Skip to main content

Home/ Internetni praktikum/ Group items tagged review

Rss Feed Group items tagged

Katja Saje

Who Owns the Future? by Jaron Lanier; Big Data by Victor Mayer-Schönberger an... - 1 views

  • Successful technologists are the new "ruling class". In this digital world order, money and power are concentrated in the hands of a few.
  • Each technological innovation produces the potential not just for cyber-crime, but for manipulating the way we lead our lives.
  • imagine you take a driverless taxi. Without explanation, it lingers in front of billboards during your journey or forces you to a particular convenience store if you need to pick up something. Is that very different to search engines reading your mind through your click-habits or Amazon telling you, often accurately, what you really want to read next?
  • ...2 more annotations...
  • The amount of raw data about all our lives continues to rise exponentially.
  • benefit and danger will depend on the use to which the information is put and the safeguards that protect us from technical malfunction and human malevolence.
anonymous

Facebook Workers Try to Spend Less Than 1 Second Determining Whether Content Is 'Approp... - 0 views

  • Facebook
  • safer
  • Woodrow Wilson
  • ...14 more annotations...
  • online bullying
  • Internet
  • Facebook
  • ATLANTIC
  • she traveled to Facebook headquarters to see how they dealt with so-called "third party" reports of about inappropriate content.
  • how long he might spend deciding if a page should stay up or come down.
  • they "optimize for half a second." Half a second!
  • Middle- and high-schoolers are all on Facebook and that means all their drama is on Facebook, too.
  • reports
  • Facebook's
  • come up with some remarkable tools for managing conflict on its site.
  • they claim to have ways of handling problems like this, which serves as a defense to the suggestion that perhaps a government agency should try to regulate them, especially around minors' use of the service.
  • It costs money
  • they'll catch most baldly inappropriate content if they give their reviewers half a second to look at each page.
Jan Keček

Cyber-security: To the barricades | The Economist - 0 views

  • European Commission and the White House have set out a series of new rules designed to stem the rising tide of cyber-attacks against public and private victims.
  • Alongside his state-of-the-union message on February 11th, Barack Obama released an executive order intended to plug the gap left by the failure of Congress to pass cyber-security legislation that matches the growing threat.
  • By contrast, the European Commission’s cyber-security strategy is at an earlier stage. It wants member countries to introduce laws compelling important firms in industries such as transport, telecoms, finance and online infrastructure to disclose details of any attack they suffer to a national authority, known as a CERT (Computer Emergency Response Team). Each CERT will be responsible for defending vital infrastructure-providers against online attacks and sharing information with its counterparts, law-enforcement agencies and data-protection bodies.
  • ...1 more annotation...
  • What neither the European nor American measures deal with directly is the shortage of cyber-security specialists. A gloomy review of the British government’s strategy by the National Audit Office, a spending watchdog, said the skills gap could take 20 years to bridge.
sintija

BBC News - US internet 'six strikes' anti-piracy campaign begins - 0 views

  • US internet 'six strikes' anti-piracy campaign begins
  • Five of the country's leading internet service providers (ISPs) are taking part in the Copyright Alert System (CAS), which they say is designed to educate rather than punish users.
  • "Over the course of the next several days... our content partners will begin sending notices of alleged peer-to-peer copyright infringement to ISPs, and the ISPs will begin forwarding those notices in the form of copyright alerts to consumers,
  • ...4 more annotations...
  • Consumers whose accounts have been used to share copyrighted content over P2P networks illegally (or without authority) will receive alerts that are meant to educate rather than punish, and direct them to legal alternatives. And for those consumers who believe they received alerts in error, an easy-to-use process will be in place for them to seek independent review of the alerts they received.
  • Meanwhile the UK has favoured a proposed "three strikes" policy
  • Under telecom regulator Ofcom's draft code, users who receive three warnings within 12 months would have anonymous information about their activities passed to copyright holders which could then seek court orders to discover their identities.
  • The policy had been due to come into effect in March 2014, but has been delayed after a House of Lords committee queried whether the Digital Economy Act - which the code is part of - complied with Treasury rules.
Urška Cerar

What Does Google Do If the Government Comes Looking for Your Emails? - Rebecca J. Rosen... - 0 views

  • Every single day, dozens of requests from law-enforcement officials, courts, and other government agencies pour into Google's offices, requesting that Google hand over different pieces of information its users have amassed
  • many of these requests are legitimate
  • It's important for law enforcement agencies to pursue illegal activity and keep the public safe.
  • ...5 more annotations...
  • Google says, "When we receive such a request, our team reviews the request to make sure it satisfies legal requirements and Google's policies.
  • once a request has been deemed valid, Google will notify users when possible.
  • Google will not provide a user's search-query information or the contents of a user's account (email content, pictures, documents, etc.) without a warrant.
  • Google has advocated for updating ECPA, "so the same protections that apply to your personal documents that you keep in your home also apply to your email and online documents."
  • If Google can establish clear practices now that somehow balance the competing needs of law-enforcement agencies and private users, that effort will pay off
nikasvajncer

Leading article: Thanks to the internet, the customer is king again. Long may he reign ... - 0 views

  • TripAdvisor, the consumer website for travellers, faces the threat of a lawsuit from hoteliers and others who claim they are being damaged by unsubstantiated and malicious reviews. The website, it appears, may have to fight its corner in court.
  • The internet has increased consumer power and started to even up the balance.
  • The internet has given ordinary consumers a voice. And if existing sites have their wings clipped by disgruntled businesses, others will simply spring up to replace them.
Janja Petek

Clashes over Internet regulation during UN talks - World Politics - World - The Indepen... - 0 views

  • The head of the UN's telecommunication overseers sought Monday to quell worries about possible moves toward greater Internet controls during global talks in Dubai, but any attempts for increased Web regulations are likely to face stiff opposition from groups led by a major US delegation.
  • he 11-day conference — seeking to update codes last reviewed when the Web was virtually unknown
  • highlights the fundamental shift from tightly managed telecommunications networks to the borderless sweep of the Internet. 
  • ...6 more annotations...
  • xpanding the Internet into developing nations.
  • Many countries will come to reaffirm their desire to see freedom of expression embedded in this conference,
  • The gathering is also powerless to force nations to change their Internet policies, such as China's notorious "Great Firewall" and widespread blackouts of political opposition sites in places including Iran and the Gulf Arab states.
  • That opens the door ... to content censorship
  • t is clear that some governments have an interest in changing the rules and regulations of the Internet,"
  • Over the decades, it has expanded to include telephone, satellite and other advances in communications.
anonymous

SaneBox: Email Management Tool Review | Inc.com - 0 views

  • It's like Gmail's Priority Inbox feature in that it looks at your messages and prior history engaging with those senders and decides which emails you're likely to deem most important.
  • Priority Inbox is trainable in this way, as well; the more you move stuff around, the better it gets at categorization. But I prefer SaneBox.
  • SaneBox gives you a custom dashboard including a timeline that graphs how many important and less important emails you get every day. My current average, according to SaneBox, is 81 a day. If I took a minute to read, digest, and respond to each one of them, that's nearly an hour and a half a day going through email. If you figure there's at least 250 work days in a year, I'm spending 375 hours annually on email. That's not acceptable.
  • ...2 more annotations...
  • And it also has a nifty feature that lets you CC or BCC a message to @SaneBox.com to remind you if someone doesn't respond.
  • SaneBox also creates an @SaneRemindMe folder that lets you keep track of all the messages to which you still need replies. Use oneweek@SaneBox.com, June5@SaneBox.com or 5minutes@SaneBox.com; it doesn't matter, SaneBox will figure out the time frame you need.
pina bitenc

The death of Web 2.0 is nigh | Technology | Technology | The Observer - 0 views

  • The death of Web 2.0 is nigh…
  • The death of Web 2.0 is nigh… Our lives were changed by Web 2.0 platform technology, but according to an industry watcher its days are numbered
  • Our lives were changed by Web 2.0 platform technology, but according to an industry watcher its days are numbered
  • ...9 more annotations...
  • The prediction of Web 2.0's demise was made by Christopher Mims, a technology commentator who writes for the MIT journal Technology Review. He started by typing Web 2.0 into Google Trends search engine
  • As it happens, Web 2.0 does mean something, even though the definition gets a bit fuzzy round the edges. It first appeared in 1999
  • if the internet itself was the platform on which Web 1.0 – the first version of the Web as a simple publication system – was built, then Web 2.0 was the platform on which new, innovative  applications could be built.
  • Online mapping systems
  • Image-hosting services
  • social networking services such as MySpace, Orkut, LinkedIn, Facebook and Twitter.
  • Cloud computing
  • So one way of looking at Web 2.0 is simply to say that it's "the web done properly"
  • The big question, of course, is what will Web 3.0 be like? And the answer, I suppose, is that if we knew that then we wouldn't be here.
petra funtek

EBSCOhost: Internet Piracy as a Hobby: What Happens When the Brazilian Jeitinho Meets ... - 2 views

  • Downloading?
  • Internet Piracy as a Hobby: What Happens When the Brazilian Jeitinho Meets Television
  • This paper explores the Brazilian cultural practices of illegal downloading of American television programs. Through research on television show forums, fandom websites, fan communities in the social networking website Orkut, the networks' homepages and literature review, piracy is shown to be related to cultural practices and an inadequate broadcasting system. It seems Brazilian fans persist in breaking the law when downloading television shows from unauthorized sources, regardless of the severe legal penalties to transgressors. They use a popular 'problem-solving strategy' (Duarte, 2006) called jeitinho brasileiro to respond to the delay or unavailability of U.S. programming on Brazilian cable and free to air television. The jeitinho brasileiro is exemplified by the fans having organized systems for file sharing of the episodes in Orkut fan communities. The study looks at a group of fans named legenders, who produce subtitles for the downloaded shows as a hobby, also despite of the Brazilian legislation on intellectual property protection. Furthermore, the paper explains why Brazilians who download television shows do not respect the law in reference to cultural, economic and political contexts. It concludes with the idea that the broadcasting industry must update and adapt its television programming distribution system, taking into account the particular context of each country, such as in Brazil.
petra funtek

Is the Devil in the Data? A Literature Review of Piracy Around the World - Kariithi - 2... - 1 views

  • This article examines the scholarly literature pertaining to music, film and software piracy around the world, with special attention to data sources, research scope and general findings. The article finds that the conspicuous absence of methodologies utilizing critical theory in this broad literature has constricted the world view of piracy, resulting in monolithic explanations of the causes and correlates of piracy. It further identifies systematic biases relating to the unjustified use of data published by the industry watchdog Business Software Alliance
1 - 13 of 13
Showing 20 items per page