Skip to main content

Home/ Internetni praktikum/ Group items tagged process

Rss Feed Group items tagged

Jernej Prodnik

Amazon unpacked - FT.com - 0 views

  • February 8, 2013 12:30 pm Amazon unpacked By Sarah O’Connor The online giant is creating thousands of UK jobs, so why are some employees less than happy?
  • Between a sooty power station and a brown canal on the edge of a small English town, there is a building that seems as if it should be somewhere else. An enormous long blue box, it looks like a smear of summer sky on the damp industrial landscape. Inside, hundreds of people in orange vests are pushing trolleys around a space the size of nine football pitches, glancing down at the screens of their handheld satnav computers for directions on where to walk next and what to pick up when they get there. They do not dawdle – the devices in their hands are also measuring their productivity in real time. They might each walk between seven and 15 miles today. It is almost Christmas and the people working in this building, together with those in seven others like it across the country, are dispatching a truck filled with parcels every three minutes or so. Before they can go home at the end of their eight-hour shift, or go to the canteen for their 30-minute break, they must walk through a set of airport-style security scanners to prove they are not stealing anything. They also walk past a life-sized cardboard image of a cheery blonde woman in an orange vest. “This is the best job I have ever had!” says a speech bubble near her head.
  • If you could slice the world in half right here, you could read the history of this town called Rugeley in the layers. Below the ground are the shafts and tunnels of the coal mine that fed the power station and was once the local economy’s beating heart. Above the ground are the trolleys and computers of Amazon, the global online retailer that has taken its place. As online shopping explodes in Britain, helping to push traditional retailers such as HMV out of business, more and more jobs are moving from high-street shops into warehouses like this one. Under pressure from politicians and the public over its tax arrangements, Amazon has tried to stress how many jobs it is creating across the country at a time of economic malaise. The undisputed behemoth of the online retail world has invested more than £1bn in its UK operations and announced last year that it would open another three warehouses over the next two years and create 2,000 more permanent jobs. Amazon even had a quote from David Cameron, the prime minister, in its September press release. “This is great news, not only for those individuals who will find work, but for the UK economy,” he said.
  • ...10 more annotations...
  • Workers in Amazon’s warehouses – or “associates in Amazon’s fulfilment centres” as the company would put it – are divided into four main groups. There are the people on the “receive lines” and the “pack lines”: they either unpack, check and scan every product arriving from around the world, or they pack up customers’ orders at the other end of the process. Another group stows away suppliers’ products somewhere in the warehouse. They put things wherever there’s a free space – in Rugeley, there are inflatable palm trees next to milk frothers and protein powder next to kettles. Only Amazon’s vast computer brain knows where everything is, because the workers use their handheld computers to scan both the item they are stowing away and a barcode on the spot on the shelf where they put it. The last group, the “pickers”, push trolleys around and pick out customers’ orders from the aisles. Amazon’s software calculates the most efficient walking route to collect all the items to fill a trolley, and then simply directs the worker from one shelf space to the next via instructions on the screen of the handheld satnav device. Even with these efficient routes, there’s a lot of walking. One of the new Rugeley “pickers” lost almost half a stone in his first three shifts. “You’re sort of like a robot, but in human form,” said the Amazon manager. “It’s human automation, if you like.” Amazon recently bought a robot company, but says it still expects to keep plenty of humans around because they are so much better at coping with the vast array of differently shaped products the company sells.
  • The unassuming efficiency of these warehouses is what enables Amazon to put parcels on customers’ doorsteps so quickly, even when it is receiving 35 orders a second. Every warehouse has its own “continuous improvement manager” who uses “kaizen” techniques pioneered by Japanese car company Toyota to improve prod­uctivity. Marc Onetto, the senior vice-president of worldwide operations, told a business school class at the University of Virginia a few years ago: “We use a bunch of Japanese guys, they are not consultants, they are insultants, they are really not nice … They’re samurais, the real last samurais, the guys from the Toyota plants.” In Rugeley, the person with the kaizen job is a friendly, bald man called Matt Pedersen, who has a “black belt” in “Six Sigma”, the Motorola-developed method of operational improvement, most famously embraced by Jack Welch at General Electric. Every day, the managers in Rugeley take a “genba walk”, which roughly means “go to the place” in Japanese, Pedersen says as he accompanies the FT on a tour of the warehouse. “We go to the associates and find out what’s stopping them from performing today, how we can make their day better.” Some people also patrol the warehouse pushing tall little desks on wheels with laptops on them – they are “mobile problem solvers” looking for any hitches that could be slowing down the operation.
  • . . . What did the people of Rugeley make of all this? For many, it has been a culture shock. “The feedback we’re getting is it’s like being in a slave camp,” said Brian Garner, the dapper chairman of the Lea Hall Miners Welfare Centre and Social Club, still a popular drinking spot. One of the first complaints to spread through the town was that employees were getting blisters from the safety boots some were given to wear, which workers said were either too cheap or the wrong sizes. One former shop-floor manager, who did not want to be named, said he always told new workers to smear their bare feet with Vaseline. “Then put your socks on and your boots on, because I know for a fact these boots are going to rub and cause blisters and sores.” ©Ben RobertsAmazon workers in Rugeley process ordersOthers found the pressure intense. Several former workers said the handheld computers, which look like clunky scientific calculators with handles and big screens, gave them a real-time indication of whether they were running behind or ahead of their target and by how much. Managers could also send text messages to these devices to tell workers to speed up, they said. “People were constantly warned about talking to one another by the management, who were keen to eliminate any form of time-wasting,” one former worker added.
  • Watson said Amazon was supposed to send the council employment data every six months, but it had not done so. “We had no idea Amazon were going to be as indifferent to these issues as they have been, it’s come as a shock to us how intransigent they are,” he said. Inside the warehouse, Amazon employees wear blue badges and the workers supplied by the agencies wear green badges. In the most basic roles they perform the same tasks as each other for the same pay of £6.20 an hour or so (the minimum adult wage is £6.19), but the Amazon workers also receive a pension and shares. A former agency worker said the prospect of winning a blue badge, “like a carrot, was dangled constantly in front of us by management in return for meeting shift targets”. Amazon’s Darwinian culture comes from the top. Jeff Bezos, its chief executive, told Forbes magazine last year (when it named him “number one CEO in America”): “Our culture is friendly and intense, but if push comes to shove, we’ll settle for intense.”
  • Ransdtad said it supplied a number of clients with “onsite-flexible workforce solutions”. It added: “The number of workers required by these clients fluctuates in response to supply and demand. When demand for clients’ products or services is high (for example during the Christmas period) the Randstad partnership allows local people to benefit from short-term work on a temporary contract, to help supplement our clients’ permanent workforce and deliver against order requirements.” Certainly, not everyone in Rugeley is upset about Amazon. A group of workers having a pint on a picnic table outside The Colliers pub near the warehouse gates said they liked their jobs, albeit as their managers hovered nervously in the background. One young agency worker said he was earning about £220 a week, compared with the £54 he had been receiving in jobless benefits. He had bought a car and moved out of his mum’s house and into a rented flat with his girlfriend, who he had met at work. “I’m doing pretty well for myself,” he said with a shy grin. “There’s always opportunities to improve yourself there.” Across the table, an older man, wagging two fingers with a cigarette pinched between them, said slowly: “It gives you your pride back, that’s what it gives you. Your pride back.” Many in the town, however, have mixed feelings. They are grateful for the jobs Amazon has created but they are also sad and angry about the quality of them. Timothy Jones, a barrister and parish councillor, summed up the mood. “I very much want them to stay, but equally I would like some of the worst employment practices to end.”
  • For Watson, the big question is whether these new jobs can support sustainable economic growth. In Rugeley, it is hard not to look back to the coal mine for an example of how one big employer could transform a place. . . . The Lea Hall Colliery opened officially on a soggy Tuesday in July 1960. Miners and their families huddled under marquees to eat their packed lunches and when the first coal was wound to the surface, three bands played an overture specially written for the occasion. It was the first mine planned and sunk by the Coal Board, the body set up after the second world war to run Britain’s newly nationalised coal industry, and the Central Electricity Generating Board was building a coal-fired power station right next door. It was a defiant demonstration of confidence in coal at a time of increasing competition from oil. “King Coal is not yet dead, as many would have it, but is going to be with us for many years to come,” the regional secretary of the National Union of Mineworkers told the crowd.
  • Soon, miners from all over the country were swarming to the modern new mine. The Coal Board and the local council built housing estates and schools to cope with the exploding population. “Peartree estate was built for the Geordies, the Springfield estate was built for the Scots and the Welsh,” remembered Brian Garner, who helped to build the mine when he was 16. “It was unbelievable, it was buzzing in the town, there was that much money about then. I could leave my job at 10 o’clock in the morning and start at five past 10 on another.” On Friday and Saturday nights, the queue outside the Lea Hall Miners’ Welfare Centre and Social Club would wrap right around the building. Rugeley’s mine was soon the most productive in the country. It was a “young man’s pit” with all the latest machines and techniques, says Ken Edwards, who started there at 25 as an electrician. The work was still dirty and dangerous, though. In 1972, a local reporter took a tour. “All is silent except for the movement of conveyor belts which carry the coal and the murmur of the air pumps. The blackness is relieved only by narrow shafts of light coming from each person’s headlamp,” she wrote. It took her two days to remove the black dust from her nails, ears, nose and hair.
  • The good times didn’t last. By the time the pit closed, four days before Christmas in 1990, a spokesman for British Coal told Reuters it was losing £300,000 a week. More than 800 people lost jobs that paid the equivalent of between £380 and £900 a week in today’s money. The town council’s chairman tried desperately to say something reassuring. “It has come as such a shock,” he told the local paper. “[But] we have got to do what many have done and look for new areas, particularly information technology and high technology. We have a lot of expertise and a wonderful geographical spot. There’s no reason why it should be the end for Rugeley.” From behind her desk in Vision estate agents, all purple paint and fairy lights, Dawn Goodwin sucks the air in through her teeth at the mention of Amazon. “We all thought it was going to be the making of the town,” she says. She expected an influx of people, including well-to-do managers, looking to buy or rent houses. But she hasn’t had any extra business at all. People are cautious because they don’t know how long their agency jobs with Amazon will last, she says. One of her tenants, a single young woman, got a job there but lost it again after she became ill halfway through a shift. She struggled to pay her rent for three months while she waited for her jobseeker’s benefits to be reinstated. “It’s leaving a bad taste in everyone’s mouths,” Goodwin says with a frown. Even the little “Unit 9” café next to the Amazon warehouse hasn’t had a boost in trade. The women who run it reckon the employees don’t have enough time in their 30-minute break to get through security, come and eat something, and then go back in again.
  • In a cramped upstairs office at the Citizens Advice Bureau, Gillian Astbury and Angela Jones have turned to statistics to try to identify Amazon’s effect on the area. They haven’t had an increase in the number of people asking about employment problems or unfair dismissal, but nor has there been any improvement in the community’s problems with debt and homelessness. Their best guess is that people haven’t had enough sustained work to make much of a difference. Astbury says employment agencies are a “necessary evil”, but stresses it is hardly ideal for people to be bouncing in and out of temporary work, particularly when a job ends abruptly and they are left with no income at all until their benefits are reinstated. Workers leaving Amazon have had a particular problem with this, prompting the parish council to submit a Freedom of Information request to the Department for Work and Pensions to find out exactly how long local people are being made to wait for their social security payments to come through.
  • Far from the CAB’s little office in Rugeley, Britain’s economists are also puzzling over why the economy remains moribund even though more and more people are in work. There are still about half a million fewer people working as full-time employees than there were before the 2008 crash, but the number of people in some sort of employment has surpassed the previous peak. Economists think the rise in insecure temporary, self-employed and part-time work, while a testament to the British labour market’s flexibility, helps to explain why economic growth remains elusive. Angi Cooney, who runs C Residential, the biggest estate agent in Rugeley, thinks the nature of employment is changing permanently and people should stop pining for the past. It’s “bloody great” that a company like Amazon chose to come to “this little old place”, she says fiercely, looking as if she’d like to take the town by the shoulders and give it a shake. “People expect a job for life, but the world isn’t like that any more, is it?” Sarah O’Connor is the FT’s economics correspondent
nensic

Under the regime of precarity: bring your own device | openDemocracy - 0 views

  • At one and the same time technocracy and financial oligarchies find here an ideal medium to extend their influence and their control of individuals in space and time.
  • At one and the same time technocracy and financial oligarchies find here an ideal medium to extend their influence and their control of individuals in space and time. This explains the fierce struggle going on among key market players.
  • Today large communities use devices like smartphones, tablets, e-readers and ultrabooks to navigate this new ecosystem.
  • ...26 more annotations...
  • The growing dynamic of mobile internet, today accounting for 12% of all internet traffic,[ii] signals a new ecosystem where living bodies, machines, networks, code, data, territory and time interact.
  • as a way of consolidating their strictly neoliberal economic policy.
  • The hundreds of thousands of apps, available in just a few years, originate from the intersection of two factors:
  • The desire and necessity to have simple, functional and fast devices able to do specific tasks on the go.
  • the operative skills to develop apps for popular mobile platforms such as Iphone Operating System (IOS) or Google Android. 
  • Apps galore
  • Apple likes to play on the ambiguity in a form of propaganda that exalts the “revolutionary” spirit of technological innovation
  • The first iPhone, in 2007, inaugurated the new phase of the cognitive era, just as the PC heralded the decline of the industrial phase. Five years later, Apple no longer has a monopoly: hundreds of millions of smartphones and tablets are sold every year and the total number of these active devices will be soon 2 billion. It took the PC thirty years to reach this level of diffusion.
  • War over the immaterial
  • Often these machines play opposite functions: as a tool to create new forms of horizontal communication and social interaction or as bait for a capillary exploitation.
  • A political analysis of mobile devices
  • The PC became a liberating tool for social cooperation in the workplace of a booming third-sector.
  • In the following phase, the spread of the first mobile devices – cellphones and laptops – provided an initial impulse for a blurring of life and work, imposing with mobile calls, emails or SMS a new type of real-time processing, regulating the rhythms of life
  • In the new biohypermedia environment, the key change lies in the combination of miniaturizing and mobilizing these pieces of equipment, allowing them to always be within the body’s reach in any context.
  • they augment physical reality[ix] with every kind of information – commercial, cultural, ecological – and act more and more as biomedical sets for the control, correction and support of our vital biological functions.
  • The PC has a central function as the medium for linguistic and written processes - its typical uses often tied to the logical concatenation of thought and the priority management of sequences over time.
  • But mobile devices concentrate complex perception of stimuli in terms of spatial organization and intervene in emotional responses. PC work in this way occupies our left hemisphere, while the continual interactions of a smartphone engage the right hemisphere.
  • In contemporary neoliberalism, these devices become an essential means of rent and profit, through a fine capture of what we generate by living with them and using them. At one and the same time technocracy and financial oligarchies find here an ideal medium to extend their influence and their control of individuals in space and time.
  • Marketing and communication campaigns portray these devices as commodity fetishes, characterizing a new phase of capitalism often described as cognitive because based on knowledge.
  • In the sphere of multinational ICT[x] Corporations a war is being waged over the design and deployment of immaterial enclosures
  • Even though all this is based on freeware and open source, they trick us into believing that the iPhone 5, Windows 8 or Jellybean[xi] are miracles that descend from Mount Olympus and for which we should be grateful as to the gods.
  • Unlike automobiles or, to a lesser degree, PCs, the use value of new mobile devices is no longer determined merely by the initial design but can be moulded by the final user.
  • The innumerable websites, blogs and forums in every language globally blooming and growing are a workshop for worldwide exchange where the digital means are developed that could be used to withdraw workers both from precarity and  from total submission to a life of labour.  
  • Microsoft is no less defensive of its monopoly: with Intel and other accomplices, they introduced a new firmware to boot Windows 8 PCs that, substituting the old BIOS,[xv] makes it impossible or very complicated to install Linux or other operating systems on new laptops.
  • Despite hesitations related to “security” problems, today companies allow or even oblige people to use their own devices
  • So, if you were one of those many who found the latest tablet, smartphone or hybrid touch device under the tree this year, be aware that you won’t be the only one pleased: under the regime of precarity, bring your own device if you want to survive. 
  •  
    "Bring your own device (BYOD) is a business policy whereby employees bring personally owned mobile devices to their place of work and use them to access privileged company resources such as email, file servers and databases as well as their personal applications and data."
donnamariee

Technology and productivity: The hollow promise of the iEconomy | The Economist - 0 views

  • Apple is the most creative, innovative and envied technology company of our time,
  • spring of 2000,
  • Cisco and its ilk as the internet transformed the economy.
  • ...7 more annotations...
  • If fact there is little sign in the data that machines are displacing humans any faster than usual
  • Perhaps because of uncertainty, though that’s a poor explanation for a phenomenon occurring globally.
  • How to put a price on the contribution of Facebook or Twitter to the Arab spring?
  • IN THE battle between David Einhorn and Apple over the latter's $137 billion cash hoard lies a deeper lesson about the outlook for the economy. Mr Einhorn, an activist investor, says Apple clings to its money out of a “Depression mentality”. Perhaps. But the more mundane explanation is that Apple, like many of the world's big companies today, is generating more cash from its existing product line than it can usefully plough back into new projects.
  • Today, we all know Apple’s products, and a lot of us own one. Yet it is hard to identify the impact they or any of today's social-media giants have had on productivity. I was at first delighted with the convenience and freedom to read documents, check Twitter and search the web on the iPad mini I got in December, but it occurred to me recently that this was at best an incremental improvement over doing it on my BlackBerry or laptop. It also provides me with many more ways to waste time. As Tom Toles, the Washington Post’s cartoonist, puts it:
  • No doubt some of those YouTube videos were being watched over Apple products. Not that I blame Apple for Penney’s culture (after all, Google owns YouTube), but it is a reminder that the social-media revolution has been a mixed blessing. Yahoo at one time stood atop the Internet but the ability of its workers to do their job from anywhere may be backfiring on productivity
  • are genuine benefits of social media and the related hardware. In its first few decades the computer/internet revolution re-engineered business processes, enabling companies to interact with each other and customers in more ways at lower cost than ever, producing measurable, bankable results. Now, it’s leading to brand-new consumer products, many of whose  benefits are unmeasured or unmeasurable.
sergeja perklič

Who owns the content you upload online? | Money | guardian.co.uk - 0 views

  • The outrage over Instagram's announcement that it is changing its terms and conditions has turned the spotlight on the relationship between websites and users who upload content, whether it is photos, video, blogs or even games.
  • A survey of UK consumers suggested just 7% read online terms and conditions before they signed up for products and services, and other research has put it even lower.
  • Twitter: You retain your rights to any content you post on Twitter, but you grant the website a worldwide, non-exclusive, royalty-free licence (with the right to sublicense) "to use, copy, reproduce, process, adapt, modify, publish, transmit, display and distribute" your content.
  • ...1 more annotation...
  • However, when you use Facebook you give it the right to use information "in connection with the services and features we provide to you and other users like your friends, our partners, the advertisers that purchase ads on the site, and the developers that build the games, applications, and websites you use".
Blaž Ulaga

You Are What You Click: On Microtargeting | The Nation - 0 views

  • Google was recently slapped with two fines
  • They provide false assurances that, in the normal course of things, our privacy is not being invaded on the Internet, that our personal data is safe, and that we are anonymous in our online—and offline—activities.
  • not a single incident, but a slow, unstoppable process of profiling who we are and what we do, to be sold to advertisers and marketing companies
  • ...3 more annotations...
  • are making it their policy and business to profile us in detai
  • And so we are stalked in the pursuit of marketing optimization.
  • (96 percent of it from advertising
inesmag

Home Network Vulnerabilities: Spam, Cookies, Pop-Ups, Spyware, and Scams > Spam - 0 views

  • Home Network Vulnerabilities: Spam, Cookies, Pop-Ups, Spyware, and Scams
  • Spam is the common name for unsolicited e-mail and it is a problem that is rampant on the Internet today.
  • Spammers do their dirty work by purchasing or creating giant e-mail lists and automated mailing tools called spambots. The lists are usually compiled from web pages where people provide their e-mail address as part of a registration process.
  • ...2 more annotations...
  • How to Block Spam There is a good chance that your ISP has some sort of spam-blocking feature available and, if spam is a problem for you, we suggest starting there.
  • replying to a spam e-mail does not stop it from coming
donnamariee

A 'more revolutionary' Web - The New York Times - 0 views

  • Just when the ideas behind "Web 2.0" are starting to enter into the mainstream, the mass of brains behind the World Wide Web is introducing pieces of what may end up being called Web 3.0. "Twenty years from now, we'll look back and say this was the embryonic period," said Tim Berners-Lee, 50, who established the programming language of the Web in 1989 with colleagues at CERN, the European science institute.
  • To many in technology, Web 2.0 means an Internet that is even more interactive, customized, social and media-intensive - not to mention profitable - than the one of a decade ago.It is a change apparent with multilayered media databases like Google Maps, software programs that run inside Web browsers like the collaboration-friendly word processor Writely, high-volume community forums like MySpace, and so-called social search tools like Yahoo Answers.
  • In this version of the Web, sites, links, media and databases are "smarter" and able to automatically convey more meaning than those of today.For example, Berners-Lee said, a Web site that announces a conference would also contain programming with a lot of related information embedded within it.A user could click on a link and immediately transfer the time and date of the conference to his or her electronic calendar. The location - address, latitude, longitude, perhaps even altitude - could be sent to his or her GPS device, and the names and biographies of others invited could be sent to an instant messenger list.
  • ...2 more annotations...
  • "There is an obvious place for the semantic Web in life sciences, in medicine, in industrial research," Shadbolt said, and that is where most of the focus is today."We're looking for communities of information users to show them the benefits," he said. "It's an evolutionary process."The big question is whether it will move on next to businesses or consumers, he said. A consequence of an open and diffuse Internet, he noted, is that unexpected outcomes can emerge from unanticipated places.
  • "People keep asking what Web 3.0 is," Berners-Lee said. "I think maybe when you've got an overlay of scalable vector graphics - everything rippling and folding and looking misty - on Web 2.0 and access to a semantic Web integrated across a huge space of data, you'll have access to an unbelievable data resource."Said Sheehan: "I believe the semantic Web will be profound. In time, it will be as obvious as the Web seems obvious to us today."
sintija

BBC News - US internet 'six strikes' anti-piracy campaign begins - 0 views

  • US internet 'six strikes' anti-piracy campaign begins
  • Five of the country's leading internet service providers (ISPs) are taking part in the Copyright Alert System (CAS), which they say is designed to educate rather than punish users.
  • "Over the course of the next several days... our content partners will begin sending notices of alleged peer-to-peer copyright infringement to ISPs, and the ISPs will begin forwarding those notices in the form of copyright alerts to consumers,
  • ...4 more annotations...
  • Consumers whose accounts have been used to share copyrighted content over P2P networks illegally (or without authority) will receive alerts that are meant to educate rather than punish, and direct them to legal alternatives. And for those consumers who believe they received alerts in error, an easy-to-use process will be in place for them to seek independent review of the alerts they received.
  • Meanwhile the UK has favoured a proposed "three strikes" policy
  • Under telecom regulator Ofcom's draft code, users who receive three warnings within 12 months would have anonymous information about their activities passed to copyright holders which could then seek court orders to discover their identities.
  • The policy had been due to come into effect in March 2014, but has been delayed after a House of Lords committee queried whether the Digital Economy Act - which the code is part of - complied with Treasury rules.
Anja Pirc

Online privacy: Difference Engine: Nobbling the internet | The Economist - 0 views

  • TWO measures affecting the privacy internet users can expect in years ahead are currently under discussion on opposite sides of the globe. The first hails from a Senate committee’s determination to make America’s online privacy laws even more robust. The second concerns efforts by the International Telecommunications Union (ITU), an intergovernmental body under the auspices of the United Nations, to rewrite its treaty for regulating telecommunications around the world, which dates from 1988, so as to bring the internet into its fief.
  • The congressional measure, approved overwhelmingly by the Senate Judiciary Committee on November 29th, would require criminal investigators to obtain a search warrant from a judge before being able to coerce internet service providers (ISPs) to hand over a person’s e-mail. The measure would also extend this protection to the rest of a person’s online content, including videos, photographs and documents stored in the "cloud"—ie, on servers operated by ISPs, social-network sites and other online provider
  • a warrant is needed only for unread e-mail less than six months old. If it has already been opened, or is more than six months old, all that law-enforcement officials need is a subpoena. In America, a subpoena does not need court approval and can be issued by a prosecutor. Similarly, a subpoena is sufficient to force ISPs to hand over their routing data, which can then be used to identify a sender’s various e-mails and to whom they were sent. That is how the FBI stumbled on a sex scandal involving David Petraeus, the now-ex director of the CIA, and his biographer.
  • ...7 more annotations...
  • No-one imagined that ISPs would one day offer gigabytes of online storage free—as Google, Yahoo!, Hotmail and other e-mail providers do today. The assumption back then was that if someone had not bothered to download and delete online messages within six months, such messages could reasonably be considered to be abandoned—and therefore not in need of strict protection.
  • wholesale access to the internet, powerful mobile phones and ubiquitous social networking have dramatically increased the amount of private data kept online. In the process, traditional thinking about online security has been rendered obsolete. For instance, more and more people nowadays keep their e-mail messages on third-party servers elsewhere, rather than on their own hard-drives or mobile phones. Many put their personal details, contacts, photographs, locations, likes, dislikes and inner thoughts on Google, Facebook, Twitter, Flickr, Dropbox and a host of other destinations. Bringing online privacy requirements into an age of cloud computing is only fit and proper, and long overdue.
  • the international telecoms treaty that emerged focused on how telephone traffic flows across borders, the rules governing the quality of service and the means operators could adopt to bill one another for facilitating international calls. As such, the regulations applied strictly to telecoms providers, the majority of which were state owned.
  • he goal of certain factions is to grant governments the authority to charge content providers like Amazon, Google, Facebook and Twitter for allowing their data to flow over national borders. If enacted, such proposals would most certainly deter investment in network infrastructure, raise costs for consumers, and hinder online access for precisely those people the ITU claims it wants to help.
  • a proposal sponsored by the United States and Canada to restrict the debate in Dubai strictly t
  • o conventional telecoms has met with a modicum of success, despite stiff opposition from Russia plus some African and Middle-Eastern countries. Behind closed doors, the conference has agreed not to alter the ITU’s current definition of “telecommunications” and to leave the introductory text concerning the existing treaty’s scope intact.
  • The sticking point has been what kind of organisations the treaty should apply to. Here, one word can make a huge difference. In ITU jargon, the current treaty relates only to “recognised operating agencies”—in other words, conventional telecoms operators. The ITU wants to change that to simply “operating agencies”. Were that to happen, not only would Google, Facebook and other website operators fall under the ITU’s jurisdiction, but so too would all government and business networks. It seems the stakes really are as high as the ITU’s critics have long maintained
Janja Petek

Google, Facebook and Twitter ordered to delete photos of James Bulger killers | Media |... - 0 views

  • Google, Facebook and Twitter have been ordered by the police to remove photographs purporting to show one of James Bulger's killers.
  • Police served the three web giants with the injunction that bans the purported identification of Venables and Robert Thompson
  • A spokeswoman for the attorney general's office said police had requested that Twitter, Facebook and Google "assist with the removal of material in breach of the terms of the order" and that the process was ongoing.
  • ...3 more annotations...
  • The photographs are believed to have begun circulating online
  • Twitter broke its silence about the issue in a Commons home affairs select committee hearing on Tuesday afternoon.
  • what is illegal offline is illegal online."
Jan Keček

Microsoft fined €561m for 'browser choice' error | Technology | guardian.co.uk - 0 views

  • Microsoft has been fined €561m by the European commission for failing to give users a choice of web browser when they logged into Windows computers in Europe between May 2011 and July 2012 – breaking a binding commitment it had made in 2009.
  • Microsoft made a five-year commitment in 2009 to offer users a choice of different browsers, after the EC's competition commission determined that the combination of its dominance on the desktop – where Windows runs around 95% of machines – gave the pre-installed Internet Explorer browser an unfair advantage over rivals
  • The commission implemented the "browser choice" system to create a level playing field - and said that once in use, it was very effective: "The choice screen was very successful with users," Joaquín Almunia, the competition commissioner, said in a statement. "For example, until November 2010, 84 million browsers were downloaded through it."
  • ...3 more annotations...
  • "We provided the commission with a complete and candid assessment of the situation, and we have taken steps to strengthen our software development and other processes to help avoid this mistake – or anything similar – in the future."
  • Microsoft said it took "full responsibility" for the technical error that caused the problem and that it had apologised for it.
  • ource close to Microsoft explained: "It was a single line in the code that triggered the browser choice program. It had a list of versions of Windows to test against: if the version was found in that list, the program would run. They didn't include Service Pack 1, which is effectively a different version of Windows, in that list. And so the program didn't run.
Kaja Horvat

Online Shopping: More Popular (Yet Less Satisfying) Than Ever | TIME.com - 0 views

  • consumers are increasingly content to turn to the web to get their holiday shopping done.
  • Yet as more consumers turn to online shopping before and after the holidays, more critics are voicing their dissatisfaction with e-retail. The biggest argument in favor of online shopping is that it eliminates the hassle of having to go to a store, but still, online shopping is hardly without hassles.
  • Among the problems: Purchased items were shipped to the wrong people; presents that were supposed to be gift-wrapped never were; cards alerting the recipients where the goods came from were buried deep inside packages or weren’t included at all; and, of course, clearing up these matters with customer service was a maddening, time-consuming process. Among the larger problems that Ephron, and surely many others, have with online shopping is this:
  • ...2 more annotations...
  • On a 100-point satisfaction scale, e-retail as a whole received a score of 78, down from 80 in the 2011 holiday season
  • for the eight year in a row, Amazon received the highest overall customer satisfaction rating in ForeSee’s study.
Kaja Horvat

EU agencies to sanction Google over privacy violations - INTERNET - FRANCE 24 - 0 views

  • EU data-protection agencies will take action against internet giant Google after it failed to comply with EU privacy laws,
  • In October the data protection agencies warned Google that its new confidentiality policy did not comply with EU laws and gave it four months to make changes or face legal action.
  • Google rolled out the new privacy policy in March 2012, allowing it to track users across various services to develop targeted advertising, despite sharp criticism from US and European consumer advocacy groups.
  • ...4 more annotations...
  • It contends the move simplifies and unifies its policies across its various services such as Gmail, YouTube, Android mobile systems, social networks and Internet search.
  • But critics argue that the policy, which offers no ability to opt out aside from refraining from signing into Google services, gives the operator of the world's largest search engine unprecedented ability to monitor its users.
  • European data protection agencies had recommended to Google that it improve information provided to users, particularly on the categories of data being processed, and for what purposes and services.
  • changes are designed to improve the user experience across the various Google products, and give the firm a more integrated view of its users
nensic

Over 800,000 on waiting list for Mailbox iPhone app - News - Gadgets & Tech - The Indep... - 0 views

  • More than 800,000 people are waiting to access a new iPhone app that aims to transform their email experience by helping them achieve the elusive "inbox zero" -- a fully processed and empty inbox.
  • The ability to "snooze" an email, which is to defer it to another time, whether later in the day, on the weekend, or until the following week, is one of the main features of the app.
  • "We want to decide ‘do I need to reply now', ‘can I deal with this later', or ‘should I get it out of the way and never deal with it again?'"
  • ...2 more annotations...
  • The system outlines a rule of "do it, delegate it, defer it, drop it" to help people maintain empty inboxes.
  • The app provides many new features over the native iPhone mail app, however it lacks the ability to multi-edit or multi-delete emails.
nikasvajncer

Addicted! Scientists show how internet dependency alters the human brain - Science - Ne... - 0 views

  • Internet addiction
  • changes in the brain similar to those seen in people addicted to alcohol, cocaine and cannabis.
  • We are doing it because modern life requires us to link up over the net in regard to jobs, professional and social connections – but not in an obsessive way.
  • ...9 more annotations...
  • "The majority of people we see with serious internet addiction are gamers – people who spend long hours in roles in various games that cause them to disregard their obligations. I have seen people who stopped attending university lectures, failed their degrees or their marriages broke down because they were unable to emotionally connect with anything outside the game."
  • spent many hours on the internet,
  • you know they have a problem
  • "The limitations [of this study] are that it is not controlled, and it's possible that illicit drugs, alcohol or other caffeine-based stimulants might account for the changes. The specificity of 'internet addiction disorder' is also questionable."
  • emotional processing, attention, decision making and cognitive control.
  • "internet addiction disorder"
  • In a groundbreaking study, researchers used MRI scanners to reveal abnormalities in the brains of adolescents who spent many hours on the internet, to the detriment of their social and personal lives.
  • An estimated 5 to 10 per cent of internet users are thought to be addicted – meaning they are unable to control their use.
  • "The majority of people we see with serious internet addiction are gamers – people who spend long hours in roles in various games that cause them to disregard their obligations.
Jernej Prodnik

Google raises privacy fears as personal details are released to app developers | Techno... - 0 views

  • Google raises privacy fears as personal details are released to app developers Campaigner says tech giant's policies don't make it clear that Google Play users who buy apps give over information
  • Charles Arthur guardian.co.uk, Monday 25 February 2013 14.39 GMT
  • Google Play: the personal details of app buyers are released to developers Google could face a third privacy row in a two years, after a leading campaigner called for the US government to investigate the fact that the names, geographic region and email addresses of people who buy apps from its Play store are passed on to the app developers without users' explicit permission.
  • ...5 more annotations...
  • Ben Edelman, an associate professor at Harvard Business School, says that analysis of Google's terms and conditions relating to its Google Play store and Google Wallet transaction system (used for buying apps) doesn't show any clauses where users are specifically told that their emails will be sent on to the developer. He also warns that developers could use that information to "track and harass" people who have given apps low ratings or requested refunds. And hackers – or malicious developers – could create personalised emails to send out to people to steal passwords (phishing) or install "updates" that were actually malware.
  • Google says it has to provide some location data about which country apps are bought in so developers can calculate the correct amount of tax to pay. But that does not explain why it passes on buyers' names and email addresses, which together with a postcode could be used to identify a person's location and address."Google's prior privacy blunders have put [it] under higher scrutiny," Edelman says, pointing to the 20-year consent order with the US Federal Trade Commission that Google signed in March 2011 in the wake of its Buzz social network fiasco – followed by a record $22.5m fine in August 2012 for hacking Apple users' browsers to install tracking cookies. It has also been fiercely criticised in Europe for its changes in March 2012 to its privacy policies, which data protection chiefs said could mean "uncontrolled" use of personal data.
  • Eric Butler, a freelance software developer of the Tapchat and Farebot apps, tweeted in July 2012 "I wonder if most Android users realise that when you buy an app in the Play Store the seller [of the app] can see your name, email address and phone."Following the row, he has noted on his blog that "Because the entire experience of purchasing Android apps is so sloppy, it's not unreasonable to assume that this privacy issue was actually an oversight." But, he says, "Google should follow Apple's lead and offer users and developers better privacy protection."
  • Another developer, Jesse Wilson, pointed out the same problem in November on Google+, and was quickly echoed by Chris Lacy, who said that "as a developer I never asked for this information, I have no need for it, and I simply do not want to be a custodian of such information."Lacy added that "As a consumer, this is distressing on many levels: there is no fair warning that this information will be transferred … trusting my personal information to Google is one thing. But with this system, users are unknowingly having to trust their information to a third party. There's no way to know what security measures that third party might have in place." He added that it meant that the app developer "has gained my personal information without requesting the appropriate permissions via the app."
  • Google has said that passing on the details does not breach its privacy conditions. In a quote to Siliconvalley.com, a representative told the site that "Google Wallet shares the information necessary to process a transaction, which is clearly spelled out in the Google Wallet privacy notice."
petra funtek

ScienceDirect.com - International Journal of Human-Computer Studies - A new look at sof... - 1 views

  • Soft lifting refers to the process whereby a legally licensed software program is installed or copied in violation of its licensing agreement. Previous research on this pervasive kind of unethical computer use has mainly focused on the determinants of this unethical act, which are rooted in personal, economic, technological, cultural, socio-political, or legal domains. However, little is known about the symbolic power that soft lifting has on the sense of self. Based on recent advances in behavioral priming, we hypothesized that soft lifting can influence the signals one sends to oneself; more specifically, soft lifting may prime individuals to experience an inauthentic sense of self, which, in turn, prompts further unethical behavior. In Study 1, we showed that participants, primed with the memory of a recent soft lifting experience, cheated more than participants recalling a recent experience of purchasing authentic software or than control participants. Moreover, feelings of inauthenticity mediated the priming effect of soft lifting on dishonest behavior. In Study 2, participants primed with soft lifting showed a greater willingness to purchase a wide range of counterfeit products over authentic products. Besides those antecedents or correlates of soft lifting already identified in the literature, educators should pay more attention to the negative impact of soft lifting on the self-images of users, which may go beyond computer-related behaviors. Priming may provide a new direction for HCI researchers to examine the impact of computer-use-related factors on users' perceptions, motivations, and behaviors.
1 - 18 of 18
Showing 20 items per page