Skip to main content

Home/ Internetni praktikum/ Group items tagged tools

Rss Feed Group items tagged

Jan Keček

11 Must-Have Tools for Blog & Social Content Creation - 0 views

  • “Anyone with half a brain can create information, but ‘content’ implies usefulness or utility.”
  • Ubersuggest takes your word or phrase and scrapes Google Suggestions to offer the hottest related topics people are searching for.
  • Tools Are a Marketer’s Best Friend What did I miss, bloggers and marketers? These are just the tools I use most often but I can’t imagine how much longer and less productive my day would be without them. Which content creation tools are your personal favorites?
donnamariee

Who is Social Media Really Working For? | Jason Benlevi | Cato Unbound - 0 views

  • “digital activism” had tremendous impact and leverage for change
  • It’s my opinion that social networking, as an activist tool, is being vastly oversold.
  • Technology always cuts two ways. Although the personal computer provided empowerment and creative liberation for individuals, and the Internet gave us access to information, they came at a cost.
  • ...7 more annotations...
  • Since centralized power is inherently non-democratic, these monolithic network entities are not inclined to liberate humanity. Therefore utopians better think twice if they are depending on the Net to promulgate democracy and freedom
  • Does social media make any kind of impact in molding opinion? Yes. As with all media types it serves both for good and evil, truth and lies
  • in the belief that cultural and physical realities are the determining factors far more than “friending” a cause. Whether we like it or not, bullets and batons are more potent than bytes. Reality generally trumps virtuality.
  • The efficacy of the network as a tool of activism is best examined in three different contexts: 1. Democratic states 2. Authoritarian states 3. Commercial “states”
  • the social network as it is presently constituted is not a serious tool for substantive social change. It is concentrated, centralized and controlled
  • n the democratic context, it is similarly a way to vent, and perhaps organize, but as of yet not much more. However, if you are selling widgets, the social network looks more promising.
  • Who is Social Media Really Working For?
  •  
    "WHO IS SOCIAL MEDIA REALLY WORKING FOR?" - essay theme
donnamariee

How Social Networking Has Changed Society | PCWorld - 0 views

  • How Social Networking Has Changed Society
  • Those who are chained to a company desk often use (or sneak onto) Twitter or Facebook to stay in touch with friends outside of work
  • ork and home life are quickly becoming blurred and social networks had better be prepared to keep up
  • ...2 more annotations...
  • social networking tools are just the beginning of something, that they could lead to ways of finding and interacting with one another we never imagined, but whatever happens, you can't dismiss these tools easily. They are taking us somewhere exciting, but we have to work out how we deal with the fading boundaries these tools have left in their wake and that means rewriting our social rules as we go along
  • expand the pool of people we have the opportunity to meet to near limitless possibilities. We're no longer restricted to or rely on people in our neighborhood, church, or workplace to provide the interaction we desire
  •  
    essay theme 3
sintija

BBC News - Google told to fix privacy policy by EU data regulators - 0 views

  • Google told to fix privacy policy by EU data regulators
  • consolidate 60 separate privacy policies into a single agreement.
  • Google has been told it should give clearer information about what data is being collected and for what purpose. It has also been told to give users more control over how the information is combined.
  • ...4 more annotations...
  • Google
  • has been accused of providing "incomplete and approximate" details raising "deep concerns about data protection and the respect of the European law".
  • It said that EU data protection laws place limits on such activities and proposed the following changes:
  • Google must "reinforce users' consent". It suggests this could be done by allowing its members to choose under what circumstances data about them was combined by asking them to click on dedicated buttons. The firm should offer a centralised opt-out tool and allow users to decide which of Google's services provided data about them. Google should adapt its own tools so that it could limit data use to authorised purposes. For example, it should be able to use a person's collated data to improve security efforts but not to target advertising.
nensic

Under the regime of precarity: bring your own device | openDemocracy - 0 views

  • At one and the same time technocracy and financial oligarchies find here an ideal medium to extend their influence and their control of individuals in space and time.
  • At one and the same time technocracy and financial oligarchies find here an ideal medium to extend their influence and their control of individuals in space and time. This explains the fierce struggle going on among key market players.
  • Today large communities use devices like smartphones, tablets, e-readers and ultrabooks to navigate this new ecosystem.
  • ...26 more annotations...
  • The growing dynamic of mobile internet, today accounting for 12% of all internet traffic,[ii] signals a new ecosystem where living bodies, machines, networks, code, data, territory and time interact.
  • as a way of consolidating their strictly neoliberal economic policy.
  • The hundreds of thousands of apps, available in just a few years, originate from the intersection of two factors:
  • The desire and necessity to have simple, functional and fast devices able to do specific tasks on the go.
  • the operative skills to develop apps for popular mobile platforms such as Iphone Operating System (IOS) or Google Android. 
  • Apps galore
  • Apple likes to play on the ambiguity in a form of propaganda that exalts the “revolutionary” spirit of technological innovation
  • The first iPhone, in 2007, inaugurated the new phase of the cognitive era, just as the PC heralded the decline of the industrial phase. Five years later, Apple no longer has a monopoly: hundreds of millions of smartphones and tablets are sold every year and the total number of these active devices will be soon 2 billion. It took the PC thirty years to reach this level of diffusion.
  • War over the immaterial
  • Often these machines play opposite functions: as a tool to create new forms of horizontal communication and social interaction or as bait for a capillary exploitation.
  • A political analysis of mobile devices
  • The PC became a liberating tool for social cooperation in the workplace of a booming third-sector.
  • In the following phase, the spread of the first mobile devices – cellphones and laptops – provided an initial impulse for a blurring of life and work, imposing with mobile calls, emails or SMS a new type of real-time processing, regulating the rhythms of life
  • In the new biohypermedia environment, the key change lies in the combination of miniaturizing and mobilizing these pieces of equipment, allowing them to always be within the body’s reach in any context.
  • they augment physical reality[ix] with every kind of information – commercial, cultural, ecological – and act more and more as biomedical sets for the control, correction and support of our vital biological functions.
  • The PC has a central function as the medium for linguistic and written processes - its typical uses often tied to the logical concatenation of thought and the priority management of sequences over time.
  • But mobile devices concentrate complex perception of stimuli in terms of spatial organization and intervene in emotional responses. PC work in this way occupies our left hemisphere, while the continual interactions of a smartphone engage the right hemisphere.
  • In contemporary neoliberalism, these devices become an essential means of rent and profit, through a fine capture of what we generate by living with them and using them. At one and the same time technocracy and financial oligarchies find here an ideal medium to extend their influence and their control of individuals in space and time.
  • Marketing and communication campaigns portray these devices as commodity fetishes, characterizing a new phase of capitalism often described as cognitive because based on knowledge.
  • In the sphere of multinational ICT[x] Corporations a war is being waged over the design and deployment of immaterial enclosures
  • Even though all this is based on freeware and open source, they trick us into believing that the iPhone 5, Windows 8 or Jellybean[xi] are miracles that descend from Mount Olympus and for which we should be grateful as to the gods.
  • Unlike automobiles or, to a lesser degree, PCs, the use value of new mobile devices is no longer determined merely by the initial design but can be moulded by the final user.
  • The innumerable websites, blogs and forums in every language globally blooming and growing are a workshop for worldwide exchange where the digital means are developed that could be used to withdraw workers both from precarity and  from total submission to a life of labour.  
  • Microsoft is no less defensive of its monopoly: with Intel and other accomplices, they introduced a new firmware to boot Windows 8 PCs that, substituting the old BIOS,[xv] makes it impossible or very complicated to install Linux or other operating systems on new laptops.
  • Despite hesitations related to “security” problems, today companies allow or even oblige people to use their own devices
  • So, if you were one of those many who found the latest tablet, smartphone or hybrid touch device under the tree this year, be aware that you won’t be the only one pleased: under the regime of precarity, bring your own device if you want to survive. 
  •  
    "Bring your own device (BYOD) is a business policy whereby employees bring personally owned mobile devices to their place of work and use them to access privileged company resources such as email, file servers and databases as well as their personal applications and data."
Kaja Horvat

Stolen identities: Manti Te'o, Facebook, and internet privacy - Opinion - Al Jazeera En... - 0 views

  • Indeed, most users of Facebook (or Google+, or countless other social networking sites) seem unaware of just how much they are sharing.
  • it is ultimately the responsibility of the user to understand his or her settings and know what, precisely, is being shared.
  • users must educate themselves about the privacy policies and tools available to them on Facebook or any other given site. Using available tools, users can reasonably protect their content from the public view.
  • ...3 more annotations...
  • Still, the best rule of thumb for individuals concerned about their photographs or other content reaching the public view is to not post them on the internet at all. While this may sound extreme, remember that it only takes one "bad apple" to share your content with those to whom you have not given permission.
  • personal Facebook photos stolen to create high-profile fictional characters
  • you have privacy settings on Facebook and obviously it doesn't work because anyone can hijack your picture
Jernej Prodnik

The New Westphalian Web - By Katherine Maher | Foreign Policy - 0 views

    • Jernej Prodnik
       
      And yet it was set-up by the governmental agencies.
  • In the popular consciousness, the Internet was simultaneously a place of possibility and danger. In 1993, Time magazine warned, "People who use … the Net may be in for a shock.… Anybody can start a discussion on any topic and say anything." It was precisely this structural independence that transformed the Internet from a mere tool for information-sharing to the world's open forum.
  • The rise of self-publishing tools like Blogger transformed the "third space" of cyberspace into a modern speaker's corner, offering any motivated writer a platform for his or her political views. Initially, this online free expression was often marginalized or dismissed -- the term "blogosphere" was originally a joke. But bloggers kept plugging away. In liberal democracies their free expression was guaranteed, and in closed societies connectivity was often too limited to draw any real attention.
  • ...1 more annotation...
  • . And the Internet -- this global resource, this wild space independent of states -- has made its mark on our neatly ordered world of nations.
Katja Kotnik

Me and my data: how much do the internet giants really know? | Technology | The Guardian - 0 views

  • Google is not only the world's largest search engine, it's one of the top three email providers, a social network, and owner of the Blogger platform and the world's largest video site, YouTube. Facebook has the social contacts, messages, wallposts and photos of more than 750 million people.
  • The site also lists my most recent sent and received emails (in both cases a "no subject" conversation thread with a colleague).
  • The big relief comes when I note Google isn't tracking the internet searches I've made on my work account
  • ...12 more annotations...
  • only around 29% of the information Facebook possesses on any given user is accessible through the site's tools.
  • The Facebook extended archive is a little creepier, including "poke info", each instance of tracking cookies they possess, previous names, and full login and logout info
  • Looking through anyone's list of searches gives a distressing degree of insight into odder parts of their personality.
  • how much do the internet giants really know?
  • sell us stuff
  • picked up by hackers
  • how much the internet giants know about us.
  • Google isn't totally unhelpfu
  • Every event to which I've ever been invited is neatly listed, alongside its location, time, and whether I said I would attend .
  • One piece of information – a supposed engagement to a schoolfriend, Amy Holmes – stands out. A Facebook "joke" that seemed faintly funny for about a week several years ago was undone by hiding it from any and all Facebook users, friends or otherwise (to avoid an "… is now single!" status update). The forgotten relationship helpfully explains why Facebook has served me up with badly targeted bridalwear adverts for several years, and reassures me that Facebook doesn't know quite everything.
  • This is the core of the main comfort
  • despite their mountain of data, Google and Facebook seem largely clueless, too – they've had no more luck making any sense out of it than I have. And that, for now, is a relief.
anonymous

Facebook Workers Try to Spend Less Than 1 Second Determining Whether Content Is 'Approp... - 0 views

  • Facebook
  • safer
  • Woodrow Wilson
  • ...14 more annotations...
  • online bullying
  • Internet
  • Facebook
  • ATLANTIC
  • she traveled to Facebook headquarters to see how they dealt with so-called "third party" reports of about inappropriate content.
  • how long he might spend deciding if a page should stay up or come down.
  • they "optimize for half a second." Half a second!
  • Middle- and high-schoolers are all on Facebook and that means all their drama is on Facebook, too.
  • reports
  • Facebook's
  • come up with some remarkable tools for managing conflict on its site.
  • they claim to have ways of handling problems like this, which serves as a defense to the suggestion that perhaps a government agency should try to regulate them, especially around minors' use of the service.
  • It costs money
  • they'll catch most baldly inappropriate content if they give their reviewers half a second to look at each page.
Gabrijela Vrbnjak

Brain-to-brain interface lets rats share information via internet | Science | The Guardian - 0 views

  • News Science Neuroscience Brain-to-brain interface lets rats share information via internet Rats thousands of miles apart collaborate on simple tasks with their brains connected through the internet Share 9893 inShare61 Email Ian Sample, science correspondent The Guardian, Friday 1 March 2013 jQ(document).ready(function(){ jQ.ajax({ url : 'http://resource.guim.co.uk/global/static/file/discussion/5/fill-comment-counts-swimlaned.js', dataType : 'script', type : 'get', crossDomain : true, cache: true }); }); Jump to comments (449) A rat with a brain-to-brain implant responds to a light (circled) by pressing a lever. Its motor cortex was connected to that of another rat. Photograph: Scientific Reports Scientists have connected the brains of a pair of animals and allowed them to share sensory information
  • US team fitted two rats with devices called brain-to-brain interfaces that let the animals collaborate on simple tasks to earn rewards
  • experiments showed that we have established a sophisticated, direct communication linkage between brains
  • ...10 more annotations...
  • In one radical demonstration of the technology, the scientists used the internet to link the brains of two rats separated
  • If the receiving rat failed at the task, the first rat was not rewarded with a drink, and appeared to change its behaviour to make the task easier for its partner.
  • an organic computer
  • we are creating
  • Even though the animals were on different continents
  • they could still communicate
  • we could create a workable network of animal brains distributed in many different locations
  • you could imagine that a combination of brains could provide solutions that individual brains cannot achieve by themselves
  • the work was "very important" in helping to understand how brains encode information
  • Very little is known about how thoughts are encoded and how they might be transmitted into another person's brain – so that is not a realistic prospect any time soon
inesmag

Home Network Vulnerabilities: Spam, Cookies, Pop-Ups, Spyware, and Scams > Spam - 0 views

  • Home Network Vulnerabilities: Spam, Cookies, Pop-Ups, Spyware, and Scams
  • Spam is the common name for unsolicited e-mail and it is a problem that is rampant on the Internet today.
  • Spammers do their dirty work by purchasing or creating giant e-mail lists and automated mailing tools called spambots. The lists are usually compiled from web pages where people provide their e-mail address as part of a registration process.
  • ...2 more annotations...
  • How to Block Spam There is a good chance that your ISP has some sort of spam-blocking feature available and, if spam is a problem for you, we suggest starting there.
  • replying to a spam e-mail does not stop it from coming
Miha Naprudnik

BBC - WebWise - How does the web work? - 1 views

  • Web pages can include embedded links or ’hyperlinks’, so simply clicking the link will take you to that page. Following a trail of links is called ‘web surfing’.
  • The web is also traversed by ’spiders’ (or software robots) that follow links and collect information that can be used by search engines such as Google. Not all web users are human!
  • As websites are becoming more sophisticated than static pages, web developers are using many more versatile tools. These include CSS (Cascading Style Sheets), scripting languages such as JavaScript and PHP (Hypertext Preprocessor), and Adobe Flash.
Jan Majdič

Free speech on the internet | Technology | guardian.co.uk - 0 views

  • Freedom of expression has long been regarded as one of the fundamental principles of modern democracies, in which civil liberties are honoured and regarded as a prerequisite for individual development and fulfilment.
  • It is this classic liberal argument that is still used by civil liberties' campaigners on the internet, like Hatewatch, which argues that those "hate speak" groups, such as neo-Nazis, must still speak freely, if only to expose and discredit themselves
  • It is not simply a case of "same old issue, new technology" with free speech and the internet. With its low start-up costs and global reach, the internet enables almost anyone in the West, in theory, to speak and be heard around the world, as well as hear others' speech.
  • ...11 more annotations...
  • particularly when they originate from, and are hosted in, foreign countries.
  • China have successfully prevented their citizens from receiving a huge quantity of (pro-democratic) material on the internet.
  • Governments in the USA, Germany and France, have all taken significant steps to curtail free speech on the internet
  • The anti-censorship pressure group, Campaign Against Censorship of the Internet in Britain, was created in response Scotland Yard's request to ISPs to censor their news feeds
  • seeking to regulate and control its immense, potential, power.
  • US is several years ahead of Britain
  • industry self-regulation
  • Technology is used to censor and evade censorship, although it seems likely that censorship tools will grow in sophistication and use as legislators struggle to censor the internet.
  • In December 1997, a 200-strong internet industry group agreed to accept a common standard of labelling called PICS - the Platform for Internet Content Selection
  • Millions of internet users in big offices, cybercafés, education institutions and libraries will use machines or ISPs which have filters installed in them.
  • In 1999, the EU launched an action plan, "Promoting Safer Use of the Internet", which provides for a hotline, where people can report sites which have caused offence
donnamariee

Technology in schools: saving money with cloud, open source and consortia | Teacher Net... - 0 views

  • largest elements of a school's budget,
  • with the role of technology as a teaching tool and in society at large growing all the time, the trick is delivering savings without damaging pupils' education or putting them at a disadvantage in the world outside school.
  • open source software,
  • ...7 more annotations...
  • The change is saving around £3,000 a year in licensing costs, according to the schools' ICT manager Phil Jones.
  • The school has also moved to open source for its virtual learning environment (VLE), now run through Moodle.
  • While open source has brought benefits in terms of flexibility, there is no doubt that the reduced cost is a major attraction, however. "ICT is always a big drain on a school budget, and any way we can save money is a massive help,"
  • Open source is also one of the solutions adopted at Notre Dame High in Sheffield, where it is used for email and management systems, as well as the school's VLE, again on Moodle. One of the advantages of open source is its flexibility, but this is only appealing if the school has the technical know-how to tweak it according to its needs
  • Changes in the educational landscape, such as the emergence and growth of federations, academy chains and clusters of headteachers working together, may resolve this in the future, but in the meantime the benefits of the external support that come from a proprietorial system may outweigh the savings of free software
  • "One of the risks is schools that go very heavily into open source end up with a system that is so bespoke only the school's technical manager can understand it
  • Technology in schools: saving money with cloud, open source and consortia
donnamariee

A 'more revolutionary' Web - The New York Times - 0 views

  • Just when the ideas behind "Web 2.0" are starting to enter into the mainstream, the mass of brains behind the World Wide Web is introducing pieces of what may end up being called Web 3.0. "Twenty years from now, we'll look back and say this was the embryonic period," said Tim Berners-Lee, 50, who established the programming language of the Web in 1989 with colleagues at CERN, the European science institute.
  • To many in technology, Web 2.0 means an Internet that is even more interactive, customized, social and media-intensive - not to mention profitable - than the one of a decade ago.It is a change apparent with multilayered media databases like Google Maps, software programs that run inside Web browsers like the collaboration-friendly word processor Writely, high-volume community forums like MySpace, and so-called social search tools like Yahoo Answers.
  • In this version of the Web, sites, links, media and databases are "smarter" and able to automatically convey more meaning than those of today.For example, Berners-Lee said, a Web site that announces a conference would also contain programming with a lot of related information embedded within it.A user could click on a link and immediately transfer the time and date of the conference to his or her electronic calendar. The location - address, latitude, longitude, perhaps even altitude - could be sent to his or her GPS device, and the names and biographies of others invited could be sent to an instant messenger list.
  • ...2 more annotations...
  • "There is an obvious place for the semantic Web in life sciences, in medicine, in industrial research," Shadbolt said, and that is where most of the focus is today."We're looking for communities of information users to show them the benefits," he said. "It's an evolutionary process."The big question is whether it will move on next to businesses or consumers, he said. A consequence of an open and diffuse Internet, he noted, is that unexpected outcomes can emerge from unanticipated places.
  • "People keep asking what Web 3.0 is," Berners-Lee said. "I think maybe when you've got an overlay of scalable vector graphics - everything rippling and folding and looking misty - on Web 2.0 and access to a semantic Web integrated across a huge space of data, you'll have access to an unbelievable data resource."Said Sheehan: "I believe the semantic Web will be profound. In time, it will be as obvious as the Web seems obvious to us today."
inesmag

How to keep your privacy online | Ask Jack | Technology | guardian.co.uk - 2 views

  • I would like my browsing and Google searches to be private. I don't want targeted advertising and I don't want to feel that anonymous companies are harvesting my clicks to learn all about me.
  • When the web was young, and a lot less shiny, web pages were fixed (static) and – barring browser quirks – everybody saw much the same thing. Today, much of the web is dynamic, which means that what you see has been adapted or possibly constructed on the fly just for you.
  • From your point of view, the advantage is that the websites you visit will be personalised to suit your needs and tastes. From the website's point of view, the advantage is that it can also personalise its prices and advertising to try to suit your needs and tastes, and increase your propensity to click and buy.
  • ...6 more annotations...
  • On the web, the rule is: if you're not paying, then you are what's being sold.
  • Probably the simplest way to reduce personalisation is to use an anonymising service. Instead of accessing the web directly, you access it via a third-party proxy server, so your that requests are mixed in with thousands of others. These services usually allow you to control cookies, turn JavaScript on and off, withhold "referrer details" and so on.
  • Nonetheless, it's often useful to have access to an anonymous proxy service, and everybody should find one they like. Examples include The Cloak, Megaproxy, Proxify and ID Zap. There are also networked open source privacy systems such as Tor and I2P.
  • Google also tracks your progress across hundreds of thousands of websites via Google Analytics. To opt out of this, install the Google Analytics Opt-out Browser Add-on (Beta), which Google offers for Microsoft Internet Explorer, Google Chrome, Mozilla Firefox, Apple Safari and Opera. However, some sites use different analytics software or track visitors in other ways you will be unaware of. Ghostery may help reduce these.
  • Finally, Facebook Connect is a potential privacy problem because it "allows users to 'connect' their Facebook identity, friends and privacy to any site".
  • In general, the more you do online – social networking, cloud computing etc – the more your privacy and security are at risk. Reducing that risk involves effort and inconvenience, so it's up to you to find an acceptable compromise
Blaž Gobec

Why Facebook's new Open Graph makes us all part of the web underclass | Technology | gu... - 1 views

  • ou're not paying for your presence on the web, then you're
  • just a product being used by an organisation bigger than you
  • When you use a free web service you're the underclass. At best you're a guest. At worst you're a beggar, couchsurfing the web and scavenging for crumbs. It's a cliché but worth repeating: if you're not paying for it, you're aren't the customer, you're the product.
  • ...10 more annotations...
  • Your individual account is probably worth very little to the service provider, so they'll have no qualms whatsoever with tinkering with the service or even making radical changes in their interests rather than yours. If you don't like it you're welcome to leave. You may well not be able to take your content and data with you, and even if you can, all your URLs will be broken.
  • if you really care about your site you need to run it on your own domain. You need to own your URLs. You'll have total control and no-one can take it away from you. You don't need anyone else. If you put the effort in up front it'll pay off in the long run.But it's no longer that simple.
  • Anyone who's ever run a website knows that building the site is one thing, but getting people to use it is quite another. The smaller your real-world presence the harder it is. If you're a national newspaper or a Hollywood star you probably won't have much trouble getting people to visit your website. If you're a self-employed plumber or an unknown blogger writing in your spare time, it's considerably harder.
  • Social networks have changed all that. Facebook and Twitter now wield enormous power over the web by giving their members ways to find and share information using tools that work in a social context.
  • Either way, your social network presence is more important than your own website.
  • But increasingly that freedom is just the freedom to be ignored, the freedom to starve.
  • es, that's nearly 34,000 new Facebook apps created in one day by customers of just one hosting company.
  • What Facebook is doing is very different. When it records our activity away from the Facebook site it's a third party to the deal. It doesn't need this data to run its own services.
  • orst o
  • all, the way Facebook collects and uses our data is both unpredictable and opaque. Its technology and policies move so quickly you'd need to be a technical and legal specialist and spend an inordinate amount of time researching Facebook's activities on an ongoing basis to have any hope of understanding what they're doing with your data.
Rok Urbancic

Would you buy a 'No internet. No video. No music' laptop? - News - Gadgets & Tech - The... - 0 views

  • wouldn't it be nice to have a phone that just does phone calls?
  • at the Buckeye Tool Expo in Dalton, Ohio there is unusual demand for devices that do less.
  • the exhibition is a draw for the Amish community, whose access to technology is restricted by their faith.
  • ...8 more annotations...
  • You don't have to wear a bonnet, however, to seek low-technology in a world still gripped by the race to offer enough bells and brushed
  • The Amish laptop is at the extreme end of a quiet drive for digital simplicity
  • The 105 has real buttons, makes calls, sends texts, costs £13 and has, wait for it, a battery life of 35 days
  • Less-smart phones are also winning fans wishing to liberate their fingers and minds from hours of distraction from forgotten pursuits, like reading books, and their wallets from £80 phone bills.
  • The needs of users aren't always the priority of tech giants more often guided by marketing departments.
  • Clutter is banished from screen and keyboard, which features dedicated "copy" and "paste" keys.
  • Ordissimo will compete with SimplicITy, laptops with just six functions launched in 2009
  • The majority of people only want a computer to send emails, Skype their family, browse the web and write documents
anonymous

SaneBox: Email Management Tool Review | Inc.com - 0 views

  • It's like Gmail's Priority Inbox feature in that it looks at your messages and prior history engaging with those senders and decides which emails you're likely to deem most important.
  • Priority Inbox is trainable in this way, as well; the more you move stuff around, the better it gets at categorization. But I prefer SaneBox.
  • SaneBox gives you a custom dashboard including a timeline that graphs how many important and less important emails you get every day. My current average, according to SaneBox, is 81 a day. If I took a minute to read, digest, and respond to each one of them, that's nearly an hour and a half a day going through email. If you figure there's at least 250 work days in a year, I'm spending 375 hours annually on email. That's not acceptable.
  • ...2 more annotations...
  • And it also has a nifty feature that lets you CC or BCC a message to @SaneBox.com to remind you if someone doesn't respond.
  • SaneBox also creates an @SaneRemindMe folder that lets you keep track of all the messages to which you still need replies. Use oneweek@SaneBox.com, June5@SaneBox.com or 5minutes@SaneBox.com; it doesn't matter, SaneBox will figure out the time frame you need.
1 - 20 of 24 Next ›
Showing 20 items per page