Skip to main content

Home/ SASSIT/ Group items tagged issues

Rss Feed Group items tagged

Peter Ruwoldt

Course: Green ICT Strategies e-Learning Course - 0 views

  •  
    Environment issues surrounding the sustainable use of ICT
Peter Ruwoldt

26 Learning Games to Change the World | Mission to Learn - 0 views

  •  
    Browser based free games teaching social and environmental issues
Peter Ruwoldt

Honda Acura Database Hacked - 0 views

  •  
    The Japanese motor company, Honda, today issued an alert to U.S. customers concerning a security breach resulting from a hacked database. The database that was managed by a third-party marketing group contained confidential information, including names of car owners, personal e-mail addresses, and even Vehicle Identification Numbers (VIN).
Peter Ruwoldt

IT Conversations | Tools of Change Conference from O'Reilly Media | Scott Sigler - 0 views

  •  
    People need to adapt and have business models that work with the new technologies.  This is an example. By the end of Scott Sigler's 20-episode podcast series, EARTHCORE, he had gained 10,000 followers. From there, he engaged the small publisher, Dragon Moon Press, to issue ANCESTOR. Its success on Amazon got the attention of Crown Publishing, which signed him for a five-book deal.
Peter Ruwoldt

Business & Technology | UW team researches a future filled with RFID chips | Seattle Ti... - 0 views

  • The project is meant to explore both positive and negative aspects of a world saturated with technology that can monitor people and objects remotely. "What we want to understand," Borriello said, "is what makes it useful, what makes it threatening and how to balance the two."
  • Our objective is to create a future world where RFID is everywhere and figure out problems we'll run into before we get there,
  • For more than a year, a dozen researchers have carried around RFID tags equipped with tiny computer chips that store an identification number unique to each tag. Researchers installed about 200 antennas throughout the computer-science building that pick up any tag near them every second.
  • ...12 more annotations...
  • The system can show when people leave the office, when they return, how often they take breaks, where they go and who's meeting with whom,
  • if people don't see the tags, it's easy to forget they are giving out information whenever they come within range of a reader.
  • how to make the technology useful while protecting privacy
  • The system is transparent, so each can tell if the other has checked his whereabouts.
  • Users can search the calendar to jog their memories about when they last saw someone or how, where and with whom they spent their time.
    • Peter Ruwoldt
       
      I can see these things being useful. Like the idea of transparency
  • have been designed to divulge more information than necessary, opening the door to security and privacy problems
  • There's no reason to have remotely readable technology in a driver's license," Borriello said. He recommends a system that requires contact with the surface of a reader, so the license-holder knows when information on his license is being read.
    • Peter Ruwoldt
       
      Ethical issues to choose the right technology for the problem. Good point
  • data from radio tags can be pieced together to offer a detailed profile of a person's habits without his or her knowledge.
  • People don't understand the implications of information they're giving out," Borriello said. "They can be linked together to paint a picture, one you didn't think you were painting."
    • Peter Ruwoldt
       
      Critical for people to be street smart. Important role for schools
  • Last year, the number of police requests for information from London's RFID-based transit card rose from four per month to 100
  • It's important to understand what the technology can do and we, collectively, have to decide what we're going to use it for
  • As soon as it becomes widely used, then it's more attractive and people start attacking it," showing its vulnerabilities, Borriello said. The trouble is "by that time, it's hard to change.
    • Peter Ruwoldt
       
      Good that someone is being proactive about this.
  •  
    The project is meant to explore both positive and negative aspects of a world saturated with technology that can monitor people and objects remotely. "What we want to understand," Borriello said, "is what makes it useful, what makes it threatening and how to balance the two."
Peter Ruwoldt

Lifehacker, tips and downloads for getting things done - 0 views

  •  
    How to Stay Safe on Public Wi-Fi Networks
Peter Ruwoldt

How Android Is Transforming Mobile Computing - Newsweek - 0 views

  • In addition to making Android available for free, Google also lets phone makers change the code and customize it so that an Android phone made by, say, Samsung has a different user interface than an Android phone from Motorola. Rubin believes this open-source model gives Google an advantage over rivals selling closed systems, like Apple, which also operates its own online stores. Apple’s tight control enables it to deliver an exceptionally smooth user experience, where everything works seamlessly together.
    • Peter Ruwoldt
       
      Key point. There are clear advantages to open systems
  •  
    So what happens when most of the residents of planet Earth carry a device that gives them instant access to pretty much all of the world's information? The implications-for politics, for education, for global economics-are dizzying. In theory, the mobile revolution could enable citizens to demand greater openness and accountability from their governments. The reverse might also be true: governments could more easily spy on citizens. "You also have the prospect of having 5 billion surveillance points," says Jonathan Zittrain, codirector of Harvard's Berkman Center for Internet & Society.
Peter Ruwoldt

Every Click You Make - washingtonpost.com - 0 views

  • companies involved say customers' privacy is protected because no personally identifying details are released.
  • Although common tracking systems, known as cookies, have counted a consumer's visits to a network of sites, the new monitoring, known as "deep-packet inspection," enables a far wider view -- every Web page visited, every e-mail sent and every search entered. Every bit of data is divided into packets -- like electronic envelopes -- that the system can access and analyze for content.
  • There's a fear here that a user's ISP is going to betray them and turn their information over to a third party
  • ...1 more annotation...
  • uidelines for behavioral advertising have been outpaced by the technology and do not address the practice directly
    • Peter Ruwoldt
       
      Example of where law lags technology
  •  
    The online behavior of a small but growing number of computer users in the United States is monitored by their Internet service providers, who have access to every click and keystroke that comes down the line
Peter Ruwoldt

User talk:203.122.254.26 - Wikipedia, the free encyclopedia - 0 views

  •  
    DECS issues with Wikipedia
Peter Ruwoldt

Lynne Brindley: We're in danger of losing our memories | Technology | The Observer - 0 views

  •  
    Too many of us suffer from a condition that is going to leave our grandchildren bereft. I call it personal digital disorder. Think of those thousands of digital photographs that lie hidden on our computers. Few store them, so those who come after us will not be able to look at them. It's tragic.
Peter Ruwoldt

Sectera Edge: A BlackBerry Secure Enough For Obama? - PC World - 0 views

  •  
    President Barack Obama may be getting a souped-up, super secure version of the BlackBerry called the Sectera Edge, recent speculation suggests. The NSA-certified device could allow Obama to fulfill his wish of staying connected, some suspect, while also addressing the numerous security concerns that come with the territory.
Peter Ruwoldt

Judge: 17,000 illegal downloads don't equal 17,000 lost sales - 0 views

  •  
    Record companies cannot collect restitution for every time a song has been illegally downloaded, a US District judge has decided. Judge James P. Jones gave his opinion on United States of America v. Dove, a criminal copyright case, ruling that each illegal download does not necessarily equate to a lost sale, and that the companies affected by P2P piracy cannot make their restitution claims based on this assumption.
Peter Ruwoldt

Does piracy matter? | News | TechRadar UK - 0 views

  •  
    Why should I have to put a useless DVD in my PC as an honesty check when the dishonest people can play at their leisure? Why should I have to type in endless serial codes, or be restricted to one PC? The dirty secret of Digital Rights Management is that it's only the first few days that particularly matters, while there's a vague chance it might slow down the pirates for a bit.
Peter Ruwoldt

New Phishing Attack Targets Online Banking Sessions With Phony Popups - DarkReading - 0 views

  •  
    The so-called "in-session phishing" attack prompts the victim to retype his username and password for the banking site because the online banking session "has expired," for instance, via a popup that purports to be from the victim's bank site, according to researchers at Trusteer, which today published an advisory (PDF) on their findings about the potential for such a phishing attack.
Peter Ruwoldt

Togelius: Automatic Game Design - 0 views

  •  
    "What makes games fun? Some (e.g. Raph Koster) claim that fun is learning - fun games are those which are easy to learn, but hard to master, with a long and smooth learning curve. I think we can create fun game rules automatically through measuring their learnability. In a recent experiment, we do this using evolutionary computation, and create some simple Pacman-like new games completely without human intervention! Perhaps this has a future in game design? The academic paper (PDF) is available as well."
Peter Ruwoldt

WKOW 27: Madison, WI Breaking News, Weather and Sports -27 News Troubleshooter: Woman b... - 0 views

  •  
    MCFARLAND (WKOW) -- Abbie Schubert paid more than $1,100 for a Dell laptop hoping to enroll in online classes at Madison Area Technical College, or MATC. But something stopped her: she bought an operating system for her computer she never heard of, Ubuntu. That's an operating system for your computer similar to Windows that contains Linux. It's highly regarded among some people and extremely popular with certain circles of computer users because it's free.
Peter Ruwoldt

E-Waste Not - TIME - 0 views

  •  
    Many electronics recyclers ship American e-waste abroad, where it is stripped and burned with little concern for environmental or human health.
Peter Ruwoldt

Mumbai police to look out for unsecured Wi-Fi connections-Mumbai-Cities-The Times of India - 0 views

  •  
    MUMBAI: City policemen will be soon seen roaming in the streets with laptops in their hands in search of unsecured Wi-Fi connections. In an initiative taken by the Mumbai police, in the backdrop of terror mails sent before blasts and terror attacks, policemen will be sent to various locations in the city in search of unsecured Wi-Fi connections.
Peter Ruwoldt

British Police set to step up hacking of home PCs | Australian IT - 0 views

  •  
    He said the authorities could break into a suspect's home or office and insert a "key-logging" device into an individual's computer. This would collect and, if necessary, transmit details of all the suspect's keystrokes. "It's just like putting a secret camera in someone's living room," he said.
Peter Ruwoldt

Open source isn't free software - Computerworld Blogs - 0 views

  •  
    The FSF wasn't looking for money. The cost that comes with using free software code is that, if you sell or distribute programs or products that use the GPLed code, you have to share your modified code with its users. That's not much, but some companies, after adding their special sauce, don't want to share. That's a big, dumb mistake.
1 - 20 of 65 Next › Last »
Showing 20 items per page