Skip to main content

Home/ Digit_al Society/ Group items tagged will

Rss Feed Group items tagged

dr tech

Toxic 'e-waste' dumped in poor nations, says United Nations | Global development | The ... - 0 views

  •  
    "The global volume of electronic waste is expected to grow by 33% in the next four years, when it will weigh the equivalent of eight of the great Egyptian pyramids, according to the UN's Step initiative, which was set up to tackle the world's growing e-waste crisis. Last year nearly 50m tonnes of e-waste was generated worldwide - or about 7kg for every person on the planet. "
dr tech

BBC News - Could work emails be banned after 6pm? - 0 views

  •  
    "n many jobs, work email doesn't stop when the employee leaves the office. And now France has decided to act. It has introduced rules to protect about a million people working in the digital and consultancy sectors from work email outside office hours. Those are taken to be before 9am and after 6pm. The deal signed between employers federations and unions says that employees will have to switch off work phones and avoid looking at work email, while firms cannot pressure staff to check messages. "
dr tech

Heartbleed Exposes a Problem With Open Source, But It's Not What You Think - 0 views

  •  
    "In Eric S. Raymond's seminal essay on open source, The Cathedral and the Bazaar, he defines Linus's Law (named for the father of the Linux kernel, Linus Torvalds), which states that "given enough eyeballs, all bugs are shallow." In other words. If enough users are looking at the code, bugs and problems will be found."
dr tech

Robot doctors, online lawyers and automated architects: the future of the professions? ... - 0 views

  •  
    "Advances in technology have long been recognised as a threat to manual labour. Now highly skilled, knowledge-based jobs that were once regarded as safe could be at risk. How will they adapt to the digital age?"
dr tech

FBI Ransomware Hits Android: How To Avoid Getting It, And Remove It - 0 views

  •  
    "Ransomware has been in the news repeatedly over the past few years. This is the insidious malware that will lock your data or device (smartphone or PC) and displays a screen-wide message that demands money from you to release it, which it does by sending you an unlock code."
dr tech

Minority languages: Cookies, caches and cows | The Economist - 0 views

  •  
    "Mozilla, the foundation behind Firefox, an open-source web browser, wants Ousmane's customers to have the option of a device that speaks their language. Smartphones with its operating system (OS) are already on sale in 24 countries, including Bangladesh, India and Mexico, for as little as $33. Other countries will be added as it makes more deals with handset manufacturers. And Bambara is one of dozens of languages into which volunteer "localisers" are translating the OS."
dr tech

Driverless cars: we should question and challenge Google, but not as haters | Technolog... - 0 views

  •  
    "Understanding how our driving data will be used is important, but we should be scrutinising other companies and products too"
dr tech

Would a Google car sacrifice you for the sake of the many? - Medium - 0 views

  •  
    "But what will robot cars be programmed to do when there's lots of them on the roads, and they're networked with one another? We know what we as individuals would like. My car should take as its Prime Directive: "Prevent my passengers from coming to harm." But when the cars are networked, their Prime Directive well might be: "Minimize the amount of harm to humans overall." "
dr tech

How do Optical and Quantum Computers work? - 0 views

  •  
    "…in about ten years or so, we will see the collapse of Moore's Law. In fact, already, we see a slowing down of Moore's Law. Computer power simply cannot maintain its rapid exponential rise using standard silicon technology. - Dr. Michio Kaku - 2012"
dr tech

Penn News | Penn Study: Americans Give Up Personal Data for Discounts, They Believe Mar... - 0 views

  •  
    "The survey found that more than half of Americans say they do not want to lose control over their information but also believe this loss of control has already happened. Turow argues that marketers misrepresent Americans' behaviors by categorizing their acceptance of company discounts in exchange for personal data as rational acceptance of "tradeoffs."
amenosolja

How to Use USB Security Keys with your Google Account - 0 views

  •  
    "The verification codes required for logging into a 2-step enabled account can be generated either using a mobile app - like Authy or Google Authenticator - or you can have them sent to your mobile phone via a text message or a voice call. The latter option however will not work if the mobile phone associated with your account is outside the coverage area"
amenosolja

Facebook 'dislike' button is not scary (Opinion) - CNN.com - 0 views

  •  
    "Facebook has announced it will create a "dislike button.""
dr tech

CryptoLocker Is The Nastiest Malware Ever - Here's What You Can Do - 0 views

  •  
    "Ransomware is an especially odious type of malware. The way it works is simple. Your computer will be infected with some malicious software. That software then renders your computer entirely unusable, sometimes purporting to be from local law enforcement and accusing you of committing a computer crime or viewing explicit pictures of children. It then demands monetary payment, either in the form of a ransom or a 'fine' before access to your computer is returned."
dr tech

Why appeasing governments over encryption will never work | Comment is free | The Guardian - 0 views

  •  
    "In case you're wondering what could be wrong with entrusting secret keys to the government for use "in exceptional circumstances", just ponder this: a few months ago, hackers (suspected to be Chinese) stole the personnel records of 21.5 million US federal employees, including the records of every person given a government background check for the last 15 years."
dr tech

Alliance for Open Media - 0 views

  •  
    "The initial project will pursue a new, open royalty-free video codec specification and open-source implementation based on the contributions of members, along with binding specifications for media format, content encryption and adaptive streaming, thereby creating opportunities for next-generation media experiences."
amenosolja

A Smile Detector and Other Apps You Need to Be Using | WIRED - 0 views

  •  
    "RECHO DOES ONE very simple, little thing: It lets you leave a voice message tied to a location. When other people using the app hit those coordinates, Recho will tell them there's something to listen to. You can use the app to discover different "rechoes" around you, if you actively want to listen in on someone's location-aware thoughts. You can also share interesting soundbytes with your Recho followers. It's a little weird and novel, but ultimately a new way to think about digital exploring a place."
longspagetti

Hide a Wi-Fi Access Point Inside a Pocket Book for Stealthy File Sharing - 0 views

  •  
    The access point itself will allow multiple devices to hook up to it so they can all share files with each other on a private little network. Then, for fun, the whole thing is shrunk down and stuffed inside a small notebook so you can stealthily share files anywhere. It's a little over the top, but fun nonetheless. Head over to Node for the full guide.
unicorn16829149

How A Fixed Gear Bike Can Mess With Google's Self-Driving Cars | TIME - 0 views

  •  
    "Google's self-driving cars have driven over a million miles in autonomous mode. But when Google brought its testing program to Austin, Texas, one of the vehicles met its match: a cyclist doing a track stand - when a rider shifts very slightly forward and back to maintain balance while keeping feet on the pedals." This is very surprising that this self-driven car would detect a person not even moving and still keep stopped, it will be interesting to see if and how they fix this problem.
amenosolja

An Android Porn App Takes Your Photo and Holds It to Ransom - 0 views

  •  
    "The Register reports that security firm Zscaler was first to spot the app, which presents itself as a normal video playing app, albeit for playing videos of an adult nature. Apparently once it has silently snapped photos of its victim it will display a message on screen demanding that they pay $500 . Otherwise, well... do you want people knowing you've used the app?"
dr tech

Facial recognition technology is Australia's latest 'national security weapon' - 0 views

  •  
    "While Keenan emphasised the capability was not a centralised biometric database, and was simply an improved way to share information already collected by different Australian jurisdictions, Gregory questioned how these images of Australians will be employed by law enforcement. "It's subtle changes in the way that things are used that need to be debated the most," he said. "In this case, we're talking about using our passport photos for a purpose for which we never gave permission.""
« First ‹ Previous 181 - 200 of 521 Next › Last »
Showing 20 items per page