Skip to main content

Home/ Open Intelligence / Web 3X (Social + Mobile)/ Group items tagged property

Rss Feed Group items tagged

D'coda Dcoda

Obama Tries to Bypass Congress with Deadly Global Internet Treaty ACTA [28Jan12] - 0 views

  • Before the American people were protesting the Stop Online Piracy Act and the Protect Intellectual Property Act, the president managed to sign an international treaty which would permit foreign companies to demand that ISPs (Internet Service Providers) remove web content in the United States without any legal oversight. Entitled the Anti-Counterfeiting Trade Agreement (ACTA), the treaty was signed by Obama on October 1, 2011, but it is currently a subject of discussion because the White House is circulating a petition demanding that senators ratify the treaty.
  • the White House has done some maneuvering — characterizing the treaty as an "executive agreement" — thereby bypassing approval by members of Congress. Concerned by this action of the administration, Sen. Ron Wyden (D-Ore., above left) sent a letter to President Obama in which he declared: It may be possible for the U.S. to implement ACTA or any other trade agreement, once validly entered, without legislation if the agreement requires no change in U.S. law. But regardless of whether the agreement requires changes in U.S. law ... the executive branch lacks constitutional authority to enter a binding international agreement covering issues delegated by the Constitution to Congress' authority, absent congressional approval.
  • Similarly, TechDirt observes: ... [E]ven if Obama has declared ACTA an executive agreement (while those in Europe insist that it’s a binding treaty), there is a very real Constitutional question here: can it actually be an executive agreement? The law is clear that the only things that can be covered by executive agreements are things that involve items that are solely under the President’s mandate. That is, you can’t sign an executive agreement that impacts the things Congress has control over. But here’s the thing: intellectual property, in Article 1, Section 8 of the Constitution, is an issue given to Congress, not the President. Thus, there’s a pretty strong argument that the President legally cannot sign any intellectual property agreements as an executive agreement and, instead, must submit them to the Senate.
  • ...6 more annotations...
  • Twenty-two EU member states signed the treaty at a ceremony in Tokyo on January 26. Other nations interested in signing the agreement have until May 2013 to do so. According to Wikipedia, the Anti-Counterfeiting Trade Agreement “creates a governing body outside national institutions such as the World Trade Organization (WTO), the World Intellectual Property Organization (WIPO) or the United Nations.” The scope of the agreement includes counterfeit goods, generic medicines, and pirated copyright-protected works.
  • The provisions of ACTA grant copyright holders direct powers to demand that ISPs remove material from the Internet, without the requirement of a court order, and permit foreign influence over ISPs in the United States. Advocates of the treaty seek to give copyright holders the ability to demand that users who do violate intellectual property rights have their Internet connections terminated as a punishment. To enforce such a system would require the creation of an individual Internet ID.
  • The Electronic Frontier Foundation (EFF) reports: The same industry rightsholder groups that support the creation of ACTA have also called for mandatory network-level filtering by Internet Service Providers and for Internet Service Providers to terminate citizens’ Internet connection on repeat allegation of copyright infringement (the “Three Strikes”/Graduated Response) so there is reason to believe that ACTA will seek to increase intermediary liability and require these things of Internet Service Providers.
  • The EFF has been vehement in its opposition to ACTA, particularly regarding the secrecy surrounding the treaty negotiations. Likewise, Michael Geist, in writing for Copyright News, asserted that ACTA was “shrouded in secrecy.” He pointed out that ACTA negotiations did not include civil society groups or developing countries, noting also that “reports suggest that trade negotiators have been required to sign non-disclosure agreements for fear of word of the treaty’s provisions leaking to the public.” The European Commission denied this allegations in 2008, arguing, “It is only natural that intergovernmental negotiations dealing with issues that have an economic impact, do not take place in public and that negotiators are bound by a certain level of discretion.”
  • As noted on Wikipedia, opponents of ACTA also assert that it will impinge upon freedom of expression and communication privacy. A large number of the World Trade Organization’s 157 members have voiced concerns that the treaty would have a negative impact on trade. Others have pointed out that ACTA does not include provisions for legal safeguards protecting ISPs from liability for the actions of their subscribers. Without such provisions, ISPs will be forced to invade the privacy of their subscribers in order to protect themselves. Aaron Shaw, research fellow at the Berkman Center for Internet & Society at Harvard University, stressed that “ACTA would create unduly harsh legal standards that do not reflect contemporary principles of democratic government, free market exchange, or civil liberties.”
  • The technology news and information website ArsTechnica.com argues that ACTA encourages ISPs to collect and provide information about suspects by providing for those ISPs “safe harbor from certain legal threats.” In protest against the treaty, the hacktivist group Anonymous hacked into the Federal Trade Commission’s cybersecurity advice website on January 24, replacing the homepage with the Anonymous logo, a rap song, and a message threatening more attacks if anti-piracy legislation in Congress were to pass. According to The Next Web: The message left temporarily on OnGuardOnline referred to the Stop Online Piracy Act, The Protect Intellectual Property Act and the Anti-Counterfeiting Trade Agreement. If they pass, the message said, "we will wage a relentless war against the corporate Internet, destroying dozens upon dozens of government and company websites."
D'coda Dcoda

Building Mobile Web Apps the Right Way: Tips and Techniques [09May11] - 0 views

  • Here’s a quick breakdown of the big differences between desktop and mobile platforms: Mobile device hardware is smaller and generally tends to have lower hardware resources than desktops/laptops. Smaller screens bring about different design considerations and challenges. Touchscreen technology introduces new interaction concepts that differ from traditional input devices (keyboard and mouse). With a mobile device, internet connectivity is not always as reliable as a hard-wired broadband connection, which means internet connectivity is a concern and data transfer could be significantly slower. Although these sound as if they are hurdles to get over, with careful thought and consideration, there’s no reason why they should be. Touchscreen technology is exciting. The smaller screen design will really make you think about how to get the user to interact with your mobile web app in the most satisfying way possible. What we should really be doing is looking at the list of differences above and seeing opportunities to deliver our content in a different way. Building mobile web apps will be a paradigm shift from traditional web development and web design.
  • In the next sections, we will discuss development/design considerations, as well as concepts and techniques for building mobile web apps.
  • Keep File Sizes Small
  • ...11 more annotations...
  • Dealing with Image Performance We want to try to get rid of as many images as we can. For the images we keep, we want them to be as lightweight as possible. If images are a necessity for particular parts of your mobile web app design, then there are a couple of extra steps we can use to trim off any excess fat from your files.
  • Use Adobe Fireworks for Transparent PNGs
  • Using ImageAlpha If Fireworks sounds like too much of a bother, check out ImageAlpha. Once installed, all you need to do is drag your images into its main window and then tweak the export settings to remove excess data from the images.
  • To learn more about using PNGs in web designs, see the Web Designer’s Guide to PNG Image Format.
  • Leveraging CSS3 Mobile web browsers these days are pretty advanced. Android devices use a mobile version of Google Chrome, whilst the iPhone does the same with Apple’s Safari. Some mobile devices come with mobile Opera and others allow you to install a browser of your choice such as mobile Firefox. So we’re talking about some pretty good browsers in terms of CSS3 and HTML5 feature support. CSS3 allows us to render things through code that would previously have required an image. We can use color gradients, draw rounded corners, create drop shadows, apply multiple backgrounds to HTML elements, and more — all of which can help improve performance and decrease development times.
  • If you look at a typical application interface via your smartphone, it’s almost guaranteed that you’ll find CSS3 being used.
  • By using CSS3, we can reduce data transfer — particularly images and possibly excess HTML markup. We let the browser and the device do the work to render the interface more quickly.
  • HTML Canvas If you fancy a little more work, then you can improve speed even further using the canvas element. Although using CSS gradients eradicates the loading of a physical image, that method still causes the device’s rendering engine to construct an image in the browser, which can result in a performance reduction depending on the device and browser.
  • Hardware Acceleration When it comes to mobile web apps, Apple’s mobile devices are a major consideration that we need to be aware of because of the current popularity of the iPhone and iPad. Safari 5 (on all platforms) brings hardware acceleration into the mix. If you’re not familiar with the feature, Apple describes it as follows: "Safari supports hardware acceleration on Mac and PC. With hardware acceleration, Safari can tap into graphics processing units to display computing-intensive graphics and animations, so standards like HTML5 and CSS3 can deliver rich, interactive media smoothly in the browser."
  • Be Cautious of CSS3 Rendering Performance As brilliant as CSS3 is, certain properties can slow down a web page. WebKit-based browsers, for instance, really seem to struggle with shadows in particular, so just be careful that you don’t apply too many of these to elements of your interface until the issue has been resolved.
  • Consider the Offline User Experience Finally, let’s briefly discuss HTML5 offline data storage.
  •  
    Very useful, but visit site for complete "how-to"
Dan R.D.

Game Set Match: Social Gaming Embraces Open Innovation [09Jul11] - 0 views

  • Alcatel-Lucent Geo-Location Mobile Game "Acquisition" On top of our platform and supported by our community members, Alcatel-Lucent ran an innovation & development challenge to bring new mobile applications and games to life. A TopCoder member came up with the idea for Acquisition, which leverages network-based API's for automated geo-checkin, SMS, subscriber identity, call control and player presence. It pairs it with game mechanics similar to a traditional game of Monopoly. In a game of Acquisition you are competing against a set of friends to amass the most wealth and you do so by physically checking into a variety of localities, trading properties, developing on top of owned properties, earning dividends and expanding your empire.
D'coda Dcoda

Google doubles Plus membership with brute-force signup process - 0 views

  • Google CEO Larry Page trotted out an impressive statistic during last week's quarterly earnings call: Google+ now has 90 million users, double what it had three months ago. Even better, 60 percent of those users are engaged daily, and 80 percent weekly.
  • But those users aren't necessarily engaging with Google+. Any action taken during a logged-in Google session—whether it be searching the Internet, checking Gmail or using Google Docs—counts as engagement under the statistic Page used. Google has refused requests from journalists and interested bystanders to reveal exactly what percentage of those 90 million signed-up Google+ users actually view Plus content each day, week or month. Instead, Google is arguing that it doesn't matter: Google+ is so integrated into the overall experience that what matters is the number of users interacting with any Google site. Combined with other steps Google has taken to integrate Plus into search results and other Google properties, the message is clear: Eventually, Google Plus will just be there whether you want it to or not.
  • On Friday, the Google Operating System blog (not affiliated with Google) wrote a post titled "New Google Accounts Require Gmail and Google+." While this isn't strictly true, the blog demonstrates how Google is making it difficult for new users not to sign up for Google+.
Marc-Alexandre Gagnon

OPENWAYS ANNOUNCING: Mobile Key DUAL© with Pure NFC™ in Cooperation with Nord... - 0 views

  • The best of mobile technologies are now combined to offer hoteliers the most advanced front desk bypass solution that is 100% deployable today, 100% future proof, 100% compatible with the major electronic locks and 0% dependent on Mobile Phone Operators/Carriers
  • Modern travelers are expecting self-service options to make their journey easier. Who did not dream to one day be able to arrive at the hotel and go straight to the room without having to go through the burden of the check-in process? Thanks to Mobile Key by OpenWays, guests can already choose to proceed straight to their room upon arrival and securely open their door with their cell phone. They are no longer forced to wait in line at the front desk – unless they want to.
  • 100% Deployable Today / 100% Future Proof / Truly Ubiquitous "Mobile Key works TODAY with ALL cell phones worldwide. With NFC (Near Field Communication) enabled cell phones gradually hitting the market in larger volumes during 2012 and 2013, we are pleased to announce Mobile Key DUAL© with Pure NFC™," said Pascal Metivier, Founder and CEO of OpenWays. "Mobile Key DUAL© combines the established and highly ubiquitous CAC™ (Crypto Acoustic Credential) technology with both RFID and NFC technologies so we can offer the only 'fully deployable today' while 'fully future proof' solution to our customers. Thanks to Mobile Key DUAL©, hoteliers can offer today a mobile-based front desk bypass solution to all their guests while being sure that the investment they are making is made for the long run."
  • ...10 more annotations...
  • In 2010, Nordic Choice Hotels was first to try mobile NFC key technology in hotels: It was an important learning experience that helped identifying needed improvements and changes
  • “When Nordic Choice Hotels conducted an NFC key pilot in 2010 at our Clarion Hotel Stockholm property we learned that mobile keys are the future for hospitality. We also learned of some limitations to the technology and it was decided not to expand the trial,” said Svein Krakk, Nordic Choice Hotels CIO. “Indeed the pilot we ran was very educative and helped us identify several areas that needed to be improved in order to make NFC viable within a hospitality environment.
  • “The No. 1 priority for Nordic Choice Hotels is to provide freedom of choice for our guests," Krakk said. "Freedom to choose the phone you prefer, to use any mobile operator, to use mobile keys or ordinary keys independently or in combination. We started looking for alternative technologies addressing some of the shortcomings of the pilot. First the user interface needed to be improved. With the latest generation of NFC phones it is not very easy for the end user to figure out how to position the phone vis à vis the lock reader. We also wanted a solution that bypassed the SWP protocol which is designed to make the solution mobile operator and mobile carrier dependant. The pilot was limited to one mobile operator. More than 1,500 mobile operators / carriers exist around the world and our guests could come from anywhere, so offering a solution that works only with one or a few carriers would be pointless.”
  • Hotelier’s independency and cost control are key "Equally important, the SWP standard drives the cost and complexity if implementation towards areas that hoteliers do not like," he said. "It implies a long list of fees to pay to the mobile phone carriers and it places our brands and hotels in a state of dependency that is not acceptable. In addition, we felt that using a solution that would make us dependant on one lock vendor only was not a good idea."
  • A good mobile front desk bypass solution must be guest centric, supported by a strong business case and must be deployable for real "In 2010, we also tested the Mobile Key solution by OpenWays with CAC™ technology," Krakk said. "We appreciated that it was compatible with all cell phones worldwide, that it was easy to use and that it was mobile carrier independent. Equally important, the pilots conducted were great successes both from a technology and a guest satisfaction stand point. As a result, we decided to deploy Mobile Key by OpenWays in several hotels and we are continuing as we speak. "We also decided to challenge OpenWays to think about the next steps and to include NFC as part of their strategy," he added. "Obviously, we wanted an NFC solution that would be free of the identified shortfalls but also would allow us to eventually offer more services to our guests in the years to come. We do realize that it will take years before NFC phones reach any form of critical mass, nevertheless we want to be sure to deploy and invest in the most future-proof platform while our dependency on both mobile carriers and lock vendors would be minimal. As a result, OpenWays proposed to us Mobile Key DUAL© with Pure NFC™. We were immediately seduced with the open architecture of the OpenWays solution. We were thrilled with the idea to offer a DUAL platform allowing us to leverage all mobiles today with the CAC™ technology while building an infrastructure for when NFC will be reaching critical mass. We are now looking forward to go live with several hotels this year."
  • Mobile Key DUAL© with Pure NFC™ is very unique: The solution is protected by 26 patent filings and patents; It allows OpenWays' customers to deploy globally without having to ever worry about knowing if their guests have the right phone or the right carrier; And, it works with all phones and all carriers. "Pure NFC™ allows adding NFC features while still being fully carrier and lock provider independent," Metivier said. "It is highly secured and operates on trusted networks. It leverages modern cryptology combined with highly secured OTP (One Time Password) principles. Implementation costs are significantly lower than with the sole SWP protocol and significant engineering efforts were invested in making the user interface intuitive. This was achieved with the design of very specific RFID antennas designed to provide high reading performances with the next generation of NFC handsets. Other areas of focus were ergonomics and human factors. With NFC, what appears to be a good idea -- because you simply have to wave your phone to a lock to open it -- can sometime be a very bad idea when you truly analyse user behaviours and expectations."
  • A solution compatible for both new build and existing hotel locks Like Mobile Key by OpenWays, Mobile Key DUAL© with Pure NFC™ can be applied to existing hotel locks and/or major renovations. New locks that are factory made with the OpenWays module built in can be provided by the major electronic lock vendors.
  • A solution that works with ALL cell phones and ALL Smartphones With Mobile Key by OpenWays, all smartphones can receive an app and leverage any data network (2G, 3G, 4G and even the hotel WiFi network) to use Mobile Key. The same is true for hotel staff who use our “Mobile key for Master Keys” that offers much more security (real time master key management) and flexibility than traditional plastic cards.
  • A “green” solution that contributes to reduced waste Mobile Key is green. The more guests use their mobile phones as room keys, the less plastic key cards will end up spoiling the environment. Today everyone is concerned about the planet, and hoteliers want to allow their guests to contribute to waste reduction programs. Because Mobile Key by OpenWays is only made with data, it is the cleanest room key a hotelier can offer. "With Mobile Key DUAL© with Pure NFC™, we are making a giant step forward and confirming our global leadership in key management via Mobile phone," Metivier said. "Mobile Key DUAL© with Pure NFC™ is a solution that is going to be 'new for long time' and will be also applied to many other market segments outside the hospitality industry, such as residential, commercial buildings, university campuses, and more. "We would like to thank our partners Nordic Choice Hotels, Nokia, NXP, KABA SAFLOK and Ariane systems that are making these first 2012 deployments possible," he said.
  • About OpenWays | OpenWays is a global solution provider of mobile-based access-management and security solutions. With offices in Chicago, Las Vegas, Seoul and in Europe, OpenWays provides technology solutions allowing for the secure issuance and delivery of access rights and keys process via any cell phone operating on any network. The OpenWays solution is truly unique as it is built on the concept of credential dematerialization. The OpenWays mobile room key solution works on ALL the 6 billion cell phones in service in the world today. For more information, please contact Barb Worcester at +1 440 930-5770 or email barbw@prproconsulting.com. More information can be found by visiting www.OpenWays.com.
Marc-Alexandre Gagnon

Visual Information Retrieval: the Next challenge in Information Management - ERM Expert... - 0 views

  • In the past 20 years, a lot of research has been done towards visual information retrieval on pictures and video files. Not all of it has been successful. But on the last years, the quality of these visual search engines has reached levels that are beginning to be acceptable for eDiscovery, compliance, law enforcement and intelligence applications.
  • More and more electronically stored information (ESI) is non-text based or does not contain any searchable text components: sound recordings, video and pictures are growing exponentially in size and more and more collaborative and social network applications support (only) these information formats.
  • In addition, a whole generation is growing up that no longer uses written communication forms such as letters or emails: they only use social networks and other new media forms for communication and collaboration.
  • ...10 more annotations...
  • Electronic files containing one of more text components or embedded objects with text components can be searched by using text-based queries.
  • Document scans (images) and even pictures can be enriched with the text of the original document or even with recognizable logo’s in the pictures. The same technology can also be applied to video shots.
  • Audio and the audio component of a video file can be processed by a phonetic search engine and users can search the content by looking for specific words or phoneme sequences.
  • In addition, audio-, pictures- and video files can be searched on contextual information such as the file name, added meta-information or text that surrounds the picture or the video on a web page.
  • Web search engines such as Google, Bing and Yahoo use primarily contextual text information from pictures and video’s to search on these object. This text can be tagged by users or can be found in the file name, file location, surrounding text on the webpage, etc. In some cases, words that are recognized in the images and videos with Optical Character Recognition (OCR) technology is used, or nudity is recognized and filtered, but that is about it. There is not or limited influence from pure visual information retrieval technology such as: give me all outdoor pictures or all images with a helicopter in it.
  • State-of-the-art visual search technology should address all of these aspects and support both text-based as image or video example based querying, result navigation and viewing.
  • Ranking images is based on complex statistics and other mathematical properties that are not always intuitive to humans.  Users need a much more exploratory and visual result list that uses all available dimensions when searching images and videos.
  • There are many use cases in the field of visual information retrieval varying from searching pictures on the internet to recognizing faces of hooligans at the entrance of a high risk football match, monitoring airports with surveillance cameras and investigating child abuse.
  • Many of these applications are highly specialized applications requiring a lot of specialized knowledge and experience to work effectively.
  • However, I expect that in the next year or five, real visual information retrieval will become a core component of in-house Enterprise Information Management systems as more and more information consists of pictures and videos that are not annotated and therefore hard to find.
Dan R.D.

Part 2 - Facebook, Google: Welcome to the new feudalism [10Sep11] - 0 views

  • Local data Alec Muffett is working on a scheme called the Mine Project. This aims to give consumers a local place to store their credentials and sensitive data, so they can choose which services they want to expose the data to.
  • "I believe the structure of the internet encourages individuals to host their own data. In some ways, it's a little unfortunate that everyone thinks it's easier to have a big company do it on their behalf, but it's entirely understandable," he says.
  • "It's a karmic cycle," he says. But sooner or later it is going to swing the other way, and people should prepare for an age when their data is once again their own, he argues.
  • ...1 more annotation...
  • There are some steps people can take to counter the castles and keep their data mobile. If you use Twitter, then cross-post your tweets to Identi.ca. With Facebook, do the same with Diaspora. With Google, keep a log of all your search recommendations. If people keep control of the data they put into the world, they will be able to search it themselves as the social networking providers do. An open-source revolution could decentralise the data and bring the castles down.
Dan R.D.

Facebook, Google: Welcome to the new feudalism [10Sep11] - 0 views

  • In the modern web, Google and Facebook are the feudal lords and people are the peasants — at least when it comes to control of the photos, comments, 'likes' and other data that each person posts online.
  • "The users contribute their own content to you for free. You sell it back to them with banner ads put on there. And on top of that, you spy on them to gather profiling data," says Michiel de Jong, of the Unhosted project to decentralise user data.
  • As your friends talk to each other, they feed Facebook data about how information flows between its users. It's likely that your friends will have their own friends and will talk to them as well. Every time these first- and second-level contacts interact, it gives Facebook more pointers to where you fit within your network. To you, it's a bunch of your mates; to Facebook, it's an expanding cloud of data to be harvested.
  • ...5 more annotations...
  • According to Metcalfe's Law, the value of a communications network is proportional to the number of users connected to the system.
  • Mistrust People mistrust this handing over of their data, in much the same way IT managers have concerns about uploading their enterprise's data into the cloud, or web users have misgivings about Gmail and Yahoo automatically scanning their emails.
  • Privacy concerns Meanwhile, Facebook has responded to people's concerns about their privacy on its network by providing more tools for adjusting privacy settings. This does not go far enough, according to de Jong. Read this Why Google+ may change the web for good Read more "If a building company put up a tollway and made drivers cede ownership of their cars whenever on that tollway, the traditional justice system would prohibit that," he argued. "Yet this is exactly what is happening on the 'information highway', and the situation is largely overlooked by justice departments, who still live largely in a brick-and-mortar world."
  • Methods of controlWhat makes this modern feudalism powerful is that the key parties are keeping their methods of control from the users.
  • Neither company openly gives details to users about how their data is being used. We never see inside Google's algorithms, or gain a view of how our connections interweave with every other person on Facebook, but their services see all.
Dan R.D.

Mobile Industry Patent Wars Growing [23Oct11] - 0 views

  • The number of mobile phone patent infringement cases filed in the US court system grew from 24 in 2006, to 84 in 2010, figures collected by Lex Machina, an intellectual property litigation data provider. That number is expected to grow to 97 cases this year, which would mark a four-fold increase in just half a decade. The rapid evolution and growth of the mobile phone industry is the underlying driving force of the rising patent wars. There are possibly over 250,000 active patents relating to a single smartphone, according to San Francisco-based patent aggregator and licensor RPX.
  • "The devices we used 10 years ago to make voice calls have become hand-held computers incorporating a vast array of software and hardware, which increases the breadth of patent exposure," said John Amster, chief executive of RPX.
1 - 9 of 9
Showing 20 items per page