69482807
submission
jfruh writes:
Last week, justice ministers from EU countries called for ISPs to censor or block certain content in the "public interest." But a legal analysis shows that such moves could actually violate EU privacy laws, since it would inevitably involve snooping on the content of Internet traffic to see what should be blocked.
69482545
submission
jfruh writes:
Fox, armed with the recent Supreme Court ruling that effectively banned Aero, went to court to stop the Dish Network from allowing its subscribers to stream live and DVR'd content over the Internet to their devices. But a federal court ruled that the situations are different: Dish has already purchased retransmission rights from content creators, and the streaming service falls within the rights of individual subscriber to place- and time-shift content.
69477007
submission
itwbennett writes:
Internet connections in the South East Asian nation have been affected by problems with the Asia America Gateway (AAG) submarine cable system for the fourth time in a year, according to local news outlets. The cause of the outages is as yet unknown, but that's not stopping online reports for pinning the blame on sharks. The more likely, but less dramatic cause of the damage was ship anchors or fishing, says Michael Costin, Chairman of the AAG Cable Consortium.
69449811
submission
jfruh writes:
If you're tired of seeing fake or misleading news articles posted by your friends to Facebook and then spreading like wildfire, you might be in luck. In a system that's something like Slashdot comment moderation on a grand scale, you'll now be able to flag a story as false. Links that have been flagged this way by many users will appear less frequently in people's newsfeeds, or with a disclaimer attached.
69445025
submission
IsoQuantic writes:
A new report from the tech career site Gooroo sheds light on which programming skills are most in demand for which tech positions. Its recently released International Tech Careers and Salary Index is based on an analysis of 3 million tech job listings from the United States, Great Britain and Australia from January through September, 2014. For a number of common tech job titles, Gooroo analyzed which skills are mentioned the most in listings for that position.
The bottom line is that different kinds of programming skills are better suited for different kinds of software development jobs. For example, if you want to be an iOS developer, being able to code in Objective-C will help you a lot more than other skills. Also, some programming skills will make you a more attractive candidate for non-developer positions. Being able to write SQL, for instance, comes in handy for system administrators, data scientists and Web designers.
By analyzing the numbers about available programming jobs, it's possible to see which skills are most in demand in the tech world. For example, the five skills most often mentioned in tech job listings were: SQL (24.3%), Java (14.5%), JavaScript (13.1%), C# (10.4%), and CSS (9.9%). In terms of salary, the five most popular tech job listings were: Python ($95,948), Java ($93,668), JavaScript ($89,101), SQL ($87,502) and C# ($87,446).
See slide show and comments below the same at the link below.
69437581
submission
itwbennett writes:
It's a basic truth that when people use a medium owned or operated by a third party, such as the Internet, an elevator with a camera or a mobile app that requires connectivity, there is no privacy. So the best thing you can do, is to place some value on your personal information and then lie, lie, lie your way into obscurity, says Frank Ahearn, a privacy expert and author of the book 'How to Disappear.'
69405221
submission
jfruh writes:
When Randy Westergren, acting out of curiosity, investigated Verizon's Android MyFiOS app for security vulnerabilities, he spotted some big ones, and let the telecom giant know about them. Somewhat amazingly, Verizon didn't react by punishing the messenger, but rather fixed the problems right away and gave him a free year of FiOS for his trouble.
69405151
submission
jfruh writes:
According to a new report derived from the treasure trove of documents leaked by Edward Snowden, the NSA uses hijacks existing criminal botnets for its own purposes. Computers already infected by run-of-the-mill crooks might find themselves repurposed by the NSA, and then launching attacks that would be difficult to trace back to the shadowy security agency.
69321617
submission
jfruh writes:
Since a smartphone is an easily portable — and easily losable, and easily stealable — device that contains all sorts of personal data, the idea of a remote "kill switch" or wipe solution is a popular one. Now Qualcomm is looking to build the concept right into their next-gen Snapdragon chip, preventing any OS-level workarounds.
69278279
submission
jfruh writes:
Since the middle of December, visitors to sites that run Google AdSense ads have intermittently found themselves redirected to other sites featuring spammy offerings for anti-aging and brain-enhancing products. While webmasters who have managed to figure out which advertisers are responsible could quash the attacks on their AdSense consoles, only now has Google itself managed to track down the villains and ban them from the service.
69277705
submission
itwbennett writes:
The story began a few months ago when it was reported that both Verizon and AT&T were injecting unique identifiers in the Web requests of their mobile customers. AT&T has since stopped using the system, but Verizon continues. Now, Stanford computer scientist Jonathan Mayer has found that one advertising company called Turn, which tracks users across the Web when they visit major sites including Facebook, Twitter, Yahoo, BlueKai, AppNexus, Walmart and WebMD, uses the Verizon UIDH to respawn its own tracking cookies.
69243233
submission
jfruh writes:
China's state-owned Internet service providers are improving the nation's connection to the worldwide Internet, adding seven new access points to the world's Internet backbone to improve speed and reliability for Chinese customers. This reveals the nation's essential Internet contradiction, improving its physical connection even as the government continues to block a number of important Intenet sites.
69243121
submission
jfruh writes:
With much of the US smartphone market set in its ways in either the iOS or Android camps, other companies are aiming to gain traction at the low end of the market, either in developming countries like India or with first-world customers who will never drop big money on a phone. Two of the main candidates are Samsung's new line of phones with its Tizen OS and, somewhat surprisingly, Microsoft, which is aggressively cutting prices of its Windows Phones. On specs, it seems that the Windows Phones have the edge.
69206439
submission
jfruh writes:
A lot of handwriting recognition tech involves writing with a finger or stylus on a screen of some sort, but Fujitsu has a different approach. It's introducing a Bluetooth ring that allows the wearer to "write" Japanese or Latin characters in midair, with the text appearing on a paired smartphone or computer. The company claims 95% accuracy in transcription, and is aiming the device at maintenance and repair workers who need to do data entry but also keep their hands free.
69206299
submission
jfruh writes:
More than 20 travel-related websites have experienced data breaches in the past two months, according to a security expert who tracks the trade in stolen data, with United Airlines reporting that some customers' frequent flier mileage accounts were compromised as recently as this past Sunday. The reason they're such tempting targets: frequent flier points, and the airline tickets they can be redeemed for, are easy to sell for quick profits.