August 08, 2011

Mobile Privacy: beware of unintended consequences

These issues are explored in our recent paper, .  We argue strongly that potential unintended uses of mobile systems must form part of the privacy threat/risk assessment, right from the outset, and that privacy must be built directly into protocols for location-based technologies.



Blackberry 8800 8820 charger port “GORDON’S ALIIVVEEEEEE????!!!” A Plea for a Brian Blessed GPS

Posted by: pybadyfyto at 11:32 PM | No Comments | Add Comment
Post contains 63 words, total size 1 kb.

Online dispute resolution saves firms time and money

Online dispu
te resoution is changing the way concerned parties participate in the resolution process.



Zotac MAG

Posted by: pybadyfyto at 09:42 AM | No Comments | Add Comment
Post contains 24 words, total size 1 kb.

August 07, 2011

Accelerated: TechStars harnesses the power of mentorship

Q&A wit
h Nicole Glaros, managing director of TechStar Boulder, a mentorship-driven seed-stage investment program



Nokia ac 8u high efficiency wall charger bulk packaging Ottawa woman gives voice to Yemeni protestors under fire

Posted by: pybadyfyto at 08:12 PM | No Comments | Add Comment
Post contains 39 words, total size 1 kb.

Can’t figure out which Android phone to choose?

The top 3 An
droid phones really standout as my top 3 picks, heading into the 2011 back to school period.



Bookmark php Spammers can be quite creative

Posted by: pybadyfyto at 06:32 AM | No Comments | Add Comment
Post contains 35 words, total size 1 kb.

August 06, 2011

Google+ the ‘Swiss Army Knife’ of social networks

Google+ the ‘Swiss Army Knife’ of social networks

By Edward N. Albro

When Google+ first launched, most people saw it, correctly, as a competitor to Facebook. But as you try Google’s social network, you realize that it has a lot in common with Twitter too. That versatility could be Google’s strength — but it could be its downfall too. Is Google+ trying to do too much?

Google+’s similarities to are obvious: You can use it to share updates, pictures and videos with family and friends. But can also be a lot like Twitter. Like Twitter (and unlike Facebook), absolute strangers can follow you without you following them or approving them (you can block people if you want). And while you can use Google+ to share personal news with people close to you, you can also use it to broadcast your thoughts on the news of the day to thousands of people you’ve never met.

In fact, my early impression of Google+ is that it is being used more like Twitter than like Facebook, that is more as broadcast than as friendly sharing. Of course, my circles are mostly filled at this point with tech journalists, both because those are the people who got and because they’re the people I know. And tech journalists are notorious blowhards. So the use of Google+ may change as it expands to the general public.

As Google+ expands, though, I wonder if people will know what to make of this Swiss Army Knife of social networks. After all, what killed Google Wave wasn’t that it did too little, it was that it did too much. It was an email system, a chat network, a file sharing service, a project management device and more — it did so much that people couldn’t figure out how to use it.

The fact that Google+ can be both and Twitter at once (with maybe a little Tumblr thrown in) could be its greatest competitive edge against those other services. But it could also leave users bewildered.

And the confusion won’t be confined to how you share things in your own account. Maybe more difficult will be knowing what to expect of the people you follow. When I follow Lance Armstrong on Twitter, I know what I’m going to get: That portion of his thoughts that he thinks are appropriate for thousands of people he doesn’t know. If I were to follow him on Google+, I don’t know what I’d get, because I don’t know how he’ll see the forum. If Lance decides Google+ is like Facebook, I may see almost nothing because he’s only sharing with his actual family and friends. Or I may get the same kind of firehose of pronouncements I see on Twitter.

Of course, the great thing about Google+ is that you don’t have to choose between the two different ways of communicating, some posts can go only to your closest friends, others to any Tom, Dick or Harry. I hope that as Google+ rolls out to hundreds of millions of new users, they’ll see those distinct ways of communicating as powerful. But I fear that for many, it may just be confusing.

Sophisticated polymorphic malware is on the rise

Paul Wood

Polymorphic malware uses variations of the same code by employing different encoding techniques, making it harder to detect as each new variation may require its own signature in order to identify it correctly.



Bookmark php The Golden Gobblers Awards

Posted by: pybadyfyto at 03:42 AM | No Comments | Add Comment
Post contains 48 words, total size 1 kb.

August 05, 2011

A Mac pro’s 5 minute Lion configuration

• Run Software Update. Apple often releases patches and updates with new OS versions. To make sure my OS and Apple applications are as up-to-date as possible, I run Software Update immediately (available from the Apple menu).



Bookmark php Are you standing between your tech start-up and success?

Posted by: pybadyfyto at 02:22 PM | No Comments | Add Comment
Post contains 55 words, total size 1 kb.

Reduce automatic notifications to improve productivity

Reduce automatic notifications to improve productivity

By Robert Strohmeyer

To a busy person, a little chime signaling the arrival of new mail amounts to nothing more than a statement of the obvious. Of course you have new mail. You always have new mail. Look in your inbox right now and you know what you’ll find? New mail. You really don’t need some obnoxious bell tinkling away in your system tray to tell you about it.

Message notifications, be they push or pull, do far more to break your concentration than to alert you about important new . They ding every five minutes or so and tell you basically the same thing every time: Someone sent you e-mail. If you’re very busy, and you already have enough basic awareness of your own professional life, you’ll disregard the chime and keep working. If you’re a little compulsive (like me), you’ll feel obligated to check the inbox, breaking your focus on the task at hand to peruse the new messages. In either case, your notification has interrupted your train of thought, however briefly, to announce something that you could have guessed on your own.

The problem with notifiers isn’t just that they tell you the obvious about the state of your inbox; it’s that they break into your consciousness with such frequency that you could spend the majority of your day looking at (and usually deleting or archiving) two or three messages at a time without ever accomplishing any significant work. Every time you shift your focus away from a present task, you then have to spend some time refocusing on it again. If a pointless little bell draws your attention every 5 or 10 minutes, you’ll be lucky to get a full hour of actual work done in an 8-hour day, and you’ll never be able to establish a state of flow.

Related Story:

While it’s nice (and usually surprising) to get an instantaneous reply to an e-mail you’ve sent out, the truth is that none of us expect an immediate response to our messages. Even the most wildly urgent e-mail in your inbox probably doesn’t require a response in less than 30 minutes (if it did, the person probably would’ve called or IMed you). Most of your contacts will be satisfied if they hear from you within the same business day, and still others will happily wait until tomorrow for your reply. So why the sense of urgency to know that new mail has landed?

Some productivity mavens recommend simply reducing the frequency of your notifiers to 20 or 30 minutes, but this strikes me as pointless. Because you already know that you’re going to get at least a couple of new messages in any given 5-minute period within the business day, you’re better off just assuming that you pretty much always have new mail in your inbox.

Rather than allow a notifier to tell you when you’ve got mail, just set your own intervals for mail breaks in whatever way suits your schedule. If you’re fastidious about responding quickly to important messages, check every 30 minutes. If you’re more relaxed, do it once every hour or two. In my experience, getting accustomed to worrying less about the e-mail inbox is a great way to discover just how little everyone else worries about the immediacy of your replies. Sure, there’s the occasional frantic weirdo who’ll call you ten minutes after sending you an e-mail to ask you if you got it, but most people really don’t care how long it takes you to get back to them, as long as it’s within a business day, or by end of day if it’s slightly more urgent.

What you gain in exchange for the relaxed mail intervals is a better shot at staying focused on the tasks that actually matter. You’ll likely also find that you spend less time dealing with e-mail overall, since it takes less time to sort and archive 30 messages at once than to deal with three at a time every 10 minutes. So go ahead, turn off the notifier and try working for a week without it. You may be surprised at the focus boost you get.

August 04, 2011

SMB owners are an overworked but happy bunch

Nearly half (46 per cent) of SMB owners polled, work beyond a 40-hour work week, according to a survey by Angus Reid Public Opinion which was commissioned by Intuit Canada, makers of the small business accounting software QuickBooks.

Amazingly, SMB owner appear unfazed by their longer work schedules. As much as 84 per cent of those polled feel they have a better work-life balance than if they were working for someone else, the survey found. 



Samsung galaxy s vibrant First Broken iPhone 4 Screen

Posted by: pybadyfyto at 11:02 AM | No Comments | Add Comment
Post contains 92 words, total size 1 kb.

August 03, 2011

Will BlackBerry users get BBM 6′s message

Will BBM 6 s
ocial integration features rekindle the old BlackBerry magic?



Targus ach111ca 4 port mobile usb hub News Flash: Gadgets are distracting

Posted by: pybadyfyto at 09:42 PM | No Comments | Add Comment
Post contains 30 words, total size 1 kb.

Canadians #tweettheresults in revolt against Election Act Sect 329

Canadians #tweettheresults in revolt against Election Act Sect 329

By Nestor  Arellano

In a rare exhibition of election fervor Canadians vented their views about the polls and a few even braved the risk of being fined by Elections Canada by “illegally” tweeted early results of yesterday’s Federal Election.

Nestor Arellano

The act of online civil disobedience squarely went against the archaic but still in effect Elections Act, Section 329 which states: No person shall transmit the result or purported result of the vote in an electoral district to the public in another district before the close of all the posting station in that other district.

Penalties for violating the act, which was introduced back in the 1930s to prevent election results from Atlantic Canada from being broadcasted to the rest of the country, could include a fine of up to $25,000 and five years in prison.

Back in 2000, Peter C. Bryan of Vancouver was fined $1,000 for flouting the 70-year-old law and posting on his blog the election results from Atlantic Canada which he accessed from a satellite feed from Newfoundland.

While, Bryan was reluctant to do the same this time around, many of his compatriots and not a few from abroad posted their opposition to EA Section 329 under the hashtag #tweetheresult. #tweettheresults generated so much buzz that it quickly became the most tweeted topic worldwide eclipsing even tweets about Osama bin Laden.

Creators of the site , and , said they created the site to “highlight that fact, and to urge lawmakers to revise this information blackout.”

The law, they said, made sense in an era when there were only a dozen radio stations in the country and we were generations away from the 24-hours news cycle, the Internet, Facebook updates, microblogging and Twitter.

Although from 7 p.m to 10 p.m,  the site removed its aggregation feature: “To avoid a potential fine or protracted legal battle, we have taken this site offline for 3 hours,”  there were many tweets like the one posted by Schmeedle that dared to include riding numbers

Deena Roth owed

Haha! RT @ Conservatives ███ █████ in ███ ridings.Liberals ███ █████. NDP █████ ██ ███ ███ seats!

A lot of users also began posting election results that were being shown on TV by local networks:

One person in Australia said he received election results sent to him via email: some 45 minutes before the social media blackout expired:  

I think punitive measures such as the one threatened by Elections Canada against people posting preliminary poll results on sites such as Facebook and Twitter, are not the answer.

At a time when we have been facing voter turnout of less than 50 per cent, activities that enable citizens to voice out their thoughts about politics and generate interest about the country’s political future should be encouraged.

EA Section 329 was created so that voters across the country went to the polls with basically the same information and would not be influenced by news coming from other parts of Canada. Proponents of Sect 329 believe that tweets from one end of Canada have the power to sway voters in the other end of the country. Yes that will likely happen in some cases but I think in general people in different provinces vote on different issues. I also can’t imagine people waiting outside polling stations checking on their smartphones and tablets checking to see how people on the other side of the country voted before they cast their own ballots.

The law was mainly aimed a broadcasters and large news media, not individuals using social media tools to communicate with their friends. Its framers had not foreseen advent of the Internet and the spontaneous viral connections afforded by social media. Elections Canada was able to single out Bryan back in 2000 but would the election body be able to enforce the law today if it decided to?

Would the law cover an individual informing his 40 friends on Facebook about election results in his part of the country? Would an American retweeting poll results from Newfoundland be fined for doing so?

How do you police the twitterverse? If they wanted, people can tweet, text, post on Facebook or even make a video on YouTube of the elections proceedings in their area.

Elections Canada, actually seems to have little appetite for s doing just that. In interviews with various news outlets its representatives have made it clear that Elections Canada is not monitoring the social media space. Elections Canada is simply not set up for such a task. Instead, reaction to violation of Section 329, they said, will be a “complaint driven process.” – there won’t be any investigation unless there is a complaint.

Perhaps this difficulty in enforcing the Section 329 will eventually lead to the law being replaced  with something that is more in tune with our current reality.

August 02, 2011

How to determine market demand on a start-up budget

Measuring ma
rket demand through social media is a growing opportunity that may prove to be extremely valuable to entrepreneurs.



Motorola v3 hinge CDs, DVDs top iPads as favourite Christmas gift choice

Posted by: pybadyfyto at 06:22 PM | No Comments | Add Comment
Post contains 40 words, total size 1 kb.

What is your market validation plan?

By Peter Hanschke

Here’s the situation: Your development team is busy creating a  (MVP). You have people off in all directions trying to secure some funding. But do you have a Market Validation Plan? Furthermore, are you executing this plan along with all the other activities? In other words, is this an activity that you are currently performing?

As the name suggests, a Market Validation Plan (another MVP for those who like ) is about reaching out to your target market to determine whether:

August 01, 2011

Growing mobile workforce, cloud computing bring new security threats

An increase
in the mobile worker population means one thing for IT professionals – an increase in security threats.



Blackberry 8700c blue refurbished white box unlocked gsm cellular phone The Golden Gobblers Awards

Posted by: pybadyfyto at 03:32 PM | No Comments | Add Comment
Post contains 42 words, total size 1 kb.

iPhone tracking controversy & PlayStation breach: Both unacceptable and avoidable

The following is an excerpt from Commissioner Cavoukian’s keynote presentation at the on May 5, 2011.

Privacy by Disaster is what you get when you don’t do Privacy by Design – when you don’t build privacy into technologies, business processes, and infrastructures proactively, right from the beginning!

The Apple has put mobile in the spotlight. The is another case in point.

Ann Cavoukian, Information and Privacy Commissioner of Ontario

I would argue that it really boils down to control – personal control over one’s data flows. What’s missing here? I’ll tell you: it’s the proper application of Fair Information Practices that form the core of our principles, namely:

1. Consent: Have the users provided their free and specific consent for the collection, use and disclosure of this personal information? Make the system user-centric.

2. Openness and Transparency: Give users clear, effective notification of the information being collected – it is no good burying these details deep inside a web site or a lengthy terms and conditions document.

3. Purpose specification: Clearly specify the purposes for which personal information is collected, used, retained and disclosed.

4. Use limitation: Always limit the use of personal information to the relevant purposes identified to users.

5. Data Minimization: Limit the amount of data you collect and retain – and anonymize the data so it can not be linked back to personal identifiers.

Failure to apply these universal principles damages business reputations, product brands and services and, of course, individual privacy. Classic lose-lose scenario.

It doesn’t have to be this way. Privacy by Disaster can be prevented altogether.

When Privacy by Design principles are applied early, robustly, systematically and across the business ecosystem, they can prevent disasters from occurring in the first place, helping to preserve confidence and restoring trust.

I encourage you to check out a number of PbD panels and workshops at the IAPP Symposium, including the panel on PbD and Mobile Computing led by Assistant Privacy Commissioner Ken Anderson.

You can also pick up a copy of our recently published A Practical Tool for Developers, Service Providers, and Users.

Hopefully the Apple and Sony controversies will serve as a loud wake-up call – for companies to embrace Privacy by Design, address privacy proactively and put control squarely in the hands of the users, where it belongs.

<< Page 2 of 2 >>
43kb generated in CPU 0.0117, elapsed 0.1135 seconds.
32 queries taking 0.1051 seconds, 98 records returned.
Powered by Minx 1.1.6c-pink.