Categories
-Multimedia 10.1 Online Outlaws: Computer Crime 10.2 Computer Security: Reducing Risks Chapter 10 Computer Security and Risks

Behind the Front Lines in the Virus Wars

In this TED talk, Mikko Hypponen tells us about–and shows us–a variety of malware species, from the earliest PC viruses to today’s high-tech organized crime menace.
[ted id=1192]

Categories
-Updates 10.5 Human Questions for a Computer Age 15.5 Question-Answering Machines

What Is Watson?

This year Watson, an IBM computer, beat two champions on TV’s Jeopardy. This PBS Nova program goes behind the scenes and explains how Watson’s creators pulled it off.

Categories
-Cross Currents 1.0 Creating Communities on the Living Web 10.5 Human Questions for a Computer Age 11.2 Technology and Job Quality 12.1 Systems and Organizations 8.5 Interpersonal Computing: From Communication to Communities

Is There a Friend Limit?

In an age when “friend” is a verb, many of us have hundreds of social-network friends. But Oxford Anthropologist Robin Dunbar’s research suggests that we’re wired to max out our meaningful relationships at about 150. This NPR story has details. Can technology help us break Dunbar’s limit, and is that a worthwhile goal?
Categories
-Updates 10.2 Computer Security: Reducing Risks 13.2 E-Business 1.0: Intranets, Extranets, and E-Sales 7.0 The Google Guys Search for Tomorrow 8.2 Wireless Network Technology 8.3 Specialized Networks: From GPS to Digital Money

Google Wallet: A Wireless Credit Card in Your Phone?

This summer some consumers will be able to pay for some of their purchases by waving their phones instead of swiping their cards. Google Wallet is an Android App that uses near-field communication technology to send transaction information from phone to merchant terminal. This kind of technology could eventually change the way we do most of our face-to-face shopping.
This New York Times article includes a demo video.

Categories
-Cross Currents 10.5 Human Questions for a Computer Age 2.3 The Computer's Core: CPU and Memory

The Green IT Movement has lost the plot

The computer industry is trying to green up its act by creating more energy-efficient products. But according to David Moschella in his Computerworld column, computer manufacturers need to take a hard look at what happens to our tech tools and toys when we discard them and move on to newer devices.
The_Green_IT_movement_has_lost_the_plot
Categories
-Cross Currents 10.3 Security, Privacy, Freedom, and Ethics 10.5 Human Questions for a Computer Age 13.3 E-Business 2.0: Reinventing Web Commerce 13.4 E-Commerce Ethics 7.3 Database Trends 7.4 No Secrets: Computers and Privacy

Show Us the Data. (It’s Ours, After All.)

Who owns your data? If somebody else collects information about you, should you have the legal right to see and use that information? New York Times Columnist Richard Thaler argues that consumers and businesses alike would benefit from laws ensuring that you have access to your information.
Read on New York Times site

Categories
-Multimedia 10.5 Human Questions for a Computer Age 8.7 Social Networks Chapter 1 Exploring Our Digital Planet Chapter 10 Computer Security and Risks Chapter 8 Networking and Digital Communication Chapter 9 The Evolving Internet

Beware of Online Filter Bubbles—A TED Talk by Eli Pariser

Two people sitting next to each other in a coffee house can get wildly different results from the same Google search. Many Facebook users see only posts from friends who agree with them because Facebook is hiding posts from other friends. These two sites, and many others, use filtering software to personalize our Web experience. In this short, thought-provoking talk, Eli Pariser said this software is rapidly creating a world in which “the Internet is showing us what it thinks we want to see, but not necessarily what we need to see.”

[ted id=1091]