Snapjudge

Posts Tagged ‘Phones’

14 Heroes & 14 Villains

In Internet, Politics, World on செப்ரெம்பர் 27, 2015 at 1:06 முப

Source: Blog | Access

Heroes

  1. David Kaye, Special Rapporteur to the United Nations Human Rights Council on the promotion and protection of the right to freedom of opinion and expression
  2. U.S. Senator Patrick Leahy, introduced and was a crucial advocate for the USA FREEDOM Act of 2015.
  3. Malkia Amal Cyril, executive director of the Center for Media Justice and co-founder of the Media Action Grassroots Network, Malkia Amal Cyril’s work
  4. MPs David Davis and Tom Watson
  5. Maricarmen Sequera is the director of TEDIC, a Paraguayan digital rights organization
  6. Journalists Scahill and Begley revealed that American and British spies hacked into the internal computer network of the world’s largest producer of SIM cards and stole vast quantities of encryption keys
  7. As director of the digital liberties organization Bolo Bhi, Farieha Aziz has been at the forefront of the campaign to modify the Prevention of Electronic Crimes Act 2015, currently under consideration in Pakistan.
  8. Netzpolitik released confidential documents to the public exposing Germany’s plans to launch bulk surveillance programs
  9. a District Court struck down an 11-year-old gag order imposed by the FBI on Nicholas Merrill, the owner of Calyx, an internet service provider.
  10. Kakao (formerly Daum Kakao), owns a South Korean internet company with a popular messaging service
  11. The U.N. Human Rights Council
  12. Moxie Marlinspike (& team), founder of Open Whisper Systems, an open source software group that freely offers the programs Signal, TextSecure, and Redphone
  13. Kate Westmoreland is a cybercrime and human rights expert with Stanford’s Center for Internet and Society. Her January paper, Foreign Law Enforcement Access to User Data: A Survival Guide and Call for Action,
  14. Tim Cook, Apple’s CEO has vocally resisted government demands to weaken the company’s data security practices

Villains

  1. Hacking Team, covertly sold advanced communications surveillance services and resources to multiple governments and entities with poor records on human rights.
  2. Prime Minister Manuel Valls, pushed through dangerous new legislation that lacks clarity and precision, and authorizes French intelligence services to exercise broad surveillance powers without prior judicial approval or oversight.
  3. Pablo Romero Quezada is the former director of Ecuador’s intelligence agency, the Secretaría Nacional de Inteligencia (SENAIN)
  4. Attorney General Githu Muigai fought to preserve Kenya’s Security Laws despite a High Court judgment overturning the legislation.
  5. Canadian MP Steven Blaney was the sponsor of Bill C-51
  6. U.K. Prime Minister David Cameron
  7. Anthony Batts, former Commissioner of the Baltimore Police Department in the U.S. Acting under a nondisclosure agreement with the FBI that was signed by a previous commissioner, the Baltimore Police Department used the “Stingray” surveillance device 4,300 times

  8. Attorney General Mukul Rohatgi argued before India’s Supreme Court that privacy is not a fundamental right
  9. Spanish Judge Javier Gómez Bermúdez jailed seven people without specifying the individualized charges or facts attributed to each suspect, forcing the defendants to make statements without knowing what they were accused of.
  10. Telefonica
  11. Prime Minister of Thailand, Prayut Chan-o-cha approved legislation to create a National Cybersecurity Committee
  12. Washington Post Editorial Board suggested that the U.S. Congress could compel Apple and Google to use their “wizardry” to create a “Secure Golden Key” for the government to access otherwise secure user data
  13. Gerhard Schindler is president of Germany’s Federal Intelligence Service (BND)
  14. U.S. Senator Richard Burr, As chairman of the Senate Intelligence Committee, Senator Burr has been a driving force behind the Cybersecurity Information Sharing Act (CISA) legislation

Best & worst cellphones by radiation output levels

In Internet, Technology, USA, World on செப்ரெம்பர் 28, 2009 at 3:44 பிப

Listing is based on phones currently available from major carriers. You can also see all available phones or all phones (current and legacy) ranked by radiation.

BEST PHONES (low radiation) WORST PHONES (high radiation)
Samsung Impression (SGH-a877) [AT&T] Motorola MOTO VU204 [Verizon Wireless]
Motorola RAZR V8 [CellularONE] T-Mobile myTouch 3G [T-Mobile]
Samsung SGH-t229 [T-Mobile] Kyocera Jax S1300 [Virgin Mobile]
Samsung Rugby (SGH-a837) [AT&T] Blackberry Curve 8330 [Sprint, U.S. Cellular, Verizon Wireless, MetroPCS]
Samsung Propel Pro (SGH-i627) [AT&T] Motorola W385 [U.S. Cellular, Verizon Wireless]
Samsung Gravity (SGH-t459) [CellularONE, T-Mobile] T-Mobile Shadow [T-Mobile]
T-Mobile Sidekick [T-Mobile] Motorola C290 [Sprint, Kajeet]
LG Xenon (GR500) [AT&T] Motorola i335 [Sprint]
Motorola Karma QA1 [AT&T] Motorola MOTO VE240 [Cricket, MetroPCS]
Sanyo Katana II [Kajeet] Blackberry Bold 9000 [AT&T]

Gartner’s Top 10 Information Technology Predictions for 2009

In Internet, Lists, Technology, USA on ஏப்ரல் 17, 2009 at 4:58 பிப

Gartner publishes an annual top 10 list of broad technology predictions selected from more than 100 predictions that its analysts present and review every year.

Prediction #1: The challenge of current world economic conditions is set to drive uptake of video telepresence in the next three years, with the travel industry losing out, according to Gartner Inc.

#2: From 2009 to 2013 the server virtualization software market will grow with a compound annual growth rate of 28 percent, rising from US$1.8bn to US$6.2bn. Organizations are looking at ways to cut costs, better utilize assets and reduce implementation/management time and complexity. Virtualization addresses all of these concerns.

3: By 2011, 30 percent of consulting and systems integration revenue will be delivered via ‘cloud computing,’ a style of computing where massively scaleable IT-enabled capabilities are delivered ‘as a service’ to external customers using Internet technologies.

4: By 2012, as many as one in three of the top 20 business process outsourcing (BPO) providers will no longer exist. Contracts which today rely on significant front-end transition investment and time will likely give way to standardized services utilizing cloud-oriented approaches.

#5: By 2012, successful enterprises will actively encourage and reward more failures in order to find the optimal approach they want more quickly. Unfortunately, for many reasons, most business managers lack the skills to change processes or understand how desired changes might affect others. Thus, the BPM principle that business managers and process participants can and should be able to change processes — either changing the design, the instance, the data or the execution — is very scary to many.

Prediction #6: In 2012, the major PC vendors will recycle only one PC for every five they ship. With ongoing PC market growth and strong adoption of mobile PCs, the volume of secondary PCs is accelerating. Without subsidies, PC recycling is usually not profitable.

#7: By 2012, 30 percent of mobile PCs sold in the worldwide consumer market will be priced at less than US$300. Low-cost PCs allow vendors to increase PC penetration in emerging markets across Asia Pacific, in Latin America, Eastern Europe and the Middle East and Africa. The inclusion of wireless functionality for mobile Internet connectivity, when combined with growing availability of wireless infrastructure makes these devices attractive to telecommunications service providers, opening up a new distribution channel.

#8: By year end 2013, 40 percent of enterprise knowledge workers will have abandoned or removed their desk phone. With complex desk phones costing several hundred dollars per unit, and growing moves toward remote workers, hotdesking and other business practices which unlink an individual from a fixed location, there are significant cost savings possible.

#9: By the end of next year 2010, wireless operators will cease to offer unlimited (flat-rate) mobile data plans. Gartner warns that users must expect data throughput limitations on 3G to continue and plan mobile enterprise services accordingly. New bandwidth-intensive smart phones and mobile Internet devices are accelerating the demand for bandwidth, with devices like Apple’s iPhone driving significant increases in mobile data usage. Networks are already hitting capacity and increased customer demand is impacting network availability and effective throughput.

Prediction #10: By year end 2012, physical sensors will create 20 percent of non-video Internet traffic. We are all familiar with CCTV systems for monitoring traffic movement, license plates and many other applications, but how about collecting data from the hard-disk shock sensors in your notebook to collect data to better understand earth tremors and earthquakes?