Skip to main content

Home/ Internetni praktikum/ Group items tagged zid

Rss Feed Group items tagged

Rebeka Aščerič

Social media followers: Beware the tweeting crowds | The Economist - 0 views

  • IF YOU think money can't buy you friends, think again. In the online world, it’s possible to purchase a crowd of fans.
  • To decide whether a follower is human, Mr Camisani Calzolari used various criteria, including the number of posts from a fan’s Twitter account and the use of correct punctuation in tweets. According to this research, by June 2011 nearly half of Twitter followers of computer maker Dell—about 700,000—were bots.
  • On close inspection, a significant proportion of Mr Romney’s followers appeared to be fake profiles.
  • ...2 more annotations...
  • There is no indication that any of the companies mentioned in Mr Camisani Calzolari’s paper have bought followers—rogue bots often attach themselves to people and brands without payment. But some firms do buy a social media following.
  • For now, the trick works. “Normal people don't know yet that there is this black market. Most have total trust that a brand's followers are real,” says Mr Camisani Calzolari.
Jan Keček

Smartphone operating systems: Bright-eyed and bushy-tailed | The Economist - 0 views

  • IF YOU have a new smartphone, it is almost certainly either an Apple iPhone or one of the many devices that runs on Google’s Android operating system. According to IDC, a research firm, more than 90% of the 228m smartphones shipped in the last quarter of 2012 belonged to one of the two dominant species. Android is the bigger bea
  • st. Its share has grown as the smartphone market has boomed, to about 70%.
  • Mozilla, a non-profit organisation best known for Firefox, a web browser, unveiled plans to bring a smartphone operating system to market. Called Firefox OS, it has the backing of 18 mobile operators based in countries from Asia to Latin America.
  • ...4 more annotations...
  • Most Windows smartphones are made by Finland’s Nokia, which dropped its own plans for a new system when it threw in its lot with the American software giant. BlackBerry, a Canadian company formerly called Research In Motion, hopes to recover lost glories with BlackBerry 10, which appeared in January after much delay.
  • One reason for the challengers’ optimism is that a lot of ground is unoccupied.
  • BlackBerry and Microsoft have the advantage of familiarity; 80m people use BlackBerrys. Companies’ information-technology departments trust them as secure. Microsoft hopes that Windows’ dominance of personal computers can be transferred to mobiles. With that in mind, all new Windows devices, on desks, on laps or in hands, have the same look, with “tiles” for touching, not clicking.
  • Whereas most applications on Apple and Android devices have been written for those systems, Firefox OS uses open standards. In principle, apps based on it can run on any device connected to the web.
Jan Keček

Cyber-security: To the barricades | The Economist - 0 views

  • European Commission and the White House have set out a series of new rules designed to stem the rising tide of cyber-attacks against public and private victims.
  • Alongside his state-of-the-union message on February 11th, Barack Obama released an executive order intended to plug the gap left by the failure of Congress to pass cyber-security legislation that matches the growing threat.
  • By contrast, the European Commission’s cyber-security strategy is at an earlier stage. It wants member countries to introduce laws compelling important firms in industries such as transport, telecoms, finance and online infrastructure to disclose details of any attack they suffer to a national authority, known as a CERT (Computer Emergency Response Team). Each CERT will be responsible for defending vital infrastructure-providers against online attacks and sharing information with its counterparts, law-enforcement agencies and data-protection bodies.
  • ...1 more annotation...
  • What neither the European nor American measures deal with directly is the shortage of cyber-security specialists. A gloomy review of the British government’s strategy by the National Audit Office, a spending watchdog, said the skills gap could take 20 years to bridge.
1 - 4 of 4
Showing 20 items per page