Increasingly, however, the ads tailored to them are for specific products that they have perused online. While the technique, which the ad industry calls personalized retargeting or remarketing, is not new, it is becoming more pervasive as companies like Google and Microsoft have entered the field. And retargeting has reached a level of precision that is leaving consumers with the palpable feeling that they are being watched as they roam the virtual aisles of online stores.
It will be the first time any government has sought to provide a single form of digital identification for internet users, coded to provide a form of filtered identity information, giving out only as much information as needed depending on the type of online transaction.
"It will be the first time any government has sought to provide a single form of digital identification for internet users, coded to provide a form of filtered identity information, giving out only as much information as needed depending on the type of online transaction."
At TED@Cannes, Gary Wolf gives a 5-min intro to an intriguing new pastime: using mobile apps and always-on gadgets to track and analyze your body, mood, diet, spending -- just about everything in daily life you can measure -- in gloriously geeky detail.
Though teachers and students are now pushing learning beyond the borders of the classroom through social networking, that move also comes with hurdles, including the fact that many schools still block access to such sites within their walls. School officials must also confront the uncertainties and questions surrounding privacy issues, proper management, and cyber security when they open their doors to social-networking sites.
"Others turned to Facebook for their updates and to seek help, with the most popular page, Cyclone Yasi Update, garnering close to 90,000 members. Over 25 Facebook groups were created for the cyclone.
Social media monitoring company SR7 compiled the figures and its director of strategy and engagement, Thomas Tudehope, said social media had now become an integral part of crisis management for governments."
You may think the only people capable of snooping on your Internet activity are government intelligence agents or possibly a talented teenage hacker holed up in his parents' basement. But some simple software lets just about anyone sitting next to you at your local coffee shop watch you browse the Web and even assume your identity online.
In a span of minutes just after midnight on Jan. 28, a technologically advanced, densely wired country with more than 20 million people online was essentially severed from the global Internet.
A good overview of how the use of IT has affected the practice of medicine. Theses: This computer record creates what I call an "iPatient" - and this iPatient threatens to become the real focus of our attention, while the real patient in the bed often feels neglected, a mere placeholder for the virtual record.
concerns have developed about invasions of privacy, for the most complete records on the travelers may be the ones they are carrying: their laptop computers full of professional and personal e-mail messages, photographs, diaries, legal documents, tax returns, browsing histories and other windows into their lives far beyond anything that could be, or would be, stuffed into a suitcase for a trip abroad. Those revealing digital portraits can be immensely useful to inspectors, who now hunt for criminal activity and security threats by searching and copying people's hard drives, cellphones and other electronic devices, which are sometimes held for weeks of analysis
By uploading images of this week's violence in Manama, the capital, to Web sites like YouTube and yFrog, and then sharing them on Facebook and Twitter, the protesters upstaged government accounts and drew worldwide attention to their demands.
A novelty less than a decade ago, the cellphone camera has become a vital tool to document the government response to the unrest that has spread through the Middle East and North Africa.