Skip to main content

Home/ Groups/ Internetni praktikum
Patricija Čelik

International cooperation is needed to make the internet safe for the world - Telegraph - 0 views

  • However, a severe downside is the challenge to data security and personal privacy. The internet is now overrun with cyber attacks and hackers. Internet security has become a very serious and common concern for the entire world.
  • Recently the American company Mandiant published a report on cyber security. This report accuses China of being the origin of most cyber attacks and portrays China as an arch-hacker.
  • Cyber attacks by nature are transnational, anonymous and deceptive. It is extremely difficult to ascertain the source of any attack. Cyber attacks launched from stolen or faked IP addresses take place around the world on daily basis.
  • ...3 more annotations...
  • China is a serious victim of cyber attacks.
  • The Chinese government is committed to international cooperation against cyber crime.
  • In September 2011 China and Russia jointly submitted to the United Nations a draft International Code of Conduct for Information Security. China is deeply sincere in seeking cooperation to tackle cyber crime. This common threat needs the participation of the whole international community.
sintija

BBC News - Viewpoint: Changing the way the internet is governed is risky - 0 views

  • Viewpoint: Changing the way the internet is governed is risky
  • the US Department of Commerce has the power to decide how the internet works
  • internet is already governed
  • ...15 more annotations...
  • It's important to realise that without governance the internet could not function.
  • avoid two different web sites having the same name
  • International Corporation for Assigned Names and Numbers (Icann)
  • governance of the internet is effectively done by multiple stakeholders
  • WGIG would report on a solution acceptable to all but would move governance to an international body.
  • US government ultimately "controls" the internet
  • The internet overseers
  • UN summit
  • US refused to relinquish control of the Root Zone file, which is basically the key to governing the internet.
  • formed the Working Group on Internet Governance (WGIG).
  • in 2003 in Geneva
  • Russians
  • International Telecommunications Union (ITU), another UN agency, to be given responsibility for internet governanc
  • A great advantage of the current governance structure is that it supports rapid developments, provided that the US Department of Commerce remains at arm's length
  • internet governance needs to help the internet evolve rather than dictate how it must develop.
Urška Cerar

BBC News - Evernote says security has been breached by hackers - 0 views

  • hackers
  • hackers
  • website
  • ...7 more annotations...
  • network
  • Twitter
  • It said user names, email addresses and encrypted passwords were accessed.
  • online personal organiser, with users able to save data such as video clips, images, web pages, notes and itineraries in an external storage system commonly known as the cloud.
  • The firm apologised "for the annoyance" caused by the breach, which it said is becoming "far more common" at other "large services".
  • Apple revealed a "small number" of its computers had been hacked
  • micro-blogging website Twitter announced it had been the victim of a security breach which compromised the accounts of 250,000 users.
Urška Cerar

Apple blocks emails containing phrase 'barely legal teen' from iCloud in new 'anti-porn... - 0 views

  • Apple is deleting all emails on its iCloud service that contain the phrase 'barely legal teen,
  • He's a barely legal teenage driver
  • some would consider the phrase to have a strong association with paedophilia
  • ...7 more annotations...
  • only the second one got through.
  • The phrase 'barely legal teen' is used in pornographic searches
  • He's barely a legal teenage driver
  • Though Apple has no legal obligation to block the phrase 'barely legal teen', its terms of service state that it has every right to do so.
  • Occasionally, automated spam filters may incorrectly block legitimate email
  • The iBookstore rejected an e-book submission on the hippie movement because it contained photographs of naked people.
  • People do not have to use Apple's iCloud service
sintija

BBC News - Viewpoint: The universal web must be adaptive - 0 views

  • Access all areas
  • Along came search technologies
  • Viewpoint: The universal web must be adaptive
  • ...21 more annotations...
  • Viewpoint: The universal web must be adaptive
  • Along came search technologies
  • Google
  • Google
  • ability to search content anywhere on the web
  • new web business.
  • spurred a new web business
  • Access all areas
  • internet went wireless
  • We need standards
  • mobile devices will outsell laptops
  • increasing the complexity of how content was served
  • Building websites for all the new browsers, screen sizes and device features is becoming difficult.
  • The future of the internet is creating highly adaptive experiences for users
  • Companies that don't figure out how to get their information to customers on any device will disappear.
  • one solution
  • such as HTML5, to make programming to any device use the same language, and software solutions to help companies simplify building websites and web apps to any device using any feature.
  • truly mobile internet future is now a reality
  • companies need to
  • focus
  • on their customer journeys, personalised experiences and developing rich content rather than on how to build websites - or they will disappear.
Urška Cerar

What Does Google Do If the Government Comes Looking for Your Emails? - Rebecca J. Rosen... - 0 views

  • Every single day, dozens of requests from law-enforcement officials, courts, and other government agencies pour into Google's offices, requesting that Google hand over different pieces of information its users have amassed
  • many of these requests are legitimate
  • It's important for law enforcement agencies to pursue illegal activity and keep the public safe.
  • ...5 more annotations...
  • once a request has been deemed valid, Google will notify users when possible.
  • Google says, "When we receive such a request, our team reviews the request to make sure it satisfies legal requirements and Google's policies.
  • Google will not provide a user's search-query information or the contents of a user's account (email content, pictures, documents, etc.) without a warrant.
  • Google has advocated for updating ECPA, "so the same protections that apply to your personal documents that you keep in your home also apply to your email and online documents."
  • If Google can establish clear practices now that somehow balance the competing needs of law-enforcement agencies and private users, that effort will pay off
Urška Cerar

BBC News - Court orders UK ISPs to block more piracy sites - 0 views

  • Opponents have argued that blocking sites in this way was ineffective.
  • Data seen by the BBC suggested that the blocking of The Pirate Bay had only had a short-term effect on the level of pirate activity online
  • there had been a large reduction in the number of users illegally downloading music
  • ...2 more annotations...
  • Blocking illegal sites helps ensure that the legal digital market can grow and labels can continue to sign and develop new talent.
  • The UK has now handed the power over what we see on the internet to corporate lobbyists
Jan Keček

Cyber-security: To the barricades | The Economist - 0 views

  • European Commission and the White House have set out a series of new rules designed to stem the rising tide of cyber-attacks against public and private victims.
  • Alongside his state-of-the-union message on February 11th, Barack Obama released an executive order intended to plug the gap left by the failure of Congress to pass cyber-security legislation that matches the growing threat.
  • By contrast, the European Commission’s cyber-security strategy is at an earlier stage. It wants member countries to introduce laws compelling important firms in industries such as transport, telecoms, finance and online infrastructure to disclose details of any attack they suffer to a national authority, known as a CERT (Computer Emergency Response Team). Each CERT will be responsible for defending vital infrastructure-providers against online attacks and sharing information with its counterparts, law-enforcement agencies and data-protection bodies.
  • ...1 more annotation...
  • What neither the European nor American measures deal with directly is the shortage of cyber-security specialists. A gloomy review of the British government’s strategy by the National Audit Office, a spending watchdog, said the skills gap could take 20 years to bridge.
Jan Keček

Smartphone operating systems: Bright-eyed and bushy-tailed | The Economist - 0 views

  • IF YOU have a new smartphone, it is almost certainly either an Apple iPhone or one of the many devices that runs on Google’s Android operating system. According to IDC, a research firm, more than 90% of the 228m smartphones shipped in the last quarter of 2012 belonged to one of the two dominant species. Android is the bigger bea
  • st. Its share has grown as the smartphone market has boomed, to about 70%.
  • Mozilla, a non-profit organisation best known for Firefox, a web browser, unveiled plans to bring a smartphone operating system to market. Called Firefox OS, it has the backing of 18 mobile operators based in countries from Asia to Latin America.
  • ...4 more annotations...
  • Most Windows smartphones are made by Finland’s Nokia, which dropped its own plans for a new system when it threw in its lot with the American software giant. BlackBerry, a Canadian company formerly called Research In Motion, hopes to recover lost glories with BlackBerry 10, which appeared in January after much delay.
  • One reason for the challengers’ optimism is that a lot of ground is unoccupied.
  • BlackBerry and Microsoft have the advantage of familiarity; 80m people use BlackBerrys. Companies’ information-technology departments trust them as secure. Microsoft hopes that Windows’ dominance of personal computers can be transferred to mobiles. With that in mind, all new Windows devices, on desks, on laps or in hands, have the same look, with “tiles” for touching, not clicking.
  • Whereas most applications on Apple and Android devices have been written for those systems, Firefox OS uses open standards. In principle, apps based on it can run on any device connected to the web.
Patricija Čelik

Internet pornography: safety plans do not go far enough - charities - Telegraph - 0 views

  • The Government yesterday launched a consultation on a possible change in the law to give parents more control over the material their children are viewing online.
  • Internet service providers have been in talks with the Government about ways of enabling parents to block sites containing sexually or gambling as well as forums glorify suicide and self-harm.
  • a report by MPs who called for a full “opt-in” which would automatically block adult material unless the user chose to deactivate it. Google has argued that an automatic block as a “mistake”, while Virgin Media, BT, TalkTalk and Sky have developed versions of the “active choice” system which makes users chose whether they want parental controls when they sign up, rather than imposing them automatically.
  • ...1 more annotation...
  • Claire Walker, head of policy, at the charity Family Lives, which this week published a hard hitting report on online dangers, said parents would be more secure with an automatic block.
Meta Arcon

On Facebook, Sharing Can Come at a Cost - NYTimes.com - 0 views

  • Facebook said in a statement that “the median amount of feedback on posts (likes, comments, shares) from people who have more than 10,000 subscribers is up 34 percent from a year ago.”
Mirna Čorak

BBC - Future - Technology - YouTube: The cult of web video - 0 views

  • With 72 hours of video uploaded to YouTube every minute, almost every moment of modern history is a cult waiting to happen. And it is becoming big business.
  • The billion dollar question is how: how to make your video “go viral”, spreading your particular slice of contemporary culture across the planet like a contagion.
  • Silliness is more important – but not vital, given that both the Kony documentary and the jump from space are entirely serious.
  • ...3 more annotations...
  • Similarly, although sex may remain the most powerful form of advertising, it barely features within this list. Visual excitement won’t do either, given that the year’s second-biggest hit features a single camera pointed at five people and a guitar.
  • irality isn’t actually a property of these videos at all. It’s a property of their audience: a description not of a particular object, but of the ways in which that object is used.
  • To pass on a video or link is to become an evangelist for an instant cult: to gain the status of an initiate, complete with social capital and mutual LOLs. Unlike a biological virus, which hijacks hapless cells no matter what their owners might want, these are infections you must decide to pass on.
ninicka17

Google's Monopoly on the News | The Nation - 0 views

ninicka17

Machine-Made News | The Nation - 0 views

ninicka17

Quitters Never Win: The Costs of Leaving Social Media - Woodrow Hartzog and Evan Seling... - 0 views

  •  
    "Quitters Never Win: The Costs of Leaving Social Media"
Mirna Čorak

The Perils of Perfection - NYTimes.com - 0 views

  • LivesOn, a soon-to-launch service that promises to tweet on your behalf even after you die. By analyzing your earlier tweets
  • Seesaw, the app lets you run instant polls of your friends and ask for advice on anything: what wedding dress to buy, what latte drink to order and soon, perhaps, what political candidate to support.
  • Take Google Glass, the company’s overhyped “smart glasses,” which can automatically snap photos of everything we see and store them for posterity.
  • ...4 more annotations...
  • Jim Gemmell, “Total Recall: How the E-Memory Revolution Will Change Everything.”
  • All these efforts to ease the torments of existence might sound like paradise to Silicon Valley. But for the rest of us, they will be hell.
  • SUCH predisposition makes it harder to notice that not all problems are problems
  • After all, saving the world might be a price worth paying for destroying everyone’s privacy, while a larger-than-life mission might convince young and idealistic employees that they are not wasting their lives tricking gullible consumers to click on ads for pointless products.
« First ‹ Previous 281 - 300 of 325 Next › Last »
Showing 20 items per page