Skip to main content

Home/ New Media Ethics 2009 course/ Group items tagged Mobile

Rss Feed Group items tagged

Meenatchi

RIAJ push for mobile phone DRM across Japan - 2 views

Article Summary: http://www.geek.com/articles/mobile/riaj-push-for-mobile-phone-drm-across-japan-20090915/ The article talks about the Recording Industry Association of Japan (RIAJ) attempting t...

Digital Rights DRM

started by Meenatchi on 16 Sep 09 no follow-up yet
Reseena Abdullah

Telecoms in emerging markets - 0 views

http://www.economist.com/printedition/displaystory.cfm?story_id=14483896 The article above details the issue surrounding the telecommunications markets in the developing countries. It mentions how...

started by Reseena Abdullah on 07 Oct 09 no follow-up yet
Weiye Loh

Digital's Great Teenage Misunderstanding | ClickZ - 0 views

  • To quote, "most noteworthy was the shift in e-mail usage, particularly among young people. Total Web-based e-mail use was down eight percent last year, led by a walloping 59 percent drop among 12 to 17 year olds." I must reemphasize, the data is only for Web-based e-mail usage (think Hotmail, Yahoo Mail, Gmail, etc.) and that's an important distinction. A decline is a decline, but this certainly doesn't fully cover how e-mail is consumed in today's digital world.
  • Mark Zuckerberg offered this at the Facebook Messaging announcement: "High school kids don't use e-mail, they use SMS a lot. People want lighter weight things like SMS and IM to message each other."
  • There are two significant issues that must be added to the conversation though: Mobile's impact: The typical smartphone user spends almost half of her time on e-mail. This makes comScore's metrics marginal since it evaluated only Web-based e-mail usage. As e-Dialog CEO John Rizzi thoughtfully points out on a recent blog post: "In the 18-24 age group, unique visits increased 9%, while time spent decreased 10%. To me this points to the increasing use of mobile to triage inboxes on the go, and the desktop inbox being used to access specific e-mails and perform tasks like getting a code for a sale, or composing an e-mail reply that would be too onerous on a mobile phone. In fact, comScore found that 30% of respondents are viewing e-mail on their mobile phone, a 36% increase from 2009, and those using mobile e-mail daily increased 40% on average." Pew Internet recently evaluated how Internet users of different age groups spent their time online. Guess what? Even 90 to 100 percent of Millennials (ages 18-33) used e-mail. As you can see in the chart, below, e-mail was the top activity across all age groups.*
  • ...1 more annotation...
  • Teenagers become adults: I may not win any scientific breakthrough awards for this statement, but people are missing the boat on this piece of the puzzle. What happens when a teenager becomes an adult in the workplace? Not only do they dress, speak, and act differently - they use different approaches to communicate, too. The first thing a new employee typical gets is…an e-mail address. And guess what? They use it, even if they have been reliant on social, IM, and texting for their primary communication channels. They will correspond for work via e-mail and opt in to e-mails from their favorite brands (including brands that they certainly did not like as a teenager). They likely will also "Like" their favorite companies on Facebook, follow them on Twitter, and opt in to SMS offers as well. They will also expect different value and information in each of these channels.
Weiye Loh

Net neutrality enshrined in Dutch law | Technology | guardian.co.uk - 0 views

  • The measure, which was adopted with a broad majority in the lower house of parliament, will prevent KPN, the Dutch telecommunications market leader, and the Dutch arms of Vodafone and T-Mobile from blocking or charging for internet services like Skype or WhatsApp, a free text service. Its sponsors said that the measure would pass a pro forma review in the Dutch senate.
  • The Dutch restrictions on operators are the first in the EU. The European commission and European parliament have endorsed network neutrality guidelines but have not yet taken legal action against operators that block or impose extra fees on consumers using services such as Skype, the voice and video service being acquired by Microsoft, and WhatsApp, a mobile software maker based in California.
  • Advocates hailed the move as a victory for consumers, while industry officials predicted that mobile broadband charges could rise in the Netherlands to compensate for the new restrictions.
  • ...2 more annotations...
  • Only one other country, Chile, has written network neutrality requirements into its telecommunications law. The Chilean law, which was approved in July 2010, took effect in May.
  • In the US, an attempt by the Federal Communications Commission to impose a similar set of network neutrality restrictions on American operators has been tied up in legal challenges from the industry.
  •  
    The Netherlands has become the first country in Europe to enshrine the concept of network neutrality into national law by banning its mobile telephone operators from blocking or charging consumers extra for using internet-based communications services.
Weiye Loh

IPhone and Android Apps Breach Privacy - WSJ.com - 0 views

  • Few devices know more personal details about people than the smartphones in their pockets: phone numbers, current location, often the owner's real name—even a unique ID number that can never be changed or turned off.
  • An examination of 101 popular smartphone "apps"—games and other software applications for iPhone and Android phones—showed that 56 transmitted the phone's unique device ID to other companies without users' awareness or consent. Forty-seven apps transmitted the phone's location in some way. Five sent age, gender and other personal details to outsiders.
  • The findings reveal the intrusive effort by online-tracking companies to gather personal data about people in order to flesh out detailed dossiers on them.
  • ...24 more annotations...
  • iPhone apps transmitted more data than the apps on phones using Google Inc.'s Android operating system. Because of the test's size, it's not known if the pattern holds among the hundreds of thousands of apps available.
  • TextPlus 4, a popular iPhone app for text messaging. It sent the phone's unique ID number to eight ad companies and the phone's zip code, along with the user's age and gender, to two of them.
  • Pandora, a popular music app, sent age, gender, location and phone identifiers to various ad networks. iPhone and Android versions of a game called Paper Toss—players try to throw paper wads into a trash can—each sent the phone's ID number to at least five ad companies. Grindr, an iPhone app for meeting gay men, sent gender, location and phone ID to three ad companies.
  • iPhone maker Apple Inc. says it reviews each app before offering it to users. Both Apple and Google say they protect users by requiring apps to obtain permission before revealing certain kinds of information, such as location.
  • The Journal found that these rules can be skirted. One iPhone app, Pumpkin Maker (a pumpkin-carving game), transmits location to an ad network without asking permission. Apple declines to comment on whether the app violated its rules.
  • With few exceptions, app users can't "opt out" of phone tracking, as is possible, in limited form, on regular computers. On computers it is also possible to block or delete "cookies," which are tiny tracking files. These techniques generally don't work on cellphone apps.
  • makers of TextPlus 4, Pandora and Grindr say the data they pass on to outside firms isn't linked to an individual's name. Personal details such as age and gender are volunteered by users, they say. The maker of Pumpkin Maker says he didn't know Apple required apps to seek user approval before transmitting location. The maker of Paper Toss didn't respond to requests for comment.
  • Many apps don't offer even a basic form of consumer protection: written privacy policies. Forty-five of the 101 apps didn't provide privacy policies on their websites or inside the apps at the time of testing. Neither Apple nor Google requires app privacy policies.
  • the most widely shared detail was the unique ID number assigned to every phone.
  • On iPhones, this number is the "UDID," or Unique Device Identifier. Android IDs go by other names. These IDs are set by phone makers, carriers or makers of the operating system, and typically can't be blocked or deleted. "The great thing about mobile is you can't clear a UDID like you can a cookie," says Meghan O'Holleran of Traffic Marketplace, an Internet ad network that is expanding into mobile apps. "That's how we track everything."
  • O'Holleran says Traffic Marketplace, a unit of Epic Media Group, monitors smartphone users whenever it can. "We watch what apps you download, how frequently you use them, how much time you spend on them, how deep into the app you go," she says. She says the data is aggregated and not linked to an individual.
  • Apple and Google ad networks let advertisers target groups of users. Both companies say they don't track individuals based on the way they use apps.
  • Apple limits what can be installed on an iPhone by requiring iPhone apps to be offered exclusively through its App Store. Apple reviews those apps for function, offensiveness and other criteria.
  • Apple says iPhone apps "cannot transmit data about a user without obtaining the user's prior permission and providing the user with access to information about how and where the data will be used." Many apps tested by the Journal appeared to violate that rule, by sending a user's location to ad networks, without informing users. Apple declines to discuss how it interprets or enforces the policy.
  • Google doesn't review the apps, which can be downloaded from many vendors. Google says app makers "bear the responsibility for how they handle user information." Google requires Android apps to notify users, before they download the app, of the data sources the app intends to access. Possible sources include the phone's camera, memory, contact list, and more than 100 others. If users don't like what a particular app wants to access, they can choose not to install the app, Google says.
  • Neither Apple nor Google requires apps to ask permission to access some forms of the device ID, or to send it to outsiders. When smartphone users let an app see their location, apps generally don't disclose if they will pass the location to ad companies.
  • Lack of standard practices means different companies treat the same information differently. For example, Apple says that, internally, it treats the iPhone's UDID as "personally identifiable information." That's because, Apple says, it can be combined with other personal details about people—such as names or email addresses—that Apple has via the App Store or its iTunes music services. By contrast, Google and most app makers don't consider device IDs to be identifying information.
  • A growing industry is assembling this data into profiles of cellphone users. Mobclix, the ad exchange, matches more than 25 ad networks with some 15,000 apps seeking advertisers. The Palo Alto, Calif., company collects phone IDs, encodes them (to obscure the number), and assigns them to interest categories based on what apps people download and how much time they spend using an app, among other factors. By tracking a phone's location, Mobclix also makes a "best guess" of where a person lives, says Mr. Gurbuxani, the Mobclix executive. Mobclix then matches that location with spending and demographic data from Nielsen Co.
  • Mobclix can place a user in one of 150 "segments" it offers to advertisers, from "green enthusiasts" to "soccer moms." For example, "die hard gamers" are 15-to-25-year-old males with more than 20 apps on their phones who use an app for more than 20 minutes at a time. Mobclix says its system is powerful, but that its categories are broad enough to not identify individuals. "It's about how you track people better," Mr. Gurbuxani says.
  • four app makers posted privacy policies after being contacted by the Journal, including Rovio Mobile Ltd., the Finnish company behind the popular game Angry Birds (in which birds battle egg-snatching pigs). A spokesman says Rovio had been working on the policy, and the Journal inquiry made it a good time to unveil it.
  • Free and paid versions of Angry Birds were tested on an iPhone. The apps sent the phone's UDID and location to the Chillingo unit of Electronic Arts Inc., which markets the games. Chillingo says it doesn't use the information for advertising and doesn't share it with outsiders.
  • Some developers feel pressure to release more data about people. Max Binshtok, creator of the DailyHoroscope Android app, says ad-network executives encouraged him to transmit users' locations. Mr. Binshtok says he declined because of privacy concerns. But ads targeted by location bring in two to five times as much money as untargeted ads, Mr. Binshtok says. "We are losing a lot of revenue."
  • Apple targets ads to phone users based largely on what it knows about them through its App Store and iTunes music service. The targeting criteria can include the types of songs, videos and apps a person downloads, according to an Apple ad presentation reviewed by the Journal. The presentation named 103 targeting categories, including: karaoke, Christian/gospel music, anime, business news, health apps, games and horror movies. People familiar with iAd say Apple doesn't track what users do inside apps and offers advertisers broad categories of people, not specific individuals. Apple has signaled that it has ideas for targeting people more closely. In a patent application filed this past May, Apple outlined a system for placing and pricing ads based on a person's "web history or search history" and "the contents of a media library." For example, home-improvement advertisers might pay more to reach a person who downloaded do-it-yourself TV shows, the document says.
  • The patent application also lists another possible way to target people with ads: the contents of a friend's media library. How would Apple learn who a cellphone user's friends are, and what kinds of media they prefer? The patent says Apple could tap "known connections on one or more social-networking websites" or "publicly available information or private databases describing purchasing decisions, brand preferences," and other data. In September, Apple introduced a social-networking service within iTunes, called Ping, that lets users share music preferences with friends. Apple declined to comment.
Weiye Loh

The Death of Postmodernism And Beyond | Philosophy Now - 0 views

  • Most of the undergraduates who will take ‘Postmodern Fictions’ this year will have been born in 1985 or after, and all but one of the module’s primary texts were written before their lifetime. Far from being ‘contemporary’, these texts were published in another world, before the students were born: The French Lieutenant’s Woman, Nights at the Circus, If on a Winter’s Night a Traveller, Do Androids Dream of Electric Sheep? (and Blade Runner), White Noise: this is Mum and Dad’s culture. Some of the texts (‘The Library of Babel’) were written even before their parents were born. Replace this cache with other postmodern stalwarts – Beloved, Flaubert’s Parrot, Waterland, The Crying of Lot 49, Pale Fire, Slaughterhouse 5, Lanark, Neuromancer, anything by B.S. Johnson – and the same applies. It’s all about as contemporary as The Smiths, as hip as shoulder pads, as happening as Betamax video recorders. These are texts which are just coming to grips with the existence of rock music and television; they mostly do not dream even of the possibility of the technology and communications media – mobile phones, email, the internet, computers in every house powerful enough to put a man on the moon – which today’s undergraduates take for granted.
  • somewhere in the late 1990s or early 2000s, the emergence of new technologies re-structured, violently and forever, the nature of the author, the reader and the text, and the relationships between them.
  • Postmodernism, like modernism and romanticism before it, fetishised [ie placed supreme importance on] the author, even when the author chose to indict or pretended to abolish him or herself. But the culture we have now fetishises the recipient of the text to the degree that they become a partial or whole author of it. Optimists may see this as the democratisation of culture; pessimists will point to the excruciating banality and vacuity of the cultural products thereby generated (at least so far).
  • ...17 more annotations...
  • Pseudo-modernism also encompasses contemporary news programmes, whose content increasingly consists of emails or text messages sent in commenting on the news items. The terminology of ‘interactivity’ is equally inappropriate here, since there is no exchange: instead, the viewer or listener enters – writes a segment of the programme – then departs, returning to a passive role. Pseudo-modernism also includes computer games, which similarly place the individual in a context where they invent the cultural content, within pre-delineated limits. The content of each individual act of playing the game varies according to the particular player.
  • The pseudo-modern cultural phenomenon par excellence is the internet. Its central act is that of the individual clicking on his/her mouse to move through pages in a way which cannot be duplicated, inventing a pathway through cultural products which has never existed before and never will again. This is a far more intense engagement with the cultural process than anything literature can offer, and gives the undeniable sense (or illusion) of the individual controlling, managing, running, making up his/her involvement with the cultural product. Internet pages are not ‘authored’ in the sense that anyone knows who wrote them, or cares. The majority either require the individual to make them work, like Streetmap or Route Planner, or permit him/her to add to them, like Wikipedia, or through feedback on, for instance, media websites. In all cases, it is intrinsic to the internet that you can easily make up pages yourself (eg blogs).
  • Where once special effects were supposed to make the impossible appear credible, CGI frequently [inadvertently] works to make the possible look artificial, as in much of Lord of the Rings or Gladiator. Battles involving thousands of individuals have really happened; pseudo-modern cinema makes them look as if they have only ever happened in cyberspace.
  • Similarly, television in the pseudo-modern age favours not only reality TV (yet another unapt term), but also shopping channels, and quizzes in which the viewer calls to guess the answer to riddles in the hope of winning money.
  • The purely ‘spectacular’ function of television, as with all the arts, has become a marginal one: what is central now is the busy, active, forging work of the individual who would once have been called its recipient. In all of this, the ‘viewer’ feels powerful and is indeed necessary; the ‘author’ as traditionally understood is either relegated to the status of the one who sets the parameters within which others operate, or becomes simply irrelevant, unknown, sidelined; and the ‘text’ is characterised both by its hyper-ephemerality and by its instability. It is made up by the ‘viewer’, if not in its content then in its sequence – you wouldn’t read Middlemarch by going from page 118 to 316 to 401 to 501, but you might well, and justifiably, read Ceefax that way.
  • A pseudo-modern text lasts an exceptionally brief time. Unlike, say, Fawlty Towers, reality TV programmes cannot be repeated in their original form, since the phone-ins cannot be reproduced, and without the possibility of phoning-in they become a different and far less attractive entity.
  • If scholars give the date they referenced an internet page, it is because the pages disappear or get radically re-cast so quickly. Text messages and emails are extremely difficult to keep in their original form; printing out emails does convert them into something more stable, like a letter, but only by destroying their essential, electronic state.
  • The cultural products of pseudo-modernism are also exceptionally banal
  • Much text messaging and emailing is vapid in comparison with what people of all educational levels used to put into letters.
  • A triteness, a shallowness dominates all.
  • In music, the pseudo-modern supersedingof the artist-dominated album as monolithic text by the downloading and mix-and-matching of individual tracks on to an iPod, selected by the listener, was certainly prefigured by the music fan’s creation of compilation tapes a generation ago. But a shift has occurred, in that what was a marginal pastime of the fan has become the dominant and definitive way of consuming music, rendering the idea of the album as a coherent work of art, a body of integrated meaning, obsolete.
  • To a degree, pseudo-modernism is no more than a technologically motivated shift to the cultural centre of something which has always existed (similarly, metafiction has always existed, but was never so fetishised as it was by postmodernism). Television has always used audience participation, just as theatre and other performing arts did before it; but as an option, not as a necessity: pseudo-modern TV programmes have participation built into them.
  • Whereas postmodernism called ‘reality’ into question, pseudo-modernism defines the real implicitly as myself, now, ‘interacting’ with its texts. Thus, pseudo-modernism suggests that whatever it does or makes is what is reality, and a pseudo-modern text may flourish the apparently real in an uncomplicated form: the docu-soap with its hand-held cameras (which, by displaying individuals aware of being regarded, give the viewer the illusion of participation); The Office and The Blair Witch Project, interactive pornography and reality TV; the essayistic cinema of Michael Moore or Morgan Spurlock.
  • whereas postmodernism favoured the ironic, the knowing and the playful, with their allusions to knowledge, history and ambivalence, pseudo-modernism’s typical intellectual states are ignorance, fanaticism and anxiety
  • pseudo-modernism lashes fantastically sophisticated technology to the pursuit of medieval barbarism – as in the uploading of videos of beheadings onto the internet, or the use of mobile phones to film torture in prisons. Beyond this, the destiny of everyone else is to suffer the anxiety of getting hit in the cross-fire. But this fatalistic anxiety extends far beyond geopolitics, into every aspect of contemporary life; from a general fear of social breakdown and identity loss, to a deep unease about diet and health; from anguish about the destructiveness of climate change, to the effects of a new personal ineptitude and helplessness, which yield TV programmes about how to clean your house, bring up your children or remain solvent.
  • Pseudo-modernism belongs to a world pervaded by the encounter between a religiously fanatical segment of the United States, a largely secular but definitionally hyper-religious Israel, and a fanatical sub-section of Muslims scattered across the planet: pseudo-modernism was not born on 11 September 2001, but postmodernism was interred in its rubble.
  • pseudo-modernist communicates constantly with the other side of the planet, yet needs to be told to eat vegetables to be healthy, a fact self-evident in the Bronze Age. He or she can direct the course of national television programmes, but does not know how to make him or herself something to eat – a characteristic fusion of the childish and the advanced, the powerful and the helpless. For varying reasons, these are people incapable of the “disbelief of Grand Narratives” which Lyotard argued typified postmodernists
  •  
    Postmodern philosophy emphasises the elusiveness of meaning and knowledge. This is often expressed in postmodern art as a concern with representation and an ironic self-awareness. And the argument that postmodernism is over has already been made philosophically. There are people who have essentially asserted that for a while we believed in postmodern ideas, but not any more, and from now on we're going to believe in critical realism. The weakness in this analysis is that it centres on the academy, on the practices and suppositions of philosophers who may or may not be shifting ground or about to shift - and many academics will simply decide that, finally, they prefer to stay with Foucault [arch postmodernist] than go over to anything else. However, a far more compelling case can be made that postmodernism is dead by looking outside the academy at current cultural production.
Karin Tan

ASCAP Makes Outlandish Copyright Claims on Cell Phone Ringtones - 16 views

As is the beginnings of copyright laws, it is to place value on IP so that people will have the motivation and incentive to produce and create even more in the future. Therefore, by saying th...

Copyright

Weiye Loh

Wi-Fi is killing trees, study finds | Crave | CNET UK - 0 views

  • The tree-loving folks of Dutch city Alphen aan den Rijn commissioned the study after finding abnormalities on trees that couldn't be explained by known viral or bacterial infections. Over the last five years, the study found that all deciduous trees in the western world are affected by radiation from mobile-phone networks and wireless LANs.
  • Over 70 per cent of trees in urban areas in the Netherlands are afflicted by Wi-Fi sickness, displaying significant variations in growth, and bleeding and fissures in their bark. That's compared with just 10 per cent showing symptoms five years ago. Meanwhile, trees in wooded areas remain happy and healthy, untroubled by wireless unwellness. 
Weiye Loh

The hidden philosophy of David Foster Wallace - Salon.com Mobile - 0 views

  • Taylor's argument, which he himself found distasteful, was that certain logical and seemingly unarguable premises lead to the conclusion that even in matters of human choice, the future is as set in stone as the past. We may think we can affect it, but we can't.
  • human responsibility — that, with advances in neuroscience, is of increasing urgency in jurisprudence, social codes and personal conduct. And it also shows a brilliant young man struggling against fatalism, performing exquisite exercises to convince others, and maybe himself, that what we choose to do is what determines the future, rather than the future more or less determining what we choose to do. This intellectual struggle on Wallace's part seems now a kind of emotional foreshadowing of his suicide. He was a victim of depression from an early age — even during his undergraduate years — and the future never looks more intractable than it does to someone who is depressed.
  • "Fate, Time, and Language" reminded me of how fond philosophers are of extreme situations in creating their thought experiments. In this book alone we find a naval battle, the gallows, a shotgun, poison, an accident that leads to paraplegia, somebody stabbed and killed, and so on. Why not say "I have a pretzel in my hand today. Tomorrow I will have eaten it or not eaten it" instead of "I have a gun in my hand and I will either shoot you through the heart and feast on your flesh or I won't"? Well, OK — the answer is easy: The extreme and violent scenarios catch our attention more forcefully than pretzels do. Also, philosophers, sequestered and meditative as they must be, may long for real action — beyond beekeeping.
  • ...1 more annotation...
  • Wallace, in his essay, at the very center of trying to show that we can indeed make meaningful choices, places a terrorist in the middle of Amherst's campus with his finger on the trigger mechanism of a nuclear weapon. It is by far the most narratively arresting moment in all of this material, and it says far more about the author's approaching antiestablishment explosions of prose and his extreme emotional makeup than it does about tweedy profs fantasizing about ordering their ships into battle. For, after all, who, besides everyone around him, would the terrorist have killed?
  •  
    In 1962, a philosopher (and world-famous beekeeper) named Richard Taylor published a soon-to-be-notorious essay called "Fatalism" in the Philosophical Review.
Weiye Loh

FreedomBox Foundation - 0 views

  • Freedom Box is the name we give to a personal server running a free software operating system, with free applications designed to create and preserve personal privacy. Freedom Box software is particularly tailored to run in "plug servers," which are compact computers that are no larger than power adapters for electronic appliances. Located in people's homes or offices such inexpensive servers can provide privacy in normal life, and safe communications for people seeking to preserve their freedom in oppressive regimes.
  • Because social networking and digital communications technologies are now critical to people fighting to make freedom in their societies or simply trying to preserve their privacy where the Web and other parts of the Net are intensively surveilled by profit-seekers and government agencies. Because smartphones, mobile tablets, and other common forms of consumer electronics are being built as "platforms" to control their users and monitor their activity. Freedom Box exists to counter these unfree "platform" technologies that threaten political freedom. Freedom Box exists to provide people with privacy-respecting technology alternatives in normal times, and to offer ways to collaborate safely and securely with others in building social networks of protest, demonstration, and mobilization for political change in the not-so-normal times. Freedom Box software is built to run on hardware that already exists, and will soon become much more widely available and much more inexpensive. "Plug servers" and other compact devices are going to become ubiquitous in the next few years, serving as "media centers," "communications centers," "wireless routers," and many other familiar and not-so-familiar roles in office and home. Freedom Box software images will turn all sorts of such devices into privacy appliances. Taken together, these appliances will afford people around the world options for communicating, publishing, and collaborating that will resist state intervention or disruption. People owning these appliances will be able to restore anonymity in the Net, despite efforts of despotic regimes to keep track of who reads what and who communicates with whom. For a list of specific Freedom Box capabilities, check out our Goals page.
Weiye Loh

Want your opinions distorted and misrepresented? Write in to The Straits Time... - 0 views

  • Letter sent by by my good friend Samuel C. Wee to ST on the 8th of March, quoting statistics from their Page One infographic: (Read this closely!) I read with keen interest the news that social mobility in Singapore’s education system is still alive and well (“School system still ‘best way to move up’”; Monday). It is indeed heartwarming to learn that only 90% of children from one-to-three-room flats do not make it to university. I firmly agree with our Education Minister Dr Ng Eng Hen, who declared that “education remains the great social leveller in Singaporean society”. His statement is backed up with the statistic that 50% of children from the bottom third of the socio-economic ladder score in the bottom third of the Primary School Leaving Examination. In recent years, there has been much debate about elitism and the impact that a family’s financial background has on a child’s educational prospects. Therefore, it was greatly reassuring to read about Dr Ng’s great faith in our “unique, meritocratic Singapore system”, which ensures that good, able students from the middle-and-high income groups are not circumscribed or restricted in any way in the name of helping financially disadvantaged students. I would like to commend Ms Rachel Chang on her outstanding article. On behalf of the financially disadvantaged students of Singapore, I thank the fine journalists of the Straits Times for their tireless work in bringing to Singaporeans accurate and objective reporting.
  • What was actually published last Friday, March 18th 2011 A reassuring experience of meritocratic system I READ with keen interest the news that social mobility in Singapore’s education system is still alive and well (‘School system still ‘best way to move up”; March 8). It is indeed heartwarming to learn that almost 50 per cent of children from one- to three-room flats make it to university and polytechnics. I firmly agree with Education Minister Ng Eng Hen, who said that education remains the great social leveller in Singapore society. His statement is backed by the statistic that about 50 per cent of children from the bottom third of the socio-economic bracket score within the top two-thirds of their Primary School Leaving Examination cohort. There has been much debate about elitism and the impact that a family’s financial background has on a child’s educational prospects. Therefore, it was reassuring to read about Dr Ng’s own experience of the ‘unique, meritocratic Singapore system’: he grew up in a three-room flat with five other siblings, and his medical studies at the National University of Singapore were heavily subsidised; later, he trained as a cancer surgeon in the United States using a government scholarship. The system also ensures that good, able students from the middle- and high-income groups are not circumscribed or restricted in any way in the name of helping financially disadvantaged students.
  • To give me the byline would be an outrageous flattery and a gross injustice to the forum editors of ST, who took the liberty of taking my observations about the statistics and subtly replacing them with more politically correct (but significantly and essentially different) statistics.
  • ...3 more annotations...
  • Of course, ST reserves the right to edit my letter for clarity and length. When said statistics in question were directly taken from their original article, though, one has to wonder if there hasn’t been a breakdown in communication over there. I’m dreadfully sorry, forum editors, I should have double-checked my original source (your journalist Ms Rachel Chang) before sending my letter.
  • take a look at how my pride in our meritocratic system in my originally letter has been transfigured into awe at Dr Ng’s background, for example! Dear friends, when an editor takes the time and effort to not just paraphrase but completely and utterly transform your piece in both intent and meaning, then what can we say but bravo.
  • There are surely no lazy slackers over at the Straits Times; instead we have evidently men and women who dedicate time and effort to correct their misguided readers, and protect them from the shame of having their real opinions published.
Weiye Loh

Apple causes 'religious' reaction in brains of fans, say neuroscientists - 0 views

  •  
    Secrets of the Superbrands also looks at the likes of Facebook, which has enjoyed phenomenal success in just a few years. "Like Apple, mobile phones and social networks offer an opportunity for us to express our basic human need to communicate. And it's by tapping into our basic needs, like gossip, religion or sex that these brands are taking over our world at such lightning speed," Riley says. He concludes: "That's not to say that clever marketing and brilliant technical innovation aren't also crucial, but it seems that if you're not providing a service which is of potential interest to every one of the 6.9 billion human beings on the planet, the chances are you're never going to become a technology superbrand."
Weiye Loh

Commentary: SingTel launches Singapore's first "priority lane" broadband plans | Techgo... - 0 views

  •  
    Until now, all broadband plans here - and in most parts of the world - are sold according to the promised top speeds that are hardly reached in everyday use because of factors like network congestion and wireless coverage. SingTel said as much today when it launched its first-of-its-kind services. Executive vice president of digital consumer, Yuen Kuan Moon, pointed to the many users who have complained that they never got the speeds they paid for, especially when mobile networks are clogged with 145 per cent cellphone penetration in Singapore. SingTel's answer? Give priority to those who pay more, and try to let them know what speeds they will typically get.
Weiye Loh

Google Adds Voice Search, Visual Search and Results Prerendering - 0 views

  • Google Goggles is a full-fledged visual search engine that's trapped in a mobile application. But why do you have to buy a smartphone to use Google Goggles when you could simply upload an image to Google and find related pages and images on the Web? "Search by Image" does more than TinEye, the "reverse image search engine" that lets you find an image on the Web.
Weiye Loh

There Is Such A Thing As A Free Coffee | The Utopianist - Think Bigger - 0 views

  • Overall, the ratio of people taking versus giving is 2-1. Stark has a truly grand vision: “It’s literally giving people hope. Ultimately the goal is for more people to do this kind of thing. I admit it seems a little frivolous to give away coffee to people with iPhones. But imagine if you had a CVS card and you could give someone $10 for their Alzheimer’s medication. The concept of frictionless social giving is very attractive. And this is just the beginning of that.” It’s easy enough to text a number to make a donation during times of disaster, and many do it, but the concern may still exist over “where” the money is going; systems with re-loadable cards are straightforward and in some way more transparent (after all, the users probably have their own, personal, cards), serving to spur people into donating even more. I say let’s expand this — I cannot wait to see it act elsewhere — some sort of school card, perhaps? Download the full-sized card here; before you go, check the balance on Twitter — updated every couple of minutes, Stark wrote the program himself. “Like” Jonathan’s Starbucks Card on Facebook to spread the word; and when you want to donate, simply log on to the Starbucks website and reload card number 6061006913522430.
  •  
    Programmer Jonathan Stark, vice president of Mobiquity, has begun a truly cool experiment: sharing his Starbucks card with the world. While researching ways one can pay-by-mobile, Stark took an interesting perspective on Starbucks' system. He realized there was (at the time) no app for Android users, so he simply took a picture of his card and posted it online. He loaded it with $30 and then encouraged others to use it - and reload it, if they see fit. Not surprisingly, people took him up on it. Since those $30, the card has seen over $9,000 worth of anonymous donations. Stark says that "every time the balance gets really high, it brings out the worst in people: Someone goes down to Starbucks and makes a huge purchase. I don't know if they are buying coffee beans or mugs, or transferring money to their own card or what. But as long as the balance stays low, say $20 to $30, it seems like it manages itself. I haven't put any money on it in a while. All the money going through the card right now is the kindness of strangers."
Weiye Loh

For Activists, Tips in Safer Use of Social Media - Noticed - NYTimes.com - 0 views

  • people often lose sight of security concerns amid the collective euphoria that can accompany swift, large-scale democratization movements like the ones in Egypt and Tunisia. “The eye gets focused on the goal and not the process,” he said, “and during that time, they put their own personal security and their network security at risk.”
  • But it’s not just the fog of enthusiasm that renders people vulnerable; it’s lack of experience.
  • Those dangers have become increasingly apparent in recent months. Facebook accounts were hacked in Tunisia. In Egypt, authorities shut down the Internet and cellphones, and employed technology that turned mobile phones into furtive listening devices, according to the guide.
  • ...1 more annotation...
  • The Access guide provides tips for keeping communications safer in such a climate. It recommends Gmail, for example, because it uses a secure connection by default, known as HTTPS, like at banking Web sites; Hotmail provides HTTPS as an option, and Facebook began offering it in January. The guide also explains how to disguise browsing histories and how to gain access to banned sites.
Weiye Loh

Climate sceptic Willie Soon received $1m from oil companies, papers show | Environment ... - 0 views

  • freedom of information documents suggest that Soon corresponded in 2003 with other prominent climate sceptics to try to weaken a major assessment of global warming being conducted by the UN's leading climate science body, the Nobel prize-winning Intergovernmental Panel on Climate Change.Soon, who had previously disclosed corporate funding he received in the 1990s, was today reportely unapologetic, telling Reuters that he agreed that he had received money from all of the groups and companies named in the report but denied that any group would have influenced his studies.
  • "I have never been motivated by financial reward in any of my scientific research," he said. "I would have accepted money from Greenpeace if they had offered it to do my research."
  • Charles G Koch Foundation, a leading provider of funds for climate sceptic groups, gave Soon two grants totalling $175,000 (then roughly £102,000) in 2005/6 and again in 2010. In addition the American Petroleum insitute (API), which represents the US petroleum and natural gas industries, gave him multiple grants between 2001 and 2007 totalling $274,000, oil company Exxon Mobil provided $335,000 between 2005 and 2010, and Soon received other grants from coal and oil industry sources including the Mobil Foundation, the Texaco Foundation and the Electric Power Research Institute.
Weiye Loh

Nokia's Separation Anxiety,Visualized - 0 views

  •  
    How do you solve a problem like Nokia? The company has been foundering for years, and at this point may have taken on more water than newish CEO Stephen Elop CEO can bail. But how did a company that once defined the mobile industry fall so far behind? It might be more a matter of distance than ideas.
Weiye Loh

Real-name Weibo, for the good of all - China Media Project - 0 views

  • According to my own research, real-name registration for the internet is done by many countries around the world. But first it requires a basis in the law. In the mobile phone sector now we’re only at about 58 percent real-name registered, and about 40 percent of the market remains unregistered. This is a process, and it has to be explained. The trials with real-name registration on the Weibo are for the sake of the orderly and healthy development of the internet — in order to protect the privacy and secrecy of individuals, corporations and the nation.
  •  
    real-name registration on China's social media platforms, a policy formally taking effect on March 16, was meant to ensure "the privacy and secrecy of individuals, corporations and the nation."
Weiye Loh

The Real Hoax Was Climategate | Media Matters Action Network - 0 views

  • Sen. Jim Inhofe's (R-OK) biggest claim to fame has been his oft-repeated line that global warming is "the greatest hoax ever perpetrated on the American people."
  • In 2003, he conceded that the earth was warming, but denied it was caused by human activity and suggested that "increases in global temperatures may have a beneficial effect on how we live our lives."
  • In 2009, however, he appeared on Fox News to declare that the earth was actually cooling, claiming "everyone understands that's the case" (they don't, because it isn't).
  • ...7 more annotations...
  • nhofe's battle against climate science kicked into overdrive when a series of illegally obtained emails surfaced from the Climatic Research Unit at East Anglia University. 
  • When the dubious reports surfaced about flawed science, manipulated data, and unsubstantiated studies, Inhofe was ecstatic.  In March, he viciously attacked former Vice President Al Gore for defending the science behind climate change
  • Unfortunately for Senator Inhofe, none of those things are true.  One by one, the pillars of evidence supporting the alleged "scandals" have shattered, causing the entire "Climategate" storyline to come crashing down. 
  • a panel established by the University of East Anglia to investigate the integrity of the research of the Climatic Research Unit wrote: "We saw no evidence of any deliberate scientific malpractice in any of the work of the Climatic Research Unit and had it been there we believe that it is likely that we would have detected it."
  • Responding to allegations that Dr. Michael Mann tampered with scientific evidence, Pennsylvania State University conducted a thorough investigation. It concluded: "The Investigatory Committee, after careful review of all available evidence, determined that there is no substance to the allegation against Dr. Michael E. Mann, Professor, Department of Meteorology, The Pennsylvania State University.  More specifically, the Investigatory Committee determined that Dr. Michael E. Mann did not engage in, nor did he participate in, directly or indirectly, any actions that seriously deviated from accepted practices within the academic community for proposing, conducting, or reporting research, or other scholarly activities."
  • London's Sunday Times retracted its story, echoed by dozens of outlets, that an IPCC issued an unsubstantiated report claiming 40% of the Amazon rainforest was endangered due to changing rainfall patterns.  The Times wrote: "In fact, the IPCC's Amazon statement is supported by peer-reviewed scientific evidence. In the case of the WWF report, the figure had, in error, not been referenced, but was based on research by the respected Amazon Environmental Research Institute (IPAM) which did relate to the impact of climate change."
  • The Times also admitted it misrepresented the views of Dr. Simon Lewis, a Royal Society research fellow at the University of Leeds, implying he agreed with the article's false premise and believed the IPCC should not utilize reports issued by outside organizations.  In its retraction, the Times was forced to admit: "Dr Lewis does not dispute the scientific basis for both the IPCC and the WWF reports," and, "We accept that Dr Lewis holds no such view... A version of our article that had been checked with Dr Lewis underwent significant late editing and so did not give a fair or accurate account of his views on these points. We apologise for this."
  •  
    The Real Hoax Was Climategate July 02, 2010 1:44 pm ET by Chris Harris
1 - 20 of 54 Next › Last »
Showing 20 items per page