Skip to main content

Home/ Groups/ Internetni praktikum
10More

BBC News - Evernote says security has been breached by hackers - 0 views

  • hackers
  • hackers
  • website
  • ...7 more annotations...
  • network
  • Twitter
  • It said user names, email addresses and encrypted passwords were accessed.
  • online personal organiser, with users able to save data such as video clips, images, web pages, notes and itineraries in an external storage system commonly known as the cloud.
  • The firm apologised "for the annoyance" caused by the breach, which it said is becoming "far more common" at other "large services".
  • Apple revealed a "small number" of its computers had been hacked
  • micro-blogging website Twitter announced it had been the victim of a security breach which compromised the accounts of 250,000 users.
6More

BBC - Future - Technology - YouTube: The cult of web video - 0 views

  • With 72 hours of video uploaded to YouTube every minute, almost every moment of modern history is a cult waiting to happen. And it is becoming big business.
  • The billion dollar question is how: how to make your video “go viral”, spreading your particular slice of contemporary culture across the planet like a contagion.
  • Silliness is more important – but not vital, given that both the Kony documentary and the jump from space are entirely serious.
  • ...3 more annotations...
  • Similarly, although sex may remain the most powerful form of advertising, it barely features within this list. Visual excitement won’t do either, given that the year’s second-biggest hit features a single camera pointed at five people and a guitar.
  • irality isn’t actually a property of these videos at all. It’s a property of their audience: a description not of a particular object, but of the ways in which that object is used.
  • To pass on a video or link is to become an evangelist for an instant cult: to gain the status of an initiate, complete with social capital and mutual LOLs. Unlike a biological virus, which hijacks hapless cells no matter what their owners might want, these are infections you must decide to pass on.
10More

Apple blocks emails containing phrase 'barely legal teen' from iCloud in new 'anti-porn... - 0 views

  • Apple is deleting all emails on its iCloud service that contain the phrase 'barely legal teen,
  • He's a barely legal teenage driver
  • some would consider the phrase to have a strong association with paedophilia
  • ...7 more annotations...
  • only the second one got through.
  • The phrase 'barely legal teen' is used in pornographic searches
  • He's barely a legal teenage driver
  • Though Apple has no legal obligation to block the phrase 'barely legal teen', its terms of service state that it has every right to do so.
  • Occasionally, automated spam filters may incorrectly block legitimate email
  • The iBookstore rejected an e-book submission on the hippie movement because it contained photographs of naked people.
  • People do not have to use Apple's iCloud service
18More

BBC News - Viewpoint: Changing the way the internet is governed is risky - 0 views

  • Viewpoint: Changing the way the internet is governed is risky
  • the US Department of Commerce has the power to decide how the internet works
  • internet is already governed
  • ...15 more annotations...
  • It's important to realise that without governance the internet could not function.
  • avoid two different web sites having the same name
  • International Corporation for Assigned Names and Numbers (Icann)
  • governance of the internet is effectively done by multiple stakeholders
  • WGIG would report on a solution acceptable to all but would move governance to an international body.
  • US government ultimately "controls" the internet
  • The internet overseers
  • UN summit
  • US refused to relinquish control of the Root Zone file, which is basically the key to governing the internet.
  • formed the Working Group on Internet Governance (WGIG).
  • in 2003 in Geneva
  • Russians
  • International Telecommunications Union (ITU), another UN agency, to be given responsibility for internet governanc
  • A great advantage of the current governance structure is that it supports rapid developments, provided that the US Department of Commerce remains at arm's length
  • internet governance needs to help the internet evolve rather than dictate how it must develop.
6More

City must wake up to digital growth, says tech investor | Business | guardian.co.uk - 0 views

  • digital business was now the third biggest contributor to the economy, responsible for 8% of GDP
  • American internet companies like Google and Amazon have walked in and eaten the lunch of the UK in media, in retail, in travel – and they are not going to stop here
  • digital business will grow to 12.4% of the economy in 2016
  • ...3 more annotations...
  • every business and public-sector organisation should be forced to measure its digital operations
  • structural change was necessary if the media were going to survive.
  • Retail isn't dead, it's just changing – the same with media
9More

BBC News - Web code weakness allows data dump on PCs - 0 views

  • The loophole exploits a feature of HTML 5 which defines how websites are made and what they can do.
  • Developer Feross Aboukhadijeh found the bug and set up a demo page that fills visitors' hard drives with pictures of cartoon cats. In one demo, Mr Aboukhadijeh managed to dump one gigabyte of data every 16 seconds onto a vulnerable Macbook. Clever code Most major browsers, Chrome, Internet Explorer, Opera and Safari, were found to be vulnerable to the bug, said Mr Aboukhadijeh. While most websites are currently built using version 4 of the Hyper Text Markup Language (HTML), that code is gradually being superseded by the newer version 5. One big change brought in with HTML 5 lets websites store more data locally on visitors' PCs. Safeguards built into the "local storage" specification should limit how much data can be stored. Different browsers allow different limits but all allow at least 2.5 megabytes to be stored. However, Mr Aboukhadijeh found a way round this cap by creating lots of temporary websites linked to the one a person actually visited. He found that each one of these associated sites was allowed to store up to the limit of data because browser makers had not written code to stop this happening. By endlessly creating new, linked websites the bug can be used to siphon huge amounts of data onto target PCs. Only Mozilla's Firefox capped storage at 5MB and was not vulnerable, he found. "Cleverly coded websites have effectively unlimited storage space on visitor's computers," wrote Mr Aboukhadijeh in a blogpost about the bug. Code to exploit the bug has been released by Mr Aboukhadijeh and he set up a website, called Filldisk that, on vulnerable PCs, dumps lots of images of cats on to the hard drive. So far, no malicious use of the exploits has been observed. In a bid to solve the problem, bug reports about the exploit have been filed with major browser makers. More on This Story .related-links-list li { position: relative; } .related-links-list .gvl3-icon { position: absolute; top: 0; left: 0; } Related Stories Firefox smartphone partners revealed 24 FEBRUARY 2013, TECHNOLOGY Flash Player exits Android store 15 AUGUST 2012, TECHNOLOGY HTML 5 target for cybercriminals 02 DECEMBER 2011, TECHNOLOGY $render("page-see-also","ID"); $render("page-newstracker","ID"); Related Internet links Feross Aboukhadijeh The BBC is not responsible for the content of external Internet sites $render("page-related-items","ID"); Share this pageShare this page1.4KShareFacebookTwitter Email Print In association with $render("advert","advert-sponsor-module","page-bookmark-links"); $render("advert-post-script-load"); $render("advert-post-script-load"); More Technology stories RSS Computer glitch hits Mars rover Nasa's Curiosity Mars rover is put into "safe mode" after a computer glitch caused by corrupted files. US plans small-ship drone launches Hackers breach Evernote security $render("advert","advert-mpu-high"); $render("advert-post-script-load"); Top Stories http://news.bbcimg.co.uk/media/images/6618
  • found the bug and set up a demo page that fills visitors' hard drives with pictures of cartoon cats.
  • ...6 more annotations...
  • because browser makers had not written code to stop this happening. By endlessly creating new, linked websites the bug can be used to siphon huge amounts of data onto target PCs.
  • found a way round this cap by creating lots of temporary websites linked to the one a person actually visited
  • Most major browsers, Chrome, Internet Explorer, Opera and Safari, were found to be vulnerable to the bug
  • was not vulnerable
  • Mozilla's Firefox
  • bug reports about the exploit have been filed with major browser makers.
7More

Apple and Samsung smartphone patent row set for new jury trial | Technology | guardian.... - 0 views

  • battle between Apple and Samsung over smartphone patents
  • Samsung used to be Apple's biggest supplier for phone parts, and Apple its largest customer. But in 2010, Steve Jobs, then Apple's chief, vowed to go to "thermonuclear war" over what he saw as copying of iPhone features by Android phones.
  • the jury decided that some Samsung products had copied the appearance of Apple's iPhone 3GS
  • ...4 more annotations...
  • is not quite over yet.
  • Samsung meanwhile became the largest smartphone manufacturer in the world, and the second most profitable behind Apple. Together, the two companies produce around half of all the smartphones shipped worldwide.
  • Samsung has mounted a series of complaints against the jury decision
  • Apple meanwhile is seeking to have the damages increased.
5More

As 'Do Not Track' Effort Seems to Stall, Web Companies Race to Look Privacy-Friendly - ... - 0 views

  • Increasingly, Internet companies are pushing each other to prove to consumers that their data is safe and in their control.
  • “It’s not just privacy advocates and regulators pushing,” Mr. Lynch said. “Increasingly, people are concerned more about privacy as technology intersects their life.”
  • In some instances, established companies are trying to gain market advantage by casting themselves as more privacy-friendly than their rivals.
  • ...2 more annotations...
  • To some degree, these developments signal that the industry is working hard to stave off government regulation, which is moving at a glacial pace anyway. There seems to be no movement on broad privacy legislation on Capitol Hill, and no consensus has been reached on standards for “Do Not Track,” a browser setting that would let Internet users indicate that they did not want their activity tracked by marketers.
  • Whether Internet users are ready to pay to protect their personal data is unclear, though surveys have repeatedly pointed to consumer anxiety.
4More

Next generation of social media 'exposing girls to sexual abuse' - Online - Media - The... - 0 views

  • A new breed of social media websites is leaving young people open to cyber bullying, with anonymous users able to bombard others with sexually explicit messages and demands.
  • The anonymity provided by the sites has made them a hotbed for sexual pressure, bullying and abuse.
  • Despite little mainstream media coverage, “question and answer” websites such as ask.fm, qooh.me and formspring.me have exploded in popularity
  • ...1 more annotation...
  • Browsing some of the sites for just a few minutes reveals a torrent of sexual demands, explicit questions and abusive threats to users whose photos suggest they are young teenage girls.
4More

Preobremenjenost z informacijami | Dnevnik.si - 0 views

  • Preobremenjenost z informacijami
  • V zadnjih 100 letih je prišlo do silnega razvoja vseh področij znanosti, takšnega razvoja, kot ga svet v času dveh generacij še ni doživel.
  • Napredek v informacijski znanosti predstavlja za posameznika napor pri razumevanju kompleksnosti vsebin, tematik in področij ter zastavljenih vprašanj.
  • ...1 more annotation...
  • Joseph Stiglitz je leta 2001 prejel Nobelovo nagrado za ekonomijo za svoje delo na področju asimetrije informacij in odnosa med principalom in agentom. Asimetrija informacij proučuje odnose med subjektoma, pri kateri razpolaga agent z več informacijami, kot jih ima na voljo principal.
7More

Internet pomembnejši od mehanika | Dnevnik.si - 1 views

  • Internet pomembnejši od mehanika
  • Da, kupci postajajo vedno bolj »pismeni« tudi na tem področju, zato tudi zanje velja: če nimaš urejenih, enostavnih, preglednih in tako ali drugačne informativnih in privlačnih internetnih strani, je skorajda tako, kot da te ni.
  • Slovenci smo »internetni« narod, ki spada v evropsko povprečje, čeravno so trendi v zadnjem času vse manj spodbudni. Na Fakulteti za družbene vede so v okviru raziskave RIS (Raba interneta v Sloveniji) zaznali, da je bila Slovenija v začetnem obdobju interneta, sredi devetdesetih let, na tem področju pravzaprav še med vodilnimi državami v Evropi, v preteklem desetletju je skorajda v vseh pogledih zdrknila v povprečje, v tem desetletju pa drsi že v podpovprečje, in je nad povprečjem Evropske unije le še v redkih indikatorjih (predvsem v bolj splošnih vidikih informacijske pismenosti in infrastrukture).
  • ...4 more annotations...
  • Tako je po njihovem mnenju internet pri avtomobilih postal najpomembnejši medij v informativno-nakupnem procesu in je že takrat prehitel vse druge medije
  • Če nam danes torej svet leži na dlani, je povsem logično, da brez njega ne morejo živeti in preživeti niti avtomobilske tovarne ter prodajalci in zastopniki, ki se vsak dan borijo za naklonjenost kupcev.
  • 34 odstotkov voznikov, ki uporabljajo internet, želi, da jih prodajalec v procesu nakupa usmerja na informacije prek interneta, 33 odstotkov pa je načeloma že pripravljenih tudi na administrativni del nakupa prek interneta. 2,4 milijarde ljudi je sredi leta 2012 v svetovnem merilu uporabljalo internet, še konec leta 2000 pa jih je bilo po podatkih Internet World Stats le 361 milijonov. 518 milijonov je uporabnikov interneta v Evropi od skupno 821 milijonov prebivalcev, kar pomeni, da ga uporablja 63 odstotkov prebivalstva. Večina kupcev, sploh tistih mlajše generacije, pred obiskom prodajnega salona zbere informacije na naši spletni strani. V salon pridejo že skoraj odločeni glede nakupa ali pa imajo zelo dodelana vprašanja glede vozila, storitve oziroma ponudbe.Ksenija Hiti, Renault
  • Večina kupcev, sploh tistih mlajše generacije, pred obiskom prodajnega salona zbere informacije na naši spletni strani. V salon pridejo že skoraj odločeni glede nakupa ali pa imajo zelo dodelana vprašanja glede vozila, storitve oziroma ponudbe,
13More

Brain-to-brain interface lets rats share information via internet | Science | The Guardian - 0 views

  • News Science Neuroscience Brain-to-brain interface lets rats share information via internet Rats thousands of miles apart collaborate on simple tasks with their brains connected through the internet Share 9893 inShare61 Email Ian Sample, science correspondent The Guardian, Friday 1 March 2013 jQ(document).ready(function(){ jQ.ajax({ url : 'http://resource.guim.co.uk/global/static/file/discussion/5/fill-comment-counts-swimlaned.js', dataType : 'script', type : 'get', crossDomain : true, cache: true }); }); Jump to comments (449) A rat with a brain-to-brain implant responds to a light (circled) by pressing a lever. Its motor cortex was connected to that of another rat. Photograph: Scientific Reports Scientists have connected the brains of a pair of animals and allowed them to share sensory information
  • US team fitted two rats with devices called brain-to-brain interfaces that let the animals collaborate on simple tasks to earn rewards
  • experiments showed that we have established a sophisticated, direct communication linkage between brains
  • ...10 more annotations...
  • In one radical demonstration of the technology, the scientists used the internet to link the brains of two rats separated
  • If the receiving rat failed at the task, the first rat was not rewarded with a drink, and appeared to change its behaviour to make the task easier for its partner.
  • an organic computer
  • we are creating
  • Even though the animals were on different continents
  • they could still communicate
  • we could create a workable network of animal brains distributed in many different locations
  • you could imagine that a combination of brains could provide solutions that individual brains cannot achieve by themselves
  • the work was "very important" in helping to understand how brains encode information
  • Very little is known about how thoughts are encoded and how they might be transmitted into another person's brain – so that is not a realistic prospect any time soon
5More

Informacijska hladna vojna - 0 views

  • ZDA so trdile, da hočejo internet obraniti pred birokratskim nadzorom OZN, cenzuro in nedemokratičnimi režimi. Nasprotniki so zahtevali več možnosti soodločanja pri upravljanju interneta, opozarjali na ameriško internetno prevlado in se sklicevali na načela nacionalne suverenosti.
  • Za varuhe internetne svobode so se poleg ZDA razglasile še EU, Velika Britanija, Kanada, Indija in nekatere južnoameriške glasovalke, na nasprotni strani so ostale Rusija, Kitajska ter številne arabske in afriške države.
  • Najpomembnejša lastnost interneta je njegova mrežna zasnova, ki nima središčne točke in ne upošteva delitve sveta na nacionalne države.
  • ...2 more annotations...
  • Ameriške delegacije niso sestavljali samo predstavniki zunanjega ministrstva, ki zastopajo uradne zaveze ZDA, da si bodo povsod po svetu prizadevale za »odprt in svoboden« internet, brez katerega si težko predstavljamo sodobne demokratične družbe. Pridružili so se jim tudi predstavniki internetnih podjetij (Googla, Facebooka …), ki so življenjsko odvisni od sedanjega odprtega interneta in po različnih ocenah v ameriško gospodarstvo letno prispevajo tudi do dvesto milijard dolarjev.
  • Letošnji poskusi netransparentnega sprejemanja protipiratske zakonodaje (Acta, Sopa, Pipa) in vse močnejši posegi v državljanske pravice niso omejeni samo na nedemokratične države »tretjega sveta«, ampak so vse pogostejši tudi na zahodu (nadzor uporabnikov, profiliranje, blokada povezav in konkurenčnih storitev …).
6More

International cooperation is needed to make the internet safe for the world - Telegraph - 0 views

  • However, a severe downside is the challenge to data security and personal privacy. The internet is now overrun with cyber attacks and hackers. Internet security has become a very serious and common concern for the entire world.
  • Recently the American company Mandiant published a report on cyber security. This report accuses China of being the origin of most cyber attacks and portrays China as an arch-hacker.
  • Cyber attacks by nature are transnational, anonymous and deceptive. It is extremely difficult to ascertain the source of any attack. Cyber attacks launched from stolen or faked IP addresses take place around the world on daily basis.
  • ...3 more annotations...
  • China is a serious victim of cyber attacks.
  • The Chinese government is committed to international cooperation against cyber crime.
  • In September 2011 China and Russia jointly submitted to the United Nations a draft International Code of Conduct for Information Security. China is deeply sincere in seeking cooperation to tackle cyber crime. This common threat needs the participation of the whole international community.
7More

BBC News - Google told to fix privacy policy by EU data regulators - 0 views

  • Google told to fix privacy policy by EU data regulators
  • consolidate 60 separate privacy policies into a single agreement.
  • Google has been told it should give clearer information about what data is being collected and for what purpose. It has also been told to give users more control over how the information is combined.
  • ...4 more annotations...
  • Google
  • has been accused of providing "incomplete and approximate" details raising "deep concerns about data protection and the respect of the European law".
  • It said that EU data protection laws place limits on such activities and proposed the following changes:
  • Google must "reinforce users' consent". It suggests this could be done by allowing its members to choose under what circumstances data about them was combined by asking them to click on dedicated buttons. The firm should offer a centralised opt-out tool and allow users to decide which of Google's services provided data about them. Google should adapt its own tools so that it could limit data use to authorised purposes. For example, it should be able to use a person's collated data to improve security efforts but not to target advertising.
7More

BBC News - US internet 'six strikes' anti-piracy campaign begins - 0 views

  • US internet 'six strikes' anti-piracy campaign begins
  • Five of the country's leading internet service providers (ISPs) are taking part in the Copyright Alert System (CAS), which they say is designed to educate rather than punish users.
  • "Over the course of the next several days... our content partners will begin sending notices of alleged peer-to-peer copyright infringement to ISPs, and the ISPs will begin forwarding those notices in the form of copyright alerts to consumers,
  • ...4 more annotations...
  • Consumers whose accounts have been used to share copyrighted content over P2P networks illegally (or without authority) will receive alerts that are meant to educate rather than punish, and direct them to legal alternatives. And for those consumers who believe they received alerts in error, an easy-to-use process will be in place for them to seek independent review of the alerts they received.
  • Meanwhile the UK has favoured a proposed "three strikes" policy
  • Under telecom regulator Ofcom's draft code, users who receive three warnings within 12 months would have anonymous information about their activities passed to copyright holders which could then seek court orders to discover their identities.
  • The policy had been due to come into effect in March 2014, but has been delayed after a House of Lords committee queried whether the Digital Economy Act - which the code is part of - complied with Treasury rules.
7More

BBC News - Online advertising breaks through £4bn barrier - 0 views

  • Online advertising breaks through £4bn barrier
  • value of online advertising grew by 12.8% in 2010, breaking through the £4bn barrier.
  • A study by the Internet Advertising Bureau (IAB) and the accountants PwC found that online advertising spending grew three times as rapidly as in 2009
  • ...4 more annotations...
  • Online video advertising also nearly doubled in 2010, with £54m spent on adverts that appeared before, during or after video clips.
  • Facebook has made big advances in the last year in persuading advertisers to see social networks as a place to promote their wares
  • Search advertising, still dominated by Google, remains the biggest earner
  • The IAB expects online spending to continue to grow, as faster broadband makes new formats increasingly attractive.
3More

Instagram makes you the product | Technology | guardian.co.uk - 0 views

  • Mark Zuckerberg's Facebook bought Instagram for $1bn.
  • In an FAQ section on Instagram's website, the company explains the cost of its app in just 12 words: "$0.00 – available for free in the Apple App Store and Google Play store."
  • In fact, the cost of using the app is that you, the user, are the product.
4More

Who owns the content you upload online? | Money | guardian.co.uk - 0 views

  • The outrage over Instagram's announcement that it is changing its terms and conditions has turned the spotlight on the relationship between websites and users who upload content, whether it is photos, video, blogs or even games.
  • A survey of UK consumers suggested just 7% read online terms and conditions before they signed up for products and services, and other research has put it even lower.
  • Twitter: You retain your rights to any content you post on Twitter, but you grant the website a worldwide, non-exclusive, royalty-free licence (with the right to sublicense) "to use, copy, reproduce, process, adapt, modify, publish, transmit, display and distribute" your content.
  • ...1 more annotation...
  • However, when you use Facebook you give it the right to use information "in connection with the services and features we provide to you and other users like your friends, our partners, the advertisers that purchase ads on the site, and the developers that build the games, applications, and websites you use".
« First ‹ Previous 181 - 200 Next › Last »
Showing 20 items per page