Skip to main content

Home/ Open Intelligence / Web 3X (Social + Mobile)/ Group items matching "public" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
Dan R.D.

Social media 'could transform public services' - 0 views

  • Social media could transform the NHS and other public services in the same way that file-sharing changed the music industry, a conference has heard.Growing use of tools, such as Facebook and Twitter, offered an opportunity to reinvent services, delegates heard. “It’s happened to the music and travel industries and it’s going to happen to public services,” said Dr Paul Hodgkin, founder of the Patient Opinion site that organised the MypublicServices conference. He said that conversations about people’s experiences with public services were going on all over the web and needed to be taken into account.“This is about turning things upside down so the thing that looks like a deficit, your experience, becomes the gift you have to give to other people.” “I’m not sure that the government can re-engineer itself from the inside out,” he said. “It’s going to take the demands of people to force it into shape.” Read more at news.bbc.co.uk
D'coda Dcoda

5 awesome ways brands are using location-based marketing [25May11] - 0 views

shared by D'coda Dcoda on 26 May 11 - No Cached
  • roughly 30 percent more individuals in the U.S. carry a smart phone than buy a daily newspaper.
  • New York Public Library In a move that embodies the Public intellectual history of America and the perfect application of social media, the New York Public Library plans to celebrate its centennial smart phone style.
  • It recently launched a “Find the Future” Foursquare badge that encourages and rewards exploration of public libraries in New York City. It transforms visitors into library ambassadors who, via location-based check-ins, end up promoting library services, programs, and collections to their Foursquare friends.
  • ...3 more annotations...
  • Badge winners get a one-year Foursquare Friends Membership at the library that comes with exclusive member-only perks such as the opportunity to win free NYPL event tickets and participate in behind-the-scenes tours
  • The library has also designed an app-based overnight scavenger hunt called “Find the Future: The Game.” On May 20, 500 pre-registered participants will complete tasks during a special launch event, before the game goes live to the public on May 21. The tasks encourage players to explore the library and historical objects such as the Declaration of Independence.
  • JetBlue Airways In January 2011, JetBlue Airways became the first U.S. airline to announce an integration between their frequent flyer rewards program and Facebook Places. JetBlue GoPlaces participants receive 25 TrueBlue frequent flyer points every time they check in to an official JetBlue airport location using Facebook Places. Those who accumulate 5,000 or more points can trade them in for free flights. While this is not exactly immediate gratification — it takes 200 airport check ins to earn a free flight — it’s still noteworthy.
Marc-Alexandre Gagnon

CloudSigma adds SSDs to its public cloud - Cloud Computing News [08Nov11] - 0 views

  • Cloud provider CloudSigma has become the first to add solid-state-drive storage to its public cloud computing service. SSDs (aka flash memory) are well known for their ability to significantly increase storage I/O performance and decrease power consumption when compared with hard disk drives, but until recently they have been too expensive for consideration in most data centers that aren’t backed by serious computing needs and deep pockets. That’s starting to change with the advent of new companies promising ever-lower prices on enterprise-grade flash storage, but making flash available as a service to cloud customers is still relatively unheard of.
  • However, adding flash is just par for the course for CloudSigma, which has been making a name for itself on high performance and customer choice since launching in the United States recently. The company’s U.S. presence is based out of the mind-blowing SuperNAP data center in Las Vegas, and CloudSigma chose 10 GbE interconnects as its standard to ensure its cloud can fully utilize the throughput horsepower of new technologies like flash. A couple weeks ago, it announced support of Oracle’s Solaris operating system, which also is unique among cloud providers (although Amazon Web Services does support OpenSolaris).
  • Although SSDs in the cloud are cool enough by themselves, they’re part of a larger trend toward making cloud computing a more palatable delivery model for all types of workloads. What began as a platform for hosting web applications has expand to enterprise apps such as ERP software from SAP, and even into massively parallel HPC workloads. AWS even offers GPU instances on an HPC cluster, which has resulted in several companies benchmarking AWS as among the fastest supercomputers in the world. Jenkins said CloudSigma will “absolutely” offer GPUs at some point, and might even go as far as to expose specific processors for rendering digital media.
D'coda Dcoda

10/04/19 Privacy Slips Again - Facebook Retroactively Makes More User Data Public - 0 views

  • There’s an argument circulating that we don’t care about our privacy as much as we did when Facebook rolled out with its “promises”, justifying, in part, this decision. Where do you stand? Will you take steps to remove information from Facebook to keep it from going public? See the article for clarification of Facebook’s claim that these changes are “opt in”.
  • Once upon a time, Facebook could be used simply to share your interests and information with a select small community of your own choosing. As Facebook’s privacy policy once promised, “No personal information that you submit to Facebook will be available to any user of the Web Site who does not belong to at least one of the groups specified by you in your privacy settings.”How times have changed.Today, Facebook removed its users’ ability to control who can see their own interests and personal information. Certain parts of users’ profiles, “including your current city, hometown, education and work, and likes and interests” will now be transformed into “connections,” meaning that they will be shared publicly. If you don’t want these parts of your profile to be made public, your only option is to delete them.Read more at www.eff.org
D'coda Dcoda

Time + travel + map [06Jun11] - 0 views

  • mapnificient travel-time map “specific to each city, ‘mapnificent’ sources the timetables of the major public transportation services to roughly calculate the areas accessible within a given time span, highlighting this area in a lit ‘bubble’. one’s location can be set via address or dropping a pointer on the map, and settings for the search include whether the user has access to a bicycle and (in beta) the day and time, as well as the maximum distance the user is willing to walk to a source of public transit. a google maps search can be conducted to find nearby amenities, with results overlain onto the visualization.”
  •  
    specific to each city, helps w timing of public transportation
Dan R.D.

Building a Public Cloud for Business Continuity [25Oct11] - 0 views

  • Cloud computing has been eyed for some time as a solution for business continuity needs, as the thought of setting up new virtual servers on an automated, on-demand basis seems highly appealing. But when it comes to figuring out the kind of cloud offerings that will work best for business continuity, typically private cloud options are usually the ones considered. The reason for this bias is the configuration of the virtual machines themselves. While public cloud services can afford business clients a lot of computing power in a hurry for a low rate, that combination does not always equate to a continuity friendly environment.
  • Then there are the security concerns. If you are patching your own systems diligently, is the cloud provider providing the same patched for their own base operating systems? What other kind of security protocols are in place? On the legal side of the equation, does the cloud provider meet compliance in the areas of data breach notification, data retention, auditing, and whatever other compliance regulations you need to follow? What are the local laws for the datacenter and how do they comply with your own corporate needs in terms of security?
Dan R.D.

This public project aims to bring broadband Internet to 6.8 million people in one Brazilian state - The Next Web [02Nov11] - 0 views

  • The state of Ceará, in Northeast Brazil, contributes only to 2% of the Brazilian GDP. Yet, it will soon host the Brazil’s largest public broadband Internet network. The Cinturão Digital do Ceará (CDC), which translates as Ceará’s Digital Big Belt, will be inaugurated this Thursday by the governor Cid Gomes and the Science and Technology Minister Aloizio Mercadante. So why did the local authorities decide to invest around R$50m (US$28.6m) into this initiative?
  • Many people couldn’t afford faster speeds anyway – in Fortaleza, one third of the population lives in favelas (slums) filled with migrants who have left rural areas.
  • This situation led the state to develop its own public network, the CDC. It is a highly ambitious project; according to the government, it consists of a whopping 2,600 kilometers of optic fiber.
  • ...1 more annotation...
  • The network will soon connect 92 cities and reach 90% of the urban population in Ceará (where only 10% live in rural areas.) As for the maximum speeds, they could vary  between 30 and 70 Mbps depending on sources. In Fortaleza, the CDC will be integrated with existing infrastructure to enable speeds of up to 2 Gbps.
Dan R.D.

Google's Big Bet on the Mobile Future - NYTimes.com [15Aug11] - 0 views

  • Google made a $12.5 billion bet on Monday that its future — and the future of big Internet companies — lies in mobile computing, and moved aggressively to take on its arch rival Apple in the mobile market.
  • The Silicon Valley giant, known for its search engine and Android phone software, rattled the tech world with its announcement that it would acquire Motorola Mobility Holdings, allowing it to get into the business of making cellphones and tablets.
  • The deal, which requires regulatory approval, would also give Google a valuable war chest of more than 17,000 patents that would help it defend Android from a barrage of patent lawsuits.
  • ...4 more annotations...
  • “Computing is moving onto mobile,” Larry Page, Google’s chief executive, said in an interview. “Even if I have a computer next to me, I’ll still be on my mobile device.”
  • But it is far from clear that Google, a $179 billion business largely built on sophisticated search algorithms and online advertising, can transform itself into a device maker. The business is costly, and the margins are slim, said Jordan Rohan, an analyst with Stifel Nicolaus.
  • “This is an emphatic exclamation point that Google is a mobile company,” said Ben Schachter, an analyst with Macquarie Capital. “It shows how important Android is to Google.”
  • Shares of Google fell 1.16 percent on Monday, to $557.23, while shares of Motorola Mobility added 55.78 percent, to $38.12.
Dan R.D.

Service Blackouts Threaten Cloud Users - Technology Review - 0 views

  • Damage control: Internet discussion about the service outage that struck Amazon Web Services in April spiked as soon as problems began (April 21st) and again when Amazon explained the cause (April 29th). The data is based on selected mentions on Twitter, blogs, and in online media. Alterian
  • Just ask Jeff Malek, cofounder of BigDoor, a Seattle company whose game software is hosted on the public servers of Amazon. Last April, problems in a Northern Virginia data center crippled Amazon's northeast operations, affecting many cloud-based businesses. Spotty service over four days left BigDoor scrambling to find technical solutions and issuing a steady stream of apologies to its 250 clients. Since then, BigDoor has joined a growing number of companies that are seeking new ways of building outage-resistant systems in the cloud, often at additional expense and inconvenience.
  • Even though outages put businesses at immense risk, public cloud providers still don't offer ironclad guarantees. In its so-called "service-level agreement," Amazon says that if its services are unavailable for more than 0.05 percent of a year (around four hours) it will give the clients a credit "equal to 10% of their bill." Some in the industry believe public clouds like Amazon should aim for 99.999 percent availability, or downtime of only around five minutes a year.
  • ...1 more annotation...
  • Indeed, Stump says only one thing is 100 percent certain when it comes to the cloud: "You always have to architect your systems under an assumption of failure."
Dan R.D.

Who Will Control the Internet of Things? (AAPL, GOOG, IBM, IDCC, MMI) - 0 views

  • Apple (Nasdaq: AAPL  ) filed a patent at the tail end of 2009 dubbed "Local Device Awareness," which describes automated connections between a number of close-range devices. Some potential applications could be device position targeting (think locating your keys) or proximity-based gaming.
  • If Apple's patent seems overly broad, patent hoarder InterDigital (Nasdaq: IDCC  ) has gone for specificity. It holds some 33 known patents covering machine-to-machine communication.
  • Motorola and Google seem to be behind in patents, with only one highly technical machine-to-machine patent showing up for Motorola Mobility, and none for Google. But as you'll soon see, the two companies might be hoping for a more open environment.
  • ...1 more annotation...
  • IBM sees the Internet of things as a source of growth, and it recognizes that the best way to capitalize is to make it easy to adopt. Keeping the underlying framework open-source will undoubtedly improve competition and encourage startups, much as the growth of the public Internet led to an explosion of newly public companies. Let's hope that the growth of this new industry isn't hampered by patents, but we should also be wary of any new bubbles that might inflate.
D'coda Dcoda

Obama Tries to Bypass Congress with Deadly Global Internet Treaty ACTA [28Jan12] - 0 views

  • Before the American people were protesting the Stop Online Piracy Act and the Protect Intellectual Property Act, the president managed to sign an international treaty which would permit foreign companies to demand that ISPs (Internet Service Providers) remove web content in the United States without any legal oversight. Entitled the Anti-Counterfeiting Trade Agreement (ACTA), the treaty was signed by Obama on October 1, 2011, but it is currently a subject of discussion because the White House is circulating a petition demanding that senators ratify the treaty.
  • the White House has done some maneuvering — characterizing the treaty as an "executive agreement" — thereby bypassing approval by members of Congress. Concerned by this action of the administration, Sen. Ron Wyden (D-Ore., above left) sent a letter to President Obama in which he declared: It may be possible for the U.S. to implement ACTA or any other trade agreement, once validly entered, without legislation if the agreement requires no change in U.S. law. But regardless of whether the agreement requires changes in U.S. law ... the executive branch lacks constitutional authority to enter a binding international agreement covering issues delegated by the Constitution to Congress' authority, absent congressional approval.
  • Similarly, TechDirt observes: ... [E]ven if Obama has declared ACTA an executive agreement (while those in Europe insist that it’s a binding treaty), there is a very real Constitutional question here: can it actually be an executive agreement? The law is clear that the only things that can be covered by executive agreements are things that involve items that are solely under the President’s mandate. That is, you can’t sign an executive agreement that impacts the things Congress has control over. But here’s the thing: intellectual property, in Article 1, Section 8 of the Constitution, is an issue given to Congress, not the President. Thus, there’s a pretty strong argument that the President legally cannot sign any intellectual property agreements as an executive agreement and, instead, must submit them to the Senate.
  • ...6 more annotations...
  • Twenty-two EU member states signed the treaty at a ceremony in Tokyo on January 26. Other nations interested in signing the agreement have until May 2013 to do so. According to Wikipedia, the Anti-Counterfeiting Trade Agreement “creates a governing body outside national institutions such as the World Trade Organization (WTO), the World Intellectual Property Organization (WIPO) or the United Nations.” The scope of the agreement includes counterfeit goods, generic medicines, and pirated copyright-protected works.
  • The provisions of ACTA grant copyright holders direct powers to demand that ISPs remove material from the Internet, without the requirement of a court order, and permit foreign influence over ISPs in the United States. Advocates of the treaty seek to give copyright holders the ability to demand that users who do violate intellectual property rights have their Internet connections terminated as a punishment. To enforce such a system would require the creation of an individual Internet ID.
  • The Electronic Frontier Foundation (EFF) reports: The same industry rightsholder groups that support the creation of ACTA have also called for mandatory network-level filtering by Internet Service Providers and for Internet Service Providers to terminate citizens’ Internet connection on repeat allegation of copyright infringement (the “Three Strikes”/Graduated Response) so there is reason to believe that ACTA will seek to increase intermediary liability and require these things of Internet Service Providers.
  • The EFF has been vehement in its opposition to ACTA, particularly regarding the secrecy surrounding the treaty negotiations. Likewise, Michael Geist, in writing for Copyright News, asserted that ACTA was “shrouded in secrecy.” He pointed out that ACTA negotiations did not include civil society groups or developing countries, noting also that “reports suggest that trade negotiators have been required to sign non-disclosure agreements for fear of word of the treaty’s provisions leaking to the public.” The European Commission denied this allegations in 2008, arguing, “It is only natural that intergovernmental negotiations dealing with issues that have an economic impact, do not take place in public and that negotiators are bound by a certain level of discretion.”
  • As noted on Wikipedia, opponents of ACTA also assert that it will impinge upon freedom of expression and communication privacy. A large number of the World Trade Organization’s 157 members have voiced concerns that the treaty would have a negative impact on trade. Others have pointed out that ACTA does not include provisions for legal safeguards protecting ISPs from liability for the actions of their subscribers. Without such provisions, ISPs will be forced to invade the privacy of their subscribers in order to protect themselves. Aaron Shaw, research fellow at the Berkman Center for Internet & Society at Harvard University, stressed that “ACTA would create unduly harsh legal standards that do not reflect contemporary principles of democratic government, free market exchange, or civil liberties.”
  • The technology news and information website ArsTechnica.com argues that ACTA encourages ISPs to collect and provide information about suspects by providing for those ISPs “safe harbor from certain legal threats.” In protest against the treaty, the hacktivist group Anonymous hacked into the Federal Trade Commission’s cybersecurity advice website on January 24, replacing the homepage with the Anonymous logo, a rap song, and a message threatening more attacks if anti-piracy legislation in Congress were to pass. According to The Next Web: The message left temporarily on OnGuardOnline referred to the Stop Online Piracy Act, The Protect Intellectual Property Act and the Anti-Counterfeiting Trade Agreement. If they pass, the message said, "we will wage a relentless war against the corporate Internet, destroying dozens upon dozens of government and company websites."
D'coda Dcoda

Google hidden 'Ad Preferences' page reveals what privacy-row search giant thinks it knows about you | Mail Online [20Jan12] - 0 views

  • IT has been said that Google knows more about what you like than your own partnerNow the search giant has given a glimpse on just how much information it has collected - and who thinks you are.But it seems the famed Google algorithms are far from infallible.
  • And people taking advantage of the facility that allows the public to view what kind of consumer Google thinks they are have been amused to find themselves listed with the wrong age and even sex.Nevertheless, the knowledge that Google works so hard to profile its 350m account holders is bound to intensify the debate about privacy which flared up again this week with the announcement that the company was going to start tracking users across all of its sites, including YouTube.
  • The detailed personal 'profile' sums up many of a user's interests, along with age and gender.Google builds a detailed profile by harvesting the history of its account holders' visits to sites in its advertising network.But your age and gender are decided by those of other Google users who have visited the sites you visit, leading to the mistakes
  • ...1 more annotation...
  • One blogger from tech site Mashable found this week that Google's Ad Preferences page assume that she was middle-aged - and a man, simply because her interests included technology and computing.  The profile page, called Ad Preferences, is hidden away inside a settings menu in Google Accounts, but can be accessed directly here. This sort of in-depth profiling raises alarm bells with privacy activists. 'Consumers have increasingly digital lives and they are developing an unfathomably large data trail every day,' says Rainey Reitman, activism director for privacy group Electronic Frontier Foundation. 'There has never been another time in history where privacy was under the kind of assault it is today.'You can opt out of the tracking, or manually edit your details. Google also  does not store information on controversial subjects such as pornography. The Ad preferences page came to public attention following a sweeping change to 'privacy policy' which comes into effect on March 1, although the preferences page was launched some time ago. YouTube data, Gmail information and search data will all be used to build up ever more accurate advertising profiles and also the company claims it will make searches more personalised.
Marc-Alexandre Gagnon

Irancell demonstrates NFC payments, ticketing - Telecompaper - 0 views

  • Iranian mobile operator MTN-Irancell teamed up with technology provider Etick Pars Intelligent Technologies Development and Bank Pasargad to demonstrate a number of NFC services such as payments and ticketing designed for the Iranian market, writes online publication NFCWorld.com citing Etick. Etick and Irancell will test a system that enables the recharge of prepaid accounts on NFC mobile wallets by either transferring money from bank accounts or making a cash deposit at a contactless point-of-sale terminal, Etick project manager Bahram Ehsandoust told NFC World. If required, funds may also be transferred back from mobile wallets to bank accounts. Using their NFC mobile wallet, end-users will be able to pay for retail purchases, for bus tickets in the cities of Mashhad and Ahwaz, where Etick runs the current smart card-based public transportation ticketing system, and for purchases from vending machines. At the same time, customer loyalty applications have been developed. Both NFC phones using a SIM as a secure element as well as Gemalto's Upteq N-Flex NFC device support the tested technology.
Marc-Alexandre Gagnon

Apple quietly begins iPhone as wallet in-store trials - Computerworld Blogs [08Nov11] - 0 views

  • The mobile wallet is becoming a reality. Apple [AAPL] has already begun plotting to turn your iPhone into an iWallet which uses iTunes as your virtual bank.
  • The company this week begins rolling out its EasyPay payment system in US retail stores. Available inside Apple's own Apple Store for iOS app, EasyPay lets users purchase accessories at Apple retail stores just by scanning in the barcode and completing the transaction on their iOS device.
  • Payment is taken using your Apple ID. Users need to enter their ID and then payment is taken using the credit card associated with their iTunes account.
  • ...9 more annotations...
  • This is a much bigger deal than it may seem, as World Payments Report 2011 informs: -- 15% of all card transactions will be mobile by 2013.-- 20 billion credit card transactions take place each year.
  • PayPal should be shaking in its boots. And as for Google Wallet? One day, you'll be paying for your public transit fees using iTunes and your iPhone.
  • There's three ways Apple may choose to create a payment infrastructure. It is possible there are more, but we'll settle on three for now:
  • -- NFC support in the iPhone 5Advantages: NFC is fully supported by the credit companies.Disadvantages: NFC isn't yet ready for prime time, but is expected to reach a much wider market by 2013.
  • -- Bluetooth-based payments: Advantages: It is possible now to use Bluetooth to make secure payment exchanges.Disadvantages: There's no agreed financial Bluetooth-based transfer standard, meaning there's no back-up or insurance in case of fraud.
  • -- Over-the-airAdvantages: Does it matter if you wave your device across a terminal? Why not pay from where you are? You could buy goods and services in this way.Disadvantages: I would argue that Apple's devices would still require RFID tags in order that payment status be easily verified. If RFID is required, then NFC makes sense.
  • What makes Apple's iTunes approach effective is that by using its existing credit service as a bank, it achieves an immediate potential user base of hundreds of millions of people, while also offering an extra layer of protection between banks and customers. If fraud takes place, Apple's insurance should protect a customer, reducing the risk to the banks.
  • Tie these NFC systems up with Apple's other in-development mobile technologies and there's lots of potential scenarios.
  • Some statistics may be of interest:-- 50,000 Dutch nurses now use NFC  to track and manage home healthcare visits.-- The Museum of London already offers interactive NFC services.-- Over 60% of manufacturers plan to put NFC in cars.
Marc-Alexandre Gagnon

45 mobile operators announce support for SIM-based NFC [24Nov11] - 0 views

  • 45 mobile operators have pledged their support for subscriber identity module (SIM) based Near Field Communication (NFC) implementations in an announcement made by mobile industry trade body the GSM Association (GSMA).
  • The large existing user-base of low-cost, mid-tier, NFC-less feature phones popular in emerging markets is a prime target for this technology. However, technical difficulties have prevented the adoption of SIM-based NFC. As the SIM card slot is located behind the battery, radio signals to and from the NFC module are effectively blocked in many phones.
  • Potential applications for this technology include mobile payments, public transit access, event ticketing, secure access to buildings or vehicles, identification, and person-to-person (P2P) data sharing.
  • ...7 more annotations...
  • The GSMA has published interoperability standards for SIM-based NFC application programming interfaces (APIs) and protocols based on the Pay-Buy-Mobile specification for secure NFC mobile payments. Such standards pave the way for the development of contactless services across a variety of devices irrespective of their operating system (OS) while providing more detailed implementation protocols for the Java and Android platforms.
  • IHS Screen Digest research indicates that the 45 operators involved in the announcement serve 50.7 per cent of the world's mobile subscriptions. Since the NFC module is embedded in the SIM card, the operators expect users to be able to use existing handsets for contactless services without the need to switch to a high-end smartphone. Users of smartphones currently lacking NFC capabilities will also benefit from this technology.
  • The 45 operators involved account for nearly 3 billion subscriptions worldwide, and include China Mobile, Vodafone Group, América Móvil, Telefónica Group, China Unicom, Axiata, Bharti Airtel, Deutsche Telekom, Verizon Wireless, and AT&T.
  • There is also the issue of cost. IHS Screen Digest estimates current SIM-based NFC modules to be a hundred times more expensive than traditional SIM cards. This would deter most operators from venturing into offering SIM-based NFC as an option to customers in emerging economies until economies of scale bring the associated costs down.
  • It is unlikely that operators will allow third-party "over-the-top" services outside of their value chain. As the implementation of some contactless services (e.g. mobile payments, public transit) depends on a close collaboration between operators and local third-parties, it is expectable that contactless services deployments and uptake will vary greatly across markets.
  • IHS Screen Digest does not foresee rapid adoption of SIM-based NFC mobile payments. Users will likely become acquainted with the contactless technology by way of other use-cases, as NFC experiences in Asia and Europe suggest--most notably the Octopus transit and stored-value card in Hong Kong, and the London Oyster transit card.
  • If NFC payment and transit cards schemes prove successful in more locations, the likelihood that such services will be increasingly incorporated into mobile devices will also increase.
Dan R.D.

Philadelphia Department of Records and Azavea Release White Paper on Augmented Reality [17May11] - 0 views

  • Azavea announced the publication of a free white paper that summarizes their research on the use of mobile augmented reality techniques for enhancing digital access to historical and cultural resources
  • the Philadelphia Department of Records was awarded an NEH Digital Humanities Start-Up Grant to develop innovative techniques for leveraging the sensors in contemporary smart phones to expand public access to historical data in novel ways. 
  • The new Augmented Reality by PhillyHistory.org application provides point-and-view access to 500 historic photographs of selected sites around Philadelphia.  Users are able to automatically access and view the historic photographs by simply pointing the camera of a smart phone at the contemporary site and selecting an available image.  The historic photos then appear as an overlay on the current urban landscape, enabling viewers to compare the past to the present.
  • ...3 more annotations...
  • With support from the NEH Digital Humanities Start-Up Grant, the DOR and Azavea’s software engineering team were tasked with exploring these questions and publishing a white paper to present the findings of this research.  The white paper is free to download at http://www.azavea.com/augmented-reality
  • While the $50,000 research grant has yielded a more complete application than originally anticipated, the project team encountered a number of limitations with the current state of the technology.
  • The Department of Records and Azavea expect to seek additional funding in order to develop solutions for these limitations as well as bring the technology to a broader array of devices including tablets.
D'coda Dcoda

Why Twitter's Oral Culture Irritates Bill Keller (and why this is an important issue) [19May11] - 0 views

  • Bill Keller of the New York Times has just written a provocative piece lamenting that new technologies are eroding essential human characteristics. I would certainly agree that almost all technologies, especially those with a cognitive element, transform the way we organize, value and manage our intellectual and social lives–-indeed, such complaints were raised, most famously by Plato about how writing was emptying words of their soul by disconnecting them from their living speakers. However, Keller makes not one but at least three distinct claims in his piece. I want to primarily discuss the one that he makes least explicitly and perhaps has never formulated directly himself.
  • first, let’s clarify the other two which are explicit.
  • here are the parts of Keller’s comments which have intrigued me
  • ...9 more annotations...
  • Second, Keller argues that “there is something decidedly faux about the camaraderie of Facebook, something illusory about the connectedness of Twitter.” This line of argument, that our social ties are being hollowed out by digital sociality, is also fairly common. I’d like to start by saying that it is not supported by empirical research.
  • Increasing numbers of people even make connections online which then they turn into offline connections (See Wang and Wellman, for example), so that even actual “virtual” connections –which I have just argued are less common—are valuable for many communities who otherwise do not have abundant peers around them, say cancer patients or gay youth in small towns.
  • First Keller talks about how we no longer need to remember everything and how his father used to use a slide rule and now there are calculators and who knows their multiplication table anymore… This is a familiar argument from cognitive replacement and I believe it is worth discussing not necessarily because there is something inherently wrong with machines making certain cognitive tasks easier, but I do deeply worry about what this means for valuing humans. Cheaper computers increasingly capable of taking over human tasks means that we face a profound human problem: how will we deal with the billions of people who will be potentially redundant if the only way of measuring a human’s worth is their price on the labor market? For me, this is an important political question rather than a technological lament. It’s not about what machines can do, it’s about the criteria by which we judge the worth of our fellow human beings, and how advances information technology increasingly leads us to devalue each other
  • If the latter were the case, his ire would be more about Google; instead, most of his frustration is directed against social media, and mostly Twitter, the most conversational, and thus most oral of these mediums.
  • The shortcomings of social media would not bother me awfully if I did not suspect that Facebook friendship and Twitter chatter are displacing real rapport and real conversation, just as Gutenberg’s device displaced remembering. The things we may be unlearning, tweet by tweet — complexity, acuity, patience, wisdom, intimacy — are things that matter.
  • Then along came the Mark Zuckerberg of his day, Johannes Gutenberg.
  • But this comparison between Gutenberg and Zuckerberg makes little sense unless you realize that Keller is actually trying to complain about the reemergence of oral psychodynamics in the public sphere rather than about memory falling out of favor.
  • My mistrust of social media is intensified by the ephemeral nature of these communications. They are the epitome of in-one-ear-and-out-the-other, which was my mother’s trope for a failure to connect.
  • The key to understanding this is that while writing did displace the value of memory, the vast abundance of printed material it did something else also, something less remarked upon, both to the shape of our public sphere and also to our psychodynamics. It replaced the natural, visceral human oral psychodynamics with those of literate and written ones
D'coda Dcoda

PR and Ethics in the Battle for Location-based Data [25May11] - 0 views

  • Micro-targeted ads were only the first step; now companies can easily link anyone's social media profile to their web-browsing habits, and sell that information to anyone who's interested. Google, Apple, Facebook, Microsoft, and others are, predictably, jockeying for lead position
  • Transformations of this magnitude are never confined to the market. Eventually, they spill over into the realm of politics and society. It's a familiar pattern: new technology enables new business practices. These practices, in turn, raise important social, political, and
  • Transformations of this magnitude are never confined to the market. Eventually, they spill over into the realm of politics and society. It's a familiar pattern: new technology enables new business practices. These practices, in turn, raise important social, political, and legal questions
  • ...1 more annotation...
  • Facebook clearly understands that the media and public opinion form part of the competitive playing field. But they seem to have forgotten Business Ethics 101: Don't do anything that you'd be embarrassed to see on Page 1 of the Wall Street Journal or the Financial Times. That's not just good ethics advice; it's good PR advice, too. Rosanna Fisk, chief executive of the public Relations Society of America, commented that Facebook's actions were "unethical and improper," adding that the affair had become a "PR nightmare."
1 - 20 of 80 Next › Last »
Showing 20 items per page