Archive for 2011/02/19
A broader discussion I had with my Microsoft contact and several others was whether mobile users will stay with Apps or move to Browsing. Apps make sense for tasks. If you know where you want to go, or what you want to buy, apps are great today. Furthermore, people are creatures of habit. The more they get used to apps, especially fanatically loyal Apple iPhone users, the more it becomes ingrained by a larger-and-larger user base. So, while intuitively it makes sense to browse the web on your smart phone, just like you do on a laptop or PC, this transition to browsing may take longer than expected. Two factors that may accelerate the adoption of browsing on smart phones are 1) the pace of improvement in smart phone operating systems that improve the browsing experience, and 2) Apple’s proprietary ecosystem, which together could drive users toward browser-based Google and Microsoft operating systems
It’s this snide, casual regard for people’s privacy that’s prompting a long-overdue backlash against the behavioural advertisersPosted: 2011/02/19 in Education / Awareness, Privacy / Data Protection, Tech Evolution
The combination of CloudShield’s Deep Packet Inspection platform and Fidelis’ Deep Session Inspection technology provides real-time network analysis, visibility, and control at network speeds up to tens of Gigabits per secondPosted: 2011/02/19 in Education / Awareness, Filtering, Tech Evolution
The SuperMassive E10000 Series uses SonicWALL’s Reassembly-Free Deep Packet Inspection (RFDPI) engine to scan every byte of every packet with full content inspection of the entire stream while providing high performance and low latency. The RFDPI engine also ensures full inspection of SSL-encrypted traffic as well as non-proxyable applications
Cryptome’s John Young: “Most reporters who contact me claim they have not time to read the material, and go on to ask impertinent questions about Julian and me. They are ignorant fools working to attract eyeballs to advertisements”Posted: 2011/02/19 in Education / Awareness
Since Wikileaks has received a lot of publicity with release of the gunship video and afterwards I have been bombarded with inquiries about Wikileaks. My attempts to deflect the inquiries were unsuccessful: most wanted information about Julian Assange and little about the operation of the initiative. Quite a few aimed to foster conflict between Cryptome and Wikileaks citing my early, very brief involvement and the mail list publication.
My critique of Wikileaks — earliest and latest — is intended to be constructive and to guard against praising a fledging operation due the weakening effect of excessive praise. Instead I believe Wikileaks needs greater, well-thought-out critique to assure it survives excessive glorification and demonization — which I warned about in the earliest days and which will become more intense in the future.
71-year-old Ray McGovern is a retired CIA officer turned political activist. He was a Federal employee under seven U.S. presidents over 27 years. When Secretary Clinton began her speech, McGovern remained standing silently in the audience and turned his back. McGovern was assaulted, dragged from the room and double handcuffed with metal cuffs causing profuse bleeding.
It was made clear to McGovern that he was not standing in a free speech zone
Could it be the U.S. government thinks peaceful, civilian protest against government is fine on the streets of Cairo, Egypt but not on U.S. soil?
U.S. Secretary of State Hillary Clinton’s recent comments that the United States will stand up for uncensored, global access to the Internet have drawn some criticism in the NetherlandsPosted: 2011/02/19 in Education / Awareness, Public Policy
Radio Netherlands Worldwide said in its report that there has been “fierce criticism” of American Internet policy, and the U.S. is itself working on a law to shut down the Internet. “In the U.S., Wikileaks is regarded as a threat to national security,” the report said. “Contrary to official policy, Washington in practice does very little to promote or guarantee internet freedom.”
The report also mentioned that “the operation known as the “Internet kill switch” was a dream of former President George W. Bush.
Internet politics: an interview with hip hop journalist and internet guru Davey D
Australia wants Sweden to make sure that WikiLeaks founder Julian Assange gets a fair hearing if he’s extradicted from Britain to face charges of sexual misconduct in SwedenPosted: 2011/02/19 in Education / Awareness
The Australian ambassador to Sweden, Paul Stephens, made the appeal in a letter to the Scandinavian country’s justice minister as Assange, a 39-year-old Australian, fought extradition in a London court.
Christopher Poole is moot’s real name and he was 15 when he founded 4chan. Eight years later, he still comes across like a shy teenager. Nevertheless, the elite of the digital culture were transfixed when he made an appearance in early February at the “Transmediale” art festival in Berlin’s House of World CulturesPosted: 2011/02/19 in Education / Awareness
“moot,” is worshipped as a “god” and “dictator.” In 2009, Time named him the “most influential person of the year” on its website. In the online voting process, fans voted for him 16 million times.
Meathead, a law student, is relatively well groomed. He used to attend meetings of the Pirate Party, but the discussions bored him. He preferred action, which led him to begin launching his own DOS attacks. Who did he attack? “I have no idea. It was always these IP addresses that they were giving me,” he says. He doesn’t care who is being targeted. He simply trusts the swarm.He Googled the punishment he would receive if caught. Section 303b of the German Criminal Code defines what he does as computer sabotage. “If you attack government agencies or critical infrastructure, you can easily be put away for a few years,” he says nonchalantly.
An influential private sector trademark defender is proposing to the World Intellectual Property Organization to undertake creation of an international “notice and takedown” system for alleged online trademark infringersPosted: 2011/02/19 in Blocking, Education / Awareness, Enforcement, Future Developments?, New Business Models, Tech Evolution
And he told Intellectual Property Watch that this will be followed in a few months by a separate proposal for a “notice-and-trackdown” article requiring internet service providers to divulge information about online counterfeiters so they can be gone after.
Secretary Clinton’s speech on Internet freedom was full of good news. The US has a more grown-up view of the complexities of Internet freedom and its importance. The bad news was in what Clinton didn’t address: the role US foreign policy and US companies play in Internet oppressionPosted: 2011/02/19 in Education / Awareness, Public Policy
Consumer Watchdog, one of the more harshest critics of Google’s dominance on the Internet, said it was “inappropriate” for the president to meet Schmidt in private while the search engine giant is being scrutinized by various U.S. government departmentsPosted: 2011/02/19 in Education / Awareness, Google, Public Policy
Google bought 48 companies during 2010, a buying spree that cost the Internet giant $1.8 billion, and a pace of acquisitions the company said it plans to continue through 2011Posted: 2011/02/19 in Education / Awareness, Google
Texas Attorney General Gregg Abbott has requested lots of information from Google, including the classified formula for setting ad ratesPosted: 2011/02/19 in Education / Awareness, Google, Public Policy
At issue is whether Google’s business practices hurt competition
Wolfram|Alpha, is an attempt to change the way we interact with knowledge on the web, to make the web more intelligent – by providing bespoke, freshly computed answers from a curated database of sourced factsPosted: 2011/02/19 in Education / Awareness, Tech Evolution
On our way to the Electronic Frontier Foundation’s 21st Birthday party, my programmer friend explained to me why, if it weren’t for the work of the good folks over at EFF, neither eBay nor WikiLeaks could do their thingPosted: 2011/02/19 in Education / Awareness
The EFF staged its 21st bash at Bricks and Mortar Media (BAMM.tv), a “content creation factory” in SoMa. In true tech-pioneer fashion, the night featured live nerdcore performances. What’s nerdcore? Let me put it this way. When the star of Dual Core shouts into the mic, “Throw your hands in the air if you’ve got mad skills,” the people he’s addressing really do have mad skills – like programming, web design, developing apps for mobile devices, managing vast databases, creating video games, and yes, even hacking. One of Dual Core’s raps included the line, “My girlfriend is a hacker.” He’s clearly smitten.
And oh, the nerdy crowd! The knowing glint in their eyes, those people who really understand how to manipulate technology. They program software, develop apps, eat, sleep and breathe online communication, whip out iPhones and Droid phones and talk about video games, latest versions of browsers and operating systems, and other matters that this reporter could not quite comprehend, because they were using acronyms. And yet, when you hang out with hardcore nerdcore fans, you learn the most fascinating things. For example, how when you begin typing “Torrent” into a Google search engine, the word “torrent” will not show up in the automatic feed that suggests search terms. Why? Well, there are theories.