recentpopularlog in

juliusbeezer : internet   446

« earlier  
71,716 video tapes in 12,094 days | Internet Archive Blogs
Ms. Stokes was a fiercely private African American social justice champion, librarian, political radical, TV producer, feminist, Apple Computer super-fan and collector like few others. Her life and idiosyncratic passions are sensitively explored in the exceedingly well reviewed new documentary, Recorder: The Marion Stokes Project, by Matt Wolf. Having premiered last month at the 2019 Tribeca Film Festival, the film is on tour and will be featured at San Francisco’s Indefest, June 8th & 10th. For those in the Bay Area, please consider joining Internet Archive staff and leadership at the 7:00pm June 10th screening. Advance tickets are available now, seating is limited.

Long before many questioned the media’s motivations and recognized the insidious intentional spread of disinformation, Ms. Stokes was alarmed. In a private herculean effort, she took on the challenge of independently preserving the news record of her times in its most pervasive and persuasive form – TV.
archiving  television  internet  spectacle  history 
june 2019 by juliusbeezer
Does Your iPhone Use As Much Electricity As A New Refrigerator? Not Even Close. – ThinkProgress
The survey of smart phone users was for 4G (because it was 2012 and presumably in the US), resulting in about 12 GB/year of data flows. We need to pair that number with the 4G efficiency of 0.6 kWh/GB (average of the range) to get a consistent estimate of 7.2 kWh/year. Thus, Mr. Mills’ 300 kWh/year for data flows should be 42 times lower, or 7.2 kWh/year.

Mr. Mills gives a electricity intensity range of 2 to 19 kWh/GB, and chooses the lowest value, thus seeming to be a reasonable fellow, but let’s examine that range. 2 kWh/GB is a bit lower than the Swedish average for 3G intensity, but it’s in the same ballpark, so let’s call it 3G. That means he’d need to pair that intensity with data flows for 3G phones, but such data are not easily available.
energy  networking  internet  telephony 
may 2019 by juliusbeezer
1990, meet 2018: How far does 20MHz of Macintosh IIsi power go today? | Ars Technica
As expected, the Macintosh IIsi is, unsurprisingly, not going to replace your modern computer. It's not going to replace mine.

To its credit, however, the IIsi was able to get me to where I wanted to go, whether it was a spot of writing, listening to music (kind of), checking emails, unwinding with a classic computer game, or browsing the World Wide Web. The more I interacted with the IIsi, the more I remembered what it was like to enjoy using a computer—to appreciate their capabilities as tools of business and leisure. While I initially wrote this off as misplaced nostalgia (something I am very susceptible to, I'll admit), I eventually found a subtle silver lining to my initial frustrations and setbacks.
Further Reading
A 1986 bulletin board system has brought the old Web back to life in 2017

Modern computing is all about supposed convenience: the convenience of connection, of multitasking, and of high performance. In my case, this means that I'll often have more than 30 open tabs in my Web browser before I even start my day, their contents often a mystery to me before I bother to clean house. I'll jump between multiple email accounts, WhatsApp, Facebook Messenger, and other modes of communication throughout the day, fragmenting my attention further. I may write for a few minutes distraction-free before a popup appears on my taskbar—updates pending.

A modern computer, something a thousand times faster than the IIsi, might imply that I'm completing a thousand tasks at once or one task a thousand times faster. Neither is the case—all those open tabs, unread messages, and pending updates are a drain on resources, both computational and personal.

In contrast, taking the IIsi through its paces was a joy. The limitations of the machine, with barely enough power to run more than one application at once, demands your attention to be 100 percent devoted to any single task. Paradoxically, it often felt like I was more productive with significantly fewer resources at hand. It captured and holds my attention on a single problem, rather than splitting my attention across dozens of unrelated tasks. Coming in with low expectations and knowing roughly what 20MHz can do for me these days, I came away from my sojourn pleasantly surprised.
apple  history  internet  informationmastery  email  web  text_tools 
february 2019 by juliusbeezer
One person, one click: is this how to save democracy? | Paolo Gerbaudo | World news | The Guardian
The pioneers of digital democracies were the pirate parties of northern Europe who first broke through in Sweden, Germany and Iceland about a decade ago, using an online decision-making platform called LiquidFeedback. One of its founders, Andreas Nitsche, said the idea was that “empowering the ordinary members would make these parties more responsive to the demands of society”.

More recently, the fiercely anti-establishment M5S and the Spanish leftwing populist party Podemos have led the way. “Ordinary citizens will become protagonists, abandoning the current system of delegate democracy in the hands of politicians,” said the late Gianroberto Casaleggio, who masterminded the M5S digital strategy. Given the discredited status of Italy’s political class, this narrative appealed to many citizens.
politics  italy  spain  internet  socialnetworking 
february 2019 by juliusbeezer
Dating Trend: Orbiting Someone is the New Ghosting Someone
She described going on a few “lovely dates” with a guy before he told her he wasn’t interested. She was fine with that, except for one small detail: “He still looks at every single [one of my] Instagram stories to the point where he shows up at the top of the list every time.”...
“He even responds to pictures that I’ll post of my family. And he’ll favorite and respond to my tweets too,” she wrote. Vanessa admits there’s been written correspondence — a tweet reply here, a “haha” comment there — but largely, this man is in her orbit, seemingly keeping tabs on her with with no intention of engaging her in meaningful conversation or, you know, dating her.
orbiting  internet  socialmedia  socialnetworking 
february 2019 by juliusbeezer
Opinion | How Silicon Valley Puts the ‘Con’ in Consent - The New York Times
The average person would have to spend 76 working days reading all of the digital privacy policies they agree to in the span of a year. Reading Amazon’s terms and conditions alone out loud takes approximately nine hours.

Why would anyone read the terms of service when they don’t feel as though they have a choice in the first place? It’s not as though a user can call up Mark Zuckerberg and negotiate his or her own privacy policy. The “I agree” button should have long ago been renamed “Meh, whatever.”
attention  internet  privacy  google  facebook  amazon 
february 2019 by juliusbeezer
Chew the fat with us
The easy way to keep in touch

Hackney LCC's email discussion group

What is it?

A small but growing group of Hackney cyclists (32 as of early March '98) who keep in touch about local cycling-related issues by email.

How do I join?

It's free and easy. Just send an email to borough co-ordinator Douglas Carnall, saying you want to be on the mailing list. He'll copy it to everyone in the group, including you, and we all then update our mailing list. Simple!

At the moment there aren't too many messages, so don't worry about having your mailbox filled up!
Hackney  cycling  politics  internet  email  history 
january 2019 by juliusbeezer
Twitter recap: World's eyes on Baraboo High School after Nazi salute photo goes viral | Local News |
451: Unavailable due to legal reasons

We recognize you are attempting to access this website from a country belonging to the European Economic Area (EEA) including the EU which enforces the General Data Protection Regulation (GDPR) and therefore access cannot be granted at this time. For any issues, contact or call 800-362-8333.
censorship  eu  us  internet 
november 2018 by juliusbeezer
Populism and the internet – a toxic mix shaping the age of conspiracy theories | John Naughton | Opinion | The Guardian
Sixty per cent of British people, for example, believe at least one conspiracy theory about how the country is run or the veracity of information citizens have been given. Britons who supported Brexit were considerably more likely to give credence to conspiracy theories than those who opposed it. Most worrying of all, though, is that 31% of Leave voters believed that Muslim immigration is part of a wider plot to make Muslims the majority in Britain, a conspiracy theory that originated in French far-right circles and is known as the “great replacement”. The comparable figure for Remain voters was 6%.

How has the internet affected all this? Our research showed that conspiracy theorists were early adopters, in that they perceived the unique usefulness of the early (pre-social media) web for people who believed propositions that would never get past the editorial gatekeepers of mainstream media. So part of the blogosphere was occupied by conspiracy theorists and what one might call conspiracist entrepreneurs: examples include those espousing the “new world order” conspiracy theory, David Icke with his “lizard” theory and Alex Jones with his InfoWars site. These and other sites became key nodes in an infrastructure of conspiracist and far-right discussion that lay beneath the radar of polite society and mainstream media.

This is probably why many people who thought about these things initially dismissed online conspiracism as a politically irrelevant phenomenon. As one cynic put it to me, at least it keeps fanatics in their pyjamas and off the streets.
internet  socialmedia  authoritarianism  uk  politics 
november 2018 by juliusbeezer
David Foster Wallace was right – even in paradise we will need the internet | Brigid Delaney | Opinion | The Guardian
Although Facebook and Google did not exist in 1996, Foster Wallace predicted that algorithms or some sort of sorting mechanism would materialise. He called it the Interlace.

“That Interlace will be this enormous gatekeeper. It will [be] sort of like the one publishing house from hell. They decide what you get and what you don’t. Because this idea that the internet’s gonna become incredibly democratic? I mean if you’ve spent any time on the web, you know that it’s not gonna be, because that’s completely overwhelming. There are four trillion bits coming at you, 99% of them are shit, and it’s too much work to do triage to decide.
internet  writing  future 
september 2018 by juliusbeezer
Inside the Daily Stormer’s Style Guide
The style guide is surprisingly fastidious about formatting. Links must not “stretch into the spacing between words.” Images must be exactly three hundred and twenty pixels wide, to avoid anything “aesthetically problematic.” Each post “should be filled with as much visual stimulation as possible,” in order to “appeal to the ADHD culture”; passages from mainstream sources must be unaltered, so that “we can never be accused of ‘fake news’—or delisted by Facebook as such.”

One section is called, simply, “No Such Thing as Too Much Hyperbole.” “Even when a person can say to themselves ‘this is ridiculous,’ they are still affected by it on an emotional level,” the guide says. “Refer to teenagers who get arrested for racist Twitter posts as ‘eternally noble warriors bravely fighting for divine war to protect the blood heritage of our sacred ancestors’. . . . You and anyone reading can say omg corny lol. But it just doesn’t matter to the primitive part of the brain.”
editing  politics  us  internet  socialmedia 
august 2018 by juliusbeezer
How E-Commerce Is Transforming Rural China | The New Yorker
Although China has the most Internet users of any country and the largest e-commerce market in the world—more than twice the size of America’s—there are still hundreds of millions of Chinese whose lives have yet to migrate online. Analysts predict that China’s online retail market will double in size in the next two years, and that the growth will come disproportionately from third- and fourth-tier cities and from the country’s vast rural hinterland. At a time when the Chinese government has instituted monumental infrastructure programs to develop these regions, companies like JD are providing a market-driven counterpart, which is likely to do for China what the Sears, Roebuck catalogue did for America in the early twentieth century.
internet  china  business  transport 
july 2018 by juliusbeezer
Qui contrôle Internet ?

Une poignée de grands acteurs dominent une grande partie du monde en ligne, mais Internet bénéficie d’une meilleure santé lorsque il est contrôlé par le plus grand nombre.
internet  français 
july 2018 by juliusbeezer
French MPs criticise 'hasty and ineffective' fake news law | World news | The Guardian
The law aims to identify and stop deliberately false information that is “massively” spread online in the three-month period before an election.

Most criticism has been focused on the section of the law that allows political parties or candidates to complain about an item of allegedly false or implausible information online and a judge will, within 48 hours, rule on it and can block the publication. The judge must decide whether the allegedly false information could determine the course of an election, and whether it has been massively and artificially spread online.
france  news  law  censorship  politics  internet  journalism 
july 2018 by juliusbeezer
The great firewall of China: Xi Jinping’s internet shutdown | News | The Guardian
Throughout the early 2000s, the Chinese leadership supplemented Fang’s technology with a set of new regulations designed to ensure that anyone with access to China’s internet played by Chinese rules. In September 2000, the state council issued order no 292, which required internet service providers to ensure that the information sent out on their services adhered to the law, and that some domain names and IP addresses were recorded. Two years later, Beijing blocked Google for the first time. (A few years later, Google introduced, a censored version of the site.) In 2002, the government increased its emphasis on self-censorship with the Public Pledge on Self-Discipline for China’s Internet Industry, which established four principles: patriotic observance of law, equitableness, trustworthiness and honesty. More than 100 companies, including Yahoo!, signed the pledge.

Perhaps the most significant development, however, was a 2004 guideline on internet censorship that called for Chinese universities to recruit internet commentators who could guide online discussions in politically acceptable directions and report comments that did not follow Chinese law.
internet  china 
june 2018 by juliusbeezer
How Peppa Pig became a video nightmare for children | Technology | The Guardian
Whether these videos are deliberately malicious, “merely” trolling, or the emergent effect of complex systems, isn’t the point. What’s new is that the system in which such violence proliferates is right in front of us, and visibly complicit, if we choose to see it for what it is. I titled that original essay “Something is wrong on the internet” because it seemed and still seems to me that the issues made glaringly obvious by the scandal are not limited to children’s content, nor to YouTube. First among these is how systems of algorithmic governance, rather than leading us towards the sunny uplands of equality and empowerment, continually re-enact and reinforce our existing prejudices, while oppressing those with the least understanding of, and thus power over, the systems they’re enmeshed in.

Take YouTube’s recommendation system for starters, which doesn’t differentiate between Disney movies and a grainy animation cooked up by a bot farm in China. Essentially what the seemingly benign “if you like that, you’ll like this” mechanism is doing is training young children – practically from birth – to click on the first thing that comes along, regardless of the source.
internet  youtube  video  children 
june 2018 by juliusbeezer
La France face au défi de la fracture numérique
À côté de la couverture mobile, l'impossibilité d'accéder à un Internet fixe de qualité constitue aussi un énorme problème pour nombre de villes et villages de l'Hexagone. Au début des années 2010, lorsque Nicolas Sarkozy était au pouvoir, le gouvernement a lancé un vaste programme : le Plan France très haut débit (PTHD). Repris sans grand changement par François Hollande, ce gigantesque chantier à 20 milliards d'euros repose essentiellement sur le déploiement de la fibre optique, qui vise à remplacer le vieux réseau cuivré. In fine, ce programme doit permettre à tous les Français de disposer d'un Internet ultrarapide à l'horizon de 2022. Le problème, c'est que d'ici là de nombreux bourgs, villes et villages devront se débrouiller avec un ADSL à bout de souffle. Ce qui pèse de plus en plus sur la compétitivité économique de nombreux territoires.
internet  politics  france 
june 2018 by juliusbeezer
Alternatives to Google Products (Complete List) | Restore Privacy
It’s been fun Google, but it’s time to say goodbye.

Have you noticed?

Google’s entire business model is based on you surrendering to their corporate surveillance. That’s it. All they do is repackage mass corporate surveillance into convenient, free, trendy applications that suck up all your data. Your private data helps Google dominate the online advertising market.

You are the product.

The other key issue to consider here is that Google is tracking and recording your activity in order to build a user profile, which can be used for various purposes. Google has many ways to track your activity, even if you are not logged into a Google account:
google  privacy  internet 
june 2018 by juliusbeezer
Meet the people who still use Myspace: 'It's given me so much joy' | Technology | The Guardian
Scalir, 48, is one of a dwindling group of people still committed to what was once the most popular social networking platform in the world, with more than 100 million users at its peak. While most people have long abandoned Myspace in favour of Facebook, Twitter and Snapchat, Scalir roams the digital graveyard searching for signs of life...
Myspace’s value doesn’t come from its paltry monthly or daily active user numbers. It comes from the first-party data it has about its registered users, particularly the email addresses and other profile information such as age, gender and connections that its users consented to giving to the company. This data can be linked to other online data sources to track individuals across the internet and target them with advertising elsewhere.
socialmedia  socialnetworking  internet  advertising 
june 2018 by juliusbeezer
RT : "Zuckering: using deliberately confusing jargon and user-interfaces to trick your users into sharing more info abou…
socialmedia  socialnetworking  coding  software  internet 
january 2018 by juliusbeezer
Trolls like those involved in Gamergate are even more hostile when they're using their real names on social media networks like Twitter (TWTR) and Facebook (FB) — Quartz
In research published this June in the journal PLoS One, Stahel studied comments on online petitions published on a German social media platform between 2010 and 2013. The data included 532,197 comments on about 1,600 online petitions. Commentators could choose to be public or anonymous. Contrary to expectations, the commentators with the harshest words during mass public attacks were more likely to be the name-identified ones than the anonymous ones (less than a third of commentators kept their names private).

That suggests we may need to rethink our efforts to encourage or enforce civility online. “Our results also do not support claims that prohibiting online anonymity will make the online world a better world,” Stahel explained by email. “The main point is that prohibiting anonymity online will not settle this ‘problem’ of firestorms.”
internet  anonymity  censorship 
january 2018 by juliusbeezer
Tim Berners-Lee on the future of the web: 'The system is failing' | Technology | The Guardian
The spread of misinformation and propaganda online has exploded partly because of the way the advertising systems of large digital platforms such as Google or Facebook have been designed to hold people’s attention.

“People are being distorted by very finely trained AIs that figure out how to distract them,” said Berners-Lee.

In some cases, these platforms offer users who create content a cut of advertising revenue. The financial incentive drove Macedonian teenagers with “no political skin in the game” to generate political clickbait fake news that was distributed on Facebook and funded by revenue from Google’s automated advertising engine AdSense.

“The system is failing. The way ad revenue works with clickbait is not fulfilling the goal of helping humanity promote truth and democracy. So I am concerned,”
google  facebook  news  web  internet  attention 
november 2017 by juliusbeezer
Cas de Nadia Daam : le cyber-harcèlement, un moyen de pression de plus en plus utilisé pour faire taire les journalistes | RSF
Reporters sans frontières (RSF) s’associe à la campagne de soutien en faveur de la journaliste Nadia Daam qui fait l’objet de graves menaces en ligne après avoir dénoncé les méthodes de trolls dans une chronique sur Europe 1...
menaces de mort, de viol, de violences, parfois teintées de racisme, auxquelles elle a fait face à la suite de l’une de ses chroniques sur Europe 1, dans laquelle elle dénonçait les trolls responsables d’une cabale contre une application “anti-relous” destinée aux femmes victimes de harcèlement de rue.

La journaliste a également observé des tentatives de piratage de ses messageries et de ses comptes sur les réseaux sociaux, rapporte Libération. Elle a reçu des mails l’informant de son inscription sur des sites pornographiques et pédophiles, mentionnant l’adresse de son domicile personnel. Sa fille a également été mentionnée.
journalism  france  internet  socialmedia 
november 2017 by juliusbeezer
Something is wrong on the internet – James Bridle – Medium
A step beyond the simply pirated Peppa Pig videos mentioned previously are the knock-offs. These too seem to teem with violence. In the official Peppa Pig videos, Peppa does indeed go to the dentist, and the episode in which she does so seems to be popular — although, confusingly, what appears to be the real episode is only available on an unofficial channel. In the official timeline, Peppa is appropriately reassured by a kindly dentist. In the version above, she is basically tortured, before turning into a series of Iron Man robots and performing the Learn Colours dance. A search for “peppa pig dentist” returns the above video on the front page, and it only gets worse from here.

Disturbing Peppa Pig videos, which tend towards extreme violence and fear, with Peppa eating her father or drinking bleach, are, it turns out very widespread. They make up an entire YouTube subculture.
youtube  internet 
november 2017 by juliusbeezer
Soutien à la journaliste Nadia Daam, menacée par des trolls - Libération
Depuis quelques jours, notre consœur Nadia Daam est assiégée par des nervis abrités dans l’anonymat d’Internet, sur Twitter, Discord ou sur les forums de discussion 18-25 de la plateforme

Attaques contre ses comptes électroniques, injures pornographiques, menaces de mort, menaces de viol, menaces sur son enfant, tentative d’intrusion à son domicile au milieu de la nuit : voilà ce que subit une journaliste pour avoir dénoncé, dans une chronique diffusée sur Europe 1, le sabotage d’un numéro de téléphone destiné à aider les femmes victimes de harcèlement de rue par des activistes issus de ce forum 18-25, lieu d’une parole libre qui parfois dérape dans une violence faussement ludique. Ce qui arrive à Nadia Daam depuis cette chronique lui donne tragiquement raison.
journalism  france  feminism  internet  socialmedia 
november 2017 by juliusbeezer
Django signals are evil | Graeme’s
I hardly need say that monkey patching is evil (i.e. a last resort), but one of the things I needed to check along the way was that there was no code being triggered by a (Django) signal, and the problems it causes are very similar to monkey patching.
coding  language  funny  webdesign  web  internet 
october 2017 by juliusbeezer
One man’s online politics is another man’s poison | John Naughton | Opinion | The Guardian
As a recovering techno-utopian, I still celebrate the empowering aspect of the internet – the way it can give everyone a voice and a platform for their views. But when viewed from inside my “liberal” filter bubble, I am also distressed by the nastiness, untruthfulness and cant that flooded on to the net during the Brexit and US presidential campaigns. I see this abusive torrent as confirming my view that the technology holds up a mirror to human nature and that much of what we see reflected in it is appalling.

One man who feels this sharply is the Harvard scholar Yochai Benkler. His landmark 2006 book The Wealth of Networks celebrated the democratising power of the internet. But his research on the 2016 election campaign confronted him with an uncomfortable truth. “An important part of what happened in this election,” he said afterwards to the New York Times, “is that a marginalised community, with views that were generally excluded, forced their way into the mainstream.”
internet  politics  bubble  socialmedia  us  facebook  google 
october 2017 by juliusbeezer
September 2017 Crawl Archive Now Available – Common Crawl
The crawl archive for September 2017 is now available! The archive is located in the commoncrawl bucket at crawl-data/CC-MAIN-2017-39/. It contains 3.01 billion web pages and over 250 TiB of uncompressed content.
internet  search  searchengines  database 
september 2017 by juliusbeezer
Analyzing the side effects of common drugs; questioning conventional pregnancy wisdom - The Washington Post
The Web site aims to help people connect the dots between the drugs they take and how they feel. The site, which is free, merges social media and medical data to help people get to the root of their problems.

Users can find studies, anonymously ask a question or peruse queries posed by others. The site provides an extensive database of the possible side effects of 45,000 drugs, vitamins and supplements; it also connects users with other people who suffer from similar problems.

Questions are not answered by medical professionals. Instead, when someone posts a question, the site invites other eHealthMe users of the same gender and similar age who have taken the same medications to answer the question. As the site warns, this does not replace the advice of a doctor, but knowing, for example, that you’re not the only one who has experienced sudden hearing loss when using eye drops is comforting. It may also help users ask better informed questions when they do seek medical help.
socialmedia  socialnetworking  internet  medicine 
september 2017 by juliusbeezer
Le photographe à l'origine du «mème» de l'été explique les secrets de son cliché
Si l’image est devenue LA blague de l’été 2017, elle a été prise en 2015 en Espagne lors d’un shooting. « J’ai pris la photo pour le travail », confirme Antonio Guillem au journal El Pais, qui avoue ne pas avoir appris tout de suite que sa photo était devenue si populaire. Il se souvient encore de cette séance photo, finalement très ordinaire. « Le scénario était improvisé car nous n’avions pas beaucoup de temps. Comme je travaille toujours avec les mêmes modèles, c’était relativement facile de composer une image », explique-t-il.
photography  internet 
september 2017 by juliusbeezer
Why don’t journalists link to primary sources? – Bad Science
the Telegraph ran the headline “Wind farms blamed for stranding of whales”. “Offshore wind farms are one of the main reasons why whales strand themselves on beaches, according to scientists studying the problem”, it continued. Baroness Warsi even cited it as a fact on BBC Question Time this week, arguing against wind farms.

But anyone who read the open access academic paper in PLoS One, titled “Beaked Whales respond to simulated and actual navy sonar”, would see that the study looked at sonar, and didn’t mention wind farms at all. At our most generous, the Telegraph story was a spectacular and bizarre exaggeration of a brief contextual aside about general levels of manmade sound in the ocean by one author at the end of the press release (titled “Whales scared by sonars”). Now, I have higher expectations of academic institutions than media ones, but this release didn’t mention wind farms, certainly didn’t say they were “one of the main reasons why whales strand themselves on beaches”, and anyone reading the press release could see that the study was about naval sonar.

The Telegraph article was a distortion (now deleted, with a miserly correction), perhaps driven by their odder editorial lines on the environment, but my point is this: if we had a culture of linking to primary sources, if they were a click away, then any sensible journalist would have been be too embarrassed to see this article go online. Distortions like this are only possible, or plausible, or worth risking, in an environment where the reader is actively deprived of information.
agnotology  informationmastery  journalism  internet  science 
august 2017 by juliusbeezer
Internet russe, l’exception qui vient de loin, par Kevin Limonier (Le Monde diplomatique, août 2017)
La Russie est en effet l’un des seuls pays à disposer d’un écosystème presque complet de plates-formes et de services indépendants de ceux de la Silicon Valley, fondés par des Russes et régis par le droit russe. Tandis qu’une part significative de la population mondiale utilise quotidiennement Google, Amazon, Facebook et Apple (GAFA), sans recours possible à des équivalents locaux crédibles, les Russes et leurs voisins ont le choix entre les géants californiens et ce qu’il est convenu d’appeler le Runet : le segment russophone du Net et les services qui le composent. Yandex jouit d’une popularité deux fois supérieure à celle de son concurrent Google, tandis que VKontakte, équivalent de Facebook, est, de très loin, le premier site consulté dans le pays.

Cette situation unique dans le monde — même en incluant le cas de la Chine — constitue un sérieux atout pour Moscou,
internet  russia  socialmedia 
august 2017 by juliusbeezer
Why We Terminated Daily Stormer
Earlier today, Cloudflare terminated the account of the Daily Stormer. We've stopped proxying their traffic and stopped answering DNS requests for their sites. We've taken measures to ensure that they cannot sign up for Cloudflare's services ever again.

Our terms of service reserve the right for us to terminate users of our network at our sole discretion. The tipping point for us making this decision was that the team behind Daily Stormer made the claim that we were secretly supporters of their ideology.
internet  politics  us 
august 2017 by juliusbeezer
The New Man of 4chan | Angela Nagle
On men’s rights sites and in some geeky subcultures, “beta male” is a common term of identification, one of both belonging and self-mockery. It has become a popular meme on 4chan’s recreationally obnoxious /b/ board, a precursor to /r9k/ that produced hacker collectives such as Anonymous while also incubating scores of anti-feminist online attacks in recent years. Know Your Meme records the earliest use of the term “beta uprising” in 2011, on the men’s rights movement blog Fight for Justice. From around 2013, the beta-male uprising was a regular topic among 4chan users...
In response to the attacks, Sierra closed down her blog and withdrew from speaking engagements and public life. In the time since the attack, weev has since become famous for hacking a phone company—a maneuver that triggered a Twitter-based #freeweev campaign, which gained support from prominent progressive endorsers such as Laurie Penny and Gabriella Coleman. Embarrassingly for those who expressed the view, fashionable in the heyday of the Occupy movement, that 4chan/b/ is a “counter-hegemonic space” and that trolls in the 4chan/b/ vein are, as Coleman argued, inheritors of the Dadaist and Situationist traditions, weev is a fascist sympathizer with a swastika tattoo on his chest. Penny claimed to be unaware of his far-right views, while Coleman not only continues to defend his rights as a hacker, but also presents him as an endearingly impish figure in her latest book.
politics  racism  theory  feminism  internet  transgression 
august 2017 by juliusbeezer
1995: The Year the Future Began, or Multimedia as the Vanishing Point of the Net | transmediale
Returning to 1995 with a more nuanced perspective than that of Campbell, that year also marks a point in time that is very much defined by what Wendy M. Grossman called the “net.wars” in her 1997 book of the same name, which chronicled different struggles between control and freedom in the early days of (inter-)networked mass communication (concentrating on the early to mid-1990s). In those years, many of the digital culture debates that are taking place today on a global scale and in the wider public sphere, through mainstream politics and media outlets, were just being established. These concerned, for example, intellectual property, privacy, data collection, and online social behavior. Such topics were initially discussed mostly within a Euro-American discourse, with a bias toward the US euphoria about the endless transgressive possibilities of our virtual lives in cyberspace, as well as the promises of global entrepreneurial freedom on what the Clinton/Gore administra­tion famously referred to as the “information superhighway.” It would be all too easy, however, to present the 1990s as the years of digital euphoria and the dot-com bust that followed as a shift from utopia to dystopia. More reflective and critical voices on the topic were certainly also there in the mid 1990s
internet  theory  history  media 
july 2017 by juliusbeezer
How Australia Bungled Its $36 Billion High-Speed Internet Rollout - The New York Times
Australia, a wealthy nation with a widely envied quality of life, lags in one essential area of modern life: its internet speed. Eight years after the country began an unprecedented broadband modernization effort that will cost at least 49 billion Australian dollars, or $36 billion, its average internet speed lags that of the United States, most of Western Europe, Japan and South Korea. In the most recent ranking of internet speeds by Akamai, a networking company, Australia came in at an embarrassing No. 51, trailing developing economies like Thailand and Kenya.
australia  internet 
may 2017 by juliusbeezer
Build a Better Monster: Morality, Machine Learning, and Mass Surveillance
There are very few levers of power over the big tech companies. Because they are essentially monopolies, consumer boycotts don’t work. Opting out of a site like Google would mean opting out of much of online life. Some people could do it on principle, but it is not something we can mobilize a mass movement around.

Indirect pressure through their actual customers—the publishers and advertisers—can work for limited goals (for example, the current panic around “brand safety” that is helping defund sites like Breitbart). But if the goal is more fundamental reform, we’re stuck. We can’t apply pressure through a system we’re trying to abolish.

Shareholder pressure doesn’t work, because the large tech companies are structured to give founders absolute control no matter how many shares they own.

Regulation is tricky. The large tech companies have capable lobbyists and massive legal resources.

Press campaigns are unlikely to work because Facebook and Google control most online publishing. Moreover, what remains of the press has just endured a painful transition to online advertising, and is wholly dependent on that business model to survive.

The one effective lever we have against tech companies is employee pressure. Software engineers are difficult to hire, expensive to train, and take a long time to replace. Small teams in critical roles (like operations or security) have the power to shut down a tech company if they act in concert.

We’ve seen some small demonstrations of the power of employee pressure. The pledge pushed companies that had been silent for months to publicly commit to not working on a Muslim registry. The employee walkout at Google in support of immigrants during the travel ban prompted the founders and CEOs to issue statements of support.
internet  facebook  google  politics  advertising 
april 2017 by juliusbeezer
Justice : Jean-Luc Mélenchon et ses conseillers judiciaires bons élèves - L'Obs
Xavier Sauvignet est celui qui a porté la parole judiciaire de Jean-Luc Mélenchon lors des tables rondes organisées en mars dans les locaux de Sciences-Po, autour des représentants de tous les candidats. Mais surtout, explique-t-il à "l’Obs", il est très fier d’avoir "mis en œuvre une méthode de travail d'un genre nouveau". Les partisans de Jean-Luc Mélenchon se sont en effet organisés de façon inédite pour fonder un programme complet. Ils communiquaient entre eux par le biais du logiciel libre Framapad, utilisé notamment par les militants Nuit debout.

"L'élaboration collaborative en ligne, auxquels les insoumis ayant appuyé la candidature de Jean-Luc Mélenchon en ligne ont eu accès, est une démarche horizontale parfaitement novatrice et en phase avec l'élaboration de l'Avenir en commun [la plateforme en ligne du programme de Mélenchon, NDLR], et avec les outils militants développés hors des cadres institutionnels classiques (YouTube, Discord, Mélenphone, la radio les Jours heureux, etc.)", plaide encore, enthousiaste, Xavier Sauvignet.
france  politics  internet  tools 
april 2017 by juliusbeezer
Information Wars: A Window into the Alternative Media Ecosystem
These rumors had different “signatures” from other types of rumors. In terms of volume (measured in tweets per minute), most crisis-related rumors spike quickly and then fade out relatively quickly as well, typically “decaying” at an exponential rate. But these alternative narrative rumors rose more slowly, and then they lingered, ebbing and flowing over the course of days or weeks (or years). They also had sustained participation by a set group of Twitter users (i.e. many tweets per user over an extended period of time), rather than finite participation by a large number of users (one or two tweets per user, all at around the same time) as typical rumors do. Additionally, alternative narrative rumors often had high “domain diversity”, in that tweets referencing the rumors linked to a large number of distinct domains (different websites), including alternative media sites such as InfoWars, BeforeItsNews, and RT (aka Russia Times). Several of these rumors also had a strong “botnet” presence
agnotology  socialmedia  internet  twitter 
march 2017 by juliusbeezer
African Nations Increasingly Silence Internet to Stem Protests - The New York Times
The Democratic Republic of Congo has blocked social media sites and text messaging amid demonstrations over the president’s attempts to extend his tenure in office.

Freedom House, an American watchdog organization, said in its annual Freedom on the Net survey of 65 countries that 24 nations experienced restrictions on social media and communications last year, up from 15 countries the previous year. Network shutdowns occurred in 15 countries last year, more than double that in 2015, the survey found.
internet  freedom  socialmedia  africa 
february 2017 by juliusbeezer
Wyden, Other Senators Warn That Net Neutrality Repeal Will Make SOPA Backlash Look Like A Fireside Snuggle | Techdirt
While it's true that the backlash to an attack on net neutrality could make SOPA and PIPA look like a beach-side picnic, the repeal won't arrive in the way the agency's rules first arrived. With the process of repealing the rules within the FCC's existing regulatory framework a giant bureaucratic headache that would require another very public comment process, the ISPs (and the politicians that love them) likely have another tactic in mind -- at least based on my 20 years, ten hours a day, of watching the telecom sector (and every other industry) dominate both parties of Congress.

At first, that will involve having Pai simply refuse to enforce the rules as they exist now (which we already saw with Pai's decision to scrap the FCC's zero rating inquiry). Pai's job in this stage play will be to pay empty lip service to things like the digital divide, while generally keeping the FCC focused on bland, non-controversial policies until the real hangman (a campaign-contribution soaked Congress) arrives.

From there, the GOP has quietly been making it clear they want to push a Communications Act rewrite that will focus on rolling back the FCC's classification of ISPs as common carriers under Title II, therefore obliterating not only net neutrality -- but the FCC's ability to act as broadband watchdog entirely. This being a new, charming post-truth era, this assault on net neutrality, broadband provider oversight and accountability will most likely be dressed up as a massive boon to job creation, broadband expansion, and the nation's puppies.

Expect it to be named something along the lines of The Making Broadband Great Again Act of 2017.
internet  us  politics 
february 2017 by juliusbeezer
How Scientists Can Protect Their Data From the Trump Administration
To get started, you need to install a BitTorrent client. There are many options, and I like Transmission because it’s open source and minimalist, but you can use whichever one you like best — the instructions are similar no matter what client you use.

Open Transmission, and click File > Create Torrent File. Then browse your disk until you find the data you’d like to share (for this example, I’m sharing a folder with over 5 gigabytes of climate data that I downloaded from the National Oceanic and Atmospheric Administration). Then you’ll need to cut and paste some trackers, which are odd-looking URLs that help facilitate peers finding one another in a swarm. There are many public trackers out there, but I’m using the ones suggested by OpenBitTorrent to paste into the trackers box.
tools  internet  freesoftware 
february 2017 by juliusbeezer
Dear Scholars, Delete Your Account At Academia.Edu
Open Access, Non-Profit Alternatives

What, then, are the alternatives for people who want to freely distribute their work? It turns out there are a number of choices for people both connected to a university and outside of them.

Institutional Repositories: Many universities and colleges in fact have their own institutional repositories for research. At the University of Iowa, we have Iowa Research Online, which grants space to undergraduates, graduate students, faculty and many other researchers to house their work. There is in fact a consortium of repositories from the Big Ten schools called the Big Ten Academic Alliance that then begin to connect networks of scholars in a searchable database–although it is admittedly a much smaller network than exists at

Zenodo: Another repository for research data is called Zenodo. It is funded by the OpenAIRE Consortium (an open access network) and CERN, the European Organization for Nuclear Research. The site is a non-profit and integrates easily with your GitHub account. It allows users 50 GB of storage for each dataset, though you can contact them and lobby for more.

(Please note that after the original publication of this article, digital humanist Ethan Gruber launched his migration tool to allow people to migrate documents from to Zenodo: tool [here] and blog post on the technique [here].)
repositories  internet  business  attention 
january 2017 by juliusbeezer
Pollution numérique : Greenpeace pointe du doigt les mauvais élèves
Plus de 4.000 centres de données extrêmement gourmands en énergie, et qui sont bien souvent alimentés par des énergies fossiles donc polluantes : c'est ce que passe en revue chaque année l'ONG Greenpeace dans son rapport sur la pollution numérique, c'est-à-dire l'effet physique de nos connexions numériques sur la planète.
energy  internet  apple  amazon  google  facebook 
january 2017 by juliusbeezer
Trump Promises a Revelation on Hacking -
Mr. Trump, who does not use email, also advised people to avoid computers when dealing with delicate material. “It’s very important, if you have something really important, write it out and have it delivered by courier, the old-fashioned way, because I’ll tell you what, no computer is safe,” Mr. Trump said.

“I don’t care what they say, no computer is safe,” he added. “I have a boy who’s 10 years old; he can do anything with a computer. You want something to really go without detection, write it out and have it sent by courier.”
security  internet 
january 2017 by juliusbeezer
Are You There Netizens? It's Me, Dana. | The Huffington Post
Douglas Carnall - translator, editor and the 185th winner of The Listerve lottery - said he feels beholden to his readers as an author. He included his personal email address with a piece on the semantics of the phrase, ‘Scout’s pace,” and received about 30 replies.

“Responding took up most of my free time for the next few days; it was an absolute pleasure to do so,” he said.

Carnall compared the experience of writing to an audience of 20,000 strangers to “a secular prayer.”
walking  cycling  writing  email  internet  religion 
december 2016 by juliusbeezer
Panopticlick | About
Setting your browser to unblock ads from websites that commit to respecting Do Not Track rewards companies that are respecting user privacy, incentivizing more companies to respect Do Not Track in order to have their ads shown at all. By preserving privacy-friendly ads, sites that rely on advertising funding can continue to thrive without adjusting their core business model, even as they respect users’ privacy choices.

Over time, we believe we can shift the norms on the Web to ensure privacy and respect for users comes first. But that can only happen if online advertisers are incentivized to respect user choices.

You can help us by installing EFF’s Privacy Badger.
Is it possible to defend against browser fingerprinting?

Browser fingerprinting is quite a powerful method of tracking users around the Internet. There are some defensive measures that can be taken with existing browsers, but none of them are ideal. In practice, the most realistic protection is using the Tor Browser, which has put a lot of effort into reducing browser fingerprintability.
security  privacy  tools  internet 
december 2016 by juliusbeezer
Trump Meets Tech Industry Leaders With Effusive Greeting - The New York Times
President-elect Donald J. Trump, who had criticized them and who they, in turn, had criticized. The executives did not acknowledge or speak to the press on the way in.

First everyone went around the room and introduced themselves — Jeff Bezos, of Amazon; Elon Musk, of Tesla; Tim Cook, of Apple; Sheryl Sandberg, of Facebook; Larry Page of Alphabet, Google’s parent company; Satya Nadella, of Microsoft, and other tech leaders. Mr. Trump was seated next to Peter Thiel, the tech investor who is a member of the president-elect’s transition team. Three of Mr. Trump’s children also attended.
The technology world had been in turmoil as the meeting drew near. Some argued the chief executives should boycott the event to show their disdain for Mr. Trump’s values. Others maintained they should go and forthrightly make their values clear. And still others thought they should attend and make their accommodations with the new reality.

“There is a wide spectrum of feeling in the Valley,” said Aaron Levie, chief executive of the cloud storage company Box.

Complicating the debate was the fact that the most fervently anti-Trump elements in Silicon Valley seem to be the start-ups and venture capitalists, few of which were invited to the meeting.
politics  internet  us  privacy 
december 2016 by juliusbeezer
We can Fix It: Saving the Truth from the Internet
So it is time to lend a hand; time to raise a barn. We need to figure out how to create the standard new methods of authentication and ranking. We need help pushing for changes at large internet companies. We need to think through the details of how the truth and rotten tomato prizes would be awarded. We’ll need a budget and funding to create a strong incentive for the prizes. We need to promote these ideas and get more adoption. In short, if you found this message, we need you. If you agree that we need social action to make the internet safe for truth, promote this message and sign up to be part of this project.
internet  socialmedia  agnotology  commenting  dccomment  philosophy 
december 2016 by juliusbeezer
Familiarity = Truth, a Reprise | Hapgood
Facebook, with its quick stream of headlines, is divorced from any information about their provenance which would allow you to ignore them. My guess is each one of those headlines, if not immediately discarded as a known falsehood, goes into our sloppy Bayesian generator of familiarity, part of an algorithm that is even less transparent to us than Facebook’s.

Confirmation bias often comes a few seconds later as we file the information, or as we weight its importance. Based on our priors we’re likely to see something as true, but maybe less relevant given what know.
facebook  internet  socialmedia  attention 
december 2016 by juliusbeezer
Facebook and Google make lies as pretty as truth - The Verge
The difference between the two is the result of AMP, an HTML framework that Google created to make mobile pages that load faster. (It also likely caused the 70news piece to be aggregated into a "top news" carousel.) AMP has the side effect of making mobile websites look a little more homogenous, narrowing down the details that publishers can customize, at least without aggressive tweaks. In a small way, the system normalizes and standardizes designs like that of 70news that otherwise would look obviously askew, tacitly accelerating traffic to questionable sites and further confusing readers who haven’t learned to discriminate.

""It’s hard to make a site look like yours in an AMP format.""

Websites that operate on these homogenizing platforms, whether they offer real news or fake, exist under the same digital gloss no matter their production budget, which presents a problem for upscale publishers wanting to stand out. "It’s hard to make a site look like yours in an AMP format," CEO Neil Vogel, told Digiday in October. "You can change the header, you can change the fonts, but it’s not yours."

Over centuries, print media developed a visual language of credibility that became second nature to most readers: crisp type and clean, uninterrupted columns communicate integrity, while exaggerated images, messy layouts, and goofy text inspire doubt. On a physical newsstand, it’s still easy to tell the National Enquirer from, say, The Atlantic. Online, it’s becoming increasingly difficult to differentiate between the two.
design  google  attention  internet  blogs  news 
december 2016 by juliusbeezer
The quick and the dead – Arbitrage bidding in Adtech and network latency | TFOT
Real Time Bidding (RTB) protocol which enables publishers and ad exchanges to put ad inventory up for auction. The RTB process allows advertisers and Demand Side Platform (DSPs) to bid on ad impressions, individually or in bundles, as soon as they become available, and display the ad of the winning advertiser. When a user visits a website a cookie containing the demographic information of the user is sent to an ad exchange. The ad exchange further requests various DSPs and ad agencies to bid on the ad space. The DSP with the highest bid is offered the ad space and its ad is displayed to the user. An ad serving process to display a single ad can comprise of up to 12 such exchanges bringing in various other Adtech industry players like third party data providers and Data management platforms (DMPs). This process is completed during the time it takes the user to type in a website address to when the page is fully loaded.

Arguably the most important and time intensive part of the RTB process is back and forth communication between ad exchanges and DSPs. During the RTB process bids have to arrive at the ad exchanges or SSPs within 100ms. This time comprises both think time and the time required for the bid requests to complete a round trip over the network. After making an allocation to computation time and network congestion which can result in frequent bottlenecks in network traffic, only 40 milliseconds is left for the round trip transit over the network.

Arbitrage bidders insert themselves into this tiny fraction of a second between the SSPs and DSPs.
advertising  internet  blogola  blogs 
december 2016 by juliusbeezer
Happy birthday,!
Keep it simple and avoid constant technology updates. Ubu is plain HTML, written in a text-editor.
Even a website should function offline. One should be able to take the hard disk and run. Avoid the cloud - computers of people you don't know and who don't care about you.
Don't ask for permission. You would have to wait forever, turning yourself into an accountant and a lawyer.
Don't promise anything. Do it the way you like it.
You don't need search engines. Rely on word-of-mouth and direct linking to slowly build your public. You don't need complicated protocols, digital currencies or other proxies. You need people who care.
Everything is temporary, even after 20 years. Servers crash, disks die, life changes and shit happens. Care and redundancy is the only path to longevity.
internet  tools  coding 
december 2016 by juliusbeezer
Fix the internet by writing good stuff and being nice to people · Woman. Legend.Blog
We have created the internet as it is today, and we have the power to change it back into something that is filled with good things to read and consume. If we want good, distributed content, we have to support things that move in that direction.

Today, I think the key is to start small. Everyone can fight against bad content.

1) The best way you can defy crap content on their own is to write your own blog on your own platform. Don’t let threads, Facebook posts, and Medium take your words and your creative license.
internet  socialmedia  facebook  twitter 
november 2016 by juliusbeezer
DSHR's Blog: Lurking Malice in the Cloud
13.7% of Amazon S3 repositories and 5.5% of Google repositories that we inspected turned out to be either compromised or completely malicious. Among those compromised are popular cloud repositories such as Groupon’s official bucket. Altogether, 472 such legitimate repositories were considered to be contaminated, ... infecting 1,306 legitimate websites, including Alexa top 300 sites like, Alexa top 5,000 sites like, etc.

The details are in Section 4.2 of the paper. Briefly, many of the compromised repositories had:

a misconfiguration flaw ... which allows arbitrary content to be uploaded and existing data to be modified without proper authorization.

Because the legitimate renters of the bucket had not been sufficiently careful to fully define the bucket's access policy:

by default, ... the cloud only checks whether the authorization key (i.e., access key and secret key) belongs to an S3 user, not the authorized party for this specific bucket: in other words, anyone, as long as she is a legitimate user of the S3, has the right to upload/modify, delete and list the resources in the bucket and download the content.
amazon  google  internet  security 
november 2016 by juliusbeezer
How two unemployed guys got rich off Facebook, fake news and an army of Trump supporters | Toronto Star
What works on Facebook and what doesn’t work occupies many of the conversations between Wade and Goldman. Explicitly telling people to prove that they support Trump by sharing their stories works, so they do that. Neither of them is particularly religious, but their readers are, so in their writing they ask God to bless the president-elect, and that works, too. So does exaggeration: “OBAMA BIRTH SECRETS REVEALED! The Letters From His Dad Reveal Something Sinister ...” And stoking fear: “Terrorists Have Infiltrated the US Government! Look Who They Want to ASSASSINATE!!” And inflaming racial and gender tension: “BREAKING: Michelle Obama holds Feminist Rally At HER SLAVE HOUSE!” And conspiracy theories: “BREAKING: Top Official Set to Testify Against Hillary Clinton Found DEAD!”
There are times when Wade wonders what it would be like to write an article he truly believes in. “In a perfect world,” he says, it would have nuance and balance and long paragraphs and take longer than 10 minutes to compose. It would make people think. But he never writes it, he says, because no one would click on it, so what would be the point?
facebook  journalism  internet  socialmedia 
november 2016 by juliusbeezer
Forget Comcast. Here’s The DIY Approach to Internet Access.
You have the freedom to use the network for any purpose as long as you don’t harm the operation of the network itself, the rights of other users, or the principles of neutrality that allow contents and services to flow without deliberate interference.

You have the right to understand the network and its components, and to share knowledge of its mechanisms and principles.

You have the right to offer services and content to the network on your own terms.

You have the right to join the network, and the obligation to extend this set of rights to anyone according to these same terms.

Those terms, put into practice, have been astoundingly robust. They’ve been the basis for a community of varying constituencies, ranging from everyday people who just want communications to several dozen small Internet service providers (ISPs) that have set up shop on Guifi to provide installation, guidance and customer service for end users.
internet  freedom  networking  spain  wifi 
november 2016 by juliusbeezer
Facebook staffers formed an unofficial task force during the past week to look into their company’s role in disseminating fake news. - Silicon Valley Business Journal
“It’s not a crazy idea. What’s crazy is for him to come out and dismiss it like that, when he knows, and those of us at the company know, that fake news ran wild on our platform during the entire campaign season,” one Facebook employee anonymously told BuzzFeed. Currently, 44 percent of Americans get their news from Facebook, according to

Dozens of employees have met twice in the last six days to discuss the issue in secret. The secrecy allows individuals to speak without fear of senior management, per the report. The group plans to meet formally in the near future and make recommendations to Facebook’s senior management.

While the task force is small, the sources told BuzzFeed that “hundreds” of Facebook staffers were unsettled by the company’s position on fake news. Zuckerberg wrote a post on his own Facebook page over the weekend saying it was “extremely unlikely hoaxes changed the outcome of this election in one direction or the other.
journalism  facebook  internet  socialmedia 
november 2016 by juliusbeezer
Do You Speak Emoji? - The New Yorker
I scrolled through the options—thumbs-up, shooting star, pink bow—and began to understand the appeal: when language poses risk, employ a playful image whose interpretation may be negotiated upon receipt.
language  internet 
november 2016 by juliusbeezer
Silicon Valley Is Worried That Trump Is Going To Grab Them By The Data - BuzzFeed News
“I have to take Trump at his word, I have to take his campaign promises seriously,” said Maciej Ceglowski, owner of Pinboard, a bookmarking site. “He said he would find and deport illegal immigrants. He said he wanted aggressive vetting of Muslims. If you are making those policies, and you are serious about pursuing them, you can force Facebook to do a lot of the work for you. You can have them detect users with languages set to Spanish or Arabic.” Facebook, Apple, and Twitter did not reply to requests for comment from BuzzFeed News, nor did Google or Microsoft.

During the course of his campaign, Trump expressed disgust at Apple, for refusing to create a backdoor that would let the FBI unlock an iPhone used by the attackers in San Bernardino. (The phone was ultimately unlocked with the help of a third-party private company that the FBI refused to name.) Trump told CNN during a debate that he would “penetrate the internet” to prevent ISIS from using it to recruit fighters and “close down parts of the internet.” Trump has, at times, expressed an interest in enhancing surveillance of Americans, saying at times that government should be tasked with with monitoring mosques and that police should create “demographics units.”
us  politics  internet 
november 2016 by juliusbeezer
Trump, and the Punditry's Scary Groupthink | RealClearPolitics
One of the Internet’s flaws has always been that for all its diversity, it is unrepresentative in important ways. Even left-leaning blogs and websites have tended to be disproportionately white. It’s an ongoing topic of conversation and source of controversy on these sites.

What makes this cycle so tricky is that the re-emergence of strong class and cultural divides in the election has brought new cleavages to the fore, which are likewise underrepresented among commentators. Not only do you have a whole lot of white folk on Twitter, but you have a whole lot of white professionals with college degrees, disproportionately granted from elite universities. Most of them live in cities and neighborhoods dominated by white professionals with college degrees, disproportionately granted from elite universities, and go to workplaces with similar makeups. Somehow, the pundits look even less like America this cycle than in the past.

I believe that most people in my Twitter feed, left and right, don’t know many genuine Trump supporters, if any. I can count two, maybe three among my Facebook friends, and I went to high school in Oklahoma. It’s the exact problem I discussed back in January: There’s a cosmopolitan vs. traditionalist divide that runs through our politics, with cultural cosmopolitans running both parties.
internet  twitter  us  politics 
november 2016 by juliusbeezer
Meme warfare: how the power of mass replication has poisoned the US election | US news | The Guardian
They have grown into a form of anarchic folk propaganda, ranging from tolerable epigrams to glittering hate-soaked image macros akin to a million little rogue Pravdas.

Like me, you probably have more than a few Facebook friends who make it their life’s work to circulate political memes in hopes of influencing how you see the world. They are our deadbeat uncles, former co-workers and long-forgotten high school acquaintances. They are agents of nowhere, apparatchiks of nothing in particular. And through the raw power of mass replication, even their most insipid ideas are able to surface from below. By typing some text on an image and sharing it with friends, they too have a voice capable of reaching a critical mass.

The reason why it is now possible for Darryl from Accounting who hates “social justice warriors” to have the same communicative power as a television network is down to the DNA of the medium: speed and lack of gatekeepers. Memes thrive on a lack of information – the faster you can grasp the point, the higher the chance it will spread.
facebook  internet  attention 
november 2016 by juliusbeezer
“You have to keep track of your changes”: The Version Variants and Publishing History of David Mitchell's Cloud Atlas
However, I have identified that there have been at least two English-language editions of Cloud Atlas in widespread circulation, from the very first day of its publication, from which other translated texts and the film script have been derived (see Fig. 1). As well as exhibiting many minor linguistic variations and copy-edits throughout (accidentals), these different editions also contain sections of narrative unique to each version that must change any close reading of the text. Given that so much literary criticism has now been produced on the subject of Mitchell’s novel, twelve years after its publication, these version variants are potentially problematic as they have not previously been noted.1 Using a combination of computational, textual-scholarly and more traditional hermeneutic methods, I here set out the substantial differences between the editions of Cloud Atlas and point to the future work that must be done to understand the effects of the heavy rewritings that occur across the different versions of the text. I also, below, outline the publishing history of the novel that resulted in these variations, as detailed to me by David Mitchell himself.
writing  editing  publishing  censorship  internet  memory 
november 2016 by juliusbeezer
‘I was so embarrassed I cried’: do parents share too much online? | Life and style | The Guardian
Excessive sharing about your children has long incited disapproval, but recently the disapproval has begun to acquire a proto-legal tinge. In March, French police warned parents against posting photos of their children on social media; according to social media analyst Eric Delcroix, the children could soon be able to sue them for posting inappropriate pictures, under the country’s privacy laws. The treasurer of the UK’s Human Rights Lawyers Association, Leanne Targett-Parker, echoes the idea that it is only a matter of time before children mount legal challenges against oversharing parents. “You can’t imagine it not being something that starts to develop within the next five to 10 years,” she says. “I can’t see how there can’t be attempts at suing people for putting up posts that they’re unhappy with.”
privacy  internet  facebook 
november 2016 by juliusbeezer
How Facebook algorithms impact democracy
34-year-old Mocha Uson is a singer-dancer who grew her Facebook page with sex advice and sessions in the bedroom with her all-girl band, the Mocha Girls.

Their trademark gyrations and near-explicit sexual moves onstage have titillated Filipinos since 2006...
For the 2016 Philippine presidential elections, Uson campaigned hard for her candidate, then Davao City Mayor Rodrigo Duterte, onstage and on her Facebook page, which became one of his campaign’s most effective online political advocacy tool...

Soon after Duterte won, Uson completed her pivot from sexy entertainer to political blogger with an interview with the President-elect.

She hit the headlines again in August when news leaked that she was going to be a social media consultant at the Bureau of Customs. That didn’t happen largely because of a public outcry that ridiculed her lack of knowledge...

In every attack, Uson provides no evidence for her ad hominem accusations, but they have been shared so often that many believe they are true.
facebook  internet  socialmedia  twitter 
october 2016 by juliusbeezer - Parsing JSON is a Minefield 💣
In conclusion, JSON is not a data format you can rely on blindly. I've demonstrated this by showing that the standard definition is spread out over at least six different documents (section 1), that the latest and most complete document, RFC-7159, is imprecise and contradictory (section 2), and by crafting test files that out of over 30 parsers, no two parsers parsed the same set of documents the same way (section 4).

In the process of inspecting parser results, I also discovered that json_checker.c from did reject valid JSON [0e1] (section 4.24), which certainly doesn't help users to know what's right or wrong. In a general way, many parsers authors like to brag about how right is their parsers (including myself), but there's no way to assess their quality since references are debatable and existing test suites are generally poor.
coding  internet  attention 
october 2016 by juliusbeezer
Twitter is a cultural success and a business failure
Twitter may be caught in the dilemma faced by many technology companies: Its health depends on continued growth, yet there may be a finite universe of users. Certainly Twitter’s service isn’t for everybody. Most people with Twitter accounts don’t use them regularly, and as many as 44% of users have never tweeted, according to a 2014 analysis.

In media, politics, technology, and entertainment, Twitter has become an essential tool. But anyone outside the conversation can be forgiven for wondering what all the fuss is about.
twitter  internet  finance 
october 2016 by juliusbeezer
Gary Lineker defends Twitter views as the Sun gives him red card | Football | The Guardian
In 2014, he told the Guardian that “Twitter Gary” enabled him to be more outspoken than he could be on television. “I’ve quite often written tweets that I think are across that line, but I just delete them. There’s a few of those,” he said. “My law to myself is, if I’ve got doubts, then don’t send it. Do I really need the shit? Although I suppose I quite enjoy finding out where the line is.”
censorship  twitter  internet 
october 2016 by juliusbeezer
Swiping For Love in All The Wrong Places – Medium
The first thing that we found was that swiping apps are staggeringly ineffective at helping people find relationships. Not everyone on these apps are looking for relationships, of course, but among those that are only 18% have found even one relationship, ever. It’s hard to imagine any service staying in business where fewer than 1 in 5 customers ever found what they were looking for.

What became clear was that swiping apps are not ‘successful’ because they’re effective at helping users find relationships; rather they’re effective at maximizing user engagement
internet  sex  relationships 
october 2016 by juliusbeezer
Does this Meme Prove Donald Trump is a White Supremacist? | Public Seminar
Mainstream media attention has arguably encouraged the production of horrible content. To understand why, we have to talk about a practice known as “shitposting.”

A shitpost is a post on a forum or social media that is explicitly designed to derail a conversation and to aggravate people — hence the internet adage, “don’t feed the trolls.” Shitposting is also at the heart of meme-based culture. When a troll first shitposts on a thread, their antagonist doesn’t yet exist. Shitposting horrible Pepe memes is an act that wills an opponent into being — an opponent, that is, who will validate the offensive status of the meme.

This is why it’s hard to tease out the causality of shitposts — and of memes. Trump-Pepe is a chicken-and-egg kind of question. The Pepe meme is meant to be offensive and antagonistic. But it is also projective. Its aim is to conjure an opponent who not only gets offended by the content of the post, but who also doesn’t understand that the joke is, in fact, that they got angry.
internet  socialmedia 
october 2016 by juliusbeezer
How porn is damaging our children’s future sex lives | Life and style | The Guardian
lison now knows is that it’s natural for boys to want to look at sexual imagery. In fact, the average age for first exposure to online pornography in the UK is 11. For slightly older boys, it’s completely normal – of 3,000 boys aged 13-18 surveyed, 81% said they looked at it.
sex  internet  porn 
september 2016 by juliusbeezer
How DARPA Took On the Twitter Bot Menace with One Hand Behind Its Back
All this was played to the competitors in a synthetic Twitter environment over four weeks in February and March.

The teams then had to analyze this Twitter stream and guess which users were bots. Each correct guess got them a single point but a team lost 0.25 points for each incorrect guess. A team that guessed all the bots d days before the end of the challenge also got d points, since DARPA is particularly interested in the early detection of influence bots.

The winning team was from the social media analytics company Sentimetrix, which guessed all the bots 12 days ahead of the deadline while making only one incorrect guess...
Sentimetrix used a pretrained algorithm to search for bot-like behavior. The team had trained this algorithm on Twitter data from the 2014 Indian election which featured many bots. It looked for unusual grammar, the similarity of the linguistics to natural language chatbots such as Eliza, and unusual behaviors such as extended periods of tweeting without a break that a human could not easily perform.
twitter  socialnetworking  internet  attention 
july 2016 by juliusbeezer
The Social-Network Illusion That Tricks Your Mind
Network scientists have known about the paradoxical nature of social networks for some time. The most famous example is the friendship paradox: on average your friends will have more friends than you do.

This comes about because the distribution of friends on social networks follows a power law. So while most people will have a small number of friends, a few individuals have huge numbers of friends. And these people skew the average...
Lerman and co have discovered a related paradox, which they call the majority illusion. This is the phenomenon in which an individual can observe a behavior or attribute in most of his or her friends, even though it is rare in the network as a whole.

They illustrate this illusion with a theoretical example: a set of 14 nodes linked up to form a small world network, just like a real social network (see picture above). They then color three of these nodes and count how many of the remaining nodes link to them in a single step.
internet  socialnetworking  socialmedia  twitter 
july 2016 by juliusbeezer
Language Log » Digital scholarship and cultural ideology
Allington et al. give a plausible account of the history of computational text analysis in the humanities. Their narrative is oriented towards literary studies, without much discussion of fields like history, archeology and musicology; and there's room to argue about their choice of people and works to feature. But from my perspective outside the field, they have cause and effect reversed. Digital Humanities is not a top-down neo-liberal conspiracy aimed at a corporatist restructuring of literary studies. Rather, it's the natural and inevitable response of students and younger scholars to the opportunities afforded by new technologies, entirely comparable to the consequences of the invention of printing...

From a historical point of view, at least, this is simply false. People began using computers in humanities research pretty much as soon as computers existed, and they did this because they wanted to get their work done more easily.
digitalhumanities  history  internet  scholarly 
july 2016 by juliusbeezer
What You Think You Know About the Web Is Wrong | TIME
Chartbeat looked at deep user behavior across 2 billion visits across the web over the course of a month and found that most people who click don’t read. In fact, a stunning 55% spent fewer than 15 seconds actively on a page. The stats get a little better if you filter purely for article pages, but even then one in every three visitors spend less than 15 seconds reading articles they land on.
attention  internet  web 
june 2016 by juliusbeezer
6 in 10 of you will share this link without reading it, a new, depressing study says - Chicago Tribune
On June 4, the satirical news site the Science Post published a block of "lorem ipsum" text under a frightening headline: "Study: 70% of Facebook users only read the headline of science stories before commenting."

Nearly 46,000 people shared the post, some of them quite earnestly — an inadvertent example, perhaps, of life imitating comedy.

Now, as if it needed further proof, the satirical headline's been validated once again: According to a new study by computer scientists at Columbia University and the French National Institute, 59 percent of links shared on social media have never actually been clicked: In other words, most people appear to retweet news without ever reading it.
internet  socialmedia  socialnetworking  science  sciencepublishing  facebook  twitter 
june 2016 by juliusbeezer
How not to journalism | Dr Claire Hardaker
Hmmm, I think I may be as unforthcoming as all your other interviewees. The first thing I’d say is that we need to take a step back. Mainly we don’t know for a fact that trolls are primarily male. There’s lots of anecdotal evidence out there but nothing (as far as I’m aware) that gives us a concrete, empirical insight into the demographics of abusive online users. Remember that profiles are extremely easy to populate with fake information, automated procedures for “detecting” the gender of online accounts can be highly problematic, and when questioned particularly about socially stigmatised behaviours, people can and do lie. One option is to look purely at those convicted for abusive online behaviour to see what kinds of people they are, and this already tells us that trolls can be male or female, old or young, working class, university educated, parents, kids, and anything in between. However, we don’t know how well those people reflect the abusive online population in general. They are, after all, people who didn’t hide their offline identity well enough to prevent themselves from being prosecuted. It’s certainly tempting to just take it as given that trolls are primarily male but without tracking at least a decent sample of trolling accounts back to the people who operate them, we’re just speculating. If someone is ever able to conduct that kind of research (and I’d be very surprised if they manage it) then we could start to paint a better picture of the average troll.
internet  forensic  language  sex  journalism 
june 2016 by juliusbeezer
Chinese officials 'create 488m bogus social media posts a year' | World news | The Guardian
The Chinese government is fabricating almost 490m social media posts a year in order to distract the public from criticising or questioning its rule, according to a study.

China’s “Fifty Cent Party” – a legion of freelance online trolls so-named because they are believed to be paid 50 cents a post – has long been blamed for flooding the Chinese internet with pro-regime messages designed to defend and promote the ruling Communist party.
attention  politics  china  internet 
june 2016 by juliusbeezer
34 surprising exceptions to Rule 34 | The Daily Dot
Among the long-held Rules of the Internet, the most infamous is Rule 34: "If it exists, there is porn of it—no exceptions."

Rule 34 has been ruining favorite childhood cartoons and sexualizing video game characters for about as long as the .jpg file format has existed, to say nothing of all the Photoshopped celebrity nudes it's produced. And although the rule is nearly universal, there remain some surprising omissions. This may come as news to you if you're familiar with humanity's shocking ability to draw breasts on anything and masturbate to it.
porn  internet  funny 
june 2016 by juliusbeezer
« earlier      
per page:    204080120160

Copy this bookmark:

to read