Skip to main content

Home/ Internetni praktikum/ Group items tagged uses

Rss Feed Group items tagged

Gabrijela Vrbnjak

BBC News - Web code weakness allows data dump on PCs - 0 views

  • The loophole exploits a feature of HTML 5 which defines how websites are made and what they can do.
  • Developer Feross Aboukhadijeh found the bug and set up a demo page that fills visitors' hard drives with pictures of cartoon cats. In one demo, Mr Aboukhadijeh managed to dump one gigabyte of data every 16 seconds onto a vulnerable Macbook. Clever code Most major browsers, Chrome, Internet Explorer, Opera and Safari, were found to be vulnerable to the bug, said Mr Aboukhadijeh. While most websites are currently built using version 4 of the Hyper Text Markup Language (HTML), that code is gradually being superseded by the newer version 5. One big change brought in with HTML 5 lets websites store more data locally on visitors' PCs. Safeguards built into the "local storage" specification should limit how much data can be stored. Different browsers allow different limits but all allow at least 2.5 megabytes to be stored. However, Mr Aboukhadijeh found a way round this cap by creating lots of temporary websites linked to the one a person actually visited. He found that each one of these associated sites was allowed to store up to the limit of data because browser makers had not written code to stop this happening. By endlessly creating new, linked websites the bug can be used to siphon huge amounts of data onto target PCs. Only Mozilla's Firefox capped storage at 5MB and was not vulnerable, he found. "Cleverly coded websites have effectively unlimited storage space on visitor's computers," wrote Mr Aboukhadijeh in a blogpost about the bug. Code to exploit the bug has been released by Mr Aboukhadijeh and he set up a website, called Filldisk that, on vulnerable PCs, dumps lots of images of cats on to the hard drive. So far, no malicious use of the exploits has been observed. In a bid to solve the problem, bug reports about the exploit have been filed with major browser makers. More on This Story .related-links-list li { position: relative; } .related-links-list .gvl3-icon { position: absolute; top: 0; left: 0; } Related Stories Firefox smartphone partners revealed 24 FEBRUARY 2013, TECHNOLOGY Flash Player exits Android store 15 AUGUST 2012, TECHNOLOGY HTML 5 target for cybercriminals 02 DECEMBER 2011, TECHNOLOGY $render("page-see-also","ID"); $render("page-newstracker","ID"); Related Internet links Feross Aboukhadijeh The BBC is not responsible for the content of external Internet sites $render("page-related-items","ID"); Share this pageShare this page1.4KShareFacebookTwitter Email Print In association with $render("advert","advert-sponsor-module","page-bookmark-links"); $render("advert-post-script-load"); $render("advert-post-script-load"); More Technology stories RSS Computer glitch hits Mars rover Nasa's Curiosity Mars rover is put into "safe mode" after a computer glitch caused by corrupted files. US plans small-ship drone launches Hackers breach Evernote security $render("advert","advert-mpu-high"); $render("advert-post-script-load"); Top Stories http://news.bbcimg.co.uk/media/images/6618
  • found the bug and set up a demo page that fills visitors' hard drives with pictures of cartoon cats.
  • ...6 more annotations...
  • because browser makers had not written code to stop this happening. By endlessly creating new, linked websites the bug can be used to siphon huge amounts of data onto target PCs.
  • found a way round this cap by creating lots of temporary websites linked to the one a person actually visited
  • Most major browsers, Chrome, Internet Explorer, Opera and Safari, were found to be vulnerable to the bug
  • was not vulnerable
  • Mozilla's Firefox
  • bug reports about the exploit have been filed with major browser makers.
nensic

Under the regime of precarity: bring your own device | openDemocracy - 0 views

  • At one and the same time technocracy and financial oligarchies find here an ideal medium to extend their influence and their control of individuals in space and time.
  • At one and the same time technocracy and financial oligarchies find here an ideal medium to extend their influence and their control of individuals in space and time. This explains the fierce struggle going on among key market players.
  • Today large communities use devices like smartphones, tablets, e-readers and ultrabooks to navigate this new ecosystem.
  • ...26 more annotations...
  • The growing dynamic of mobile internet, today accounting for 12% of all internet traffic,[ii] signals a new ecosystem where living bodies, machines, networks, code, data, territory and time interact.
  • as a way of consolidating their strictly neoliberal economic policy.
  • The hundreds of thousands of apps, available in just a few years, originate from the intersection of two factors:
  • The desire and necessity to have simple, functional and fast devices able to do specific tasks on the go.
  • the operative skills to develop apps for popular mobile platforms such as Iphone Operating System (IOS) or Google Android. 
  • Apps galore
  • Apple likes to play on the ambiguity in a form of propaganda that exalts the “revolutionary” spirit of technological innovation
  • The first iPhone, in 2007, inaugurated the new phase of the cognitive era, just as the PC heralded the decline of the industrial phase. Five years later, Apple no longer has a monopoly: hundreds of millions of smartphones and tablets are sold every year and the total number of these active devices will be soon 2 billion. It took the PC thirty years to reach this level of diffusion.
  • War over the immaterial
  • Often these machines play opposite functions: as a tool to create new forms of horizontal communication and social interaction or as bait for a capillary exploitation.
  • A political analysis of mobile devices
  • The PC became a liberating tool for social cooperation in the workplace of a booming third-sector.
  • In the following phase, the spread of the first mobile devices – cellphones and laptops – provided an initial impulse for a blurring of life and work, imposing with mobile calls, emails or SMS a new type of real-time processing, regulating the rhythms of life
  • In the new biohypermedia environment, the key change lies in the combination of miniaturizing and mobilizing these pieces of equipment, allowing them to always be within the body’s reach in any context.
  • they augment physical reality[ix] with every kind of information – commercial, cultural, ecological – and act more and more as biomedical sets for the control, correction and support of our vital biological functions.
  • The PC has a central function as the medium for linguistic and written processes - its typical uses often tied to the logical concatenation of thought and the priority management of sequences over time.
  • But mobile devices concentrate complex perception of stimuli in terms of spatial organization and intervene in emotional responses. PC work in this way occupies our left hemisphere, while the continual interactions of a smartphone engage the right hemisphere.
  • In contemporary neoliberalism, these devices become an essential means of rent and profit, through a fine capture of what we generate by living with them and using them. At one and the same time technocracy and financial oligarchies find here an ideal medium to extend their influence and their control of individuals in space and time.
  • Marketing and communication campaigns portray these devices as commodity fetishes, characterizing a new phase of capitalism often described as cognitive because based on knowledge.
  • In the sphere of multinational ICT[x] Corporations a war is being waged over the design and deployment of immaterial enclosures
  • Even though all this is based on freeware and open source, they trick us into believing that the iPhone 5, Windows 8 or Jellybean[xi] are miracles that descend from Mount Olympus and for which we should be grateful as to the gods.
  • Unlike automobiles or, to a lesser degree, PCs, the use value of new mobile devices is no longer determined merely by the initial design but can be moulded by the final user.
  • The innumerable websites, blogs and forums in every language globally blooming and growing are a workshop for worldwide exchange where the digital means are developed that could be used to withdraw workers both from precarity and  from total submission to a life of labour.  
  • Microsoft is no less defensive of its monopoly: with Intel and other accomplices, they introduced a new firmware to boot Windows 8 PCs that, substituting the old BIOS,[xv] makes it impossible or very complicated to install Linux or other operating systems on new laptops.
  • Despite hesitations related to “security” problems, today companies allow or even oblige people to use their own devices
  • So, if you were one of those many who found the latest tablet, smartphone or hybrid touch device under the tree this year, be aware that you won’t be the only one pleased: under the regime of precarity, bring your own device if you want to survive. 
  •  
    "Bring your own device (BYOD) is a business policy whereby employees bring personally owned mobile devices to their place of work and use them to access privileged company resources such as email, file servers and databases as well as their personal applications and data."
donnamariee

Firefox OS won't magically succeed just because it's open source - see webOS | Technolo... - 0 views

  • Firefox OS won't magically succeed just because it's open source - see webOS The siren song of open source means some people think Firefox OS could take the smartphone market by storm - but that's what they thought about webOS
  • Open source" operating systems are the siren call of the internet. For years, we were promised, Linux was going to be the Next Big Thing on the desktop; the tired old empires of Windows and MacOS were going to be pushed aside, and everyone was going to embrace Linux (though quite which distro wasn't clear). From infants to grannies, they would all see the light, and install software that was built with the user in mind - as long as the user was someone who could hold the idea of the concentric circles of file ownership (root/wheel/std) in their head
  • Despite the fevered imaginings of a fair number at the time, there was simply no chance that webOS was going to go anywhere without direct help from HP; and HP wasn't going to give it that help, since it had plenty of troubles of its own.
  • ...8 more annotations...
  • LG has indicated that it will be using webOS in its Smart TV line (which, in passing, suggests that Google's hopes of having a multi-manufacturer-pronged assault on the living room with Google TV are being chipped away; Samsung has gone its own way, Sony offers a mixture of Google and its own smart TV offerings, and now it looks like LG isn't exactly all-in). Though that might, in time, become something that it uses on phones or tablets, you'd be crazy to bet on it. LG is smart enough to know that TVs are a world away from phones and tablets, both in terms of the user interaction experience, and the demands that they make for user acceptance.
  • But the siren song of open source OSs becomes deafening when you look at the other announcement to come out of Mobile World Congress, in which Mozilla is touting its Firefox OS as the anathema to the world's ills - or at least those afflicting the smartphone industry. What does Moziila chief executive Gary Kovacs think is going to be the unique selling point of the Firefox OS phones that he expects to see in 2014? "Our goal is to level the playing field and usher in an explosion of content and services that will meet the diverse needs of the next two billion people online," he said in Barcelona, adding "We're not trying to get in the middle of an operating system fight; what we are trying to do is be the catalyst to drive more development around the open web."
  • The problem for Firefox OS is that it doesn't have a dedicated hardware backer. Sure, Sony has said that it will make some phones using it. ZTE and Alcatel say they will build hardware that will run it. And Kovacs points to the fact that Firefox OS will run HTML5 apps - not "native" apps (in the sense that iOS or Android apps run natively). That might put a questionmark over whether, by some analysts' measure, the FFOS phone is truly a "smartphone", since their definition for that includes "running apps on a native API". (That's why Gartner and IDC don't class Nokia's Asha phones as smartphones.)
  • So how did Android succeed? Three things. First, Google get a vibrant app ecosystem going even before there was a single phone: it had competitions for apps, with a $10m fund to seed developer ideas. By April 2008 there were almost 2,000 Android applications; two-third came from outside the US. Among the offerings: photo-enhanced driving, on-the-fly party mashups with maps, maintaining passive surveillance on your family's whereabouts. (Some things never change.) Second, it was able to go to Verizon, which was looking enviously at how AT&T was able to offer the iPhone, and suggest that Android phones - when they came along - could be the answer to that competitive challenge. And third, it was Google - the gigantic search-engine-and-everything-else company with the international reputation. If Google was doing a new generation of smartphone software (and if Apple had validated the idea), then it looked like a good deal for everyone. And handset manufacturers were eager to find an alternative to Microsoft.
  • Android is gigantic - some version of it might be on a billion phones this year - meaning there's no obvious need for another open source OS. What, after all, is FFOS actually going to do that Android doesn't, or that iOS or Windows Phone or BlackBerry can't? Yes, we've heard that the target isn't the west, but the developing world; that still doesn't explain why a Chinese handset manufacturer would deploy FFOS rather than Android, whether the Google version or a forked one that could connect to a local app store.
  • Even worse, FFOS is at an immediate competitive disadvantage because the principal browser on smartphones now is based on WebKit. Chrome uses it, MobileSafari uses it, BlackBerry uses it, and Opera uses it too now. That leaves only Internet Explorer on Windows Phone standing alone. Developers writing HTML5 apps will naturally write for compatibility with WebKit, which is always going to behave slightly differently from Firefox's Gecko rendering engine. For FFOS's sake, you have to hope the differences aren't big.
  • That's the trouble with the magical thinking that often attaches to open source projects. Making webOS open source didn't solve its problems; it simply shoved them off into a siding. Having an open source mobile OS didn't guarantee Android's success; the efforts of Google, and the timing in the market, did that.
  • Perhaps for that reason, people have high expectations for the Ubuntu OS and phone, with its fabulously complex array of gestures for control. Bad news, dreamers: it's going to fail in the market too if Canonical attempts to market it as a hardware-software combination - that is, sells Ubuntu phones at retail.
Nuša Gregoršanec

BBC News - Mobile internet use nearing 50% - 0 views

  • Mobile internet use
  • Mobile internet use nearing 50%
  • Some 45% of people surveyed said they made use of the net while out and about, compared with 31% in 2010.
  • ...5 more annotations...
  • Domestic internet use also rose. According to the ONS, 77% of households now have access to a net connection.
  • Older users, who the government is particularly keen to get connected, appeared to have been relatively untouched by the phenomenon.
  • While 71% of 16 to 24-year-old who went online said they used mobile broadband, just 8% of internet users aged over 65 made use of the newer technology.
  • The ONS survey also found a dramatic rise in the use of wifi hotspots - a seven-fold increase since 2011 - suggesting that the rise of 3G has done little to slow demand for free and paid-for wireless access.
  • All findings were based on a monthly survey of 1,800 randomly selected adults from across the UK.
Jernej Prodnik

Why I'm quitting Facebook - CNN.com - 0 views

  • Why I'm quitting Facebook By Douglas Rushkoff, CNN February 25, 2013 -- Updated 1502 GMT (2302 HKT)
  • (CNN) -- I used to be able to justify using Facebook as a cost of doing business. As a writer and sometime activist who needs to promote my books and articles and occasionally rally people to one cause or another, I found Facebook fast and convenient. Though I never really used it to socialize, I figured it was OK to let other people do that, and I benefited from their behavior. I can no longer justify this arrangement.
  • Today, I am surrendering my Facebook account, because my participation on the site is simply too inconsistent with the values I espouse in my work. In my upcoming book "Present Shock," I chronicle some of what happens when we can no longer manage our many online presences. I have always argued for engaging with technology as conscious human beings and dispensing with technologies that take that agency away.
  • ...3 more annotations...
  • Facebook is just such a technology. It does things on our behalf when we're not even there. It actively misrepresents us to our friends, and worse misrepresents those who have befriended us to still others. To enable this dysfunctional situation -- I call it "digiphrenia" -- would be at the very least hypocritical. But to participate on Facebook as an author, in a way specifically intended to draw out the "likes" and resulting vulnerability of others, is untenable.
  • Douglas Rushkoff Facebook has never been merely a social platform. Rather, it exploits our social interactions the way a Tupperware party does. Facebook does not exist to help us make friends, but to turn our network of connections, brand preferences and activities over time -- our "social graphs" -- into money for others.
  • We Facebook users have been building a treasure lode of big data that government and corporate researchers have been mining to predict and influence what we buy and for whom we vote. We have been handing over to them vast quantities of information about ourselves and our friends, loved ones and acquaintances. With this information, Facebook and the "big data" research firms purchasing their data predict still more things about us -- from our future product purchases or sexual orientation to our likelihood for civil disobedience or even terrorism.
metapavlin

Kim Dotcom announces Mega, successor to Megaupload | Technology | guardian.co.uk - 0 views

  • Kim Dotcom, founder of the banned Megaupload filesharing site, has announced a new version called Mega designed to sidestep the American laws under which he is being prosecuted for £175m worth of alleged online piracy, racketeering and money laundering.
  • The site would not use US-based hosting companies as partners in order to avoid being shut down by US authorities, Dotcom said.
  • Megaupload was shut down in January 2012 when New Zealand police helicopters swooped into Dotcom's mansion outside Auckland to seize computers and other evidence at the request of US authorities.
  • ...2 more annotations...
  • Users of Mega would be able to upload, store and share photos, text files, music and films, encrypt those files and grant access using unique decryption keys, Dotcom said. "You hold the keys to what you store in the cloud, not us," a statement on the Mega website said.
  • Ensuring that files are not pirated will be the job of content owners, a major change from Megaupload, which the US film industry says ignored illegal content and profited from it.
mancamikulic

Why We All Have 'Internet-Addiction Genes' - Robert Wright - The Atlantic - 0 views

  • : A gene that seems to be (very modestly) correlated with internet addiction also plays a role in nicotine addiction.
  • A gene that seems to be (very modestly) correlated with internet addiction also plays a role in nicotine addiction.
  • internet addiction is not a figment of our imagination
  • ...16 more annotations...
  • Whether heavy internet use deserves to be called an addiction or just a hard-to-break habit is a question about a behavior pattern and its attendant psychological states.
  • To answer it we ask such things as how strong the cravings for the internet are, what lengths a person will go to in order to satisfy them, and so on.
  • Human beings are biochemical machines "designed" by natural selection to, among other things, form habits.
  • The habit-forming machinery involves the release of reward chemicals, such as dopamine, that make us feel good upon attaining these goals
  • In the modern world, there are shortcuts to getting these rewards
  • And there's some evidence (though here I'm approaching the limits of my comprehension of the science) that people with a particular variant of a gene involved in building acetylcholine receptors are more susceptible to nicotine addiction than other people
  • the main point is this: the biochemical mechanisms (including genes) involved in chemical addictions will naturally be the mechanisms involved in habit formation more generally since habit formation is what they were originally designed for.
  • whether it's a habit or an addiction, it is going to involve pleasure-dispensing biochemical mechanisms of the sort that can get us addicted to such chemicals as nicotine and cocaine
  • After all, the internet, like these chemicals, allows us to trigger our neuronal reward mechanisms with much less work,
  • it wasn't possible, in a very small and technologically primitive social universe, to at any time of day launch an observation or joke
  • the internet, like a pack of cigarettes or lots of cocaine, lets you just sit in a room and repeatedly trigger reward chemicals that
  • And all of us have lots and lots of these genes--genes that make us susceptible to internet addiction.
  • some of these genes may vary from person to person in ways that make some people particularly susceptible to internet addiction
  • In fact, there will turn out to be so many genes which are so modestly correlated with internet addiction
  • that if journalists write stories every time such a gene is found, or is thought to have been found, they will find that they're not shedding much actual light on the situation.
  • These genes are really just genes for being human.
Jan Majdič

Free speech on the internet | Technology | guardian.co.uk - 0 views

  • Freedom of expression has long been regarded as one of the fundamental principles of modern democracies, in which civil liberties are honoured and regarded as a prerequisite for individual development and fulfilment.
  • It is this classic liberal argument that is still used by civil liberties' campaigners on the internet, like Hatewatch, which argues that those "hate speak" groups, such as neo-Nazis, must still speak freely, if only to expose and discredit themselves
  • It is not simply a case of "same old issue, new technology" with free speech and the internet. With its low start-up costs and global reach, the internet enables almost anyone in the West, in theory, to speak and be heard around the world, as well as hear others' speech.
  • ...11 more annotations...
  • particularly when they originate from, and are hosted in, foreign countries.
  • China have successfully prevented their citizens from receiving a huge quantity of (pro-democratic) material on the internet.
  • Governments in the USA, Germany and France, have all taken significant steps to curtail free speech on the internet
  • The anti-censorship pressure group, Campaign Against Censorship of the Internet in Britain, was created in response Scotland Yard's request to ISPs to censor their news feeds
  • seeking to regulate and control its immense, potential, power.
  • US is several years ahead of Britain
  • industry self-regulation
  • Technology is used to censor and evade censorship, although it seems likely that censorship tools will grow in sophistication and use as legislators struggle to censor the internet.
  • In December 1997, a 200-strong internet industry group agreed to accept a common standard of labelling called PICS - the Platform for Internet Content Selection
  • Millions of internet users in big offices, cybercafés, education institutions and libraries will use machines or ISPs which have filters installed in them.
  • In 1999, the EU launched an action plan, "Promoting Safer Use of the Internet", which provides for a hotline, where people can report sites which have caused offence
Blaž Gobec

Why Facebook's new Open Graph makes us all part of the web underclass | Technology | gu... - 1 views

  • ou're not paying for your presence on the web, then you're
  • just a product being used by an organisation bigger than you
  • When you use a free web service you're the underclass. At best you're a guest. At worst you're a beggar, couchsurfing the web and scavenging for crumbs. It's a cliché but worth repeating: if you're not paying for it, you're aren't the customer, you're the product.
  • ...10 more annotations...
  • Your individual account is probably worth very little to the service provider, so they'll have no qualms whatsoever with tinkering with the service or even making radical changes in their interests rather than yours. If you don't like it you're welcome to leave. You may well not be able to take your content and data with you, and even if you can, all your URLs will be broken.
  • if you really care about your site you need to run it on your own domain. You need to own your URLs. You'll have total control and no-one can take it away from you. You don't need anyone else. If you put the effort in up front it'll pay off in the long run.But it's no longer that simple.
  • Anyone who's ever run a website knows that building the site is one thing, but getting people to use it is quite another. The smaller your real-world presence the harder it is. If you're a national newspaper or a Hollywood star you probably won't have much trouble getting people to visit your website. If you're a self-employed plumber or an unknown blogger writing in your spare time, it's considerably harder.
  • Social networks have changed all that. Facebook and Twitter now wield enormous power over the web by giving their members ways to find and share information using tools that work in a social context.
  • Either way, your social network presence is more important than your own website.
  • But increasingly that freedom is just the freedom to be ignored, the freedom to starve.
  • es, that's nearly 34,000 new Facebook apps created in one day by customers of just one hosting company.
  • What Facebook is doing is very different. When it records our activity away from the Facebook site it's a third party to the deal. It doesn't need this data to run its own services.
  • orst o
  • all, the way Facebook collects and uses our data is both unpredictable and opaque. Its technology and policies move so quickly you'd need to be a technical and legal specialist and spend an inordinate amount of time researching Facebook's activities on an ongoing basis to have any hope of understanding what they're doing with your data.
Jernej Prodnik

Google raises privacy fears as personal details are released to app developers | Techno... - 0 views

  • Google raises privacy fears as personal details are released to app developers Campaigner says tech giant's policies don't make it clear that Google Play users who buy apps give over information
  • Charles Arthur guardian.co.uk, Monday 25 February 2013 14.39 GMT
  • Google Play: the personal details of app buyers are released to developers Google could face a third privacy row in a two years, after a leading campaigner called for the US government to investigate the fact that the names, geographic region and email addresses of people who buy apps from its Play store are passed on to the app developers without users' explicit permission.
  • ...5 more annotations...
  • Ben Edelman, an associate professor at Harvard Business School, says that analysis of Google's terms and conditions relating to its Google Play store and Google Wallet transaction system (used for buying apps) doesn't show any clauses where users are specifically told that their emails will be sent on to the developer. He also warns that developers could use that information to "track and harass" people who have given apps low ratings or requested refunds. And hackers – or malicious developers – could create personalised emails to send out to people to steal passwords (phishing) or install "updates" that were actually malware.
  • Google says it has to provide some location data about which country apps are bought in so developers can calculate the correct amount of tax to pay. But that does not explain why it passes on buyers' names and email addresses, which together with a postcode could be used to identify a person's location and address."Google's prior privacy blunders have put [it] under higher scrutiny," Edelman says, pointing to the 20-year consent order with the US Federal Trade Commission that Google signed in March 2011 in the wake of its Buzz social network fiasco – followed by a record $22.5m fine in August 2012 for hacking Apple users' browsers to install tracking cookies. It has also been fiercely criticised in Europe for its changes in March 2012 to its privacy policies, which data protection chiefs said could mean "uncontrolled" use of personal data.
  • Eric Butler, a freelance software developer of the Tapchat and Farebot apps, tweeted in July 2012 "I wonder if most Android users realise that when you buy an app in the Play Store the seller [of the app] can see your name, email address and phone."Following the row, he has noted on his blog that "Because the entire experience of purchasing Android apps is so sloppy, it's not unreasonable to assume that this privacy issue was actually an oversight." But, he says, "Google should follow Apple's lead and offer users and developers better privacy protection."
  • Another developer, Jesse Wilson, pointed out the same problem in November on Google+, and was quickly echoed by Chris Lacy, who said that "as a developer I never asked for this information, I have no need for it, and I simply do not want to be a custodian of such information."Lacy added that "As a consumer, this is distressing on many levels: there is no fair warning that this information will be transferred … trusting my personal information to Google is one thing. But with this system, users are unknowingly having to trust their information to a third party. There's no way to know what security measures that third party might have in place." He added that it meant that the app developer "has gained my personal information without requesting the appropriate permissions via the app."
  • Google has said that passing on the details does not breach its privacy conditions. In a quote to Siliconvalley.com, a representative told the site that "Google Wallet shares the information necessary to process a transaction, which is clearly spelled out in the Google Wallet privacy notice."
Jernej Prodnik

Amazon unpacked - FT.com - 0 views

  • February 8, 2013 12:30 pm Amazon unpacked By Sarah O’Connor The online giant is creating thousands of UK jobs, so why are some employees less than happy?
  • Between a sooty power station and a brown canal on the edge of a small English town, there is a building that seems as if it should be somewhere else. An enormous long blue box, it looks like a smear of summer sky on the damp industrial landscape. Inside, hundreds of people in orange vests are pushing trolleys around a space the size of nine football pitches, glancing down at the screens of their handheld satnav computers for directions on where to walk next and what to pick up when they get there. They do not dawdle – the devices in their hands are also measuring their productivity in real time. They might each walk between seven and 15 miles today. It is almost Christmas and the people working in this building, together with those in seven others like it across the country, are dispatching a truck filled with parcels every three minutes or so. Before they can go home at the end of their eight-hour shift, or go to the canteen for their 30-minute break, they must walk through a set of airport-style security scanners to prove they are not stealing anything. They also walk past a life-sized cardboard image of a cheery blonde woman in an orange vest. “This is the best job I have ever had!” says a speech bubble near her head.
  • If you could slice the world in half right here, you could read the history of this town called Rugeley in the layers. Below the ground are the shafts and tunnels of the coal mine that fed the power station and was once the local economy’s beating heart. Above the ground are the trolleys and computers of Amazon, the global online retailer that has taken its place. As online shopping explodes in Britain, helping to push traditional retailers such as HMV out of business, more and more jobs are moving from high-street shops into warehouses like this one. Under pressure from politicians and the public over its tax arrangements, Amazon has tried to stress how many jobs it is creating across the country at a time of economic malaise. The undisputed behemoth of the online retail world has invested more than £1bn in its UK operations and announced last year that it would open another three warehouses over the next two years and create 2,000 more permanent jobs. Amazon even had a quote from David Cameron, the prime minister, in its September press release. “This is great news, not only for those individuals who will find work, but for the UK economy,” he said.
  • ...10 more annotations...
  • Workers in Amazon’s warehouses – or “associates in Amazon’s fulfilment centres” as the company would put it – are divided into four main groups. There are the people on the “receive lines” and the “pack lines”: they either unpack, check and scan every product arriving from around the world, or they pack up customers’ orders at the other end of the process. Another group stows away suppliers’ products somewhere in the warehouse. They put things wherever there’s a free space – in Rugeley, there are inflatable palm trees next to milk frothers and protein powder next to kettles. Only Amazon’s vast computer brain knows where everything is, because the workers use their handheld computers to scan both the item they are stowing away and a barcode on the spot on the shelf where they put it. The last group, the “pickers”, push trolleys around and pick out customers’ orders from the aisles. Amazon’s software calculates the most efficient walking route to collect all the items to fill a trolley, and then simply directs the worker from one shelf space to the next via instructions on the screen of the handheld satnav device. Even with these efficient routes, there’s a lot of walking. One of the new Rugeley “pickers” lost almost half a stone in his first three shifts. “You’re sort of like a robot, but in human form,” said the Amazon manager. “It’s human automation, if you like.” Amazon recently bought a robot company, but says it still expects to keep plenty of humans around because they are so much better at coping with the vast array of differently shaped products the company sells.
  • The unassuming efficiency of these warehouses is what enables Amazon to put parcels on customers’ doorsteps so quickly, even when it is receiving 35 orders a second. Every warehouse has its own “continuous improvement manager” who uses “kaizen” techniques pioneered by Japanese car company Toyota to improve prod­uctivity. Marc Onetto, the senior vice-president of worldwide operations, told a business school class at the University of Virginia a few years ago: “We use a bunch of Japanese guys, they are not consultants, they are insultants, they are really not nice … They’re samurais, the real last samurais, the guys from the Toyota plants.” In Rugeley, the person with the kaizen job is a friendly, bald man called Matt Pedersen, who has a “black belt” in “Six Sigma”, the Motorola-developed method of operational improvement, most famously embraced by Jack Welch at General Electric. Every day, the managers in Rugeley take a “genba walk”, which roughly means “go to the place” in Japanese, Pedersen says as he accompanies the FT on a tour of the warehouse. “We go to the associates and find out what’s stopping them from performing today, how we can make their day better.” Some people also patrol the warehouse pushing tall little desks on wheels with laptops on them – they are “mobile problem solvers” looking for any hitches that could be slowing down the operation.
  • . . . What did the people of Rugeley make of all this? For many, it has been a culture shock. “The feedback we’re getting is it’s like being in a slave camp,” said Brian Garner, the dapper chairman of the Lea Hall Miners Welfare Centre and Social Club, still a popular drinking spot. One of the first complaints to spread through the town was that employees were getting blisters from the safety boots some were given to wear, which workers said were either too cheap or the wrong sizes. One former shop-floor manager, who did not want to be named, said he always told new workers to smear their bare feet with Vaseline. “Then put your socks on and your boots on, because I know for a fact these boots are going to rub and cause blisters and sores.” ©Ben RobertsAmazon workers in Rugeley process ordersOthers found the pressure intense. Several former workers said the handheld computers, which look like clunky scientific calculators with handles and big screens, gave them a real-time indication of whether they were running behind or ahead of their target and by how much. Managers could also send text messages to these devices to tell workers to speed up, they said. “People were constantly warned about talking to one another by the management, who were keen to eliminate any form of time-wasting,” one former worker added.
  • Watson said Amazon was supposed to send the council employment data every six months, but it had not done so. “We had no idea Amazon were going to be as indifferent to these issues as they have been, it’s come as a shock to us how intransigent they are,” he said. Inside the warehouse, Amazon employees wear blue badges and the workers supplied by the agencies wear green badges. In the most basic roles they perform the same tasks as each other for the same pay of £6.20 an hour or so (the minimum adult wage is £6.19), but the Amazon workers also receive a pension and shares. A former agency worker said the prospect of winning a blue badge, “like a carrot, was dangled constantly in front of us by management in return for meeting shift targets”. Amazon’s Darwinian culture comes from the top. Jeff Bezos, its chief executive, told Forbes magazine last year (when it named him “number one CEO in America”): “Our culture is friendly and intense, but if push comes to shove, we’ll settle for intense.”
  • Ransdtad said it supplied a number of clients with “onsite-flexible workforce solutions”. It added: “The number of workers required by these clients fluctuates in response to supply and demand. When demand for clients’ products or services is high (for example during the Christmas period) the Randstad partnership allows local people to benefit from short-term work on a temporary contract, to help supplement our clients’ permanent workforce and deliver against order requirements.” Certainly, not everyone in Rugeley is upset about Amazon. A group of workers having a pint on a picnic table outside The Colliers pub near the warehouse gates said they liked their jobs, albeit as their managers hovered nervously in the background. One young agency worker said he was earning about £220 a week, compared with the £54 he had been receiving in jobless benefits. He had bought a car and moved out of his mum’s house and into a rented flat with his girlfriend, who he had met at work. “I’m doing pretty well for myself,” he said with a shy grin. “There’s always opportunities to improve yourself there.” Across the table, an older man, wagging two fingers with a cigarette pinched between them, said slowly: “It gives you your pride back, that’s what it gives you. Your pride back.” Many in the town, however, have mixed feelings. They are grateful for the jobs Amazon has created but they are also sad and angry about the quality of them. Timothy Jones, a barrister and parish councillor, summed up the mood. “I very much want them to stay, but equally I would like some of the worst employment practices to end.”
  • For Watson, the big question is whether these new jobs can support sustainable economic growth. In Rugeley, it is hard not to look back to the coal mine for an example of how one big employer could transform a place. . . . The Lea Hall Colliery opened officially on a soggy Tuesday in July 1960. Miners and their families huddled under marquees to eat their packed lunches and when the first coal was wound to the surface, three bands played an overture specially written for the occasion. It was the first mine planned and sunk by the Coal Board, the body set up after the second world war to run Britain’s newly nationalised coal industry, and the Central Electricity Generating Board was building a coal-fired power station right next door. It was a defiant demonstration of confidence in coal at a time of increasing competition from oil. “King Coal is not yet dead, as many would have it, but is going to be with us for many years to come,” the regional secretary of the National Union of Mineworkers told the crowd.
  • Soon, miners from all over the country were swarming to the modern new mine. The Coal Board and the local council built housing estates and schools to cope with the exploding population. “Peartree estate was built for the Geordies, the Springfield estate was built for the Scots and the Welsh,” remembered Brian Garner, who helped to build the mine when he was 16. “It was unbelievable, it was buzzing in the town, there was that much money about then. I could leave my job at 10 o’clock in the morning and start at five past 10 on another.” On Friday and Saturday nights, the queue outside the Lea Hall Miners’ Welfare Centre and Social Club would wrap right around the building. Rugeley’s mine was soon the most productive in the country. It was a “young man’s pit” with all the latest machines and techniques, says Ken Edwards, who started there at 25 as an electrician. The work was still dirty and dangerous, though. In 1972, a local reporter took a tour. “All is silent except for the movement of conveyor belts which carry the coal and the murmur of the air pumps. The blackness is relieved only by narrow shafts of light coming from each person’s headlamp,” she wrote. It took her two days to remove the black dust from her nails, ears, nose and hair.
  • The good times didn’t last. By the time the pit closed, four days before Christmas in 1990, a spokesman for British Coal told Reuters it was losing £300,000 a week. More than 800 people lost jobs that paid the equivalent of between £380 and £900 a week in today’s money. The town council’s chairman tried desperately to say something reassuring. “It has come as such a shock,” he told the local paper. “[But] we have got to do what many have done and look for new areas, particularly information technology and high technology. We have a lot of expertise and a wonderful geographical spot. There’s no reason why it should be the end for Rugeley.” From behind her desk in Vision estate agents, all purple paint and fairy lights, Dawn Goodwin sucks the air in through her teeth at the mention of Amazon. “We all thought it was going to be the making of the town,” she says. She expected an influx of people, including well-to-do managers, looking to buy or rent houses. But she hasn’t had any extra business at all. People are cautious because they don’t know how long their agency jobs with Amazon will last, she says. One of her tenants, a single young woman, got a job there but lost it again after she became ill halfway through a shift. She struggled to pay her rent for three months while she waited for her jobseeker’s benefits to be reinstated. “It’s leaving a bad taste in everyone’s mouths,” Goodwin says with a frown. Even the little “Unit 9” café next to the Amazon warehouse hasn’t had a boost in trade. The women who run it reckon the employees don’t have enough time in their 30-minute break to get through security, come and eat something, and then go back in again.
  • In a cramped upstairs office at the Citizens Advice Bureau, Gillian Astbury and Angela Jones have turned to statistics to try to identify Amazon’s effect on the area. They haven’t had an increase in the number of people asking about employment problems or unfair dismissal, but nor has there been any improvement in the community’s problems with debt and homelessness. Their best guess is that people haven’t had enough sustained work to make much of a difference. Astbury says employment agencies are a “necessary evil”, but stresses it is hardly ideal for people to be bouncing in and out of temporary work, particularly when a job ends abruptly and they are left with no income at all until their benefits are reinstated. Workers leaving Amazon have had a particular problem with this, prompting the parish council to submit a Freedom of Information request to the Department for Work and Pensions to find out exactly how long local people are being made to wait for their social security payments to come through.
  • Far from the CAB’s little office in Rugeley, Britain’s economists are also puzzling over why the economy remains moribund even though more and more people are in work. There are still about half a million fewer people working as full-time employees than there were before the 2008 crash, but the number of people in some sort of employment has surpassed the previous peak. Economists think the rise in insecure temporary, self-employed and part-time work, while a testament to the British labour market’s flexibility, helps to explain why economic growth remains elusive. Angi Cooney, who runs C Residential, the biggest estate agent in Rugeley, thinks the nature of employment is changing permanently and people should stop pining for the past. It’s “bloody great” that a company like Amazon chose to come to “this little old place”, she says fiercely, looking as if she’d like to take the town by the shoulders and give it a shake. “People expect a job for life, but the world isn’t like that any more, is it?” Sarah O’Connor is the FT’s economics correspondent
Rebeka Aščerič

BBC News - Children 'must know web limits' says Wales commissioner - 0 views

  • Adults must impose the necessary checks and balances to keep children safe online, says the children's commissioner for Wales.
  • "All children and young people don't seem much of a distinction between their online and offline lives,"
  • Mr Towler told BBC Radio Wales. "It's all just one thing and they get really excited by the opportunities the internet affords and sometimes parents get a little scared about that and worried about what their children are accessing." 'Crossing the road' Continue reading the main story “Start Quote They're all running around with handheld computers these days, they're not just on phones ” End Quote Keith Towler Children's commissioner Mr Towler said he talks to children in lots of different settings and they "still enjoy playing outside as much as they ever did". He said we need to recognise that the internet provides fantastic opportunities for education and learning and its making sure that children access that safely. He said that was a real challenge for parents and carers. "It's a bit like crossing the road, you try to teach your children the best way of crossing the road well. We need to teach our children the best way of using this fantastic resource. "I think too many parents are very very scared of the internet and because they're so scared they will say 'Oh I don't understand it'". Handheld computers The commissioner also praised Hwb, the virtual learning environment, which he said provides protection for children using the web in schools. Mr Towler said: "We've got to get parents and carers to recognise that children do operate in the digital world. They're all running around with handheld computers these days, they're not just on phones. "They can access whatever they want whenever they want and parents need to engage on that. " "We need to remember that children and young people are much more savvy than sometimes we think they are, and they are much more responsible than sometimes adults think they are so its not all doom and gloom. "What we need to do is put the right checks and balances in place and what children always want from parents and carers is to understand what the boundaries are, and that's our job to do that." Sangeet Bhullar, executive director of Wise Kids, added that the digital landscape was "evolving rapidly" and up-to-date data was needed on how children and young people in Wales related to it. More on This Story .related-links-list li { position: relative; } .related-links-list .gvl3-icon { position: absolute; top: 0; left: 0; } Related Stories Web safety lessons urged for infants 05 FEBRUARY 2013, EDUCATION &amp; FAMILY Online chat 'should be monitored' 22 JANUARY 2013, TECHNOLOGY Body to promote digital teaching 22 JUNE 2012, WALES $render("page-see-also","ID"); $render("page-newstracker","ID"); Related Internet links Children's Commissioner for Wales The BBC is not responsible for the content of external Internet sites $render("page-related-items","ID"); Share this pageShare this pageShareFacebookTwitter Email Print In association with $render("advert","advert-sponsor-module","page-bookmark-links"); $render("advert-post-script-load"); $render("advert-post-script-load"); More Wales stories RSS Army base shuts in defence shake-up An Army base in Pembrokeshire is to close with 600 troops transferred to St Athan in the Vale of Glamorgan. Soldiers' conman jailed three years Wales recall Warburton and Jones <!--
  • ...2 more annotations...
  • "I think too many parents are very very scared of the internet and because they're so scared they will say 'Oh I don't understand it'".
  • "What we need to do is put the right checks and balances in place and what children always want from parents and carers is to understand what the boundaries are, and that's our job to do that."
inesmag

Prevent Wi-Fi Eavesdroppers from Hijacking Your Accounts > Password Sniffing and Accoun... - 0 views

  • Prevent Wi-Fi Eavesdroppers from Hijacking Your Accounts
  • Password sniffing and account hijacking have become more prevalent in recent years because of Wi-Fi and software that make these hacking techniques so easy
  • Both of the methods we're discussing require the eavesdropper to be connected to the same network as you.
  • ...1 more annotation...
  • These hacking techniques can still be used by other users on private networks using the Personal/Pre-Shared Key (PSK) mode of WPA/WPA2 encryption or the older WEP encryption. However, they can't be used on networks using the Enterprise/EAP mode of WPA/WPA2 encryption, which is usually used only by businesses and requires a separate 802.1X server.
mancamikulic

Google Glass: is it a threat to our privacy? | Technology | The Guardian - 1 views

  • glasses that can shoot video, take pictures, and broadcast what you're seeing to the world
  • They weren't due to get them until last Friday
  • Google Glass is the most hotly anticipated new arrival in "wearable computing"
  • ...46 more annotations...
  • from "mainframe" computers
  • Google's idea is that you need only speak to operate it
  • "OK, Glass, take video!"
  • The only other way to get that point of view is to strap a camera to your head.
  • And yet people are already beginning to fret about the social implications of Glass
  • the question of privacy
  • how will we behave in groups
  • David Yee, the chief technology officer at a company called Editorially
  • Yee's worry was that the young person might be filming everything
  • Joshua Topolsky
  • have tried out Google Glass
  • This is the company that has repeatedly breached the boundaries of what we think is "private".
  • forgetting that sometimes deadly enemies have mutual friends
  • use of personal data without an individual's clear consent.
  • So how comfortable – or uneasy – should we feel about the possibility that what we're doing in a public or semi-public place (or even somewhere private) might get slurped up and assimilated by Google?
  • Oliver Stokes
  • ou could inadvertently become part of somebody else's data collection – that could be quite alarming
  • Now it's going to be able to compute what it is you're looking at.
  • Song Chaoming
  • nalysing mobile phone records
  • how your smartphone is able to show where you are on an onscreen map
  • Social media
  • Where the five million are the wearers of Glass – and the one monitor is Google
  • Google probably knows what you're going to do before you do.
  • Twitter
  • we're more used to the snatched photo or video that tells a story
  • Google doesn't want to discuss these issues.
  • this is a live issue,
  • One of the reasons they're doing Explorers is to get feedback on these things
  • how will we behave with each other?
  • hows data such as your speed, altitude, and even ski-resort maps
  • Concentrating on what was in front of me wasn't hard
  • they do it without letting others realise you are doing anything
  • we get too deeply involved with our technology
  • she pointed out how smartphones change us:
  • Topolsky
  • It brought something new into view
  • the more I used Glass the more it made sense to me; the more I wanted it."
  • how text messages or phone calls would just appear as alerts
  • Glass makes you feel more powerful
  • Hurst
  • is likely to be annoying
  • here's where the problems really start – you don't know if they're taking a video of you.
  • body language change
  • model seems to require voice control
  • how much are we going to share with others
Jernej Prodnik

Amazon 'used neo-Nazi guards to keep immigrant workforce under control' in Germany - Eu... - 0 views

  • Amazon 'used neo-Nazi guards to keep immigrant workforce under control' in Germany Internet giant investigates abuse claims by foreign workers in its German warehouses Tony Paterson Berlin
  • Amazon is at the centre of a deepening scandal in Germany as the online shopping giant faced claims that it employed security guards with neo-Nazi connections to intimidate its foreign workers. Germany’s ARD television channel made the allegations in a documentary about Amazon’s treatment of more than 5,000 temporary staff from across Europe to work at its German packing and distribution centres.The film showed omnipresent guards from a company named HESS Security wearing black uniforms, boots and with military haircuts. They were employed to keep order at hostels and budget hotels where foreign workers stayed. “Many of the workers are afraid,” the programme-makers said.The documentary provided photographic evidence showing that guards regularly searched the bedrooms and kitchens of foreign staff. “They tell us they are the police here,” a Spanish woman complained. Workers were&nbsp; allegedly frisked to check they had not walked away with breakfast rolls.
  • Another worker called Maria said she was thrown out of the cramped chalet she shared with five others&nbsp; because she had dried her wet clothes on a wall heater. She said she was confronted by a muscular, tattooed security man and told to leave. The guards then shone car headlights at her in her chalet while she packed in an apparent attempt to intimidate her.Several guards were shown wearing Thor Steinar clothing – a Berlin-based designer brand synonymous with the far-right in Germany. The Bundesliga football association and the federal parliament have both banned the label because of its neo-Nazi associations. Ironically, Amazon stopped selling the clothing for the same reasons in 2009.ARD suggested that the name “HESS Security” was an allusion to Adolf Hitler’s deputy, Rudolf Hess. It alleged that its director was a man, named only as Uwe L, who associated with football hooligans and convicted neo-Nazis who were known to police. The programme-makers, who booked in at one of the budget hotels where Amazon staff were housed, said they were arrested by HESS Security guards after being caught using cameras. They were ordered to hand over their film and, when they refused, were held for nearly an hour before police arrived and freed them. The film showed HESS guards scuffling with the camera crew and trying to cover their lenses.
  • ...1 more annotation...
  • ARD said Amazon’s temporary staff worked eight-hour shifts packing goods at the company’s logistics centres in Bad Hersfeld, Konstanz and Augsburg. Many walked up to 17 kilometres per shift and all those taken on could be fired at will. On arrival in Germany, most were told their pay had been cut to below the rate promised when they applied for jobs at Amazon.&nbsp; “They don’t see any way of complaining,” said Heiner Reimann, a spokesman for the United Services Union (Ver.di). “They are all too frightened of being sent home without a job.”Silvina, a Spanish mother of three in her 50s, who lost her job as an art teacher, was featured in the film. She applied for three months’ work with Amazon to earn some badly needed cash. “It’s like being in a machine and we are just a small part in this machine,” she told the programme.HESS Security did not respond to the allegations made by ARD.Amazon employs 7,700 full-time staff at seven distrubution centres in Germany. The accusations led to the company’s Facebook site being inundated with angry complaints.The company said: “Although the security firm was not contracted by Amazon we are, of course, currently examining the allegations concerning the behaviour of security guards and will take the appropriate measures immediately. We do not tolerate discrimination or intimidation.”
sintija

BBC News - Viewpoint: Changing the way the internet is governed is risky - 0 views

  • Viewpoint: Changing the way the internet is governed is risky
  • the US Department of Commerce has the power to decide how the internet works
  • internet is already governed
  • ...15 more annotations...
  • It's important to realise that without governance the internet could not function.
  • avoid two different web sites having the same name
  • International Corporation for Assigned Names and Numbers (Icann)
  • governance of the internet is effectively done by multiple stakeholders
  • WGIG would report on a solution acceptable to all but would move governance to an international body.
  • US government ultimately "controls" the internet
  • The internet overseers
  • UN summit
  • US refused to relinquish control of the Root Zone file, which is basically the key to governing the internet.
  • formed the Working Group on Internet Governance (WGIG).
  • in 2003 in Geneva
  • Russians
  • International Telecommunications Union (ITU), another UN agency, to be given responsibility for internet governanc
  • A great advantage of the current governance structure is that it supports rapid developments, provided that the US Department of Commerce remains at arm's length
  • internet governance needs to help the internet evolve rather than dictate how it must develop.
Janja Petek

Forty years of the internet: how the world changed for ever | Technology | The Guardian - 1 views

  • In October 1969, a student typed 'LO' on a computer - and the internet was born
  • Towards the end of the summer of 1969
  • a large grey metal box was delivered to the office of Leonard Kleinrock, a professor at the University of California in Los Angeles.
  • ...32 more annotations...
  • At 10.30pm, as Kleinrock's fellow professors and students crowded around, a computer was connected to the IMP, which made contact with a second IMP, attached to a second computer, several hundred miles away at the Stanford Research Institute, and an undergraduate named Charley Kline tapped out a message.
  • It's impossible to say for certain when the internet began, mainly because nobody can agree on what, precisely, the internet is.
  • It's interesting to compare how much has changed in computing and the internet since 1969 with, say, how much has changed in world politics.
  • On the other hand, the breakthrough accomplished that night in 1969 was a decidedly down-to-earth one
  • Twelve years after Charley Kline's first message on the Arpanet, as it was then known, there were still only 213 computers on the network; but 14 years after that, 16 million people were online, and email was beginning to change the world; the first really usable web browser wasn't launched until 1993, but by 1995 we had Amazon, by 1998 Google, and by 2001, Wikipedia, at which point there were 513 million people online. Today the figure is more like 1.7 billion.
  • on New Year's Day 1994 –&nbsp;only yesterday, in other words –&nbsp;there were an estimated 623 websites.
  • On the one hand, they were there because of the Russian Sputnik satellite launch, in 1957, which panicked the American defence establishment, prompting Eisenhower to channel millions of dollars into scientific research, and establishing Arpa, the Advanced Research Projects Agency, to try to win the arms technology race. The idea was "that we would not get surprised again,"
  • "In a few years, men will be able to communicate more effectively through a machine than face to face," they declared.
  • The few outsiders who knew of the box's existence couldn't even get its name right: it was an IMP, or "interface message processor"
  • It was already possible to link computers by telephone lines, but it was glacially slow, and every computer in the network had to be connected, by a dedicated line, to every other computer, which meant you couldn't connect more than a handful of machines without everything becoming monstrously complex and costly.
  • The solution, called "packet switching" – which owed its existence to the work of a British physicist, Donald Davies – involved breaking data down into blocks that could be routed around any part of the network that happened to be free, before getting reassembled at the other end.
  • Still, Kleinrock recalls a tangible sense of excitement that night as Kline sat down at the SDS Sigma 7 computer, connected to the IMP, and at the same time made telephone contact with his opposite number at Stanford. As his colleagues watched, he typed the letter L, to begin the word LOGIN.
  • One of the most intriguing things about the growth of the internet is this: to a select group of technological thinkers, the surprise wasn't how quickly it spread across the world, remaking business, culture and politics – but that it took so long to get off the ground.
  • In 1945, the American presidential science adviser, Vannevar Bush, was already imagining the "memex", a device in which "an individual stores all his books, records, and communications", which would be linked to each other by "a mesh of associative trails", like weblinks.
  • And in 1946, an astonishingly complete vision of the future appeared in the magazine Astounding Science Fiction. In a story entitled A Logic Named Joe, the author Murray Leinster envisioned a world in which every home was equipped with a tabletop box that he called a "logic":
  • Instead of smothering their research in the utmost secrecy – as you might expect of a cold war project aimed at winning a technological battle against Moscow – they made public every step of their thinking, in documents known as Requests For Comments.
  • Deliberately or not, they helped encourage a vibrant culture of hobbyists on the fringes of academia –&nbsp;students and rank amateurs who built their own electronic bulletin-board systems and eventually FidoNet, a network to connect them to each other.
  • n argument can be made that these unofficial tinkerings did as much to create the public internet as did the Arpanet. Well into the 90s, by the time the Arpanet had been replaced by NSFNet, a larger government-funded network,
  • It was the hobbyists, making unofficial connections into the main system, who first opened the internet up to allcomers.
  • This was the software known as TCP/IP, which made it possible for networks to connect to other networks, creating a "network of networks", capable of expanding virtually infinitely
  • Nevertheless, by July 1992, an Essex-born businessman named Cliff Stanford had opened Demon Internet, Britain's first commercial internet service provider.
  • After a year or so, Demon had between 2,000 and 3,000 users,
  • the @ symbol was introduced in 1971, and the first message, according to the programmer who sent it, Ray Tomlinson, was "something like QWERTYUIOP".
  • A couple of years later I got my first mobile phone, which came with two batteries: a very large one, for normal use, and an extremely large one, for those occasions on which you might actually want a few hours of power
  • For most of us, though, the web is in effect synonymous with the internet, even if we grasp that in technical terms that's inaccurate: the web is simply a system that sits on top of the internet, making it greatly easier to navigate the information there, and to use it as a medium of sharing and communication.
  • The first ever website was his own, at CERN: info.cern.ch.
  • The idea that a network of computers might enable a specific new way of thinking about information, instead of just allowing people to access the data on each other's terminals, had been around for as long as the idea of the network itself: it's there in Vannevar Bush's memex, and Murray Leinster's logics.
  • Web browsers crossed the border into mainstream use far more rapidly than had been the case with the internet itself: Mosaic launched in 1993 and Netscape followed soon after, though it was an embarrassingly long time before Microsoft realised the commercial necessity of getting involved at all. Amazon and eBay were online by 1995. And in 1998 came Google, offering a powerful new way to search the proliferating mass of information on the web.
  • Google, and others, saw that the key to the web's future would be helping users exclude almost everything on any given topic,&nbsp;restricting search results to the most relevant pages.
  • It is absurd – though also unavoidable here – to compact the whole of what happened from then onwards into a few sentences: the dotcom boom, the historically unprecedented dotcom bust, the growing "digital divide", and then the hugely significant flourishing, over the last seven years, of what became known as Web 2.0.
  • The most confounding thing of all is that in a few years' time, all this stupendous change will probably seem like not very much change at all.
  • Will you remember when the web was something you accessed primarily via a computer? Will you remember when there were places you couldn't get a wireless connection? Will you remember when "being on the web" was still a distinct concept, something that described only a part of your life, instead of permeating all of it? Will you remember Google?
sergeja perklič

Who owns the content you upload online? | Money | guardian.co.uk - 0 views

  • The outrage over Instagram's announcement that it is changing its terms and conditions has turned the spotlight on the relationship between websites and users who upload content, whether it is photos, video, blogs or even games.
  • A survey of UK consumers suggested just 7% read online terms and conditions before they signed up for products and services, and other research has put it even lower.
  • Twitter: You retain your rights to any content you post on Twitter, but you grant the website a worldwide, non-exclusive, royalty-free licence (with the right to sublicense) "to use, copy, reproduce, process, adapt, modify, publish, transmit, display and distribute" your content.
  • ...1 more annotation...
  • However, when you use Facebook you give it the right to use information "in connection with the services and features we provide to you and other users like your friends, our partners, the advertisers that purchase ads on the site, and the developers that build the games, applications, and websites you use".
Anja Vasle

Mailbox: the free iPhone app that will change how you use email - Features - Gadgets & ... - 0 views

  • Mailbox is a free iPhone app that aims to change the way you use email.
  • an overflowing inbox is deeply inefficient and it's important to scuttle the unimportant stuff away to stop it from distracting you from the crucial bits.
  • A quick swipe right and emails that you don't need but shouldn't be deleted are swept into an archive, symbolised by a green tick.
  • ...4 more annotations...
  • A slow swipe right, however, and the tick turns into a red X, telling you that email has been deleted.
  • You can do all these swipes without even opening an email, reading the first two lines of the message in the inbox list.
  • This is a fantastic app, though there are some downsides – mostly to do with the fact that it won't work for everyone. For a start, it's iPhone-only – there's no Android, Windows Phone or BlackBerry version for now.
  • This is a remarkable app that can really make a difference to the way you use email.
sintija

BBC News - US internet 'six strikes' anti-piracy campaign begins - 0 views

  • US internet 'six strikes' anti-piracy campaign begins
  • Five of the country's leading internet service providers (ISPs) are taking part in the Copyright Alert System (CAS), which they say is designed to educate rather than punish users.
  • "Over the course of the next several days... our content partners will begin sending notices of alleged peer-to-peer copyright infringement to ISPs, and the ISPs will begin forwarding those notices in the form of copyright alerts to consumers,
  • ...4 more annotations...
  • Consumers whose accounts have been used to share copyrighted content over P2P networks illegally (or without authority) will receive alerts that are meant to educate rather than punish, and direct them to legal alternatives. And for those consumers who believe they received alerts in error, an easy-to-use process will be in place for them to seek independent review of the alerts they received.
  • Meanwhile the UK has favoured a proposed "three strikes" policy
  • Under telecom regulator Ofcom's draft code, users who receive three warnings within 12 months would have anonymous information about their activities passed to copyright holders which could then seek court orders to discover their identities.
  • The policy had been due to come into effect in March 2014, but has been delayed after a House of Lords committee queried whether the Digital Economy Act - which the code is part of - complied with Treasury rules.
1 - 20 of 130 Next › Last »
Showing 20 items per page