Etiquetas » Privacy

Solitary night walking

In the past, I looked forward to daylight savings time but recently I have discovered that I enjoy walking in the dark.  I never appreciated the privacy that darkness affords.   91 palabras más

Darkness

Alarms sound over changes to EU roaming, net neutrality and privacy rules

The European Parliament’s liberal-centrist bloc has warned over changes being made by EU countries to incoming telecoms legislation, saying they will severely weaken efforts to introduce unified net neutrality rules and eliminate mobile roaming surcharges for people moving between member states. 817 palabras más

Facebook playing by their rules matter

Facebook states that it’s mission is to give people the power to share and make the world more open and connected. But in reality it is Facebook that has the power to share the information they have access to and thus give them a competitive advantage over any other social media site. 453 palabras más

Future

Why I Don't Tell Other People's Stories

I have a confession to make. I haven’t been completely honest with you, dear readers. I’ve been writing this blog for a couple of years. I’ve written over 500 entries. 885 palabras más

Professional Development

Obama criticizes China's demands for U.S. tech firms to hand over encryption keys, install backdoors

”President Barack Obama on Monday sharply criticized China’s plans for new rules on U.S. tech companies, urging Beijing to change the policy if it wants to do business with the United States and saying he had raised it with President Xi Jinping,” Jeff Mason reports for Reuters. 351 palabras más

News

Internet and Anonymity

Last month, a 13 year old boy was killed by a high school student in Japan. The information of the victim is now prevalent all over the country and the entire nation is mourning over his death. 167 palabras más

Daily Report: China’s Rules for Foreign Tech Firms Draw Concern From Obama by THE NEW YORK TIMES


By THE NEW YORK TIMES

The rules, among other things, require companies that sell computer equipment to Chinese banks to turn over secret source code, submit to invasive audits and build so-called back doors into hardware and software. 15 palabras más

Tech