications
  • Network Control Protocol (NCP)
  • a user-transparent mechanism for sharing files between host computers
  • the first Terminal Interface Processor (TIP) is implemented
  • common language
  • 1972 Vinton Cerf is called to the chairmanship
  • Inter-Networking Group (INWG)
  • to develop standards for the ARPANET
  • NCP communications system
  • TCP (Transmission-Control Protocol)
  • Users at various sites could log on to the Network and request data from a number of host computers
  • They conceived of a protocol that could be adopted by all gateway computers and hosts alike
  • In this way different networks could be linked together to form a network of networks
  • By the late '70s the final protocol was developed - TCP/IP (Internet Protocol) - which would become the standard for internet communications.
  • Bob Metcalfe's: Ethernet
  • packet switching networks
  • a dissertation on the ARPANET
  • marketed his invention as Ethernet
  • the '80s witnessed the explosion of Local Area Networks (LANs)
  •  
    Drugi del serije člankov. 
Sandra Hribar

Study: Facebook Is Your Frenemy - Megan Garber - The Atlantic - 0 views

  • Facebook is terrible. But Facebook is, at the same time, wonderful. We love it, we hate it. We love to hate it, hate to love it, etc. It is our best friend. It is our worst enemy. Facebook may be friending the world, in other words, but it is also frenemy-ing us, one click at a time. This, according to new research from the Skype-like service Rebtel, which regularly surveys its users about their habits. The company recently queried U.S. users aged 18 and older, garnering responses from 1,632 mobile device owners. Among its questions: What social networking sites cause you the most stress? Which have the most negative effect on your mood? Which have the most positive?  The survey's major finding was unsurprising: Most social networks seem to have very little negative effect on those users' overall moods or stress levels. However: Of the users who did implicate social networks in stress and general mood changes, the overwhelming majority of them pointed their collective fingers at one network in particular: Facebook. Asked "what social network causes you the most stress?," 18.4 percent of Android users and 21.4 percent of iPhone users replied, "Facebook." By comparison, the next-most-named network, Twitter, was called out by only 5.9 percent of Android users and 4.4 percent of iPhone -- and the next-most-named, LinkedIn, clocked in with 4.0 percent and 3.2 percent of users, respectively.
Jan Majdič

Leader: Social Networks | Comment is free | The Guardian - 0 views

  • The internet has always revolved around social networking, but the explosion of a fresh generation of communal sites such as MySpace, Bebo and Facebook is taking the phenomenon into new and unchartered territory.
  • One of those applications called iLike - pigging-backing on Facebook's global network - has already attracted more than 6 million members, and is growing by 1 million every few days, making it one of the fastest growing companies of any kind ever
  • A new generation accustomed to instant networking, and unashamed about living more of their lives online, is bound to change the organisations they work for and maybe the way they are governed, or at least the way their governments communicate with them
Anja Pirc

Online privacy: Difference Engine: Nobbling the internet | The Economist - 0 views

  • TWO measures affecting the privacy internet users can expect in years ahead are currently under discussion on opposite sides of the globe. The first hails from a Senate committee’s determination to make America’s online privacy laws even more robust. The second concerns efforts by the International Telecommunications Union (ITU), an intergovernmental body under the auspices of the United Nations, to rewrite its treaty for regulating telecommunications around the world, which dates from 1988, so as to bring the internet into its fief.
  • The congressional measure, approved overwhelmingly by the Senate Judiciary Committee on November 29th, would require criminal investigators to obtain a search warrant from a judge before being able to coerce internet service providers (ISPs) to hand over a person’s e-mail. The measure would also extend this protection to the rest of a person’s online content, including videos, photographs and documents stored in the "cloud"—ie, on servers operated by ISPs, social-network sites and other online provider
  • a warrant is needed only for unread e-mail less than six months old. If it has already been opened, or is more than six months old, all that law-enforcement officials need is a subpoena. In America, a subpoena does not need court approval and can be issued by a prosecutor. Similarly, a subpoena is sufficient to force ISPs to hand over their routing data, which can then be used to identify a sender’s various e-mails and to whom they were sent. That is how the FBI stumbled on a sex scandal involving David Petraeus, the now-ex director of the CIA, and his biographer.
  • ...7 more annotations...
  • No-one imagined that ISPs would one day offer gigabytes of online storage free—as Google, Yahoo!, Hotmail and other e-mail providers do today. The assumption back then was that if someone had not bothered to download and delete online messages within six months, such messages could reasonably be considered to be abandoned—and therefore not in need of strict protection.
  • wholesale access to the internet, powerful mobile phones and ubiquitous social networking have dramatically increased the amount of private data kept online. In the process, traditional thinking about online security has been rendered obsolete. For instance, more and more people nowadays keep their e-mail messages on third-party servers elsewhere, rather than on their own hard-drives or mobile phones. Many put their personal details, contacts, photographs, locations, likes, dislikes and inner thoughts on Google, Facebook, Twitter, Flickr, Dropbox and a host of other destinations. Bringing online privacy requirements into an age of cloud computing is only fit and proper, and long overdue.
  • the international telecoms treaty that emerged focused on how telephone traffic flows across borders, the rules governing the quality of service and the means operators could adopt to bill one another for facilitating international calls. As such, the regulations applied strictly to telecoms providers, the majority of which were state owned.
  • he goal of certain factions is to grant governments the authority to charge content providers like Amazon, Google, Facebook and Twitter for allowing their data to flow over national borders. If enacted, such proposals would most certainly deter investment in network infrastructure, raise costs for consumers, and hinder online access for precisely those people the ITU claims it wants to help.
  • a proposal sponsored by the United States and Canada to restrict the debate in Dubai strictly t
  • o conventional telecoms has met with a modicum of success, despite stiff opposition from Russia plus some African and Middle-Eastern countries. Behind closed doors, the conference has agreed not to alter the ITU’s current definition of “telecommunications” and to leave the introductory text concerning the existing treaty’s scope intact.
  • The sticking point has been what kind of organisations the treaty should apply to. Here, one word can make a huge difference. In ITU jargon, the current treaty relates only to “recognised operating agencies”—in other words, conventional telecoms operators. The ITU wants to change that to simply “operating agencies”. Were that to happen, not only would Google, Facebook and other website operators fall under the ITU’s jurisdiction, but so too would all government and business networks. It seems the stakes really are as high as the ITU’s critics have long maintained
Neža Zidanič

Social networking: teachers blame Facebook and Twitter for pupils' poor grades - Telegraph - 0 views

  • Teachers believe social networking sites such as Facebook and Twitter are to blame for pupils' poor grades, a study has concluded.
  • Seven in 10 British teachers believe children are becoming more and more obsessed with websites such as Facebook  By Andy Bloxham 10:38AM GMT 18 Nov 2010
  • This research clearly demonstrates that students up and down the country are spending more and more time using social media.
  • ...7 more annotations...
  • "Rather than relying on life experiences, educational travel and face to face interaction with others, children are becoming obsessed with social networking and this is shaping their attitudes instead.
  • The report concludes that the children with the poorest grades at school are the ones who spent most time on social networking.
  • Seven in 10 British teachers believe children are becoming more and more obsessed with websites such as Facebook, Twitter and MySpace.
  • Half of the 500 teachers polled believe this fixation is affecting the children's ability to concentrate in class.
  • 'They enjoy using this tool but there is a danger that these virtual interactions filter out problematic or emotional issues, which in real life, support social and emotional development. ''Social networking has become so much the norm, for adults and children alike, that non-participation can result in feeling excluded or even socially ostracised. ''The time invested in social media versus real life interpersonal interaction can detract from that available for real human contact and contribute to delayed and/or distorted social and emotional development.''
  • It is also claimed that children who are online at every available opportunity are less willing to communicate with adults.
  • ''Currently there is little empirical research and related guidance on how to integrate social media into school-based learning, although I am aware that many teachers are grappling with this challenge in their day to day practice and some are managing to use this new media very constructively.
petra funtek

Social networks: after privacy, beyond friendship | openDemocracy - 0 views

  • irst, research shows that social-networking sites are a serious risk when accessed at work.
  • Facebook at work". It may sound ridiculous, but the purpose is to ensure that employees are not putting their personal and corporate data out to tender.
  • The second reason is that once uploaded, personal details can become public possession - and not just for now but, effectively, forever. News Corp bought MySpace to exploit what previously had been unthinkable to advertisers: customers telling you what they want without you even asking.
  • ...2 more annotations...
  • he irony in all this is that Facebook - which in September 2007 overtook MySpace in Britain as the preferred site for individual users - was originally set up to mirror rather than overturn the "intimacy" and exclusiveness of real-world, face-to-face networks. Andrew McCollum, one of the founders of Facebook, explained to me that they based the project on a pretty closed community, namely university colleges.
  • Social networks: after privacy, beyond friendship
Veronika Lavrenčič

Google Buzz aims to crack the social web - News - Gadgets & Tech - The Independent - 0 views

  • Google Buzz aims to crack the social web
  • Google Buzz
  • share messages, web links and photos with friends and colleagues directly within Gmail
  • ...24 more annotations...
  • smartphones based on Google's Android operating system.
  • Google's new technology mimics some of the key features of popular social networking services like Twitter and Facebook
  • Gmail is the third most popular web-based email in the world
  • the large pool of Gmail users.
  • There's always been a giant social network underneath Gmail,"
  • Todd Jackson
  • 176.5 million unique visitors in December
  • Forrester Research social media analyst Augie Ray
  • flag as viewable to everyone
  • utomatically indexed by Google's search engine
  • be available within Google's recently launched real-time search results.
  • users can also keep messages private by sharing only with customized groups of friends and colleagues.
  • users can easily share content from various Google online properties like photo-sharing service Picasa and video site YouTube.
  • Content from certain third-party services such as Twitter can also be shared
  • Buzz is not currently able to display messages that originated on Facebook
  • "The fact that Gmail did not connect and allow broadcasts out to Twitter and Facebook could be a real challenge to them
  • Google hopes to jumpstart its social networking push
  • the Orkut social network in 2004
  • Google has tried to ride the social networking wave before
  • ailed to attract as many users as social giants like Facebook and MySpace in the United States.
  • Google is following in the footsteps of Yahoo
  • has seen lackluster results according to analysts.
  • Google appears to be putting a heavy emphasis on mobile and location-based capabilities
  • a special mobile application for Buzz that will run on smartphones based on Google's Android software, Windows Mobile and the Symbian operating system.
  •  
    Kako si Google prizadeva ustvariti podobno socialno omrežje, kot sta Facebook in Twitter.
Nuša Gregoršanec

BBC NEWS | UK | Online networking 'harms health' - 0 views

  • Online networking 'harms health'
  • Online networking 'harms health'
  • Dr Aric Sigman says websites such as Facebook set out to enrich social lives, but end up keeping people apart.
  • ...4 more annotations...
  • A lack of "real" social networking, involving personal interaction, may have biological effects, he suggests. He also says that evidence suggests that a lack of face-to-face networking could alter the way genes work, upset immune responses, hormone levels, the function of arteries, and influence mental performance.
  • This, he claims, could increase the risk of health problems as serious as cancer, strokes, heart disease, and dementia.
  • Dr Sigman says that there is research that suggests the number of hours people spend interacting face-to-face has fallen dramatically since 1987, as the use of electronic media has increased.
  • Dr Sigman also argues using electronic media undermines people's social skills and their ability to read body language.
donnamariee

Who is Social Media Really Working For? | Jason Benlevi | Cato Unbound - 0 views

  • “digital activism” had tremendous impact and leverage for change
  • It’s my opinion that social networking, as an activist tool, is being vastly oversold.
  • Technology always cuts two ways. Although the personal computer provided empowerment and creative liberation for individuals, and the Internet gave us access to information, they came at a cost.
  • ...7 more annotations...
  • Since centralized power is inherently non-democratic, these monolithic network entities are not inclined to liberate humanity. Therefore utopians better think twice if they are depending on the Net to promulgate democracy and freedom
  • Does social media make any kind of impact in molding opinion? Yes. As with all media types it serves both for good and evil, truth and lies
  • in the belief that cultural and physical realities are the determining factors far more than “friending” a cause. Whether we like it or not, bullets and batons are more potent than bytes. Reality generally trumps virtuality.
  • The efficacy of the network as a tool of activism is best examined in three different contexts: 1. Democratic states 2. Authoritarian states 3. Commercial “states”
  • the social network as it is presently constituted is not a serious tool for substantive social change. It is concentrated, centralized and controlled
  • n the democratic context, it is similarly a way to vent, and perhaps organize, but as of yet not much more. However, if you are selling widgets, the social network looks more promising.
  • Who is Social Media Really Working For?
  •  
    "WHO IS SOCIAL MEDIA REALLY WORKING FOR?" - essay theme
Meta Arcon

Google Glass: what it means for business | Media Network | Guardian Professional - 0 views

  • Google Glass could herald the next phase of mobile computing.
  • One of the most exciting announcements and demos from Google IO 2012 was Project Glass – Google's computerised glasses designed to let wearers use apps, capture images and video, use the internet and social networks on the move
  • Glass has a processor, memory, and a visual display that is positioned above the eye so that one is able to interact with the virtual world without inhibiting the real one. It has a camera, microphone, and speaker to capture and receive information. It has multiple radios for data communication. Glass also has gyroscopes, an accelerometer, and a compass so the device is aware of its context not only to you, but to your location in the physical world as well.
  • ...2 more annotations...
  • But how does knowing a fact faster help us? How can near-instantaneous access to information make a difference?
  • How does a wearable mobile device such as Glass represent a step forward for business? It does so because it provides the ability to interact with relevant data, in real-time and in a collaborative fashion that has never before been possible.
inesmag

How to keep your privacy online | Ask Jack | Technology | guardian.co.uk - 2 views

  • I would like my browsing and Google searches to be private. I don't want targeted advertising and I don't want to feel that anonymous companies are harvesting my clicks to learn all about me.
  • When the web was young, and a lot less shiny, web pages were fixed (static) and – barring browser quirks – everybody saw much the same thing. Today, much of the web is dynamic, which means that what you see has been adapted or possibly constructed on the fly just for you.
  • From your point of view, the advantage is that the websites you visit will be personalised to suit your needs and tastes. From the website's point of view, the advantage is that it can also personalise its prices and advertising to try to suit your needs and tastes, and increase your propensity to click and buy.
  • ...6 more annotations...
  • On the web, the rule is: if you're not paying, then you are what's being sold.
  • Probably the simplest way to reduce personalisation is to use an anonymising service. Instead of accessing the web directly, you access it via a third-party proxy server, so your that requests are mixed in with thousands of others. These services usually allow you to control cookies, turn JavaScript on and off, withhold "referrer details" and so on.
  • Nonetheless, it's often useful to have access to an anonymous proxy service, and everybody should find one they like. Examples include The Cloak, Megaproxy, Proxify and ID Zap. There are also networked open source privacy systems such as Tor and I2P.
  • Google also tracks your progress across hundreds of thousands of websites via Google Analytics. To opt out of this, install the Google Analytics Opt-out Browser Add-on (Beta), which Google offers for Microsoft Internet Explorer, Google Chrome, Mozilla Firefox, Apple Safari and Opera. However, some sites use different analytics software or track visitors in other ways you will be unaware of. Ghostery may help reduce these.
  • Finally, Facebook Connect is a potential privacy problem because it "allows users to 'connect' their Facebook identity, friends and privacy to any site".
  • In general, the more you do online – social networking, cloud computing etc – the more your privacy and security are at risk. Reducing that risk involves effort and inconvenience, so it's up to you to find an acceptable compromise
Anja Vasle

Even Google won't be around for ever, let alone Facebook | Technology | The Observer - 0 views

  • At the moment, the four leading monsters are Apple, Google, Facebook and Amazon. Yet 18 years ago, Apple was weeks away from extinction, Amazon had just launched, Google was still three years away from incorporation and Facebook lay nine years into the future.
  • We understand pretty well the factors that determine the fortunes of companies that make things people buy – which is why, for example, one can predict thatApple won't be able indefinitely to sustain its huge profit margins on its iDevices.
  • This leaves Facebook, a company that has one billion products (called users) and earns its living by selling information about them to advertisers.
  • ...11 more annotations...
  • The two key factors that will determine Facebook's future are the power of network effects and the "stickiness" of its service – ie, the extent to which it can dissuade users from leaving.
  • he key determinants of success or failure were (i) the average number of friends that users have and (ii) whether the difficulty of using the site comes to outweigh the perceived benefits.
  • Facebook users will constitute a captive market and will be correspondingly exploited. And the company will be regulated as a monopoly.
  • How much exploitation will users tolerate before they decide to quit?
  • n fact, it is now so dominant that millions of people around the world think that Facebook is the internet.
  • At one point in the conversation, the Google boys noticed that their collaborator had suddenly gone rather quiet.
  • But the number of commercial companies that are more than a century old is vanishingly small.
  • in the technology world one can go from zero to hero is a very short time
  • Google has a well understood and currently profitable business model and a huge technical infrastructure but ultimately is vulnerable to a well-resourced competitor armed with better search technology.
  • A telephone network with a million subscribers is infinitely more valuable then one with only 10. In technological ecosystems, network effects are very powerful: they explain, for example, how Microsoft came to dominate the market for desktop operating and office systems.
  • If you put your faith in network effects, therefore, Facebook looks like a good investment because it'll be around for the long term.
donnamariee

How Social Networking Has Changed Society | PCWorld - 0 views

  • How Social Networking Has Changed Society
  • Those who are chained to a company desk often use (or sneak onto) Twitter or Facebook to stay in touch with friends outside of work
  • ork and home life are quickly becoming blurred and social networks had better be prepared to keep up
  • ...2 more annotations...
  • social networking tools are just the beginning of something, that they could lead to ways of finding and interacting with one another we never imagined, but whatever happens, you can't dismiss these tools easily. They are taking us somewhere exciting, but we have to work out how we deal with the fading boundaries these tools have left in their wake and that means rewriting our social rules as we go along
  • expand the pool of people we have the opportunity to meet to near limitless possibilities. We're no longer restricted to or rely on people in our neighborhood, church, or workplace to provide the interaction we desire
  •  
    essay theme 3
inesmag

Home Network Vulnerabilities: Spam, Cookies, Pop-Ups, Spyware, and Scams > Spam - 0 views

  • Home Network Vulnerabilities: Spam, Cookies, Pop-Ups, Spyware, and Scams
  • Spam is the common name for unsolicited e-mail and it is a problem that is rampant on the Internet today.
  • Spammers do their dirty work by purchasing or creating giant e-mail lists and automated mailing tools called spambots. The lists are usually compiled from web pages where people provide their e-mail address as part of a registration process.
  • ...2 more annotations...
  • How to Block Spam There is a good chance that your ISP has some sort of spam-blocking feature available and, if spam is a problem for you, we suggest starting there.
  • replying to a spam e-mail does not stop it from coming
inesmag

Prevent Wi-Fi Eavesdroppers from Hijacking Your Accounts > Password Sniffing and Accoun... - 0 views

  • Prevent Wi-Fi Eavesdroppers from Hijacking Your Accounts
  • Password sniffing and account hijacking have become more prevalent in recent years because of Wi-Fi and software that make these hacking techniques so easy
  • Both of the methods we're discussing require the eavesdropper to be connected to the same network as you.
  • ...1 more annotation...
  • These hacking techniques can still be used by other users on private networks using the Personal/Pre-Shared Key (PSK) mode of WPA/WPA2 encryption or the older WEP encryption. However, they can't be used on networks using the Enterprise/EAP mode of WPA/WPA2 encryption, which is usually used only by businesses and requires a separate 802.1X server.
Jan Majdič

China to Web Users: Great Firewall? Just Be Glad We're Not North Korea - David Caraglia... - 1 views

  • Last week, Google Executive Chairman Eric Schmidt urged North Korean leaders to embrace the Internet. Only a small proportion of that country's 24 million people can access the World Wide Web, and the majority of the 1.5 million mobile phones there belong to political and military elites.
  • Meanwhile, in China, a country that has embraced the Internet to a much greater extent, the big story was about censorship, both online and off.
  • For Chinese social media users, the irony here was too perfect to go unnoticed
  • ...5 more annotations...
  • A number of social networking and sharing websites are blocked in China, including Facebook, Twitter, Youtube, Wikipedia, and certain Google applications
  • "China's progress must be viewed in the context of its unique historical and cultural circumstances.
  • Web users engage with and identify as part of a broader, sometimes international, online community
  • Chinese public preferences are shifting from broadcast media to networked media; with that shift, the expectation for public participation is growing.
  • Knowing well the impact and viral nature of social networking, editors loyal to propaganda authorities took control of the newspaper's microblogging account not long after the scandal broke.
Neža Zidanič

Warning over social networking 'snooping' technology - Telegraph - 0 views

  • New stalking software capable of tracking people’s movements and predicting future behaviour using data from social networking websites has been developed, it emerged today.
  • The sophisticated technology relies on websites such as Facebook and Twitter to build a detailed picture of people’s lives in a move that could raise concerns over breach of privacy and civil liberties.
  • t was claimed that the technology could be transformed into a "Google for spies" and used by governments as a means of monitoring and controlling people online.
  • ...1 more annotation...
  • Users may be posting information that they believe will be viewed only by their friends, but instead, it is being viewed by government officials or pulled in by data collection services like the Riot search."
1 - 20 of 84 Next › Last »
Showing 20 items per page