Skip to main content

Home/ Internetni praktikum/ Group items tagged other

Rss Feed Group items tagged

Janja Petek

Forty years of the internet: how the world changed for ever | Technology | The Guardian - 1 views

  • In October 1969, a student typed 'LO' on a computer - and the internet was born
  • Towards the end of the summer of 1969
  • a large grey metal box was delivered to the office of Leonard Kleinrock, a professor at the University of California in Los Angeles.
  • ...32 more annotations...
  • At 10.30pm, as Kleinrock's fellow professors and students crowded around, a computer was connected to the IMP, which made contact with a second IMP, attached to a second computer, several hundred miles away at the Stanford Research Institute, and an undergraduate named Charley Kline tapped out a message.
  • It's impossible to say for certain when the internet began, mainly because nobody can agree on what, precisely, the internet is.
  • It's interesting to compare how much has changed in computing and the internet since 1969 with, say, how much has changed in world politics.
  • On the other hand, the breakthrough accomplished that night in 1969 was a decidedly down-to-earth one
  • Twelve years after Charley Kline's first message on the Arpanet, as it was then known, there were still only 213 computers on the network; but 14 years after that, 16 million people were online, and email was beginning to change the world; the first really usable web browser wasn't launched until 1993, but by 1995 we had Amazon, by 1998 Google, and by 2001, Wikipedia, at which point there were 513 million people online. Today the figure is more like 1.7 billion.
  • on New Year's Day 1994 – only yesterday, in other words – there were an estimated 623 websites.
  • On the one hand, they were there because of the Russian Sputnik satellite launch, in 1957, which panicked the American defence establishment, prompting Eisenhower to channel millions of dollars into scientific research, and establishing Arpa, the Advanced Research Projects Agency, to try to win the arms technology race. The idea was "that we would not get surprised again,"
  • "In a few years, men will be able to communicate more effectively through a machine than face to face," they declared.
  • The few outsiders who knew of the box's existence couldn't even get its name right: it was an IMP, or "interface message processor"
  • It was already possible to link computers by telephone lines, but it was glacially slow, and every computer in the network had to be connected, by a dedicated line, to every other computer, which meant you couldn't connect more than a handful of machines without everything becoming monstrously complex and costly.
  • The solution, called "packet switching" – which owed its existence to the work of a British physicist, Donald Davies – involved breaking data down into blocks that could be routed around any part of the network that happened to be free, before getting reassembled at the other end.
  • Still, Kleinrock recalls a tangible sense of excitement that night as Kline sat down at the SDS Sigma 7 computer, connected to the IMP, and at the same time made telephone contact with his opposite number at Stanford. As his colleagues watched, he typed the letter L, to begin the word LOGIN.
  • One of the most intriguing things about the growth of the internet is this: to a select group of technological thinkers, the surprise wasn't how quickly it spread across the world, remaking business, culture and politics – but that it took so long to get off the ground.
  • In 1945, the American presidential science adviser, Vannevar Bush, was already imagining the "memex", a device in which "an individual stores all his books, records, and communications", which would be linked to each other by "a mesh of associative trails", like weblinks.
  • And in 1946, an astonishingly complete vision of the future appeared in the magazine Astounding Science Fiction. In a story entitled A Logic Named Joe, the author Murray Leinster envisioned a world in which every home was equipped with a tabletop box that he called a "logic":
  • Instead of smothering their research in the utmost secrecy – as you might expect of a cold war project aimed at winning a technological battle against Moscow – they made public every step of their thinking, in documents known as Requests For Comments.
  • Deliberately or not, they helped encourage a vibrant culture of hobbyists on the fringes of academia – students and rank amateurs who built their own electronic bulletin-board systems and eventually FidoNet, a network to connect them to each other.
  • n argument can be made that these unofficial tinkerings did as much to create the public internet as did the Arpanet. Well into the 90s, by the time the Arpanet had been replaced by NSFNet, a larger government-funded network,
  • It was the hobbyists, making unofficial connections into the main system, who first opened the internet up to allcomers.
  • This was the software known as TCP/IP, which made it possible for networks to connect to other networks, creating a "network of networks", capable of expanding virtually infinitely
  • Nevertheless, by July 1992, an Essex-born businessman named Cliff Stanford had opened Demon Internet, Britain's first commercial internet service provider.
  • After a year or so, Demon had between 2,000 and 3,000 users,
  • the @ symbol was introduced in 1971, and the first message, according to the programmer who sent it, Ray Tomlinson, was "something like QWERTYUIOP".
  • A couple of years later I got my first mobile phone, which came with two batteries: a very large one, for normal use, and an extremely large one, for those occasions on which you might actually want a few hours of power
  • For most of us, though, the web is in effect synonymous with the internet, even if we grasp that in technical terms that's inaccurate: the web is simply a system that sits on top of the internet, making it greatly easier to navigate the information there, and to use it as a medium of sharing and communication.
  • The first ever website was his own, at CERN: info.cern.ch.
  • The idea that a network of computers might enable a specific new way of thinking about information, instead of just allowing people to access the data on each other's terminals, had been around for as long as the idea of the network itself: it's there in Vannevar Bush's memex, and Murray Leinster's logics.
  • Web browsers crossed the border into mainstream use far more rapidly than had been the case with the internet itself: Mosaic launched in 1993 and Netscape followed soon after, though it was an embarrassingly long time before Microsoft realised the commercial necessity of getting involved at all. Amazon and eBay were online by 1995. And in 1998 came Google, offering a powerful new way to search the proliferating mass of information on the web.
  • Google, and others, saw that the key to the web's future would be helping users exclude almost everything on any given topic, restricting search results to the most relevant pages.
  • It is absurd – though also unavoidable here – to compact the whole of what happened from then onwards into a few sentences: the dotcom boom, the historically unprecedented dotcom bust, the growing "digital divide", and then the hugely significant flourishing, over the last seven years, of what became known as Web 2.0.
  • The most confounding thing of all is that in a few years' time, all this stupendous change will probably seem like not very much change at all.
  • Will you remember when the web was something you accessed primarily via a computer? Will you remember when there were places you couldn't get a wireless connection? Will you remember when "being on the web" was still a distinct concept, something that described only a part of your life, instead of permeating all of it? Will you remember Google?
Anja Pirc

Online privacy: Difference Engine: Nobbling the internet | The Economist - 0 views

  • TWO measures affecting the privacy internet users can expect in years ahead are currently under discussion on opposite sides of the globe. The first hails from a Senate committee’s determination to make America’s online privacy laws even more robust. The second concerns efforts by the International Telecommunications Union (ITU), an intergovernmental body under the auspices of the United Nations, to rewrite its treaty for regulating telecommunications around the world, which dates from 1988, so as to bring the internet into its fief.
  • The congressional measure, approved overwhelmingly by the Senate Judiciary Committee on November 29th, would require criminal investigators to obtain a search warrant from a judge before being able to coerce internet service providers (ISPs) to hand over a person’s e-mail. The measure would also extend this protection to the rest of a person’s online content, including videos, photographs and documents stored in the "cloud"—ie, on servers operated by ISPs, social-network sites and other online provider
  • a warrant is needed only for unread e-mail less than six months old. If it has already been opened, or is more than six months old, all that law-enforcement officials need is a subpoena. In America, a subpoena does not need court approval and can be issued by a prosecutor. Similarly, a subpoena is sufficient to force ISPs to hand over their routing data, which can then be used to identify a sender’s various e-mails and to whom they were sent. That is how the FBI stumbled on a sex scandal involving David Petraeus, the now-ex director of the CIA, and his biographer.
  • ...7 more annotations...
  • No-one imagined that ISPs would one day offer gigabytes of online storage free—as Google, Yahoo!, Hotmail and other e-mail providers do today. The assumption back then was that if someone had not bothered to download and delete online messages within six months, such messages could reasonably be considered to be abandoned—and therefore not in need of strict protection.
  • wholesale access to the internet, powerful mobile phones and ubiquitous social networking have dramatically increased the amount of private data kept online. In the process, traditional thinking about online security has been rendered obsolete. For instance, more and more people nowadays keep their e-mail messages on third-party servers elsewhere, rather than on their own hard-drives or mobile phones. Many put their personal details, contacts, photographs, locations, likes, dislikes and inner thoughts on Google, Facebook, Twitter, Flickr, Dropbox and a host of other destinations. Bringing online privacy requirements into an age of cloud computing is only fit and proper, and long overdue.
  • the international telecoms treaty that emerged focused on how telephone traffic flows across borders, the rules governing the quality of service and the means operators could adopt to bill one another for facilitating international calls. As such, the regulations applied strictly to telecoms providers, the majority of which were state owned.
  • he goal of certain factions is to grant governments the authority to charge content providers like Amazon, Google, Facebook and Twitter for allowing their data to flow over national borders. If enacted, such proposals would most certainly deter investment in network infrastructure, raise costs for consumers, and hinder online access for precisely those people the ITU claims it wants to help.
  • a proposal sponsored by the United States and Canada to restrict the debate in Dubai strictly t
  • o conventional telecoms has met with a modicum of success, despite stiff opposition from Russia plus some African and Middle-Eastern countries. Behind closed doors, the conference has agreed not to alter the ITU’s current definition of “telecommunications” and to leave the introductory text concerning the existing treaty’s scope intact.
  • The sticking point has been what kind of organisations the treaty should apply to. Here, one word can make a huge difference. In ITU jargon, the current treaty relates only to “recognised operating agencies”—in other words, conventional telecoms operators. The ITU wants to change that to simply “operating agencies”. Were that to happen, not only would Google, Facebook and other website operators fall under the ITU’s jurisdiction, but so too would all government and business networks. It seems the stakes really are as high as the ITU’s critics have long maintained
mancamikulic

Google Glass: is it a threat to our privacy? | Technology | The Guardian - 1 views

  • glasses that can shoot video, take pictures, and broadcast what you're seeing to the world
  • They weren't due to get them until last Friday
  • Google Glass is the most hotly anticipated new arrival in "wearable computing"
  • ...46 more annotations...
  • from "mainframe" computers
  • Google's idea is that you need only speak to operate it
  • "OK, Glass, take video!"
  • The only other way to get that point of view is to strap a camera to your head.
  • And yet people are already beginning to fret about the social implications of Glass
  • the question of privacy
  • how will we behave in groups
  • David Yee, the chief technology officer at a company called Editorially
  • Yee's worry was that the young person might be filming everything
  • Joshua Topolsky
  • have tried out Google Glass
  • This is the company that has repeatedly breached the boundaries of what we think is "private".
  • forgetting that sometimes deadly enemies have mutual friends
  • use of personal data without an individual's clear consent.
  • So how comfortable – or uneasy – should we feel about the possibility that what we're doing in a public or semi-public place (or even somewhere private) might get slurped up and assimilated by Google?
  • Oliver Stokes
  • ou could inadvertently become part of somebody else's data collection – that could be quite alarming
  • Now it's going to be able to compute what it is you're looking at.
  • Song Chaoming
  • nalysing mobile phone records
  • how your smartphone is able to show where you are on an onscreen map
  • Social media
  • Where the five million are the wearers of Glass – and the one monitor is Google
  • Google probably knows what you're going to do before you do.
  • Twitter
  • we're more used to the snatched photo or video that tells a story
  • Google doesn't want to discuss these issues.
  • this is a live issue,
  • One of the reasons they're doing Explorers is to get feedback on these things
  • how will we behave with each other?
  • hows data such as your speed, altitude, and even ski-resort maps
  • Concentrating on what was in front of me wasn't hard
  • they do it without letting others realise you are doing anything
  • we get too deeply involved with our technology
  • she pointed out how smartphones change us:
  • Topolsky
  • It brought something new into view
  • the more I used Glass the more it made sense to me; the more I wanted it."
  • how text messages or phone calls would just appear as alerts
  • Glass makes you feel more powerful
  • Hurst
  • is likely to be annoying
  • here's where the problems really start – you don't know if they're taking a video of you.
  • body language change
  • model seems to require voice control
  • how much are we going to share with others
Jernej Prodnik

Why I'm quitting Facebook - CNN.com - 0 views

  • Why I'm quitting Facebook By Douglas Rushkoff, CNN February 25, 2013 -- Updated 1502 GMT (2302 HKT)
  • (CNN) -- I used to be able to justify using Facebook as a cost of doing business. As a writer and sometime activist who needs to promote my books and articles and occasionally rally people to one cause or another, I found Facebook fast and convenient. Though I never really used it to socialize, I figured it was OK to let other people do that, and I benefited from their behavior. I can no longer justify this arrangement.
  • Today, I am surrendering my Facebook account, because my participation on the site is simply too inconsistent with the values I espouse in my work. In my upcoming book "Present Shock," I chronicle some of what happens when we can no longer manage our many online presences. I have always argued for engaging with technology as conscious human beings and dispensing with technologies that take that agency away.
  • ...3 more annotations...
  • Facebook is just such a technology. It does things on our behalf when we're not even there. It actively misrepresents us to our friends, and worse misrepresents those who have befriended us to still others. To enable this dysfunctional situation -- I call it "digiphrenia" -- would be at the very least hypocritical. But to participate on Facebook as an author, in a way specifically intended to draw out the "likes" and resulting vulnerability of others, is untenable.
  • Douglas Rushkoff Facebook has never been merely a social platform. Rather, it exploits our social interactions the way a Tupperware party does. Facebook does not exist to help us make friends, but to turn our network of connections, brand preferences and activities over time -- our "social graphs" -- into money for others.
  • We Facebook users have been building a treasure lode of big data that government and corporate researchers have been mining to predict and influence what we buy and for whom we vote. We have been handing over to them vast quantities of information about ourselves and our friends, loved ones and acquaintances. With this information, Facebook and the "big data" research firms purchasing their data predict still more things about us -- from our future product purchases or sexual orientation to our likelihood for civil disobedience or even terrorism.
Jernej Prodnik

Amazon unpacked - FT.com - 0 views

  • February 8, 2013 12:30 pm Amazon unpacked By Sarah O’Connor The online giant is creating thousands of UK jobs, so why are some employees less than happy?
  • Between a sooty power station and a brown canal on the edge of a small English town, there is a building that seems as if it should be somewhere else. An enormous long blue box, it looks like a smear of summer sky on the damp industrial landscape. Inside, hundreds of people in orange vests are pushing trolleys around a space the size of nine football pitches, glancing down at the screens of their handheld satnav computers for directions on where to walk next and what to pick up when they get there. They do not dawdle – the devices in their hands are also measuring their productivity in real time. They might each walk between seven and 15 miles today. It is almost Christmas and the people working in this building, together with those in seven others like it across the country, are dispatching a truck filled with parcels every three minutes or so. Before they can go home at the end of their eight-hour shift, or go to the canteen for their 30-minute break, they must walk through a set of airport-style security scanners to prove they are not stealing anything. They also walk past a life-sized cardboard image of a cheery blonde woman in an orange vest. “This is the best job I have ever had!” says a speech bubble near her head.
  • If you could slice the world in half right here, you could read the history of this town called Rugeley in the layers. Below the ground are the shafts and tunnels of the coal mine that fed the power station and was once the local economy’s beating heart. Above the ground are the trolleys and computers of Amazon, the global online retailer that has taken its place. As online shopping explodes in Britain, helping to push traditional retailers such as HMV out of business, more and more jobs are moving from high-street shops into warehouses like this one. Under pressure from politicians and the public over its tax arrangements, Amazon has tried to stress how many jobs it is creating across the country at a time of economic malaise. The undisputed behemoth of the online retail world has invested more than £1bn in its UK operations and announced last year that it would open another three warehouses over the next two years and create 2,000 more permanent jobs. Amazon even had a quote from David Cameron, the prime minister, in its September press release. “This is great news, not only for those individuals who will find work, but for the UK economy,” he said.
  • ...10 more annotations...
  • Workers in Amazon’s warehouses – or “associates in Amazon’s fulfilment centres” as the company would put it – are divided into four main groups. There are the people on the “receive lines” and the “pack lines”: they either unpack, check and scan every product arriving from around the world, or they pack up customers’ orders at the other end of the process. Another group stows away suppliers’ products somewhere in the warehouse. They put things wherever there’s a free space – in Rugeley, there are inflatable palm trees next to milk frothers and protein powder next to kettles. Only Amazon’s vast computer brain knows where everything is, because the workers use their handheld computers to scan both the item they are stowing away and a barcode on the spot on the shelf where they put it. The last group, the “pickers”, push trolleys around and pick out customers’ orders from the aisles. Amazon’s software calculates the most efficient walking route to collect all the items to fill a trolley, and then simply directs the worker from one shelf space to the next via instructions on the screen of the handheld satnav device. Even with these efficient routes, there’s a lot of walking. One of the new Rugeley “pickers” lost almost half a stone in his first three shifts. “You’re sort of like a robot, but in human form,” said the Amazon manager. “It’s human automation, if you like.” Amazon recently bought a robot company, but says it still expects to keep plenty of humans around because they are so much better at coping with the vast array of differently shaped products the company sells.
  • The unassuming efficiency of these warehouses is what enables Amazon to put parcels on customers’ doorsteps so quickly, even when it is receiving 35 orders a second. Every warehouse has its own “continuous improvement manager” who uses “kaizen” techniques pioneered by Japanese car company Toyota to improve prod­uctivity. Marc Onetto, the senior vice-president of worldwide operations, told a business school class at the University of Virginia a few years ago: “We use a bunch of Japanese guys, they are not consultants, they are insultants, they are really not nice … They’re samurais, the real last samurais, the guys from the Toyota plants.” In Rugeley, the person with the kaizen job is a friendly, bald man called Matt Pedersen, who has a “black belt” in “Six Sigma”, the Motorola-developed method of operational improvement, most famously embraced by Jack Welch at General Electric. Every day, the managers in Rugeley take a “genba walk”, which roughly means “go to the place” in Japanese, Pedersen says as he accompanies the FT on a tour of the warehouse. “We go to the associates and find out what’s stopping them from performing today, how we can make their day better.” Some people also patrol the warehouse pushing tall little desks on wheels with laptops on them – they are “mobile problem solvers” looking for any hitches that could be slowing down the operation.
  • . . . What did the people of Rugeley make of all this? For many, it has been a culture shock. “The feedback we’re getting is it’s like being in a slave camp,” said Brian Garner, the dapper chairman of the Lea Hall Miners Welfare Centre and Social Club, still a popular drinking spot. One of the first complaints to spread through the town was that employees were getting blisters from the safety boots some were given to wear, which workers said were either too cheap or the wrong sizes. One former shop-floor manager, who did not want to be named, said he always told new workers to smear their bare feet with Vaseline. “Then put your socks on and your boots on, because I know for a fact these boots are going to rub and cause blisters and sores.” ©Ben RobertsAmazon workers in Rugeley process ordersOthers found the pressure intense. Several former workers said the handheld computers, which look like clunky scientific calculators with handles and big screens, gave them a real-time indication of whether they were running behind or ahead of their target and by how much. Managers could also send text messages to these devices to tell workers to speed up, they said. “People were constantly warned about talking to one another by the management, who were keen to eliminate any form of time-wasting,” one former worker added.
  • Watson said Amazon was supposed to send the council employment data every six months, but it had not done so. “We had no idea Amazon were going to be as indifferent to these issues as they have been, it’s come as a shock to us how intransigent they are,” he said. Inside the warehouse, Amazon employees wear blue badges and the workers supplied by the agencies wear green badges. In the most basic roles they perform the same tasks as each other for the same pay of £6.20 an hour or so (the minimum adult wage is £6.19), but the Amazon workers also receive a pension and shares. A former agency worker said the prospect of winning a blue badge, “like a carrot, was dangled constantly in front of us by management in return for meeting shift targets”. Amazon’s Darwinian culture comes from the top. Jeff Bezos, its chief executive, told Forbes magazine last year (when it named him “number one CEO in America”): “Our culture is friendly and intense, but if push comes to shove, we’ll settle for intense.”
  • Ransdtad said it supplied a number of clients with “onsite-flexible workforce solutions”. It added: “The number of workers required by these clients fluctuates in response to supply and demand. When demand for clients’ products or services is high (for example during the Christmas period) the Randstad partnership allows local people to benefit from short-term work on a temporary contract, to help supplement our clients’ permanent workforce and deliver against order requirements.” Certainly, not everyone in Rugeley is upset about Amazon. A group of workers having a pint on a picnic table outside The Colliers pub near the warehouse gates said they liked their jobs, albeit as their managers hovered nervously in the background. One young agency worker said he was earning about £220 a week, compared with the £54 he had been receiving in jobless benefits. He had bought a car and moved out of his mum’s house and into a rented flat with his girlfriend, who he had met at work. “I’m doing pretty well for myself,” he said with a shy grin. “There’s always opportunities to improve yourself there.” Across the table, an older man, wagging two fingers with a cigarette pinched between them, said slowly: “It gives you your pride back, that’s what it gives you. Your pride back.” Many in the town, however, have mixed feelings. They are grateful for the jobs Amazon has created but they are also sad and angry about the quality of them. Timothy Jones, a barrister and parish councillor, summed up the mood. “I very much want them to stay, but equally I would like some of the worst employment practices to end.”
  • For Watson, the big question is whether these new jobs can support sustainable economic growth. In Rugeley, it is hard not to look back to the coal mine for an example of how one big employer could transform a place. . . . The Lea Hall Colliery opened officially on a soggy Tuesday in July 1960. Miners and their families huddled under marquees to eat their packed lunches and when the first coal was wound to the surface, three bands played an overture specially written for the occasion. It was the first mine planned and sunk by the Coal Board, the body set up after the second world war to run Britain’s newly nationalised coal industry, and the Central Electricity Generating Board was building a coal-fired power station right next door. It was a defiant demonstration of confidence in coal at a time of increasing competition from oil. “King Coal is not yet dead, as many would have it, but is going to be with us for many years to come,” the regional secretary of the National Union of Mineworkers told the crowd.
  • Soon, miners from all over the country were swarming to the modern new mine. The Coal Board and the local council built housing estates and schools to cope with the exploding population. “Peartree estate was built for the Geordies, the Springfield estate was built for the Scots and the Welsh,” remembered Brian Garner, who helped to build the mine when he was 16. “It was unbelievable, it was buzzing in the town, there was that much money about then. I could leave my job at 10 o’clock in the morning and start at five past 10 on another.” On Friday and Saturday nights, the queue outside the Lea Hall Miners’ Welfare Centre and Social Club would wrap right around the building. Rugeley’s mine was soon the most productive in the country. It was a “young man’s pit” with all the latest machines and techniques, says Ken Edwards, who started there at 25 as an electrician. The work was still dirty and dangerous, though. In 1972, a local reporter took a tour. “All is silent except for the movement of conveyor belts which carry the coal and the murmur of the air pumps. The blackness is relieved only by narrow shafts of light coming from each person’s headlamp,” she wrote. It took her two days to remove the black dust from her nails, ears, nose and hair.
  • The good times didn’t last. By the time the pit closed, four days before Christmas in 1990, a spokesman for British Coal told Reuters it was losing £300,000 a week. More than 800 people lost jobs that paid the equivalent of between £380 and £900 a week in today’s money. The town council’s chairman tried desperately to say something reassuring. “It has come as such a shock,” he told the local paper. “[But] we have got to do what many have done and look for new areas, particularly information technology and high technology. We have a lot of expertise and a wonderful geographical spot. There’s no reason why it should be the end for Rugeley.” From behind her desk in Vision estate agents, all purple paint and fairy lights, Dawn Goodwin sucks the air in through her teeth at the mention of Amazon. “We all thought it was going to be the making of the town,” she says. She expected an influx of people, including well-to-do managers, looking to buy or rent houses. But she hasn’t had any extra business at all. People are cautious because they don’t know how long their agency jobs with Amazon will last, she says. One of her tenants, a single young woman, got a job there but lost it again after she became ill halfway through a shift. She struggled to pay her rent for three months while she waited for her jobseeker’s benefits to be reinstated. “It’s leaving a bad taste in everyone’s mouths,” Goodwin says with a frown. Even the little “Unit 9” café next to the Amazon warehouse hasn’t had a boost in trade. The women who run it reckon the employees don’t have enough time in their 30-minute break to get through security, come and eat something, and then go back in again.
  • In a cramped upstairs office at the Citizens Advice Bureau, Gillian Astbury and Angela Jones have turned to statistics to try to identify Amazon’s effect on the area. They haven’t had an increase in the number of people asking about employment problems or unfair dismissal, but nor has there been any improvement in the community’s problems with debt and homelessness. Their best guess is that people haven’t had enough sustained work to make much of a difference. Astbury says employment agencies are a “necessary evil”, but stresses it is hardly ideal for people to be bouncing in and out of temporary work, particularly when a job ends abruptly and they are left with no income at all until their benefits are reinstated. Workers leaving Amazon have had a particular problem with this, prompting the parish council to submit a Freedom of Information request to the Department for Work and Pensions to find out exactly how long local people are being made to wait for their social security payments to come through.
  • Far from the CAB’s little office in Rugeley, Britain’s economists are also puzzling over why the economy remains moribund even though more and more people are in work. There are still about half a million fewer people working as full-time employees than there were before the 2008 crash, but the number of people in some sort of employment has surpassed the previous peak. Economists think the rise in insecure temporary, self-employed and part-time work, while a testament to the British labour market’s flexibility, helps to explain why economic growth remains elusive. Angi Cooney, who runs C Residential, the biggest estate agent in Rugeley, thinks the nature of employment is changing permanently and people should stop pining for the past. It’s “bloody great” that a company like Amazon chose to come to “this little old place”, she says fiercely, looking as if she’d like to take the town by the shoulders and give it a shake. “People expect a job for life, but the world isn’t like that any more, is it?” Sarah O’Connor is the FT’s economics correspondent
manca_

Apollo Plus: Microsoft's next Windows Phone update to include Wi-Fi, audio, and other f... - 0 views

  • bring new features to Windows
  • // 33inShare Microsoft is currently preparing an update for Windows Phone 8, codenamed Apollo Plus.
  • A Wi-Fi connection fix is also planned to let connections always remain on, alongside some audio improvements. Apollo Plus will also test Microsoft's ability to deliver Windows Phone 8 updates over-the-air, a change from the previous OS that required users to plug devices into PCs to get similar updates.
Kaja Horvat

Stolen identities: Manti Te'o, Facebook, and internet privacy - Opinion - Al Jazeera En... - 0 views

  • Indeed, most users of Facebook (or Google+, or countless other social networking sites) seem unaware of just how much they are sharing.
  • it is ultimately the responsibility of the user to understand his or her settings and know what, precisely, is being shared.
  • users must educate themselves about the privacy policies and tools available to them on Facebook or any other given site. Using available tools, users can reasonably protect their content from the public view.
  • ...3 more annotations...
  • Still, the best rule of thumb for individuals concerned about their photographs or other content reaching the public view is to not post them on the internet at all. While this may sound extreme, remember that it only takes one "bad apple" to share your content with those to whom you have not given permission.
  • personal Facebook photos stolen to create high-profile fictional characters
  • you have privacy settings on Facebook and obviously it doesn't work because anyone can hijack your picture
Jernej Prodnik

Aaron Swartz files reveal how FBI tracked internet activist | Technology | guardian.co.uk - 0 views

  • Aaron Swartz files reveal how FBI tracked internet activist Firedoglake blogger Daniel Wright publishes once-classified FBI documents that show extent of agency's investigation into Swartz
  • Amanda Holpuch guardian.co.uk, Tuesday 19 February 2013 22.42 GMT
  • A blogger has published once-classified FBI files that show how the agency tracked and collected information on internet activist Aaron Swartz. Swartz, who killed himself in January aged 26, had previously requested his files and posted them on his blog, but some new documents and redactions are included in the files published by Firedoglake blogger Daniel Wright.Wright was given 21 of 23 declassified documents, thanks to a rule that declassifies FBI files on the deceased. Wright said that he was told the other two pages of documents were not provided because of freedom of information subsections concerning privacy, "sources and methods," and that can "put someone's life in danger."
  • ...3 more annotations...
  • The FBI's files concern Swartz's involvement in accessing the Public Access to Court Electronic Records (Pacer) documents. In pursuit of their investigation, the FBI had collected his personal information and was surveilling an Illinois address where he had his IP address registered. Aaron H. Swartz FBI File by Daniel Wright
  • One page reads: "Washington Field Office requests that the North RA attempt to locate Aaron Swartz, his vehicles, drivers license information and picture, and others. Since Swartz is the potential subject of an ongoing investigation, it is requested that Swartz not be approached by agents." The FBI also collected information from his social networking profiles, including Facebook and Linkedin. The latter proved to be a catalog of his many notable accomplishments, which include being a co-founder of Reddit, a founder of a website to improve the government, watchdog.net and as metadata adviser at Creative Commons.
  • Information from a New York Times article about his Pacer hack was also included in the files, though strangely, since the article can still be read online, the name of the article's other subject, Carl Malamud, was blocked out.Hacking collective Anonymous released a State Department database Monday in memory of Swartz. The files included employees' personal information such as addresses, phone number and emails.
sergeja perklič

Who owns the content you upload online? | Money | guardian.co.uk - 0 views

  • The outrage over Instagram's announcement that it is changing its terms and conditions has turned the spotlight on the relationship between websites and users who upload content, whether it is photos, video, blogs or even games.
  • A survey of UK consumers suggested just 7% read online terms and conditions before they signed up for products and services, and other research has put it even lower.
  • Twitter: You retain your rights to any content you post on Twitter, but you grant the website a worldwide, non-exclusive, royalty-free licence (with the right to sublicense) "to use, copy, reproduce, process, adapt, modify, publish, transmit, display and distribute" your content.
  • ...1 more annotation...
  • However, when you use Facebook you give it the right to use information "in connection with the services and features we provide to you and other users like your friends, our partners, the advertisers that purchase ads on the site, and the developers that build the games, applications, and websites you use".
Gabrijela Vrbnjak

BBC News - Web code weakness allows data dump on PCs - 0 views

  • The loophole exploits a feature of HTML 5 which defines how websites are made and what they can do.
  • Developer Feross Aboukhadijeh found the bug and set up a demo page that fills visitors' hard drives with pictures of cartoon cats. In one demo, Mr Aboukhadijeh managed to dump one gigabyte of data every 16 seconds onto a vulnerable Macbook. Clever code Most major browsers, Chrome, Internet Explorer, Opera and Safari, were found to be vulnerable to the bug, said Mr Aboukhadijeh. While most websites are currently built using version 4 of the Hyper Text Markup Language (HTML), that code is gradually being superseded by the newer version 5. One big change brought in with HTML 5 lets websites store more data locally on visitors' PCs. Safeguards built into the "local storage" specification should limit how much data can be stored. Different browsers allow different limits but all allow at least 2.5 megabytes to be stored. However, Mr Aboukhadijeh found a way round this cap by creating lots of temporary websites linked to the one a person actually visited. He found that each one of these associated sites was allowed to store up to the limit of data because browser makers had not written code to stop this happening. By endlessly creating new, linked websites the bug can be used to siphon huge amounts of data onto target PCs. Only Mozilla's Firefox capped storage at 5MB and was not vulnerable, he found. "Cleverly coded websites have effectively unlimited storage space on visitor's computers," wrote Mr Aboukhadijeh in a blogpost about the bug. Code to exploit the bug has been released by Mr Aboukhadijeh and he set up a website, called Filldisk that, on vulnerable PCs, dumps lots of images of cats on to the hard drive. So far, no malicious use of the exploits has been observed. In a bid to solve the problem, bug reports about the exploit have been filed with major browser makers. More on This Story .related-links-list li { position: relative; } .related-links-list .gvl3-icon { position: absolute; top: 0; left: 0; } Related Stories Firefox smartphone partners revealed 24 FEBRUARY 2013, TECHNOLOGY Flash Player exits Android store 15 AUGUST 2012, TECHNOLOGY HTML 5 target for cybercriminals 02 DECEMBER 2011, TECHNOLOGY $render("page-see-also","ID"); $render("page-newstracker","ID"); Related Internet links Feross Aboukhadijeh The BBC is not responsible for the content of external Internet sites $render("page-related-items","ID"); Share this pageShare this page1.4KShareFacebookTwitter Email Print In association with $render("advert","advert-sponsor-module","page-bookmark-links"); $render("advert-post-script-load"); $render("advert-post-script-load"); More Technology stories RSS Computer glitch hits Mars rover Nasa's Curiosity Mars rover is put into "safe mode" after a computer glitch caused by corrupted files. US plans small-ship drone launches Hackers breach Evernote security $render("advert","advert-mpu-high"); $render("advert-post-script-load"); Top Stories http://news.bbcimg.co.uk/media/images/6618
  • found the bug and set up a demo page that fills visitors' hard drives with pictures of cartoon cats.
  • ...6 more annotations...
  • because browser makers had not written code to stop this happening. By endlessly creating new, linked websites the bug can be used to siphon huge amounts of data onto target PCs.
  • found a way round this cap by creating lots of temporary websites linked to the one a person actually visited
  • Most major browsers, Chrome, Internet Explorer, Opera and Safari, were found to be vulnerable to the bug
  • was not vulnerable
  • Mozilla's Firefox
  • bug reports about the exploit have been filed with major browser makers.
mancamikulic

Why We All Have 'Internet-Addiction Genes' - Robert Wright - The Atlantic - 0 views

  • : A gene that seems to be (very modestly) correlated with internet addiction also plays a role in nicotine addiction.
  • A gene that seems to be (very modestly) correlated with internet addiction also plays a role in nicotine addiction.
  • internet addiction is not a figment of our imagination
  • ...16 more annotations...
  • Whether heavy internet use deserves to be called an addiction or just a hard-to-break habit is a question about a behavior pattern and its attendant psychological states.
  • To answer it we ask such things as how strong the cravings for the internet are, what lengths a person will go to in order to satisfy them, and so on.
  • Human beings are biochemical machines "designed" by natural selection to, among other things, form habits.
  • The habit-forming machinery involves the release of reward chemicals, such as dopamine, that make us feel good upon attaining these goals
  • In the modern world, there are shortcuts to getting these rewards
  • And there's some evidence (though here I'm approaching the limits of my comprehension of the science) that people with a particular variant of a gene involved in building acetylcholine receptors are more susceptible to nicotine addiction than other people
  • the main point is this: the biochemical mechanisms (including genes) involved in chemical addictions will naturally be the mechanisms involved in habit formation more generally since habit formation is what they were originally designed for.
  • whether it's a habit or an addiction, it is going to involve pleasure-dispensing biochemical mechanisms of the sort that can get us addicted to such chemicals as nicotine and cocaine
  • After all, the internet, like these chemicals, allows us to trigger our neuronal reward mechanisms with much less work,
  • it wasn't possible, in a very small and technologically primitive social universe, to at any time of day launch an observation or joke
  • the internet, like a pack of cigarettes or lots of cocaine, lets you just sit in a room and repeatedly trigger reward chemicals that
  • And all of us have lots and lots of these genes--genes that make us susceptible to internet addiction.
  • some of these genes may vary from person to person in ways that make some people particularly susceptible to internet addiction
  • In fact, there will turn out to be so many genes which are so modestly correlated with internet addiction
  • that if journalists write stories every time such a gene is found, or is thought to have been found, they will find that they're not shedding much actual light on the situation.
  • These genes are really just genes for being human.
Rebeka Aščerič

BBC News - Children 'must know web limits' says Wales commissioner - 0 views

  • Adults must impose the necessary checks and balances to keep children safe online, says the children's commissioner for Wales.
  • "All children and young people don't seem much of a distinction between their online and offline lives,"
  • Mr Towler told BBC Radio Wales. "It's all just one thing and they get really excited by the opportunities the internet affords and sometimes parents get a little scared about that and worried about what their children are accessing." 'Crossing the road' Continue reading the main story “Start Quote They're all running around with handheld computers these days, they're not just on phones ” End Quote Keith Towler Children's commissioner Mr Towler said he talks to children in lots of different settings and they "still enjoy playing outside as much as they ever did". He said we need to recognise that the internet provides fantastic opportunities for education and learning and its making sure that children access that safely. He said that was a real challenge for parents and carers. "It's a bit like crossing the road, you try to teach your children the best way of crossing the road well. We need to teach our children the best way of using this fantastic resource. "I think too many parents are very very scared of the internet and because they're so scared they will say 'Oh I don't understand it'". Handheld computers The commissioner also praised Hwb, the virtual learning environment, which he said provides protection for children using the web in schools. Mr Towler said: "We've got to get parents and carers to recognise that children do operate in the digital world. They're all running around with handheld computers these days, they're not just on phones. "They can access whatever they want whenever they want and parents need to engage on that. " "We need to remember that children and young people are much more savvy than sometimes we think they are, and they are much more responsible than sometimes adults think they are so its not all doom and gloom. "What we need to do is put the right checks and balances in place and what children always want from parents and carers is to understand what the boundaries are, and that's our job to do that." Sangeet Bhullar, executive director of Wise Kids, added that the digital landscape was "evolving rapidly" and up-to-date data was needed on how children and young people in Wales related to it. More on This Story .related-links-list li { position: relative; } .related-links-list .gvl3-icon { position: absolute; top: 0; left: 0; } Related Stories Web safety lessons urged for infants 05 FEBRUARY 2013, EDUCATION &amp; FAMILY Online chat 'should be monitored' 22 JANUARY 2013, TECHNOLOGY Body to promote digital teaching 22 JUNE 2012, WALES $render("page-see-also","ID"); $render("page-newstracker","ID"); Related Internet links Children's Commissioner for Wales The BBC is not responsible for the content of external Internet sites $render("page-related-items","ID"); Share this pageShare this pageShareFacebookTwitter Email Print In association with $render("advert","advert-sponsor-module","page-bookmark-links"); $render("advert-post-script-load"); $render("advert-post-script-load"); More Wales stories RSS Army base shuts in defence shake-up An Army base in Pembrokeshire is to close with 600 troops transferred to St Athan in the Vale of Glamorgan. Soldiers' conman jailed three years Wales recall Warburton and Jones <!--
  • ...2 more annotations...
  • "I think too many parents are very very scared of the internet and because they're so scared they will say 'Oh I don't understand it'".
  • "What we need to do is put the right checks and balances in place and what children always want from parents and carers is to understand what the boundaries are, and that's our job to do that."
Rebeka Aščerič

The internet comes of age | Comment is free | guardian.co.uk - 0 views

  • Comment is free The internet comes of age Older people are using the web as never before.
  • Silver surfers, defined as internet users over the age of 65, spend more time on the web (42 hours a month) than any other group,
  • A lot of older people still do not realise that once you have fixed up a broadband connection (which admittedly can be dodgy with some service providers) it is very easy to buy or sell things on the auction space eBay (the most popular one in the UK); to buy a book from Amazon or the wonderful abebooks; or to Google or email.
  • ...1 more annotation...
  • They do want to keep up with old friends, but they also want to make contact with other people of whatever age with whom they share a common interest.
inesmag

How to keep your privacy online | Ask Jack | Technology | guardian.co.uk - 2 views

  • I would like my browsing and Google searches to be private. I don't want targeted advertising and I don't want to feel that anonymous companies are harvesting my clicks to learn all about me.
  • When the web was young, and a lot less shiny, web pages were fixed (static) and – barring browser quirks – everybody saw much the same thing. Today, much of the web is dynamic, which means that what you see has been adapted or possibly constructed on the fly just for you.
  • From your point of view, the advantage is that the websites you visit will be personalised to suit your needs and tastes. From the website's point of view, the advantage is that it can also personalise its prices and advertising to try to suit your needs and tastes, and increase your propensity to click and buy.
  • ...6 more annotations...
  • On the web, the rule is: if you're not paying, then you are what's being sold.
  • Probably the simplest way to reduce personalisation is to use an anonymising service. Instead of accessing the web directly, you access it via a third-party proxy server, so your that requests are mixed in with thousands of others. These services usually allow you to control cookies, turn JavaScript on and off, withhold "referrer details" and so on.
  • Nonetheless, it's often useful to have access to an anonymous proxy service, and everybody should find one they like. Examples include The Cloak, Megaproxy, Proxify and ID Zap. There are also networked open source privacy systems such as Tor and I2P.
  • Google also tracks your progress across hundreds of thousands of websites via Google Analytics. To opt out of this, install the Google Analytics Opt-out Browser Add-on (Beta), which Google offers for Microsoft Internet Explorer, Google Chrome, Mozilla Firefox, Apple Safari and Opera. However, some sites use different analytics software or track visitors in other ways you will be unaware of. Ghostery may help reduce these.
  • Finally, Facebook Connect is a potential privacy problem because it "allows users to 'connect' their Facebook identity, friends and privacy to any site".
  • In general, the more you do online – social networking, cloud computing etc – the more your privacy and security are at risk. Reducing that risk involves effort and inconvenience, so it's up to you to find an acceptable compromise
donnamariee

BBC News - O2's Tu Go aims to challenge Skype and other Voip apps - 0 views

  • O2 has launched an app which lets users make and receive phone calls and texts via a tablet, computer or smartphone. Tu Go is available for Android, Apple's iOS devices and Windows 7 PCs but limited to "pay monthly" subscribers - so excludes corporate accounts.
  • Users can be logged into the service on up to five devices at once - meaning all will ring if they receive a call - including handsets using Sim cards associated with different networks and internet enabled gadgets such as iPods.
  • The effort represents the telecom industry's latest attempt to tackle competition from Skype and other third-party Voip services. These typically do not charge for app-to-app calls, but do require the user to buy credit if they want to call or send a text to a standard mobile or landline number.
  • ...2 more annotations...
  • But the scale of the threat was highlighted earlier this week when the chairman of China Mobile - the world's largest telecom carrier - said his firm was now more concerned about the challenge posed by Microsoft's Skype and Tencent's WeChat services than it was about competition from China's rival mobile networks.
  • There are already dozens of Voip apps on the market including lesser-known names such as Tango, Fring, Bria and Zerofone as well as manufacturer's own services including BlackBerry BBM and Apple's Facetime.
inesmag

Technology News: Internet: Facebook's Relationship With Developers: It's Even More Comp... - 2 views

  • When it comes to developers working with Facebook, "share and share alike" is the new policy.
  • No one rides the Facebook express for free.
  • "If you use any Facebook APIs to build personalized or social experiences, you must also enable people to easily share their experiences back with people on Facebook," Facebook said in a blog post announcing the change.
  • ...2 more annotations...
  • On one hand it can be argued that Facebook is merely following industry trends; other social networks like Twitter have also banned apps that mimic their core functionality.
  • In short, Facebook is moving aggressively to block Twitter and other social media sites from establishing free-rider status on its site
Maj Krek

Kill the Internet-and Other Anti-SOPA Myths | The Nation - 0 views

  • in the wake of protests by dozens of websites and large numbers of their users, as well as a virtually unanimous chorus of criticism from leading progressive voices and outlets, including Michael Moore, Cenk Uygur, Keith Olbermann, Alternet, Daily Kos, MoveOn and many people associated with Occupy Wall Street. Judging by the fervor of the anti-SOPA/PIPA protests, a casual observer might think the advocates of the anti-piracy bills were in the same moral league as the torturers at Abu Ghraib.
  • But before we celebrate this “populist” victory, it’s worth remembering that the defeat of SOPA and PIPA was also a victory for the enormously powerful tech industry, which almost always beats the far smaller creative businesses in legislative disputes. (Google alone generated more than $37 billion in 2011, more than double the revenue of all record companies, major and indie combined.)
  • One example of anti-SOPA rhetorical over-reach was a tendency by some to invent sinister motives for the sponsors. On his usually brilliant show The Young Turks, Uygur said that SOPA’s sponsors were “pushing for a monopoly for the MPAA and to kill their competition on the Internet.” This is untrue. They wanted to kill those entities that steal their movies and make money off them, either directly or indirectly. There really is a difference
  • ...8 more annotations...
  • that stopped allowing children to put up their own drawings of characters like Mickey Mouse because of fear of copyright lawsuits. Examples such as this, or of a theoretical risk of parents being charged for the right to have kids sing “Happy Birthday”, are demagogic. The underlying issue is scale. There is a profound moral difference between loaning a friend a book and posting, without permission, the content of bestsellers for commercial gain—and people and legislators ought to take that distinction into account.
  • since iTunes and Amazon and are surviving, Napster’s original model was legally killed and Kim Dotcom was apprehended, no new laws are needed. The status quo may be what we end up with, but that doesn’t make it inevitable or right. Human beings have created the piracy problem and although, like any kind of crime, society can’t eliminate it entirely, we can decide whether or not to seriously try. &nbsp;
  • What is good for Google and Facebook is not always going to be what’s best for the 99 percent. (And of course Microsoft and Apple et al. are extremely aggressive when it comes to protecting their intellectual property rights).
  • on the content of some of the Kool-Aid that has recently been served and help swing the pendulum back, if only a little, in a direction in which intellectual property can be nourished. Otherwise, we will be complicit in accelerating the trend of the last decade, in which those who write code get richly rewarded, while those who write the music, poetry, drama and journalism that are being encoded have to get day jobs.
  • To be sure, the legislators who crafted the ill-fated bills and the film industry lobbyists who supported them have little to be proud of.
  • In a widely viewed anti-SOPA/PIPA speech on Ted.com, Internet philosopher Clay Shirky similarly attributed dark motives to the studios. The targets are not Google and Yahoo
  • If he means a friend sharing Marianne Faithfull’s version of &amp;ldquo;Visions of Johanna&amp;rdquo; with me on Facebook, then the accusation is absurd.
  • ek in his 25,000-square-foot compound surrounded by a fleet of Merced
nensic

Under the regime of precarity: bring your own device | openDemocracy - 0 views

  • At one and the same time technocracy and financial oligarchies find here an ideal medium to extend their influence and their control of individuals in space and time.
  • At one and the same time technocracy and financial oligarchies find here an ideal medium to extend their influence and their control of individuals in space and time. This explains the fierce struggle going on among key market players.
  • Today large communities use devices like smartphones, tablets, e-readers and ultrabooks to navigate this new ecosystem.
  • ...26 more annotations...
  • The growing dynamic of mobile internet, today accounting for 12% of all internet traffic,[ii] signals a new ecosystem where living bodies, machines, networks, code, data, territory and time interact.
  • as a way of consolidating their strictly neoliberal economic policy.
  • The hundreds of thousands of apps, available in just a few years, originate from the intersection of two factors:
  • The desire and necessity to have simple, functional and fast devices able to do specific tasks on the go.
  • the operative skills to develop apps for popular mobile platforms such as Iphone Operating System (IOS) or Google Android.&nbsp;
  • Apps galore
  • Apple likes to play on the ambiguity in a form of propaganda that exalts the “revolutionary” spirit of technological innovation
  • The first iPhone, in 2007, inaugurated the new phase of the cognitive era, just as the PC heralded the decline of the industrial phase. Five years later, Apple no longer has a monopoly: hundreds of millions of smartphones and tablets are sold every year and the total number of these active devices will be soon 2 billion. It took the PC thirty years to reach this level of diffusion.
  • War over the immaterial
  • Often these machines play opposite functions: as a tool to create new forms of horizontal communication and social interaction or as bait for a capillary exploitation.
  • A political analysis of mobile devices
  • The PC became a liberating tool for social cooperation in the workplace of a booming third-sector.
  • In the following phase, the spread of the first mobile devices – cellphones and laptops – provided an initial impulse for a blurring of life and work, imposing with mobile calls, emails or SMS a new type of real-time processing, regulating the rhythms of life
  • In the new biohypermedia environment, the key change lies in the combination of miniaturizing and mobilizing these pieces of equipment, allowing them to always be within the body’s reach in any context.
  • they augment physical reality[ix] with every kind of information – commercial, cultural, ecological – and act more and more as biomedical sets for the control, correction and support of our vital biological functions.
  • The PC has a central function as the medium for linguistic and written processes - its typical uses often tied to the logical concatenation of thought and the priority management of sequences over time.
  • But mobile devices concentrate complex perception of stimuli in terms of spatial organization and intervene in emotional responses. PC work in this way occupies our left hemisphere, while the continual interactions of a smartphone engage the right hemisphere.
  • In contemporary neoliberalism, these devices become an essential means of rent and profit, through a fine capture of what we generate by living with them and using them. At one and the same time technocracy and financial oligarchies find here an ideal medium to extend their influence and their control of individuals in space and time.
  • Marketing and communication campaigns portray these devices as commodity fetishes, characterizing a new phase of capitalism often described as cognitive because based on knowledge.
  • In the sphere of multinational ICT[x] Corporations a war is being waged over the design and deployment of immaterial enclosures
  • Even though all this is based on freeware and open source, they trick us into believing that the iPhone 5, Windows 8 or Jellybean[xi] are miracles that descend from Mount Olympus and for which we should be grateful as to the gods.
  • Unlike automobiles or, to a lesser degree, PCs, the use value of new mobile devices is no longer determined merely by the initial design but can be moulded by the final user.
  • The innumerable websites, blogs and forums in every language globally blooming and growing are a workshop for worldwide exchange where the digital means are developed that could be used to withdraw workers both from precarity and &nbsp;from total submission to a life of labour. &nbsp;
  • Microsoft is no less defensive of its monopoly: with Intel and other accomplices, they introduced a new firmware to boot Windows 8 PCs that, substituting the old BIOS,[xv] makes it impossible or very complicated to install Linux or other operating systems on new laptops.
  • Despite hesitations related to “security” problems, today companies allow or even oblige people to use their own devices
  • So, if you were one of those many who found the latest tablet, smartphone or hybrid touch device under the tree this year, be aware that you won’t be the only one pleased: under the regime of precarity, bring your own device if you want to survive.&nbsp;
  •  
    "Bring your own device (BYOD) is a business policy whereby employees bring personally owned mobile devices to their place of work and use them to access privileged company resources such as email, file servers and databases as well as their personal applications and data."
nikasvajncer

Leading article: Thanks to the internet, the customer is king again. Long may he reign ... - 0 views

  • TripAdvisor, the consumer website for travellers, faces the threat of a lawsuit from hoteliers and others who claim they are being damaged by unsubstantiated and malicious reviews. The website, it appears, may have to fight its corner in court.
  • The internet has increased consumer power and started to even up the balance.
  • The internet has given ordinary consumers a voice. And if existing sites have their wings clipped by disgruntled businesses, others will simply spring up to replace them.
Urška Bračko

The internet and language change: Im in ur internets, creolizin ur english | The Economist - 0 views

  • It's a broad term referring to either English with a healthy dash of unique Indian vocabulary, or the Indian languages spoken with English words and phrases thrown in, or the speech of Indians comfortable switching back and forth quickly between two languages.
  • Singlish (from Singapore) is more like a real creole, an established dialect of English that is difficult for non-Singaporeans to follow.
  • we already know British and American English are seeding each other with new words and phrases
  • ...2 more annotations...
  • improvised, speech-like forms of written English are proliferating on Facebook, Twitter and elsewhere.
  • Non-natives are already interacting with each other in person, in English, all around the world. It's harder to forecast the structural changes that this could cause to standard English.
1 - 20 of 65 Next › Last »
Showing 20 items per page