Skip to main content

Home/ New Media Ethics 2009 course/ Group items tagged service

Rss Feed Group items tagged

Weiye Loh

McKinsey & Company - Clouds, big data, and smart assets: Ten tech-enabled business tren... - 0 views

  • 1. Distributed cocreation moves into the mainstreamIn the past few years, the ability to organise communities of Web participants to develop, market, and support products and services has moved from the margins of business practice to the mainstream. Wikipedia and a handful of open-source software developers were the pioneers. But in signs of the steady march forward, 70 per cent of the executives we recently surveyed said that their companies regularly created value through Web communities. Similarly, more than 68m bloggers post reviews and recommendations about products and services.
  • for every success in tapping communities to create value, there are still many failures. Some companies neglect the up-front research needed to identify potential participants who have the right skill sets and will be motivated to participate over the longer term. Since cocreation is a two-way process, companies must also provide feedback to stimulate continuing participation and commitment. Getting incentives right is important as well: cocreators often value reputation more than money. Finally, an organisation must gain a high level of trust within a Web community to earn the engagement of top participants.
  • 2. Making the network the organisation In earlier research, we noted that the Web was starting to force open the boundaries of organisations, allowing nonemployees to offer their expertise in novel ways. We called this phenomenon "tapping into a world of talent." Now many companies are pushing substantially beyond that starting point, building and managing flexible networks that extend across internal and often even external borders. The recession underscored the value of such flexibility in managing volatility. We believe that the more porous, networked organisations of the future will need to organise work around critical tasks rather than molding it to constraints imposed by corporate structures.
  • ...10 more annotations...
  • 3. Collaboration at scale Across many economies, the number of people who undertake knowledge work has grown much more quickly than the number of production or transactions workers. Knowledge workers typically are paid more than others, so increasing their productivity is critical. As a result, there is broad interest in collaboration technologies that promise to improve these workers' efficiency and effectiveness. While the body of knowledge around the best use of such technologies is still developing, a number of companies have conducted experiments, as we see in the rapid growth rates of video and Web conferencing, expected to top 20 per cent annually during the next few years.
  • 4. The growing ‘Internet of Things' The adoption of RFID (radio-frequency identification) and related technologies was the basis of a trend we first recognised as "expanding the frontiers of automation." But these methods are rudimentary compared with what emerges when assets themselves become elements of an information system, with the ability to capture, compute, communicate, and collaborate around information—something that has come to be known as the "Internet of Things." Embedded with sensors, actuators, and communications capabilities, such objects will soon be able to absorb and transmit information on a massive scale and, in some cases, to adapt and react to changes in the environment automatically. These "smart" assets can make processes more efficient, give products new capabilities, and spark novel business models. Auto insurers in Europe and the United States are testing these waters with offers to install sensors in customers' vehicles. The result is new pricing models that base charges for risk on driving behavior rather than on a driver's demographic characteristics. Luxury-auto manufacturers are equipping vehicles with networked sensors that can automatically take evasive action when accidents are about to happen. In medicine, sensors embedded in or worn by patients continuously report changes in health conditions to physicians, who can adjust treatments when necessary. Sensors in manufacturing lines for products as diverse as computer chips and pulp and paper take detailed readings on process conditions and automatically make adjustments to reduce waste, downtime, and costly human interventions.
  • 5. Experimentation and big data Could the enterprise become a full-time laboratory? What if you could analyse every transaction, capture insights from every customer interaction, and didn't have to wait for months to get data from the field? What if…? Data are flooding in at rates never seen before—doubling every 18 months—as a result of greater access to customer data from public, proprietary, and purchased sources, as well as new information gathered from Web communities and newly deployed smart assets. These trends are broadly known as "big data." Technology for capturing and analysing information is widely available at ever-lower price points. But many companies are taking data use to new levels, using IT to support rigorous, constant business experimentation that guides decisions and to test new products, business models, and innovations in customer experience. In some cases, the new approaches help companies make decisions in real time. This trend has the potential to drive a radical transformation in research, innovation, and marketing.
  • Using experimentation and big data as essential components of management decision making requires new capabilities, as well as organisational and cultural change. Most companies are far from accessing all the available data. Some haven't even mastered the technologies needed to capture and analyse the valuable information they can access. More commonly, they don't have the right talent and processes to design experiments and extract business value from big data, which require changes in the way many executives now make decisions: trusting instincts and experience over experimentation and rigorous analysis. To get managers at all echelons to accept the value of experimentation, senior leaders must buy into a "test and learn" mind-set and then serve as role models for their teams.
  • 6. Wiring for a sustainable world Even as regulatory frameworks continue to evolve, environmental stewardship and sustainability clearly are C-level agenda topics. What's more, sustainability is fast becoming an important corporate-performance metric—one that stakeholders, outside influencers, and even financial markets have begun to track. Information technology plays a dual role in this debate: it is both a significant source of environmental emissions and a key enabler of many strategies to mitigate environmental damage. At present, information technology's share of the world's environmental footprint is growing because of the ever-increasing demand for IT capacity and services. Electricity produced to power the world's data centers generates greenhouse gases on the scale of countries such as Argentina or the Netherlands, and these emissions could increase fourfold by 2020. McKinsey research has shown, however, that the use of IT in areas such as smart power grids, efficient buildings, and better logistics planning could eliminate five times the carbon emissions that the IT industry produces.
  • 7. Imagining anything as a service Technology now enables companies to monitor, measure, customise, and bill for asset use at a much more fine-grained level than ever before. Asset owners can therefore create services around what have traditionally been sold as products. Business-to-business (B2B) customers like these service offerings because they allow companies to purchase units of a service and to account for them as a variable cost rather than undertake large capital investments. Consumers also like this "paying only for what you use" model, which helps them avoid large expenditures, as well as the hassles of buying and maintaining a product.
  • In the IT industry, the growth of "cloud computing" (accessing computer resources provided through networks rather than running software or storing data on a local computer) exemplifies this shift. Consumer acceptance of Web-based cloud services for everything from e-mail to video is of course becoming universal, and companies are following suit. Software as a service (SaaS), which enables organisations to access services such as customer relationship management, is growing at a 17 per cent annual rate. The biotechnology company Genentech, for example, uses Google Apps for e-mail and to create documents and spreadsheets, bypassing capital investments in servers and software licenses. This development has created a wave of computing capabilities delivered as a service, including infrastructure, platform, applications, and content. And vendors are competing, with innovation and new business models, to match the needs of different customers.
  • 8. The age of the multisided business model Multisided business models create value through interactions among multiple players rather than traditional one-on-one transactions or information exchanges. In the media industry, advertising is a classic example of how these models work. Newspapers, magasines, and television stations offer content to their audiences while generating a significant portion of their revenues from third parties: advertisers. Other revenue, often through subscriptions, comes directly from consumers. More recently, this advertising-supported model has proliferated on the Internet, underwriting Web content sites, as well as services such as search and e-mail (see trend number seven, "Imagining anything as a service," earlier in this article). It is now spreading to new markets, such as enterprise software: Spiceworks offers IT-management applications to 950,000 users at no cost, while it collects advertising from B2B companies that want access to IT professionals.
  • 9. Innovating from the bottom of the pyramid The adoption of technology is a global phenomenon, and the intensity of its usage is particularly impressive in emerging markets. Our research has shown that disruptive business models arise when technology combines with extreme market conditions, such as customer demand for very low price points, poor infrastructure, hard-to-access suppliers, and low cost curves for talent. With an economic recovery beginning to take hold in some parts of the world, high rates of growth have resumed in many developing nations, and we're seeing companies built around the new models emerging as global players. Many multinationals, meanwhile, are only starting to think about developing markets as wellsprings of technology-enabled innovation rather than as traditional manufacturing hubs.
  • 10. Producing public good on the grid The role of governments in shaping global economic policy will expand in coming years. Technology will be an important factor in this evolution by facilitating the creation of new types of public goods while helping to manage them more effectively. This last trend is broad in scope and draws upon many of the other trends described above.
Weiye Loh

A DIY Data Manifesto | Webmonkey | Wired.com - 0 views

  • Running a server is no more difficult than starting Windows on your desktop. That’s the message Dave Winer, forefather of blogging and creator of RSS, is trying to get across with his EC2 for Poets project.
  • Winer has put together an easy-to-follow tutorial so you too can set up a Windows-based server running in the cloud. Winer uses Amazon’s EC2 service. For a few dollars a month, Winer’s tutorial can have just about anyone up and running with their own server.
  • but education and empowerment aren’t Winer’s only goals. “I think it’s important to bust the mystique of servers,” says Winer, “it’s essential if we’re going to break free of the ‘corporate blogging silos.’”
  • ...8 more annotations...
  • The corporate blogging silos Winer is thinking of are services like Twitter, Facebook and WordPress. All three have been instrumental in the growth of the web, they make it easy for anyone publish. But they also suffer denial of service attacks, government shutdowns and growing pains, centralized services like Twitter and Facebook are vulnerable. Services wrapped up in a single company are also vulnerable to market whims, Geocities is gone, FriendFeed languishes at Facebook and Yahoo is planning to sell Delicious. A centralized web is brittle web, one that can make our data, our communications tools disappear tomorrow.
  • But the web will likely never be completely free of centralized services and Winer recognizes that. Most people will still choose convenience over freedom. Twitter’s user interface is simple, easy to use and works on half a dozen devices.
  • Winer isn’t the only one who believes the future of the web will be distributed systems that aren’t controlled by any single corporation or technology platform. Microformats founder Tantek Çelik is also working on a distributed publishing system that seeks to retain all the cool features of the social web, but remove the centralized bottleneck.
  • to be free of corporate blogging silos and centralized services the web will need an army of distributed servers run by hobbyists, not just tech-savvy web admins, but ordinary people who love the web and want to experiment.
  • Winer wants to start by creating a loosely coupled, distributed microblogging service like Twitter. “I’m pretty sure we know how to create a micro-blogging community with open formats and protocols and no central point of failure,” he writes on his blog.
  • that means decoupling the act of writing from the act of publishing. The idea isn’t to create an open alternative to Twitter, it’s to remove the need to use Twitter for writing on Twitter. Instead you write with the tools of your choice and publish to your own server.
  • If everyone publishes first to their own server there’s no single point of failure. There’s no fail whale, and no company owns your data. Once the content is on your server you can then push it on to wherever you’d like — Twitter, Tumblr, WordPress of whatever the site du jour is ten years from now.
  • The glue that holds this vision together is RSS. Winer sees RSS as the ideal broadcast mechanism for the distributed web and in fact he’s already using it — Winer has an RSS feed of links that are then pushed on to Twitter.
Weiye Loh

Net-Neutrality: The First Amendment of the Internet | LSE Media Policy Project - 0 views

  • debates about the nature, the architecture and the governing principles of the internet are not merely technical or economic discussions.  Above all, these debates have deep political, social, and cultural implications and become a matter of public, national and global interest.
  • In many ways, net neutrality could be considered the first amendment of the internet; no pun intended here. However, just as with freedom of speech the principle of net neutrality cannot be approached as absolute or as a fetish. Even in a democracy we cannot say everything applies all the time in all contexts. Limiting the core principle of freedom of speech in a democracy is only possible in very specific circumstances, such as harm, racism or in view of the public interest. Along the same lines, compromising on the principle of net neutrality should be for very specific and clearly defined reasons that are transparent and do not serve commercial private interests, but rather public interests or are implemented in view of guaranteeing an excellent quality of service for all.
  • One of the only really convincing arguments of those challenging net neutrality is that due to the dramatic increases in streaming activity and data-exchange through peer-to-peer networks, the overall quality of service risks being compromised if we stick to data being treated on a first come first serve basis. We are being told that popular content will need to be stored closer to the consumer, which evidently comes at an extra cost.
  • ...5 more annotations...
  • Implicitly two separate debates are being collapsed here and I would argue that we need to separate both. The first one relates to the stability of the internet as an information and communication infrastructure because of the way we collectively use that infrastructure. The second debate is whether ISPs and telecommunication companies should be allowed to differentiate in their pricing between different levels of quality of access, both towards consumers and content providers.
  • Just as with freedom of speech, circumstances can be found in which the principle while still cherished and upheld, can be adapted and constrained to some extent. To paraphrase Tim Wu (2008), the aspiration should still be ‘to treat all content, sites, and platforms equally’, but maybe some forms of content should be treated more equally than others in order to guarantee an excellent quality of service for all. However, the societal and political implications of this need to be thought through in detail and as with freedom of speech itself, it will, I believe, require strict regulation and conditions.
  • In regards to the first debate on internet stability, a case can be made for allowing internet operators to differentiate between different types of data with different needs – if for any reason the quality of service of the internet as a whole cannot be guaranteed anymore. 
  • Concerning the second debate on differential pricing, it is fair to say that from a public interest and civic liberty perspective the consolidation and institutionalization of a commercially driven two-tiered internet is not acceptable and impossible to legitimate. As is allowing operators to differentiate in the quality of provision of certain kind of content above others.  A core principle such as net neutrality should never be relinquished for the sake of private interests and profit-making strategies – on behalf of industry or for others. If we need to compromise on net neutrality it would always have to be partial, to be circumscribed and only to improve the quality of service for all, not just for the few who can afford it.
  • Separating these two debates exposes the crux of the current net-neutrality debate. In essence, we are being urged to give up on the principle of net-neutrality to guarantee a good quality of service.  However, this argument is actually a pre-text for the telecom industry to make content-providers pay for the facilitation of access to their audiences – the internet subscribers. And this again can be linked to another debate being waged amongst content providers: how do we make internet users pay for the content they access online? I won’t open that can of worms here, but I will make my point clear.  Telecommunication industry efforts to make content providers pay for access to their audiences do not offer legitimate reasons to suspend the first amendment of the internet.
Weiye Loh

Net neutrality enshrined in Dutch law | Technology | guardian.co.uk - 0 views

  • The measure, which was adopted with a broad majority in the lower house of parliament, will prevent KPN, the Dutch telecommunications market leader, and the Dutch arms of Vodafone and T-Mobile from blocking or charging for internet services like Skype or WhatsApp, a free text service. Its sponsors said that the measure would pass a pro forma review in the Dutch senate.
  • The Dutch restrictions on operators are the first in the EU. The European commission and European parliament have endorsed network neutrality guidelines but have not yet taken legal action against operators that block or impose extra fees on consumers using services such as Skype, the voice and video service being acquired by Microsoft, and WhatsApp, a mobile software maker based in California.
  • Advocates hailed the move as a victory for consumers, while industry officials predicted that mobile broadband charges could rise in the Netherlands to compensate for the new restrictions.
  • ...2 more annotations...
  • Only one other country, Chile, has written network neutrality requirements into its telecommunications law. The Chilean law, which was approved in July 2010, took effect in May.
  • In the US, an attempt by the Federal Communications Commission to impose a similar set of network neutrality restrictions on American operators has been tied up in legal challenges from the industry.
  •  
    The Netherlands has become the first country in Europe to enshrine the concept of network neutrality into national law by banning its mobile telephone operators from blocking or charging consumers extra for using internet-based communications services.
Arthur Cane

Excellent SEO Service That Last - 1 views

I have been working with Syntactics Inc. for five years now, and I have entrusted my online business to them for that long because I found their services really excellent. In fact, for that five...

seo outsourcing services

started by Arthur Cane on 13 Dec 11 no follow-up yet
Weiye Loh

Do avatars have digital rights? - 20 views

hi weiye, i agree with you that this brings in the topic of representation. maybe you should try taking media and representation by Dr. Ingrid to discuss more on this. Going back to your questio...

avatars

Weiye Loh

Google wants to help you find what you love | Techgoondu - 0 views

  • WDYL is nothing but self-promotional, getting users to take a look at other Google services which they might never have known existed. And of course, this is still search, which is Google’s core business. WDLY merely presents search in a more visually appealing manner; so again, this could tie in with some future marketing effort.
  •  
    Google has secretly unveiled a new service called "What do you love?" (or, wdyl.com) to help you find out, well, what you love. Think of it as something like a search engine, but instead of searching the Web for "something", you actually search across various Google services for "something". For example, searching for "shoes" gives you the option to translate shoes into 57 languages via Google Translate, find books about shoes via Google Books, watch videos of shoes via YouTube, read the latest news about shoes via Google News, and more.
funeral adelaide

Top Funeral Service in Adelaide - 1 views

Sensible Funerals handled the funeral of my late grandmother. It was really difficult for me and my family to say goodbye. That is why we wanted to give her the best funeral service though our fam...

Funeral Adelaide

started by funeral adelaide on 18 Oct 11 no follow-up yet
Weiye Loh

Hacktivists as Gadflies - NYTimes.com - 0 views

  •  
    "Consider the case of Andrew Auernheimer, better known as "Weev." When Weev discovered in 2010 that AT&T had left private information about its customers vulnerable on the Internet, he and a colleague wrote a script to access it. Technically, he did not "hack" anything; he merely executed a simple version of what Google Web crawlers do every second of every day - sequentially walk through public URLs and extract the content. When he got the information (the e-mail addresses of 114,000 iPad users, including Mayor Michael Bloomberg and Rahm Emanuel, then the White House chief of staff), Weev did not try to profit from it; he notified the blog Gawker of the security hole. For this service Weev might have asked for free dinners for life, but instead he was recently sentenced to 41 months in prison and ordered to pay a fine of more than $73,000 in damages to AT&T to cover the cost of notifying its customers of its own security failure. When the federal judge Susan Wigenton sentenced Weev on March 18, she described him with prose that could have been lifted from the prosecutor Meletus in Plato's "Apology." "You consider yourself a hero of sorts," she said, and noted that Weev's "special skills" in computer coding called for a more draconian sentence. I was reminded of a line from an essay written in 1986 by a hacker called the Mentor: "My crime is that of outsmarting you, something that you will never forgive me for." When offered the chance to speak, Weev, like Socrates, did not back down: "I don't come here today to ask for forgiveness. I'm here to tell this court, if it has any foresight at all, that it should be thinking about what it can do to make amends to me for the harm and the violence that has been inflicted upon my life." He then went on to heap scorn upon the law being used to put him away - the Computer Fraud and Abuse Act, the same law that prosecutors used to go after the 26-year-old Internet activist Aaron Swart
Weiye Loh

Secrecy in the age of WikiLeaks - 1 views

  •  
    As government agencies look to leverage new technologies to communicate with the public, move more citizen services online, share services amongst agencies, share intelligence for national security purposes and collaborate with other nations and private industry, they will need to take a more open stance to secrecy and information sharing. But to mitigate risks, they need to take a more solid security stance at the same time. It is imperative for leaders at all levels within government (agencies, departments, contractors, etc.) to weigh the risks and benefits of making information more accessible and, once decided, put strong safeguards in place to ensure only those who need access can get access. Information leaks imply failures across multiple areas, particularly risk management, access control and confidentiality. The ongoing WikiLeaks exposé clearly shows that the threat is not always from external groups; it can be far more insidious when it stems from trusted individuals within an organisation.
Arthur Cane

Outstanding Team of SEO Specialists - 1 views

We have already tried a number of link builders and SEO services over the years and we were generally disappointed. Until we found our way to Syntactics Inc. I find their service great that is why,...

seo specialist specialists

started by Arthur Cane on 26 Jan 12 no follow-up yet
Weiye Loh

De-Universalizing Access! Is there a Conspiracy to Electronically "Kettle" th... - 0 views

  •  
    those wishing to access and make use of government services or benefits may be quite out of luck if they can't afford in home Internet service, live in a remote area, don't own a computer and/or lack the necessary knowledge, skill, physical facility, and cognitive capacity to manage computer and Internet access and use.
Meenatchi

Online Defamation - 0 views

  •  
    Interesting Case In summary, the article discusses the court ruling of an online defamation case that took place in Korea. It involves Kim, the victim, who experienced the spread of false articles and defamatory comments that blamed him for his ex-girlfriend's suicide. The final verdict held Internet portals liable for the damages caused by the articles they displayed on their website. This is despite the articles having been provided by external media outlets. The Supreme Court ordered four of the major portals involved in the case to pay a combined 30 million ($22,500) as compensation to Kim. Ethical Question I feel there are a few ethical issues that are at play in this case. One would be if it is ethical to publish sensitive information about an individual without his/her permission on the Internet. This is of more importance when the credibility of the information is dubious. Another ethical question would be if Internet Service Providers can be held responsible for information they did not create. Is it fair to charge them on the basis that they have failed to regulate the content displayed on their sites? Problem The problem with the first ethical question is that it creates a question of individual privacy rights against the freedom of speech for another. Publishing sensitive information that might not even be true about an individual infringes his/her privacy rights. However, it is the right of the publisher to have the freedom of speech to state what he/she thinks. The issue with the second ethical question is that the Internet Service Providers merely provide a platform for people to express their views. They should not be held liable for comments posted by individuals using the website. However, the opposing view would expect the ISPs to be responsible for the content they allow to be displayed on their site. They have to regulate the content to ensure that sensitive or controversial information that would cause irrevocable damage to others
Weiye Loh

Epiphenom: Religion and suicide - a patchy global picture - 0 views

  • The main objective of this study is to understand the factors that contribute to suicide in different countries, and what can be done to reduce them. In each country, people who have attempted suicide are brought into the study and given a questionnaire to fill out. Another group of people, randomly chosen, are given the same questionnaire. That allows the team to compare religious affiliation, involvement in organised religion, and individual religiosity in suicide attempters and the general population. When they looked at the data, and adjusted them for a host of factors known to affect suicide risk (age, gender, marital status, employment, and education), a complex picture emerged.
  • In Iran, religion was highly protective, whether religion was measured as the rate of mosque attendance or as whether the individual thought of themselves as a religious person. In Brazil, going to religious services and personal religiosity were both highly protective. Bizarrely, however, religious affiliation was not. That might be because being Protestant was linked to greater risk, and Catholicism to lower risk. Put the two together, and it may balance out. In Estonia, suicides were lower in those who were affiliated to a religion, and those who said they were religious. They were also a bit lower in those who In India, there wasn't much effect of religion at all - a bit lower in those who go to religious services at least occasionally. Vietnam was similar. Those who went to religious services yearly were less likely to have attempted suicide, but no other measure of religion had any effect. In Sri Lanka, going to religious services had no protective effect, but subjective religiosity did. In South Africa, those who go to Church were no less likely to attempt suicide. In fact, those who said they were religious were actually nearly three times more likely to attempt suicide, and those who were affiliated to a religion were an incredible six times more likely!
  • In Brazil, religious people are six times less likely to commit suicide than the non religious. In South Africa, they are three times more likely. How to explain these national differences?
  • ...5 more annotations...
  • Part of it might be differences in the predominant religion. The protective effect of religion seems to be higher in monotheistic countries, and it's particularly high in the most fervently monotheistic country, Iran. In India, Sri Lanka, and Vietnam, the protective effect is smaller or non-existent.
  • But that doesn't explain South Africa. South Africa is unusual in that it is a highly diverse country, fractured by ethnic, social and religious boundaries. The researchers think that this might be a factor: South Africa has been described as ‘‘The Rainbow Nation’’ because of its cultural diversity. There are a variety of ethnic groups and a greater variety of cultures within each of these groups. While cultural diversity is seen as a national asset, the interaction of cultures results in the blurring of cultural norms and boundaries at the individual, family and cultural group levels. Subsequently, there is a large diversity of religious denominations and this does not seem favorable in terms of providing protection against attempted suicide.
  • earlier studies have shown that religious homogeneity is linked to lower suicide rates, and they suggest that the reverse might well be happening in South Africa.
  • this also could explain why, in Brazil, Protestants have a higher suicide rate than the unaffiliated. That too could be linked to their status as a religious minority.
  • we've got a study showing the double-edged nature of religion. For those inside the group, it provides support and comfort. But once fractures appear, religion just seems to turn up the heat!
  •  
     Religion and suicide
Weiye Loh

Android software piracy rampant despite Google's efforts to curb - Computerworld - 0 views

  • Some have argued that piracy is rampant in those countries where the online Android Market is not yet available. But a recent KeyesLabs research project suggests that may not be true. KeyesLabs created a rough methodology to track total downloads of its apps, determine which ones were pirated, and the location of the end users. The results were posted in August, along with a “heat map” showing pirate activity. 
  • In July 2010, Google announced the Google Licensing Service, available via Android Market. Applications can include the new License Verification Library (LVL). “At run time, with the inclusion of a set of libraries provided by us, your application can query the Android Market licensing server to determine the license status of your users,” according to a blog post by Android engineer Eric Chu. “It returns information on whether your users are authorized to use the app based on stored sales records.”
  • Justin Case, at the Android Police Web site, dissected the LVL. “A minor patch to an application employing this official, Google-recommended protection system will render it completely worthless,” he concluded.
  • ...2 more annotations...
  • In response, Google has promised continued improvements and outlined a multipronged strategy around the new licensing service to make piracy much harder. “A determined attacker who’s willing to disassemble and reassemble code can eventually hack around the service,” acknowledged Android engineer Trevor Johns in a recent blog post.  But developers can make their work much harder by combining a cluster of techniques, he counsels: obfuscating code, modifying the licensing library to protect against common cracking techniques, designing the app to be tamper-resistant, and offloading license validation to a trusted server.
  • Gareau isn’t quite as convinced of the benefits of code obfuscation, though he does make use of it. He’s taken several other steps to protect his software work. One is providing a free trial version, which allows only a limited amount of data but is otherwise fully-featured. The idea: Let customers prove that the app will do everything they want, and they may be more willing to pay for it. He also provides a way to detect whether the app has been tampered with, for example, by removing the licensing checks. If yes, the app can be structured to stop working or behave erratically.
  •  
    Android software piracy rampant despite Google's efforts to curb
Weiye Loh

Anonymous speaks: the inside story of the HBGary hack - 0 views

  • It has been an embarrassing week for security firm HBGary and its HBGary Federal offshoot. HBGary Federal CEO Aaron Barr thought he had unmasked the hacker hordes of Anonymous and was preparing to name and shame those responsible for co-ordinating the group's actions, including the denial-of-service attacks that hit MasterCard, Visa, and other perceived enemies of WikiLeaks late last year.
  • When Barr told one of those he believed to be an Anonymous ringleader about his forthcoming exposé, the Anonymous response was swift and humiliating. HBGary's servers were broken into, its e-mails pillaged and published to the world, its data destroyed, and its website defaced. As an added bonus, a second site owned and operated by Greg Hoglund, owner of HBGary, was taken offline and the user registration database published.
  • HBGary and HBGary Federal position themselves as experts in computer security. The companies offer both software and services to both the public and private sectors. On the software side, HBGary has a range of computer forensics and malware analysis tools to enable the detection, isolation, and analysis of worms, viruses, and trojans. On the services side, it offers expertise in implementing intrusion detection systems and secure networking, and performs vulnerability assessment and penetration testing of systems and software. A variety of three letter agencies, including the NSA, appeared to be in regular contact with the HBGary companies, as did Interpol, and HBGary also worked with well-known security firm McAfee. At one time, even Apple expressed an interest in the company's products or services.
  • ...1 more annotation...
  • One might think that such an esteemed organization would prove an insurmountable challenge for a bunch of disaffected kids to hack. World-renowned, government-recognized experts against Anonymous? HBGary should be able to take their efforts in stride. Unfortunately for HBGary, neither the characterization of Anonymous nor the assumption of competence on the security company's part are accurate, as the story of how HBGary was hacked will make clear. Anonymous is a diverse bunch: though they tend to be younger rather than older, their age group spans decades. Some may still be in school, but many others are gainfully employed office-workers, software developers, or IT support technicians, among other things. With that diversity in age and experience comes a diversity of expertise and ability.
test and tagging

Excellent Test and Tagging in Adelaide - 1 views

I have been looking for a reliable electrical safety specialist to check on my electrical equipment which we have been using in my restaurant in Adelaide. After a week of searching, I finally found...

test and tagging

started by test and tagging on 24 Nov 11 no follow-up yet
qiyi liao

Online Censorship: Obama urged to fine firms for aiding censors - 3 views

Internet activists are urging Barack Obama to pass legislation that would make it illegal for technology companies to collaborate with authoritarian countries that censor the internet. -The Guardi...

started by qiyi liao on 02 Sep 09 no follow-up yet
Weiye Loh

IPhone and Android Apps Breach Privacy - WSJ.com - 0 views

  • Few devices know more personal details about people than the smartphones in their pockets: phone numbers, current location, often the owner's real name—even a unique ID number that can never be changed or turned off.
  • An examination of 101 popular smartphone "apps"—games and other software applications for iPhone and Android phones—showed that 56 transmitted the phone's unique device ID to other companies without users' awareness or consent. Forty-seven apps transmitted the phone's location in some way. Five sent age, gender and other personal details to outsiders.
  • The findings reveal the intrusive effort by online-tracking companies to gather personal data about people in order to flesh out detailed dossiers on them.
  • ...24 more annotations...
  • iPhone apps transmitted more data than the apps on phones using Google Inc.'s Android operating system. Because of the test's size, it's not known if the pattern holds among the hundreds of thousands of apps available.
  • TextPlus 4, a popular iPhone app for text messaging. It sent the phone's unique ID number to eight ad companies and the phone's zip code, along with the user's age and gender, to two of them.
  • Pandora, a popular music app, sent age, gender, location and phone identifiers to various ad networks. iPhone and Android versions of a game called Paper Toss—players try to throw paper wads into a trash can—each sent the phone's ID number to at least five ad companies. Grindr, an iPhone app for meeting gay men, sent gender, location and phone ID to three ad companies.
  • iPhone maker Apple Inc. says it reviews each app before offering it to users. Both Apple and Google say they protect users by requiring apps to obtain permission before revealing certain kinds of information, such as location.
  • The Journal found that these rules can be skirted. One iPhone app, Pumpkin Maker (a pumpkin-carving game), transmits location to an ad network without asking permission. Apple declines to comment on whether the app violated its rules.
  • With few exceptions, app users can't "opt out" of phone tracking, as is possible, in limited form, on regular computers. On computers it is also possible to block or delete "cookies," which are tiny tracking files. These techniques generally don't work on cellphone apps.
  • makers of TextPlus 4, Pandora and Grindr say the data they pass on to outside firms isn't linked to an individual's name. Personal details such as age and gender are volunteered by users, they say. The maker of Pumpkin Maker says he didn't know Apple required apps to seek user approval before transmitting location. The maker of Paper Toss didn't respond to requests for comment.
  • Many apps don't offer even a basic form of consumer protection: written privacy policies. Forty-five of the 101 apps didn't provide privacy policies on their websites or inside the apps at the time of testing. Neither Apple nor Google requires app privacy policies.
  • the most widely shared detail was the unique ID number assigned to every phone.
  • On iPhones, this number is the "UDID," or Unique Device Identifier. Android IDs go by other names. These IDs are set by phone makers, carriers or makers of the operating system, and typically can't be blocked or deleted. "The great thing about mobile is you can't clear a UDID like you can a cookie," says Meghan O'Holleran of Traffic Marketplace, an Internet ad network that is expanding into mobile apps. "That's how we track everything."
  • O'Holleran says Traffic Marketplace, a unit of Epic Media Group, monitors smartphone users whenever it can. "We watch what apps you download, how frequently you use them, how much time you spend on them, how deep into the app you go," she says. She says the data is aggregated and not linked to an individual.
  • Apple and Google ad networks let advertisers target groups of users. Both companies say they don't track individuals based on the way they use apps.
  • Apple limits what can be installed on an iPhone by requiring iPhone apps to be offered exclusively through its App Store. Apple reviews those apps for function, offensiveness and other criteria.
  • Apple says iPhone apps "cannot transmit data about a user without obtaining the user's prior permission and providing the user with access to information about how and where the data will be used." Many apps tested by the Journal appeared to violate that rule, by sending a user's location to ad networks, without informing users. Apple declines to discuss how it interprets or enforces the policy.
  • Google doesn't review the apps, which can be downloaded from many vendors. Google says app makers "bear the responsibility for how they handle user information." Google requires Android apps to notify users, before they download the app, of the data sources the app intends to access. Possible sources include the phone's camera, memory, contact list, and more than 100 others. If users don't like what a particular app wants to access, they can choose not to install the app, Google says.
  • Neither Apple nor Google requires apps to ask permission to access some forms of the device ID, or to send it to outsiders. When smartphone users let an app see their location, apps generally don't disclose if they will pass the location to ad companies.
  • Lack of standard practices means different companies treat the same information differently. For example, Apple says that, internally, it treats the iPhone's UDID as "personally identifiable information." That's because, Apple says, it can be combined with other personal details about people—such as names or email addresses—that Apple has via the App Store or its iTunes music services. By contrast, Google and most app makers don't consider device IDs to be identifying information.
  • A growing industry is assembling this data into profiles of cellphone users. Mobclix, the ad exchange, matches more than 25 ad networks with some 15,000 apps seeking advertisers. The Palo Alto, Calif., company collects phone IDs, encodes them (to obscure the number), and assigns them to interest categories based on what apps people download and how much time they spend using an app, among other factors. By tracking a phone's location, Mobclix also makes a "best guess" of where a person lives, says Mr. Gurbuxani, the Mobclix executive. Mobclix then matches that location with spending and demographic data from Nielsen Co.
  • Mobclix can place a user in one of 150 "segments" it offers to advertisers, from "green enthusiasts" to "soccer moms." For example, "die hard gamers" are 15-to-25-year-old males with more than 20 apps on their phones who use an app for more than 20 minutes at a time. Mobclix says its system is powerful, but that its categories are broad enough to not identify individuals. "It's about how you track people better," Mr. Gurbuxani says.
  • four app makers posted privacy policies after being contacted by the Journal, including Rovio Mobile Ltd., the Finnish company behind the popular game Angry Birds (in which birds battle egg-snatching pigs). A spokesman says Rovio had been working on the policy, and the Journal inquiry made it a good time to unveil it.
  • Free and paid versions of Angry Birds were tested on an iPhone. The apps sent the phone's UDID and location to the Chillingo unit of Electronic Arts Inc., which markets the games. Chillingo says it doesn't use the information for advertising and doesn't share it with outsiders.
  • Some developers feel pressure to release more data about people. Max Binshtok, creator of the DailyHoroscope Android app, says ad-network executives encouraged him to transmit users' locations. Mr. Binshtok says he declined because of privacy concerns. But ads targeted by location bring in two to five times as much money as untargeted ads, Mr. Binshtok says. "We are losing a lot of revenue."
  • Apple targets ads to phone users based largely on what it knows about them through its App Store and iTunes music service. The targeting criteria can include the types of songs, videos and apps a person downloads, according to an Apple ad presentation reviewed by the Journal. The presentation named 103 targeting categories, including: karaoke, Christian/gospel music, anime, business news, health apps, games and horror movies. People familiar with iAd say Apple doesn't track what users do inside apps and offers advertisers broad categories of people, not specific individuals. Apple has signaled that it has ideas for targeting people more closely. In a patent application filed this past May, Apple outlined a system for placing and pricing ads based on a person's "web history or search history" and "the contents of a media library." For example, home-improvement advertisers might pay more to reach a person who downloaded do-it-yourself TV shows, the document says.
  • The patent application also lists another possible way to target people with ads: the contents of a friend's media library. How would Apple learn who a cellphone user's friends are, and what kinds of media they prefer? The patent says Apple could tap "known connections on one or more social-networking websites" or "publicly available information or private databases describing purchasing decisions, brand preferences," and other data. In September, Apple introduced a social-networking service within iTunes, called Ping, that lets users share music preferences with friends. Apple declined to comment.
Weiye Loh

Measuring Social Media: Who Has Access to the Firehose? - 0 views

  • The question that the audience member asked — and one that we tried to touch on a bit in the panel itself — was who has access to this raw data. Twitter doesn’t comment on who has full access to its firehose, but to Weil’s credit he was at least forthcoming with some of the names, including stalwarts like Microsoft, Google and Yahoo — plus a number of smaller companies.
  • In the case of Twitter, the company offers free access to its API for developers. The API can provide access and insight into information about tweets, replies and keyword searches, but as developers who work with Twitter — or any large scale social network — know, that data isn’t always 100% reliable. Unreliable data is a problem when talking about measurements and analytics, where the data is helping to influence decisions related to social media marketing strategies and allocations of resources.
  • One of the companies that has access to Twitter’s data firehose is Gnip. As we discussed in November, Twitter has entered into a partnership with Gnip that allows the social data provider to resell access to the Twitter firehose.This is great on one level, because it means that businesses and services can access the data. The problem, as noted by panelist Raj Kadam, the CEO of Viralheat, is that Gnip’s access can be prohibitively expensive.
  • ...3 more annotations...
  • The problems with reliable access to analytics and measurement information is by no means limited to Twitter. Facebook data is also tightly controlled. With Facebook, privacy controls built into the API are designed to prevent mass data scraping. This is absolutely the right decision. However, a reality of social media measurement is that Facebook Insights isn’t always reachable and the data collected from the tool is sometimes inaccurate.It’s no surprise there’s a disconnect between the data that marketers and community managers want and the data that can be reliably accessed. Twitter and Facebook were both designed as tools for consumers. It’s only been in the last two years that the platform ecosystem aimed at serving large brands and companies
  • The data that companies like Twitter, Facebook and Foursquare collect are some of their most valuable assets. It isn’t fair to expect a free ride or first-class access to the data by anyone who wants it.Having said that, more transparency about what data is available to services and brands is needed and necessary.We’re just scraping the service of what social media monitoring, measurement and management tools can do. To get to the next level, it’s important that we all question who has access to the firehose.
  • We Need More Transparency for How to Access and Connect with Data
1 - 20 of 124 Next › Last »
Showing 20 items per page