Successful technologists are the new "ruling class". In this digital world order, money and power are concentrated in the hands of a few.
Who Owns the Future? by Jaron Lanier; Big Data by Victor Mayer-Schönberger an... - 1 views
-
-
Each technological innovation produces the potential not just for cyber-crime, but for manipulating the way we lead our lives.
-
imagine you take a driverless taxi. Without explanation, it lingers in front of billboards during your journey or forces you to a particular convenience store if you need to pick up something. Is that very different to search engines reading your mind through your click-habits or Amazon telling you, often accurately, what you really want to read next?
- ...2 more annotations...
Facebook Workers Try to Spend Less Than 1 Second Determining Whether Content Is 'Approp... - 0 views
-
Facebook
-
safer
-
Woodrow Wilson
- ...14 more annotations...
Cyber-security: To the barricades | The Economist - 0 views
-
European Commission and the White House have set out a series of new rules designed to stem the rising tide of cyber-attacks against public and private victims.
-
Alongside his state-of-the-union message on February 11th, Barack Obama released an executive order intended to plug the gap left by the failure of Congress to pass cyber-security legislation that matches the growing threat.
-
By contrast, the European Commission’s cyber-security strategy is at an earlier stage. It wants member countries to introduce laws compelling important firms in industries such as transport, telecoms, finance and online infrastructure to disclose details of any attack they suffer to a national authority, known as a CERT (Computer Emergency Response Team). Each CERT will be responsible for defending vital infrastructure-providers against online attacks and sharing information with its counterparts, law-enforcement agencies and data-protection bodies.
- ...1 more annotation...
BBC News - US internet 'six strikes' anti-piracy campaign begins - 0 views
-
US internet 'six strikes' anti-piracy campaign begins
-
Five of the country's leading internet service providers (ISPs) are taking part in the Copyright Alert System (CAS), which they say is designed to educate rather than punish users.
-
"Over the course of the next several days... our content partners will begin sending notices of alleged peer-to-peer copyright infringement to ISPs, and the ISPs will begin forwarding those notices in the form of copyright alerts to consumers,
- ...4 more annotations...
What Does Google Do If the Government Comes Looking for Your Emails? - Rebecca J. Rosen... - 0 views
-
Every single day, dozens of requests from law-enforcement officials, courts, and other government agencies pour into Google's offices, requesting that Google hand over different pieces of information its users have amassed
-
many of these requests are legitimate
-
It's important for law enforcement agencies to pursue illegal activity and keep the public safe.
- ...5 more annotations...
Leading article: Thanks to the internet, the customer is king again. Long may he reign ... - 0 views
-
TripAdvisor, the consumer website for travellers, faces the threat of a lawsuit from hoteliers and others who claim they are being damaged by unsubstantiated and malicious reviews. The website, it appears, may have to fight its corner in court.
-
The internet has increased consumer power and started to even up the balance.
-
The internet has given ordinary consumers a voice. And if existing sites have their wings clipped by disgruntled businesses, others will simply spring up to replace them.
Clashes over Internet regulation during UN talks - World Politics - World - The Indepen... - 0 views
-
The head of the UN's telecommunication overseers sought Monday to quell worries about possible moves toward greater Internet controls during global talks in Dubai, but any attempts for increased Web regulations are likely to face stiff opposition from groups led by a major US delegation.
-
he 11-day conference — seeking to update codes last reviewed when the Web was virtually unknown
-
highlights the fundamental shift from tightly managed telecommunications networks to the borderless sweep of the Internet.
- ...6 more annotations...
SaneBox: Email Management Tool Review | Inc.com - 0 views
-
It's like Gmail's Priority Inbox feature in that it looks at your messages and prior history engaging with those senders and decides which emails you're likely to deem most important.
-
Priority Inbox is trainable in this way, as well; the more you move stuff around, the better it gets at categorization. But I prefer SaneBox.
-
SaneBox gives you a custom dashboard including a timeline that graphs how many important and less important emails you get every day. My current average, according to SaneBox, is 81 a day. If I took a minute to read, digest, and respond to each one of them, that's nearly an hour and a half a day going through email. If you figure there's at least 250 work days in a year, I'm spending 375 hours annually on email. That's not acceptable.
- ...2 more annotations...
The death of Web 2.0 is nigh | Technology | Technology | The Observer - 0 views
-
The death of Web 2.0 is nigh…
-
The death of Web 2.0 is nigh… Our lives were changed by Web 2.0 platform technology, but according to an industry watcher its days are numbered
-
Our lives were changed by Web 2.0 platform technology, but according to an industry watcher its days are numbered
- ...9 more annotations...
EBSCOhost: Internet Piracy as a Hobby: What Happens When the Brazilian Jeitinho Meets ... - 2 views
-
Downloading?
-
Internet Piracy as a Hobby: What Happens When the Brazilian Jeitinho Meets Television
-
This paper explores the Brazilian cultural practices of illegal downloading of American television programs. Through research on television show forums, fandom websites, fan communities in the social networking website Orkut, the networks' homepages and literature review, piracy is shown to be related to cultural practices and an inadequate broadcasting system. It seems Brazilian fans persist in breaking the law when downloading television shows from unauthorized sources, regardless of the severe legal penalties to transgressors. They use a popular 'problem-solving strategy' (Duarte, 2006) called jeitinho brasileiro to respond to the delay or unavailability of U.S. programming on Brazilian cable and free to air television. The jeitinho brasileiro is exemplified by the fans having organized systems for file sharing of the episodes in Orkut fan communities. The study looks at a group of fans named legenders, who produce subtitles for the downloaded shows as a hobby, also despite of the Brazilian legislation on intellectual property protection. Furthermore, the paper explains why Brazilians who download television shows do not respect the law in reference to cultural, economic and political contexts. It concludes with the idea that the broadcasting industry must update and adapt its television programming distribution system, taking into account the particular context of each country, such as in Brazil.
Is the Devil in the Data? A Literature Review of Piracy Around the World - Kariithi - 2... - 1 views
-
This article examines the scholarly literature pertaining to music, film and software piracy around the world, with special attention to data sources, research scope and general findings. The article finds that the conspicuous absence of methodologies utilizing critical theory in this broad literature has constricted the world view of piracy, resulting in monolithic explanations of the causes and correlates of piracy. It further identifies systematic biases relating to the unjustified use of data published by the industry watchdog Business Software Alliance
1 - 13 of 13
Showing 20▼ items per page