Skip to main content

Home/ Groups/ Internetni praktikum
anonymous

How Much YouTube Do Employees Really Watch at Work? - Alexis C. Madrigal - The Atlantic - 0 views

  • J.C. Penney employees are reported to have watched five million YouTube videos from the office during the month of January.
  • the number of YouTube videos watched on the clock is astronomical, belonging to the category of numbers so large that you should write them like this: 107. 
  • YouTube says it streams more than 4 billion videos per day, with about 40 percent coming from the US, so 1.6 billion American streams each day. Let's assume there are 300 million Americans who all watch exactly the same amount of videos each day.
  • ...2 more annotations...
  • How many come from the country's 55 million white-collar workers during the hours between 8 and 6pm?
  • But I wouldn't be surprised if the white-collar worker average was 10 videos a day or even more.
anonymous

Preobremenjenost z informacijami | Dnevnik.si - 0 views

  • Preobremenjenost z informacijami
  • V zadnjih 100 letih je prišlo do silnega razvoja vseh področij znanosti, takšnega razvoja, kot ga svet v času dveh generacij še ni doživel.
  • Napredek v informacijski znanosti predstavlja za posameznika napor pri razumevanju kompleksnosti vsebin, tematik in področij ter zastavljenih vprašanj.
  • ...1 more annotation...
  • Joseph Stiglitz je leta 2001 prejel Nobelovo nagrado za ekonomijo za svoje delo na področju asimetrije informacij in odnosa med principalom in agentom. Asimetrija informacij proučuje odnose med subjektoma, pri kateri razpolaga agent z več informacijami, kot jih ima na voljo principal.
Patricija Čelik

As 'Do Not Track' Effort Seems to Stall, Web Companies Race to Look Privacy-Friendly - ... - 0 views

  • Increasingly, Internet companies are pushing each other to prove to consumers that their data is safe and in their control.
  • In some instances, established companies are trying to gain market advantage by casting themselves as more privacy-friendly than their rivals.
  • “It’s not just privacy advocates and regulators pushing,” Mr. Lynch said. “Increasingly, people are concerned more about privacy as technology intersects their life.”
  • ...2 more annotations...
  • To some degree, these developments signal that the industry is working hard to stave off government regulation, which is moving at a glacial pace anyway. There seems to be no movement on broad privacy legislation on Capitol Hill, and no consensus has been reached on standards for “Do Not Track,” a browser setting that would let Internet users indicate that they did not want their activity tracked by marketers.
  • Whether Internet users are ready to pay to protect their personal data is unclear, though surveys have repeatedly pointed to consumer anxiety.
Patricija Čelik

Next generation of social media 'exposing girls to sexual abuse' - Online - Media - The... - 0 views

  • A new breed of social media websites is leaving young people open to cyber bullying, with anonymous users able to bombard others with sexually explicit messages and demands.
  • Despite little mainstream media coverage, “question and answer” websites such as ask.fm, qooh.me and formspring.me have exploded in popularity
  • The anonymity provided by the sites has made them a hotbed for sexual pressure, bullying and abuse.
  • ...1 more annotation...
  • Browsing some of the sites for just a few minutes reveals a torrent of sexual demands, explicit questions and abusive threats to users whose photos suggest they are young teenage girls.
Gabrijela Vrbnjak

Apple and Samsung smartphone patent row set for new jury trial | Technology | guardian.... - 0 views

  • battle between Apple and Samsung over smartphone patents
  • is not quite over yet.
  • the jury decided that some Samsung products had copied the appearance of Apple's iPhone 3GS
  • ...4 more annotations...
  • Samsung used to be Apple's biggest supplier for phone parts, and Apple its largest customer. But in 2010, Steve Jobs, then Apple's chief, vowed to go to "thermonuclear war" over what he saw as copying of iPhone features by Android phones.
  • Samsung meanwhile became the largest smartphone manufacturer in the world, and the second most profitable behind Apple. Together, the two companies produce around half of all the smartphones shipped worldwide.
  • Samsung has mounted a series of complaints against the jury decision
  • Apple meanwhile is seeking to have the damages increased.
Gabrijela Vrbnjak

BBC News - Web code weakness allows data dump on PCs - 0 views

  • The loophole exploits a feature of HTML 5 which defines how websites are made and what they can do.
  • Developer Feross Aboukhadijeh found the bug and set up a demo page that fills visitors' hard drives with pictures of cartoon cats. In one demo, Mr Aboukhadijeh managed to dump one gigabyte of data every 16 seconds onto a vulnerable Macbook. Clever code Most major browsers, Chrome, Internet Explorer, Opera and Safari, were found to be vulnerable to the bug, said Mr Aboukhadijeh. While most websites are currently built using version 4 of the Hyper Text Markup Language (HTML), that code is gradually being superseded by the newer version 5. One big change brought in with HTML 5 lets websites store more data locally on visitors' PCs. Safeguards built into the "local storage" specification should limit how much data can be stored. Different browsers allow different limits but all allow at least 2.5 megabytes to be stored. However, Mr Aboukhadijeh found a way round this cap by creating lots of temporary websites linked to the one a person actually visited. He found that each one of these associated sites was allowed to store up to the limit of data because browser makers had not written code to stop this happening. By endlessly creating new, linked websites the bug can be used to siphon huge amounts of data onto target PCs. Only Mozilla's Firefox capped storage at 5MB and was not vulnerable, he found. "Cleverly coded websites have effectively unlimited storage space on visitor's computers," wrote Mr Aboukhadijeh in a blogpost about the bug. Code to exploit the bug has been released by Mr Aboukhadijeh and he set up a website, called Filldisk that, on vulnerable PCs, dumps lots of images of cats on to the hard drive. So far, no malicious use of the exploits has been observed. In a bid to solve the problem, bug reports about the exploit have been filed with major browser makers. More on This Story .related-links-list li { position: relative; } .related-links-list .gvl3-icon { position: absolute; top: 0; left: 0; } Related Stories Firefox smartphone partners revealed 24 FEBRUARY 2013, TECHNOLOGY Flash Player exits Android store 15 AUGUST 2012, TECHNOLOGY HTML 5 target for cybercriminals 02 DECEMBER 2011, TECHNOLOGY $render("page-see-also","ID"); $render("page-newstracker","ID"); Related Internet links Feross Aboukhadijeh The BBC is not responsible for the content of external Internet sites $render("page-related-items","ID"); Share this pageShare this page1.4KShareFacebookTwitter Email Print In association with $render("advert","advert-sponsor-module","page-bookmark-links"); $render("advert-post-script-load"); $render("advert-post-script-load"); More Technology stories RSS Computer glitch hits Mars rover Nasa's Curiosity Mars rover is put into "safe mode" after a computer glitch caused by corrupted files. US plans small-ship drone launches Hackers breach Evernote security $render("advert","advert-mpu-high"); $render("advert-post-script-load"); Top Stories http://news.bbcimg.co.uk/media/images/6618
  • found the bug and set up a demo page that fills visitors' hard drives with pictures of cartoon cats.
  • ...6 more annotations...
  • because browser makers had not written code to stop this happening. By endlessly creating new, linked websites the bug can be used to siphon huge amounts of data onto target PCs.
  • Most major browsers, Chrome, Internet Explorer, Opera and Safari, were found to be vulnerable to the bug
  • found a way round this cap by creating lots of temporary websites linked to the one a person actually visited
  • was not vulnerable
  • Mozilla's Firefox
  • bug reports about the exploit have been filed with major browser makers.
Gabrijela Vrbnjak

City must wake up to digital growth, says tech investor | Business | guardian.co.uk - 0 views

  • digital business was now the third biggest contributor to the economy, responsible for 8% of GDP
  • every business and public-sector organisation should be forced to measure its digital operations
  • digital business will grow to 12.4% of the economy in 2016
  • ...3 more annotations...
  • American internet companies like Google and Amazon have walked in and eaten the lunch of the UK in media, in retail, in travel – and they are not going to stop here
  • structural change was necessary if the media were going to survive.
  • Retail isn't dead, it's just changing – the same with media
Gabrijela Vrbnjak

Brain-to-brain interface lets rats share information via internet | Science | The Guardian - 0 views

  • News Science Neuroscience Brain-to-brain interface lets rats share information via internet Rats thousands of miles apart collaborate on simple tasks with their brains connected through the internet Share 9893 inShare61 Email Ian Sample, science correspondent The Guardian, Friday 1 March 2013 jQ(document).ready(function(){ jQ.ajax({ url : 'http://resource.guim.co.uk/global/static/file/discussion/5/fill-comment-counts-swimlaned.js', dataType : 'script', type : 'get', crossDomain : true, cache: true }); }); Jump to comments (449) A rat with a brain-to-brain implant responds to a light (circled) by pressing a lever. Its motor cortex was connected to that of another rat. Photograph: Scientific Reports Scientists have connected the brains of a pair of animals and allowed them to share sensory information
  • US team fitted two rats with devices called brain-to-brain interfaces that let the animals collaborate on simple tasks to earn rewards
  • experiments showed that we have established a sophisticated, direct communication linkage between brains
  • ...10 more annotations...
  • In one radical demonstration of the technology, the scientists used the internet to link the brains of two rats separated
  • we are creating
  • an organic computer
  • If the receiving rat failed at the task, the first rat was not rewarded with a drink, and appeared to change its behaviour to make the task easier for its partner.
  • Even though the animals were on different continents
  • they could still communicate
  • we could create a workable network of animal brains distributed in many different locations
  • you could imagine that a combination of brains could provide solutions that individual brains cannot achieve by themselves
  • the work was "very important" in helping to understand how brains encode information
  • Very little is known about how thoughts are encoded and how they might be transmitted into another person's brain – so that is not a realistic prospect any time soon
sergeja perklič

Informacijska hladna vojna - 0 views

  • ZDA so trdile, da hočejo internet obraniti pred birokratskim nadzorom OZN, cenzuro in nedemokratičnimi režimi. Nasprotniki so zahtevali več možnosti soodločanja pri upravljanju interneta, opozarjali na ameriško internetno prevlado in se sklicevali na načela nacionalne suverenosti.
  • Za varuhe internetne svobode so se poleg ZDA razglasile še EU, Velika Britanija, Kanada, Indija in nekatere južnoameriške glasovalke, na nasprotni strani so ostale Rusija, Kitajska ter številne arabske in afriške države.
  • Najpomembnejša lastnost interneta je njegova mrežna zasnova, ki nima središčne točke in ne upošteva delitve sveta na nacionalne države.
  • ...2 more annotations...
  • Ameriške delegacije niso sestavljali samo predstavniki zunanjega ministrstva, ki zastopajo uradne zaveze ZDA, da si bodo povsod po svetu prizadevale za »odprt in svoboden« internet, brez katerega si težko predstavljamo sodobne demokratične družbe. Pridružili so se jim tudi predstavniki internetnih podjetij (Googla, Facebooka …), ki so življenjsko odvisni od sedanjega odprtega interneta in po različnih ocenah v ameriško gospodarstvo letno prispevajo tudi do dvesto milijard dolarjev.
  • Letošnji poskusi netransparentnega sprejemanja protipiratske zakonodaje (Acta, Sopa, Pipa) in vse močnejši posegi v državljanske pravice niso omejeni samo na nedemokratične države »tretjega sveta«, ampak so vse pogostejši tudi na zahodu (nadzor uporabnikov, profiliranje, blokada povezav in konkurenčnih storitev …).
sergeja perklič

The European Union Closes in on Data Privacy Legislation - SPIEGEL ONLINE - 0 views

  • The European Union is seeking to increase the private sphere of its citizens by strengthening data protection laws for the web. Large Internet firms and lobbyists are fighting the plans.
  • Gmail and Facebook may be forced to abandon their ad-supported models and start charging their customers in Europe or stop providing them with these popular services altogether.
  • Take Facebook, for example, which has its European headquarters in Ireland. The Irish government's data protection commissioner would then be responsible for the concerns of all EU citizens relating to the company's privacy policies.
  • ...2 more annotations...
  • Under exi
  • sting privacy regulations, data protection supervision in EU countries must be conducted entirely independently of public authorities, and data protection controllers are not under the supervision of the European Commission. But the EU wants to weaken this policy and install itself as the data protection agencies' supervisory authority.
sergeja perklič

Twitter active users pass 200 million | Technology | guardian.co.uk - 0 views

  • Number of Twitterati has shot up from 140 million in May, but majority of 500 million registered users prefer not to tweet
  • Twitter now has more than 200 million active users around the world
  • The rapid growth and perceived importance of Twitter in the US, where there are 140 million registered users
sergeja perklič

Who owns the content you upload online? | Money | guardian.co.uk - 0 views

  • The outrage over Instagram's announcement that it is changing its terms and conditions has turned the spotlight on the relationship between websites and users who upload content, whether it is photos, video, blogs or even games.
  • A survey of UK consumers suggested just 7% read online terms and conditions before they signed up for products and services, and other research has put it even lower.
  • Twitter: You retain your rights to any content you post on Twitter, but you grant the website a worldwide, non-exclusive, royalty-free licence (with the right to sublicense) "to use, copy, reproduce, process, adapt, modify, publish, transmit, display and distribute" your content.
  • ...1 more annotation...
  • However, when you use Facebook you give it the right to use information "in connection with the services and features we provide to you and other users like your friends, our partners, the advertisers that purchase ads on the site, and the developers that build the games, applications, and websites you use".
sergeja perklič

Instagram makes you the product | Technology | guardian.co.uk - 0 views

  • Mark Zuckerberg's Facebook bought Instagram for $1bn.
  • In an FAQ section on Instagram's website, the company explains the cost of its app in just 12 words: "$0.00 – available for free in the Apple App Store and Google Play store."
  • In fact, the cost of using the app is that you, the user, are the product.
sintija

BBC News - Online advertising breaks through £4bn barrier - 0 views

  • Online advertising breaks through £4bn barrier
  • value of online advertising grew by 12.8% in 2010, breaking through the £4bn barrier.
  • A study by the Internet Advertising Bureau (IAB) and the accountants PwC found that online advertising spending grew three times as rapidly as in 2009
  • ...4 more annotations...
  • Facebook has made big advances in the last year in persuading advertisers to see social networks as a place to promote their wares
  • Online video advertising also nearly doubled in 2010, with £54m spent on adverts that appeared before, during or after video clips.
  • Search advertising, still dominated by Google, remains the biggest earner
  • The IAB expects online spending to continue to grow, as faster broadband makes new formats increasingly attractive.
sintija

BBC News - US internet 'six strikes' anti-piracy campaign begins - 0 views

  • US internet 'six strikes' anti-piracy campaign begins
  • Five of the country's leading internet service providers (ISPs) are taking part in the Copyright Alert System (CAS), which they say is designed to educate rather than punish users.
  • "Over the course of the next several days... our content partners will begin sending notices of alleged peer-to-peer copyright infringement to ISPs, and the ISPs will begin forwarding those notices in the form of copyright alerts to consumers,
  • ...4 more annotations...
  • Consumers whose accounts have been used to share copyrighted content over P2P networks illegally (or without authority) will receive alerts that are meant to educate rather than punish, and direct them to legal alternatives. And for those consumers who believe they received alerts in error, an easy-to-use process will be in place for them to seek independent review of the alerts they received.
  • Meanwhile the UK has favoured a proposed "three strikes" policy
  • Under telecom regulator Ofcom's draft code, users who receive three warnings within 12 months would have anonymous information about their activities passed to copyright holders which could then seek court orders to discover their identities.
  • The policy had been due to come into effect in March 2014, but has been delayed after a House of Lords committee queried whether the Digital Economy Act - which the code is part of - complied with Treasury rules.
sintija

BBC News - Google told to fix privacy policy by EU data regulators - 0 views

  • Google told to fix privacy policy by EU data regulators
  • consolidate 60 separate privacy policies into a single agreement.
  • Google has been told it should give clearer information about what data is being collected and for what purpose. It has also been told to give users more control over how the information is combined.
  • ...4 more annotations...
  • Google
  • has been accused of providing "incomplete and approximate" details raising "deep concerns about data protection and the respect of the European law".
  • It said that EU data protection laws place limits on such activities and proposed the following changes:
  • Google must "reinforce users' consent". It suggests this could be done by allowing its members to choose under what circumstances data about them was combined by asking them to click on dedicated buttons. The firm should offer a centralised opt-out tool and allow users to decide which of Google's services provided data about them. Google should adapt its own tools so that it could limit data use to authorised purposes. For example, it should be able to use a person's collated data to improve security efforts but not to target advertising.
Patricija Čelik

International cooperation is needed to make the internet safe for the world - Telegraph - 0 views

  • However, a severe downside is the challenge to data security and personal privacy. The internet is now overrun with cyber attacks and hackers. Internet security has become a very serious and common concern for the entire world.
  • Recently the American company Mandiant published a report on cyber security. This report accuses China of being the origin of most cyber attacks and portrays China as an arch-hacker.
  • Cyber attacks by nature are transnational, anonymous and deceptive. It is extremely difficult to ascertain the source of any attack. Cyber attacks launched from stolen or faked IP addresses take place around the world on daily basis.
  • ...3 more annotations...
  • China is a serious victim of cyber attacks.
  • The Chinese government is committed to international cooperation against cyber crime.
  • In September 2011 China and Russia jointly submitted to the United Nations a draft International Code of Conduct for Information Security. China is deeply sincere in seeking cooperation to tackle cyber crime. This common threat needs the participation of the whole international community.
sintija

BBC News - Viewpoint: Changing the way the internet is governed is risky - 0 views

  • Viewpoint: Changing the way the internet is governed is risky
  • the US Department of Commerce has the power to decide how the internet works
  • internet is already governed
  • ...15 more annotations...
  • It's important to realise that without governance the internet could not function.
  • avoid two different web sites having the same name
  • International Corporation for Assigned Names and Numbers (Icann)
  • governance of the internet is effectively done by multiple stakeholders
  • WGIG would report on a solution acceptable to all but would move governance to an international body.
  • US government ultimately "controls" the internet
  • in 2003 in Geneva
  • UN summit
  • US refused to relinquish control of the Root Zone file, which is basically the key to governing the internet.
  • formed the Working Group on Internet Governance (WGIG).
  • The internet overseers
  • Russians
  • International Telecommunications Union (ITU), another UN agency, to be given responsibility for internet governanc
  • A great advantage of the current governance structure is that it supports rapid developments, provided that the US Department of Commerce remains at arm's length
  • internet governance needs to help the internet evolve rather than dictate how it must develop.
Urška Cerar

BBC News - Evernote says security has been breached by hackers - 0 views

  • hackers
  • hackers
  • website
  • ...7 more annotations...
  • network
  • Twitter
  • It said user names, email addresses and encrypted passwords were accessed.
  • online personal organiser, with users able to save data such as video clips, images, web pages, notes and itineraries in an external storage system commonly known as the cloud.
  • The firm apologised "for the annoyance" caused by the breach, which it said is becoming "far more common" at other "large services".
  • Apple revealed a "small number" of its computers had been hacked
  • micro-blogging website Twitter announced it had been the victim of a security breach which compromised the accounts of 250,000 users.
« First ‹ Previous 261 - 280 of 322 Next › Last »
Showing 20 items per page