Skip to main content

Home/ Science Technology Society/ Group items matching "Networks'" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
thinkahol *

Social networking's good and bad impacts on kids | KurzweilAI - 0 views

  •  
    Social media present risks and benefits to children but parents who try to secretly monitor their kids' activities online are wasting their time, says Larry D. Rosen, Ph.D., professor of psychology at California State University, Dominguez Hills. Rosen identifies potential adverse effects of social media, including: Teens who use Facebook more often show more narcissistic tendencies, while young adults who have a strong Facebook presence show more signs of other psychological disorders, including antisocial behaviors, mania, and aggressive tendencies. Daily overuse of media and technology has a negative effect on the health of all children, especially preteens and teenagers, by making them more prone to anxiety, depression, and other psychological disorders, and making them more susceptible to future health problems. Facebook can be distracting and can negatively impact learning. Studies found that middle school, high school and college students who checked Facebook at least once during a 15-minute study period achieved lower grades. Rosen says new research has also found positive influences linked to social networking, including: Young adults who spend more time on Facebook are better at showing "virtual empathy" to their online friends. Online social networking can help introverted adolescents learn how to socialize. Social networking can provide tools for teaching in compelling ways that engage young students. "If you feel that you have to use some sort of computer program to surreptitiously monitor your child's social networking, you are wasting your time. Your child will find a workaround in a matter of minutes," he says. "You have to start talking about appropriate technology use early and often and build trust, so that when there is a problem, whether it is being bullied or seeing a disturbing image, your child will talk to you about it." Ref.: Larry D. Rosen, Poke Me: How Social Networks Can Both Help and Harm Our Kids, 2011; 119th Annua
thinkahol *

Sony network breach shows Amazon Cloud's appeal for hackers | KurzweilAI - 0 views

  •  
    The hackers that brought down Sony's Playstation Network for more than a month used stolen credit cards to rent computing power from Amazon's Elastic Computing Cloud (EC2) to carry out their attack. Personal information, credit cards, and passwords from millions of customers were seized by hackers during the attack. Because computing power can be rented from EC2 anonymously, hacking using the service can be hard to trace. Tracing the attack may require the FBI seeking a search warrant to access Amazon's detailed records of which IP addresses accessed the service at which time, and tracing those IP addresses to homes or businesses. The Playstation Network remains down in Japan due to government concerns over its security.
thinkahol *

Collective memory | KurzweilAI - 0 views

  •  
    As computing power continues to move from the desktop to portable devices, the nature of communications networks will change radically. A network in which devices are regularly being added and removed, and where the strength of the connections between the devices fluctuates with their movement, requires much different protocols from those that govern relatively stable networks, like the Internet.
Todd Suomela

RAND | Research Memoranda | On Distributed Communications: I. Introduction to Distributed Communications Networks - 0 views

  •  
    One in a series of eleven Memoranda detailing the Distributed Adaptive Message Block Network, a proposed digital data communications system based on a distributed network concept. It introduces the system concept and outlines the requirements for and design considerations of such a system, especially in regard to implications for its use in the 1970s. In particular, the Memorandum is directed toward examining the use of redundancy as one means of building communications systems to withstand heavy enemy attacks.
thinkahol *

'Wireless' humans could form backbone of new mobile networks | KurzweilAI - 0 views

  •  
    Members of the public could form the backbone of powerful new mobile Internet networks by carrying wearable sensors, according to researchers from Queen's University Belfast.
Aman Khani

Deciding On the Right Network Managed Services - 1 views

  •  
    To completely comprehend a provider's dependability as well as the reputation it would be sensible speaking to some of their customers as well as associates to see what they have to say about the company.
thinkahol *

Anonymous exposes 1,589 internet child porn users OPDarknet | MGx - Musings, Essays & Ballads - 0 views

  •  
    Anonymous uses its skills to extract user information from darknet websites specializing in child pornography. Tuesday, after hacking into Lolita City, a darknet website used by pedophiles to trade in child pornography, Anonymous released usernames and other information of 1,589 pedophiles trading in kiddie porn. The move comes after the group managed to take down more than 40 pedophile websites last week which were swapping images through the Tor anonymization network. A darknet website is a closed private network of computers used for file sharing. Darknet websites are part of the Invisible Web, sometimes called the Deep Web, containing content that is not part of the Surface Web, which is indexed by standard search engines. Yesterday Pastebin release, Anonymous enthusiasts explain the technical side of how they were able to locate and identify Lolita City and access their user data base. In a prior Pastebin release, Anonymous offers a timeline of events detailing the discovery of the hidden cache of more than 100 gigabytes of child porn associated with Lolita City.
thinkahol *

Building a Subversive Grassroots Network - IEEE Spectrum - 0 views

  •  
    How Commotion Wireless plans to enable digital communication in the face of an Internet shutdown
primusit

telecommunication network companies - 1 views

  •  
    As one of the leading optical module manufacturers, we provide a variety of customzied solutions, includes configuration designing, programming and coding solutions to fit our customers' need and to enable the next generation of optical transceivers.
thinkahol *

Giant Undersea Network Will Bring Offshore Wind Power to East Coast, With Google Investment | Popular Science - 0 views

  •  
    Last night, Google announced that it has agreed to invest heavily in a proposed $5 billion, 350-mile power transmission backbone that would provide infrastructure for future offshore wind projects along the mid-Atlantic coast. But even with the backing of one of the world's mightiest tech companies, various financial investment firms, and many important officials in government, the transmission line is going to be something of a technological trick.
thinkahol *

A story bigger than Facebook - 0 views

  •  
    Much like a Facebook profile, " The Social Network " is made more appealing through some artful lies, well-chosen omissions and careful shading.
Todd Suomela

Uncertain Principles: What's the Matter With Biologists? - 0 views

  •  
    And yet, even today, seventeen years after the launch of the arxiv, every attempt to set up a preprint service for biologists has been a dismal failure, as noted by both Ginsparg and Timo Hannay (whose Science21 talk notes are up at Nature Networks. You can also get video and microblogging). Contrary to what a naive outsider's opinion might suggest, biologists appear to be highly resistant to the whole idea of sharing pre-publication results.
Todd Suomela

Apomediation - P2P Foundation - 0 views

  •  
    Apomediation is a new scholarly socio-technological term that characterizes the process of disintermediation (intermediaries are middlemen or "gatekeeper", e.g. health professionals giving "relevant" information to a patient, and disintermediation means to bypass them), whereby the former intermediaries are functionally replaced by apomediaries, i.e. network/group/collaborative filtering processes [Eysenbach, 2008 [WebCite] and 2007b]. The difference between an intermediary and an apomediary is that an intermediary stands "in between" (latin: inter- means "in between") the consumer and information/service, i.e. is absolutely necessary to get a specific information/service. In contrast, apomediation means that there are agents (people, tools) which "stand by" (latin: apo- means separate, detached, away from) to guide a consumer to high quality information/services/experiences, without being a prerequisite to obtain that information/service in the first place. The switch from an intermediation model to an apomediation model has broadimplications for example for the way people judge credibility, as hypothesized and elaborated in more detail elsewhere [
thinkahol *

About New York - Creating a Network Like Facebook, Only Private - NYTimes.com - 0 views

  •  
    Four N.Y.U. students have decided people should be able to communicate online without surrendering their privacy to a big business.
thinkahol *

The American Wikileaks Hacker | Rolling Stone Culture - 0 views

  •  
    On July 29th, returning from a trip to Europe, Jacob Appelbaum, a lanky, unassuming 27-year-old wearing a black T-shirt with the slogan "Be the trouble you want to see in the world," was detained at customs by a posse of federal agents. In an interrogation room at Newark Liberty airport, he was grilled about his role in Wikileaks, the whistle-blower group that has exposed the government's most closely guarded intelligence reports about the war in Afghanistan. The agents photocopied his receipts, seized three of his cellphones - he owns more than a dozen - and confiscated his computer. They informed him that he was under government surveillance. They questioned him about the trove of 91,000 classified military documents that Wikileaks had released the week before, a leak that Vietnam-era activist Daniel Ellsberg called "the largest unauthorized disclosure since the Pentagon Papers." They demanded to know where Julian Assange, the founder of Wikileaks, was hiding. They pressed him on his opinions about the wars in Afghanistan and Iraq. Appelbaum refused to answer. Finally, after three hours, he was released. Sex, Drugs, and the Biggest Cybercrime of All Time Appelbaum is the only known American member of Wikileaks and the leading evangelist for the software program that helped make the leak possible. In a sense, he's a bizarro version of Mark Zuckerberg: If Facebook's ambition is to "make the world more open and connected," Appelbaum has dedicated his life to fighting for anonymity and privacy. An anarchist street kid raised by a heroin- addict father, he dropped out of high school, taught himself the intricacies of code and developed a healthy paranoia along the way. "I don't want to live in a world where everyone is watched all the time," he says. "I want to be left alone as much as possible. I don't want a data trail to tell a story that isn't true." We have transferred our most intimate and personal information - our bank accounts, e-mails, photographs, ph
thinkahol *

Quantum engineers remove roadblock in developing next-generation technologies - 0 views

  •  
    (PhysOrg.com) -- An international team has removed a major obstacle to engineer quantum systems that will play a key role in the computers, communication networks, and even biomedical devices of the future.
thinkahol *

Future Intelligence | Watch Free Documentary Online - 0 views

  •  
    Catch a first-time glimpse at smart technology that will put android helpers in the home, network commuters and entire cities to the Web, and bring us entertainment systems that can virtually make dreams come true. Advances in artificial intelligence are creating machines with near human-like mental agility. Intelligence will be embedded everywhere - even in our clothing, thanks to smaller, more powerful computers. Soon, we will be able to build computers with artificial intelligence and processing power that rivals the human brain. Intelligence will be everywhere, in our clothing, our vehicles and homes. Intelligent robots will serve us - until they don't feel like doing so anymore. And what happens then…?
1 - 20 of 34 Next ›
Showing 20 items per page