Skip to main content

Home/ Open Intelligence / Web 3X (Social + Mobile)/ Group items tagged law

Rss Feed Group items tagged

D'coda Dcoda

Obama Tries to Bypass Congress with Deadly Global Internet Treaty ACTA [28Jan12] - 0 views

  • Before the American people were protesting the Stop Online Piracy Act and the Protect Intellectual Property Act, the president managed to sign an international treaty which would permit foreign companies to demand that ISPs (Internet Service Providers) remove web content in the United States without any legal oversight. Entitled the Anti-Counterfeiting Trade Agreement (ACTA), the treaty was signed by Obama on October 1, 2011, but it is currently a subject of discussion because the White House is circulating a petition demanding that senators ratify the treaty.
  • the White House has done some maneuvering — characterizing the treaty as an "executive agreement" — thereby bypassing approval by members of Congress. Concerned by this action of the administration, Sen. Ron Wyden (D-Ore., above left) sent a letter to President Obama in which he declared: It may be possible for the U.S. to implement ACTA or any other trade agreement, once validly entered, without legislation if the agreement requires no change in U.S. law. But regardless of whether the agreement requires changes in U.S. law ... the executive branch lacks constitutional authority to enter a binding international agreement covering issues delegated by the Constitution to Congress' authority, absent congressional approval.
  • Similarly, TechDirt observes: ... [E]ven if Obama has declared ACTA an executive agreement (while those in Europe insist that it’s a binding treaty), there is a very real Constitutional question here: can it actually be an executive agreement? The law is clear that the only things that can be covered by executive agreements are things that involve items that are solely under the President’s mandate. That is, you can’t sign an executive agreement that impacts the things Congress has control over. But here’s the thing: intellectual property, in Article 1, Section 8 of the Constitution, is an issue given to Congress, not the President. Thus, there’s a pretty strong argument that the President legally cannot sign any intellectual property agreements as an executive agreement and, instead, must submit them to the Senate.
  • ...6 more annotations...
  • Twenty-two EU member states signed the treaty at a ceremony in Tokyo on January 26. Other nations interested in signing the agreement have until May 2013 to do so. According to Wikipedia, the Anti-Counterfeiting Trade Agreement “creates a governing body outside national institutions such as the World Trade Organization (WTO), the World Intellectual Property Organization (WIPO) or the United Nations.” The scope of the agreement includes counterfeit goods, generic medicines, and pirated copyright-protected works.
  • The provisions of ACTA grant copyright holders direct powers to demand that ISPs remove material from the Internet, without the requirement of a court order, and permit foreign influence over ISPs in the United States. Advocates of the treaty seek to give copyright holders the ability to demand that users who do violate intellectual property rights have their Internet connections terminated as a punishment. To enforce such a system would require the creation of an individual Internet ID.
  • The Electronic Frontier Foundation (EFF) reports: The same industry rightsholder groups that support the creation of ACTA have also called for mandatory network-level filtering by Internet Service Providers and for Internet Service Providers to terminate citizens’ Internet connection on repeat allegation of copyright infringement (the “Three Strikes”/Graduated Response) so there is reason to believe that ACTA will seek to increase intermediary liability and require these things of Internet Service Providers.
  • The EFF has been vehement in its opposition to ACTA, particularly regarding the secrecy surrounding the treaty negotiations. Likewise, Michael Geist, in writing for Copyright News, asserted that ACTA was “shrouded in secrecy.” He pointed out that ACTA negotiations did not include civil society groups or developing countries, noting also that “reports suggest that trade negotiators have been required to sign non-disclosure agreements for fear of word of the treaty’s provisions leaking to the public.” The European Commission denied this allegations in 2008, arguing, “It is only natural that intergovernmental negotiations dealing with issues that have an economic impact, do not take place in public and that negotiators are bound by a certain level of discretion.”
  • As noted on Wikipedia, opponents of ACTA also assert that it will impinge upon freedom of expression and communication privacy. A large number of the World Trade Organization’s 157 members have voiced concerns that the treaty would have a negative impact on trade. Others have pointed out that ACTA does not include provisions for legal safeguards protecting ISPs from liability for the actions of their subscribers. Without such provisions, ISPs will be forced to invade the privacy of their subscribers in order to protect themselves. Aaron Shaw, research fellow at the Berkman Center for Internet & Society at Harvard University, stressed that “ACTA would create unduly harsh legal standards that do not reflect contemporary principles of democratic government, free market exchange, or civil liberties.”
  • The technology news and information website ArsTechnica.com argues that ACTA encourages ISPs to collect and provide information about suspects by providing for those ISPs “safe harbor from certain legal threats.” In protest against the treaty, the hacktivist group Anonymous hacked into the Federal Trade Commission’s cybersecurity advice website on January 24, replacing the homepage with the Anonymous logo, a rap song, and a message threatening more attacks if anti-piracy legislation in Congress were to pass. According to The Next Web: The message left temporarily on OnGuardOnline referred to the Stop Online Piracy Act, The Protect Intellectual Property Act and the Anti-Counterfeiting Trade Agreement. If they pass, the message said, "we will wage a relentless war against the corporate Internet, destroying dozens upon dozens of government and company websites."
Marc-Alexandre Gagnon

More retailers turning paper checks into e-transfers - MarketWatch - 0 views

  • SAN FRANCISCO (CBS.MW) -- When an unidentified $30 debit showed up on her bank statement as an electronic funds transfer, Cheryl Hicks was mystified.
  • Each month, three electronic transfers go through her account -- and this wasn't one she recognized. "It just said ACH debit and the amount," said Hicks, a 33-year-old communications manager who lives near Everett, Washington.
  • Hicks soon discovered her phone company transformed the paper check she sent for payment into an e-transfer, and her bank failed to list either the check number or the recipient on her statement.
  • ...11 more annotations...
  • Hicks' inability to readily identify the EFT debit illustrates a mounting bookkeeping problem some checking customers are encountering as banks and retailers seek to minimize the handling of paper checks to cut costs and boost profit.
  • "While the EFTs are helpful to everybody and clearly more efficient, I'm not sure the banking system has adequate safeguards," said Kent Phelps, a vice president of software engineering for WitsEnd Software, which develops programs enabling check scanning.
  • Customers lack the ability to set parameters on the practice, he said. "I ought to be able to tell the bank 'I'm going to authorize EFT, but I want to be called if its over $5,000 or will empty the bank account."
  • A fast-growing number of U.S. retailers are scanning images of checks into banks' computer systems and destroying the originals. An estimated 461 million check payments have been converted into e-payments since January 2002, according to NACHA, the Electronic Payments Association.
  • Meanwhile, a law called Check 21 will go into effect next October allowing banks to send checks to each other electronically, eliminating the need to transport them manually from bank to bank, and authorizing check "substitutes" to be used in a court of law.
  • Banks and merchants say electronic check scanning helps detect fraud more quickly, while also saving 5 to 25 cents a transaction, according to NACHA.
  • Some problems arise In bank-to-bank electronic transactions, the check payment moves faster through the system -- meaning consumers should no longer count on a three- to five-day lag time. Otherwise, check-writers are unlikely to notice a change, aside from receiving copies of their returned checks in lieu of the originals.
  • Some consumer advocates warn that many merchants aren't fully educated in the legal ins-and-outs of check scanning. Gail Hillebrand, senior attorney with Consumers Union, nonprofit publisher of Consumer Reports, said she's received complaints that companies have run checks through twice, once as an electronic transfer and again as a regular check.
  • "There are a lot of merchants who don't really know what the rules are," Hillebrand said. "The merchant thinks 'you owe me money, I have this check here because I didn't send it in last month, I'll send it through now.'
  • "The fact that that is inconsistent with NACHA rules and probably illegal, the merchant doesn't know and hasn't been educated."
  • Hicks couldn't find any notice on phone bills that her checks would be converted to electronic transfers, though the NACHA rules governing the process require companies to notify consumers every time they plan to convert a check into an electronic payment.
D'coda Dcoda

Bill Would Require Warrants For Govt to Access Your Email, Cloud Services [18May11] - 0 views

  • Sen. Patrick Leahy on Tuesday unveiled an overhaul to a 25-year-old digital privacy law that would require the government to obtain warrants before accesssing email and other cloud-based data. The update to the Electronic Communications Privacy Act (ECPA), would also extend to location-based data, and allow private companies to collaborate with the government in the event of a cyber attack. The ECPA was first enacted in 1986, well before the Internet, email, or smartphones. As a result, it is "significantly outdated and out-paced by rapid changes in technology and the changing mission of our law enforcement agencies after September 11," said Leahy, a Vermont Democrat. As a result, Leahy's updated 2011 version of the ECPA would apply to technologies like email, cloud services, and location data on smartphones. If the government wanted an ISP to hand over emails on a particular customer, for example, they would need to first obtain a warrant. At this point, the government abides by a rule that provides access to email after 180 days, depending on the circumstance.
D'coda Dcoda

Senator Has 'Serious Doubts' About Privacy of Google, Apple Location Apps [10May11] - 0 views

  • At the close of an almost three-hour hearing on cell-phone tracking, Sen. Al Franken said Tuesday that he still has "serious doubts" that consumers' privacy rights are being respected when it comes to location-based services via iOS and Android. "I think that people have a right to know who is getting their information, and a right to decide how that information is shared and used," said Franken. "After having heard today's testimony, I have serious doubts that those rights are being respected in law or in practice."
  • "We need to think seriously about how to address this problem, [especially since] mobile devices are only going to become more and more popular," he continued. "This is an urgent issue we'll be dealing with." Franken, a Minnesota Democrat who chairs the new Senate Judiciary Subcommittee on Privacy, Technology and the Law, heard testimony from Apple and Google executives today about how their mobile platforms collect and use location-based data, and what type of control users have over that information. Google said that any location-based data it collects via its Android mobile operating system is anonymous in nature and the majority of that information is deleted after one week. "The location information sent to Google servers when users opt in to location services on Android is anonymized and stored in the aggregate and is not tied or traceable to a specific user," said Alan Davidson, director of public policy at Google. "The collected information is stored with a hashed version of an anonymous token, which is deleted after approximately one week."
  •  
    Combine this with the TED talk on selective searches and it looks like a cross between 1984 and The Matrix is brewing up.
Dan R.D.

Internet of Things - How it will change the world [25May11] - 0 views

  •  
    According to a recent report by Amdocs, experts are predicting that there wil be seven trillion networked devices by 2017, delivering a connected life that has immediate access to data, media, communities and communications across a broad range of devices We have been promised this interconnected world since the 1980s, bu imitations such as costs and the size and capabilities of chips and infrastructure, have kept many innovations on hold However, 4G and IPv6 now offer vast superhighways of space and speed delivering what's needed for machine to machine (M2M) communication to take place on a grand scale. Add to this the fact that Moore's Law remains a constant, chips have become both smaller and more affordab
D'coda Dcoda

DOJ Wants Wireless Carriers To Collect Location Data [11May11] - 0 views

  • The Department of Justice (DOJ) is calling for laws requiring wireless carriers to store user location data that could be helpful to criminal investigations in which a person's location is critical to solving the crime. The request came, ironically enough, in the middle of a Senate hearing at which lawmakers grilled Apple and Google executives over their collection and use of location-based data from iPad, iPhone, and Android devices
  • Jason Weinstein, deputy assistant attorney general for the Criminal Division of the DOJ, Tuesday testified before the Senate Judiciary Committee's Subcommittee on Privacy, Technology and the Law that it would be useful if companies that have access to smartphone location data could provide that information lawfully to criminal investigators. The DOJ is particularly interested in the data as it pertains to investigations about cyber crimes that target mobile devices, child abductions, and others in which a mobile phone user's location is crucial, he said.
D'coda Dcoda

Kaspersky Calls For 'Internet Interpol' [18May11] - 0 views

  • "With cybercrime now the second largest criminal activity in the world, measures such as the creation of an 'Internet Interpol' and better cooperation between international law enforcement agencies are needed if criminals are to be curtailed in the future, Kaspersky Labs founder and security expert Eugene Kaspersky has argued. He said, 'We were talking about that 10 years ago and almost nothing has happened. Sooner or later we will have one. I am also talking about Internet passports and having an online ID. Some countries are introducing this idea, so maybe in 15 years we will all have it.'"
Marc-Alexandre Gagnon

The Paypers. Insights in payments. [02Dec11] - 0 views

  • The Dutch consortium of major banks and MNOs which in 2010 signed a letter of intent to jointly introduce mobile payments at the checkout in the Netherlands have taken their initiative one step further.
  • The partnership, which includes financial services providers ABN AMRO, Rabobank and ING as well as KPN and Vodafone, will notify the initiative for approval to the European Commission in Brussels.
  • It is expected that the EC will communicate its vision in the first quarter of 2012. After that, the consortium can start the actual execution of the plans. It is expected that Dutch consumers can experience payments with their mobile early 2013.
  • ...3 more annotations...
  • The consortium was established to develop a user-friendly and secure mobile payment service in the Netherlands. For technical support a central services organization (Trusted Services Manager/TSM) is set to be established by the partners. The creation of a legal entity which will host this TSM is currently in preparation.
  • In 2010 the six original consortium partners signed a letter of intent, followed in mid-2011 by a cooperation agreement. T-Mobile, which was part of the initial group of six, has recently decided not to become a shareholder in the legal entity to be established and therefore not to continue the cooperation. T-Mobile and its parent company Deutsche Telekom strongly believe in the potential of mobile payments, but will decide in a later stage how to bring this service to the market.
  • The other five partners however have fully reconfirmed their commitment to the Sixpack initiative. In view of the competitive aspects of collaboration between the biggest banks and mobile operators, the consortium informed the Dutch Competition Authority (NMa) of the initiative in an early stage. In the coming weeks the Sixpack initiative will be notified to the European Commission (EC) in view of the requirement to test the founding of the TSM for competition law aspects.
D'coda Dcoda

Microphone Turns Any Surface into Touch Interface - Technology Review - 0 views

  • Through gesture recognition techniques we detect different kind of fingers-touch and associate them with different sounds. In the video we used two different audio synthesis techniques: - physic modelling, which consists in generating the sound by simulating physical laws; - concatenative synthesis (audio mosaicing), in which the sound of the contact microphone is associated with its closest frame present in a sound database. To put it another way, the system is transforming the vibrations transmitted from touch through a rigid body into waveforms that a computer can, in real time, recognize and either transmute into audible sound or use as a triggering mechanism for other sounds. It's an ingenious approach, especially because Zamborlin has made the system clever enough to recognize the sound of particular gestures, so that the interface can accomplish more than just triggering actions when it "hears" a tap.
  • will touch interfaces of the future rely on sounds as well as capacitance? Perhaps sound would be a cheaper, more-durable option for certain kinds of interfaces, making touch interactions all the more ubiquitous.
D'coda Dcoda

This Is Generation Flux: Meet The Pioneers Of The New (And Chaotic) Frontier Of Busines... - 0 views

  • The business climate, it turns out, is a lot like the weather. And we've entered a next-two-hours era. The pace of change in our economy and our culture is accelerating--fueled by global adoption of social, mobile, and other new technologies--and our visibility about the future is declining.
  • Uncertainty has taken hold in boardrooms and cubicles, as executives and workers (employed and unemployed) struggle with core questions: Which competitive advantages have staying power? What skills matter most? How can you weigh risk and opportunity when the fundamentals of your business may change overnight?
  • Look at the global cell-phone business. Just five years ago, three companies controlled 64% of the smartphone market: Nokia, Research in Motion, and Motorola. Today, two different companies are at the top of the industry: Samsung and Apple. This sudden complete swap in the pecking order of a global multibillion-dollar industry is unprecedented. Consider the meteoric rise of Groupon and Zynga, the disruption in advertising and publishing, the advent of mobile ultrasound and other "mHealth" breakthroughs (see "Open Your Mouth And Say 'Aah!'). Online-education efforts are eroding our assumptions about what schooling looks like. Cars are becoming rolling, talking, cloud-connected media hubs. In an age where Twitter and other social-media tools play key roles in recasting the political map in the Mideast; where impoverished residents of refugee camps would rather go without food than without their cell phones; where all types of media, from music to TV to movies, are being remade, redefined, defended, and attacked every day in novel ways--there is no question that we are in a new world.
  • ...14 more annotations...
  • Any business that ignores these transformations does so at its own peril. Despite recession, currency crises, and tremors of financial instability, the pace of disruption is roaring ahead. The frictionless spread of information and the expansion of personal, corporate, and global networks have plenty of room to run. And here's the conundrum: When businesspeople search for the right forecast--the road map and model that will define the next era--no credible long-term picture emerges. There is one certainty, however. The next decade or two will be defined more by fluidity than by any new, settled paradigm; if there is a pattern to all this, it is that there is no pattern. The most valuable insight is that we are, in a critical sense, in a time of chaos.
  • To thrive in this climate requires a whole new approach, which we'll outline in the pages that follow. Because some people will thrive. They are the members of Generation Flux. This is less a demographic designation than a psychographic one: What defines GenFlux is a mind-set that embraces instability, that tolerates--and even enjoys--recalibrating careers, business models, and assumptions. Not everyone will join Generation Flux, but to be successful, businesses and individuals will have to work at it.
  • Digital competition destroyed bookseller Borders, and yet the big, stodgy music labels--seemingly the ground zero for digital disruption--defy predictions of their demise. Walmart has given up trying to turn itself into a bank, but before retail bankers breathe a sigh of relief, they ought to look over their shoulders at Square and other mobile-wallet initiatives. Amid a reeling real-estate market, new players like Trulia and Zillow are gobbling up customers. Even the law business is under siege from companies like LegalZoom, an online DIY document service. "All these industries are being revolutionized," observes Pete Cashmore, the 26-year-old founder of social-news site Mashable, which has exploded overnight to reach more than 20 million users a month. "It's come to technology first, but it will reach every industry. You're going to have businesses rise and fall faster than ever."
  • You Don't Know What You Don't Know "In a big company, you never feel you're fast enough." Beth Comstock, the chief marketing officer of GE
  • Within GE, she says, "our traditional teams are too slow. We're not innovating fast enough. We need to systematize change." Comstock connected me with Susan Peters, who oversees GE's executive-development effort. "The pace of change is pretty amazing," Peters says. "There's a need to be less hierarchical and to rely more on teams. This has all increased dramatically in the last couple of years."
  • Executives at GE are bracing for a new future. The challenge they face is the same one staring down wide swaths of corporate America, not to mention government, schools, and other institutions that have defined how we've lived: These organizations have structures and processes built for an industrial age, where efficiency is paramount but adaptability is terribly difficult. We are finely tuned at taking a successful idea or product and replicating it on a large scale. But inside these legacy institutions, changing direction is rough.
  • " The true challenge lies elsewhere, he explains: "In an increasingly turbulent and interconnected world, ambiguity is rising to unprecedented levels. That's something our current systems can't handle.
  • "There's a difference between the kind of problems that companies, institutions, and governments are able to solve and the ones that they need to solve," Patnaik continues. "Most big organizations are good at solving clear but complicated problems. They're absolutely horrible at solving ambiguous problems--when you don't know what you don't know. Faced with ambiguity, their gears grind to a halt.
  • The security of the 40-year career of the man in the gray-flannel suit may have been overstated, but at least he had a path, a ladder. The new reality is multiple gigs, some of them supershort (see "The Four-Year Career"), with constant pressure to learn new things and adapt to new work situations, and no guarantee that you'll stay in a single industry.
  • "So many people tell me, 'I don't know what you do,'" Kumra says. It's an admission echoed by many in Generation Flux, but it doesn't bother her at all. "I'm a collection of many things. I'm not one thing."
  • The point here is not that Kumra's tool kit of skills allows her to cut through the ambiguity of this era. Rather, it is that the variety of her experiences--and her passion for new ones--leaves her well prepared for whatever the future brings. "I had to try something entrepreneurial. I had to try social enterprise. I needed to understand government," she says of her various career moves. "I just needed to know all this."
  • You do not have to be a jack-of-all-trades to flourish in the age of flux, but you do need to be open-minded.
  • Nuke Nostalgia If ambiguity is high and adaptability is required, then you simply can't afford to be sentimental about the past. Future-focus is a signature trait of Generation Flux. It is also an imperative for businesses: Trying to replicate what worked yesterday only leaves you vulnerable.
  • "We now recognize that external focus is more multifaceted than simply serving 'the customer,'" says Peters, "that other stakeholders have to be considered. We talk about how to get and apply external knowledge, how to lead in ambiguous situations, how to listen actively, and the whole idea of collaboration."
Marc-Alexandre Gagnon

Visual Information Retrieval: the Next challenge in Information Management - ERM Expert... - 0 views

  • In the past 20 years, a lot of research has been done towards visual information retrieval on pictures and video files. Not all of it has been successful. But on the last years, the quality of these visual search engines has reached levels that are beginning to be acceptable for eDiscovery, compliance, law enforcement and intelligence applications.
  • More and more electronically stored information (ESI) is non-text based or does not contain any searchable text components: sound recordings, video and pictures are growing exponentially in size and more and more collaborative and social network applications support (only) these information formats.
  • In addition, a whole generation is growing up that no longer uses written communication forms such as letters or emails: they only use social networks and other new media forms for communication and collaboration.
  • ...10 more annotations...
  • Electronic files containing one of more text components or embedded objects with text components can be searched by using text-based queries.
  • Document scans (images) and even pictures can be enriched with the text of the original document or even with recognizable logo’s in the pictures. The same technology can also be applied to video shots.
  • Audio and the audio component of a video file can be processed by a phonetic search engine and users can search the content by looking for specific words or phoneme sequences.
  • In addition, audio-, pictures- and video files can be searched on contextual information such as the file name, added meta-information or text that surrounds the picture or the video on a web page.
  • Web search engines such as Google, Bing and Yahoo use primarily contextual text information from pictures and video’s to search on these object. This text can be tagged by users or can be found in the file name, file location, surrounding text on the webpage, etc. In some cases, words that are recognized in the images and videos with Optical Character Recognition (OCR) technology is used, or nudity is recognized and filtered, but that is about it. There is not or limited influence from pure visual information retrieval technology such as: give me all outdoor pictures or all images with a helicopter in it.
  • State-of-the-art visual search technology should address all of these aspects and support both text-based as image or video example based querying, result navigation and viewing.
  • Ranking images is based on complex statistics and other mathematical properties that are not always intuitive to humans.  Users need a much more exploratory and visual result list that uses all available dimensions when searching images and videos.
  • There are many use cases in the field of visual information retrieval varying from searching pictures on the internet to recognizing faces of hooligans at the entrance of a high risk football match, monitoring airports with surveillance cameras and investigating child abuse.
  • Many of these applications are highly specialized applications requiring a lot of specialized knowledge and experience to work effectively.
  • However, I expect that in the next year or five, real visual information retrieval will become a core component of in-house Enterprise Information Management systems as more and more information consists of pictures and videos that are not annotated and therefore hard to find.
Dan R.D.

Copyright and Twitter - the Story of @jp917 's MP3 Leaks [26Apr10] - 0 views

  • The story involves a music blogger named JP, who runs the appropriately named JP’s blog. JP also has a Twitter account, where he mostly seems to post links to his blog One such post was about the leak of the new album by The National. That post includes a link to Amazon where people can purchase the new album… and also a link to a download of one song (in MP3 format) from the album. Someone — and it’s not at all clear who — apparently filed a DMCA claim over the Twitter message about the leak, and Twitter responded by taking down the tweet and sending JP a note: jp917, Apr 22 03:10 pm (PDT): Hello, The following material has been removed from your account in response to a DMCA take-down notice: Tweet: http://twitter.com/jp917/statuses/12499491144 — New Post: Leaked: The National — High Violet http://jpsblog.net/2010/04/20/leaked-the-national-high-violet/ Twitter is receiving a takedown notice (in theory) from the copyright holder, and Twitter is merely responding to that takedown and notifying the user. Second, JP claims that he only linked to Amazon and not to a download, but looking at his blog post, there are two clear links to a single song from the album — one at Mediafire and the other via Box.net. He makes no claim that these are authorized, so perhaps they are potentially infringing, which makes things a bit messier. It is true that his main link is to Amazon, encouraging people to purchase, but there are those MP3 links as well (though, again, only to a single song, not the whole album).Read more at techdirt.com
  •  
    The end to the story involving the copyrightability of Twitter will have to read from the source. All I can tell you is, "marvelous --just, marvelous."
D'coda Dcoda

Future of Web - Lee Rainier predicts [28Apr10] - 0 views

  • Rainier , director of the Pew Internet & American Life Project, looks ahead and makes a lengthy prediction of where we’re headed via the internet. As tempting as it was to clip the whole thing, I’ve resisted which means you will want to follow the link to read the article.
  • Themes:Cognitive capacities will shift (memorization)New literacies will be required. Fourth “R” is retrieval… “extreme Googlers”Tech isn’t the problem; people’s inherent character traits is the issuePerformance of information markets is a big unknown especially in the age of social media and junk information … Google will improve.Innovation ecosystem will change so radically (bandwidth/processing) that it’s hard to forecastBasic trends are evident — “the internet of things” and “sensors” and “mobile” and “location-based services” and “3D” and “speech recognition” and “translation systems”Law/regulations to protect privacy even though more disclosure required“Workarounds” to provide a measure of anonymityConfidentiality and autonomy will replace yearning for anonymityRise of social media is as much a challenge to anonymity as authentication requirements. Reputation management and information responsibility will emerge. Significantly more responsive govt, biz, NFP (71%/72%) v (26/26) [responses - anonymous, not-anonymous] Tide too strong to resist – pressure for transparency is powerfulData wil be the platform for changeEfficiency and responsiveness aren’t the same thingWe’re reading and writing more than our parents – participation breeds engagementNature of writing has changed (public). Quality will get better due to feedback and flamersReading and writing will be different in 10 years; screen literacy will become importantRead more at wiredpen.com
  •  
    long list of Pew research predictions for internet
D'coda Dcoda

Apple Has Removed 'Zero' Apps for Location-Related Violations [10May11] - 0 views

  • Apple has not removed any apps from its App Store for violations related to location-based services, Apple executive Guy Tribble told a Senate subcommittee Tuesday. In most cases, Apple tries to identify potentially troublesome apps before they are admitted into the App Store or work with the developer to resolve any issues that arise, Tribble told the Senate Judiciary Subcommittee on Privacy, Technology and the Law during a hearing on cell phone location services.
D'coda Dcoda

Exploitation and Amazon's Mechanical Turk [26May11] - 0 views

  • Since 2007, the US federal minimum wage has been set at $7.15 an hour, yet workers on Amazon’s Mechanical Turk—many of whom live in the US—make an average of $2 (according to the estimates of Mechanical Turk researcher Alex Quinn).  As illustrated in the above image, Amazon, itself, encourages businesses (at least implicitly) to pay workers (or “turkers” as they are called) less-than-minimum wages.  Moreover, to even qualify for these low-paying tasks called HITs (Human Intelligence Tasks), turkers are often expected to complete unpaid training sessions that can last for up to an hour.  Also, because turkers receive micro-payments for each task and because the time to completion for each task is rationalized to the second, turkers receive no pay during normal periods of rest during the workday.
  • Mechanical Turk is a crowdsourcing platform that allow anyone to recruit laborers for short online tasks, which cannot be effectively completed by computers.  For examples, turkers might compile contact information for various businesses, sort through images and tag offensive ones, or participate in university research experiments.  Because of the piecemeal and spatially-disembedded nature of the work, it is virtually unregulated. Can we simply dismiss this subversion of labor laws—as some commentators have—on the grounds that “$2 an hour is a decent wage in India?”  Even if we are angered by this exploitation of turkers, is it even possible to regulate an international platform of this sort?
  •  
    Crowdsourcing problem
D'coda Dcoda

Internet security: cookie monster unleashed following EU ruling [28May11] - 0 views

  • Warning notices at the top of websites, annoying pop-up windows, forms asking for your consent ... fears have been voiced that browsing the web could become more complicated and time-consuming as a result of "challenging" new EU rules on internet cookies.They are small text files put on to our computers by websites so they can remember things about us, and almost every site uses them.But at one minute past midnight on Thursday 26 May, the law surrounding the way they are used changed.
  • From that date, all UK businesses and organisations running websites in this country were required to obtain people's consent before they install cookies on their machines.Some experts have said that where the new rules could have a big impact is if people are looking at lots of different sites they have no relationship with. For example, you might be browsing a dozen online retailers looking for the best price on an item. The worst-case scenario is that every time you visit a new site, you face a pop-up window, a "splash page" (which comes up before the home page) or a bar at the top, informing you about how cookies are used on the site, and asking for your consent.
D'coda Dcoda

New app another tool for workers in wage disputes [21May11] - 0 views

  • Workers who don't trust the boss to keep track of their wages can now do it themselves with a new smart phone application from the Department of Labor. But employers worry that the time sheet app, along with other new initiatives, could encourage even more wage and hour lawsuits. The app lets workers calculate regular work hours, break time and overtime pay to create their own wage records. Department officials say the information could prove valuable in a dispute over pay or during a government investigation when an employer has failed to keep accurate records. "This app will help empower workers to understand and stand up for their rights when employers have denied their hard-earned pay," Labor Secretary Hilda Solis said. The app is the latest example of the Obama administration's push for more aggressive enforcement of wage and hour laws. The agency has hired about 300 more investigators to probe complaints of unpaid work time, lack of overtime pay and minimum wage violations.
D'coda Dcoda

Righthaven Hit With Class Action Counterclaim [17May11] - 0 views

  • "Steve Green reports that one of the website operators accused of copyright infringement by Righthaven has retaliated, hitting the Las Vegas company with a class-action counterclaim, charging that defendants in all 57 Righthaven cases in Colorado 'are victims of extortion litigation by Righthaven, which has made such extortion litigation a part of its, if not its entire, business model.' The counterclaim says Righthaven has victimized defendants by failing to send takedown notices prior to suing, by threatening to take their website domain names when that's not provided for under the federal Copyright Act, by falsely claiming it owns the copyrights at issue and by failing to investigate jurisdictional and fair use issues before suing, among other things. The claim seeks an adjudication that Righthaven's copyright infringement lawsuits amount to unfair and deceptive trade practices under Colorado law, an injunction permanently enjoining Righthaven from continuing the alleged unfair and deceptive trade practices, an unspecified financial award to the class-action plaintiffs for damages as well as their costs and attorney's fees."
  •  
    Concerns "extortion litigation" by Righthaven over copyright issues.
D'coda Dcoda

Should internet users ever be cut off? [18Jun11] - 0 views

  • The internet is a tool which contributes to the "progress of humankind as a whole" and should be available to all.That is the view of Frank La Rue, the UN's Special Rapporteur on the promotion and protection of the right to freedom of opinion and expression.
  • Mr La Rue was tasked with writing a report looking into global access to the internet as a medium for freedom of opinion and expression.
  • In the final document [PDF] presented to the Human Rights Council this week, he concluded that the removal of an individual's internet access should only take place in "few, exceptional and limited circumstances prescribed by human rights law".
  • ...1 more annotation...
  • He went as far as to say that removing somebody's internet access is to deprive them of a key component for the basic human right of freedom of expression.
1 - 20 of 25 Next ›
Showing 20 items per page