Appeals court strikes down FCCs Net neutrality rules | CNET News


Broadband providers aren’t “common carriers,” court says, and that makes all the difference in a decision certain to shake up the fixed broadband and wireless industries.

Read more: Appeals court strikes down FCCs Net neutrality rules | Politics and Law | CNET News

Older Adults and Internet Use: Some of What we know | Pew


Middle Earth comes to life in epic Chrome experiment | Engadget


We’re go out on a limb here and say that the Venn diagram of Engadget fans and Tolkien fans looks something like this. So, we figure you’ll probably want to hear about a brand new Chrome experiment that brings various parts of Middle Earth to life, including the Trollshaw and Dol Guldur. It starts with a pretty simple interactive map, but from there you’re able to dive into several locations and learn about Hobbit lore through text, animations and audio. At the end of each lesson on Tolkien’s fantasy world, you’re challenged to complete a simple mini game that has you causing flowers to bloom or avoiding troll attacks. While the WebGL-powered games are pretty impressive, its the HTML5 audio and animations that are the real eye-candy here — doubly so since they work just as well on a phone or tablet as they do your desktop. As you swipe through slides in the story, camera angles change in coordination with your finger and characters dart across bridges. Honestly, even if you’re part of that tiny sliver in the diagram that can’t stand Tolkien, it’s worth checking out the latest Chrome Experiment, if only to remind yourself of the growing power of the web browser.

Middle Earth comes to life in epic Chrome experiment | Engadget

Our Government Has Weaponized the Internet. Here’s How They Did It | Wired.com


The internet backbone — the infrastructure of networks upon which internet traffic travels — went from being a passive infrastructure for communication to an active weapon for attacks.

According to revelations about the QUANTUM program, the NSA can “shoot” (their words) an exploit at any target it desires as his or her traffic passes across the backbone. It appears that the NSA and GCHQ were the first to turn the internet backbone into a weapon; absent Snowdens of their own, other countries may do the same and then say, “It wasn’t us. And even if it was, you started it.”

If the NSA can hack Petrobras, the Russians can justify attacking Exxon/Mobil. If GCHQ can hack Belgacom to enable covert wiretaps, France can do the same to AT&T. If the Canadians target the Brazilian Ministry of Mines and Energy, the Chinese can target the U.S. Department of the Interior. We now live in a world where, if we are lucky, our attackers may be every country our traffic passes through except our own.

Which means the rest of us — and especially any company or individual whose operations are economically or politically significant — are now targets. All cleartext traffic is not just information being sent from sender to receiver, but is a possible attack vector.

Here’s how it works.

Read more: Our Government Has Weaponized the Internet. Here’s How They Did It | Wired Opinion | Wired.com

How to Opt Out of Data Tracking on Your Most-Used Sites | Mashable


Google’s latest updates to its terms of service have left many privacy advocates crying foul. One new feature called “shared endorsements” allows your name and photograph to be used in targeted advertisements on Google property sites.

Google’s support page for shared endorsements claims the feature will allow for more friend-based recommendation of music and restaurants, working much like Facebook’s Sponsored Stories.

Shared endorsements are not unique. Many sites, apps and browsers are using your information in ways you might not entirely comply with if you’d take the time to read their privacy policies. Often, opting out is only a click away, though it may be difficult to find out where exactly to click.

We’ve compiled this list of ways various Internet companies are tracking and using your data — plus, given you the tools to opt out, if you wish.

Reviews how to opt out for:

  • Targeted Advertisements
  • Search History
  • Disable Third-Party Cookie Tracking

Read: How to Opt Out of Data Tracking on Your Most-Used Sites | Mashable

Related:

Books, libraries, and the changing digital landscape | Pew Research Center


How libraries are dealing with the changing technological environment, as well as the larger context of Americans’ reading and library habits, and what they expect from libraries in the future.

The Ultimate Guide to the Invisible Web | OEDB.org


Search engines are, in a sense, the heartbeat of the internet; “googling” has become a part of everyday speech and is even recognized by Merriam-Webster as a grammatically correct verb. It’s a common misconception, however, that googling a search term will reveal every site out there that addresses your search. In fact, typical search engines like Google, Yahoo, or Bing actually access only a tiny fraction – estimated at 0.03% – of the internet. The sites that traditional searches yield are part of what’s known as the Surface Web, which is comprised of indexed pages that a search engine’s web crawlers are programmed to retrieve.

So where’s the rest? The vast majority of the Internet lies in the Deep Web, sometimes referred to as the Invisible Web. The actual size of the Deep Web is impossible to measure, but many experts estimate it is about 500 times the size of the web as we know it.

Deep Web pages operate just like any other site online, but they are constructed so that their existence is invisible to Web crawlers. While recent news, such as the bust of the infamous Silk Road drug-dealing site and Edward Snowden’s NSA shenanigans, have spotlighted the Deep Web’s existence, it’s still largely misunderstood.

Read more: The Ultimate Guide to the Invisible Web | OEDB.org.

Eye-opening and informative post. Topics discussed:

  • Search Engines and the Surface Web
  • How is the Deep Web Invisible to Search Engines?
  • How to Access and Search for Invisible Content
  • Invisible Web Search Tools

Super Searcher Tips | Mary Ellen Bates


Networked Worlds & Networked Enterprises | Pew Research Center


Networked Worlds & Networked Enterprises
Lee Rainie, Director of the Pew Research Center’s Internet Project, shows how the large, loosely knit social circles of networked individuals expand opportunities for learning, problem solving, decision making, and personal interaction.

The new social operating system of “networked individualism” requires us to develop networking skills and strategies, work on maintaining ties, and balance multiple overlapping networks. The “triple revolution” that has brought on this transformation: the rise of social networking, the capacity of the Internet to empower individuals, and the always-on connectivity of mobile devices.

Drawing on extensive evidence, Rainie examines how the move to networked individualism has driven changes in organizational structure, job performance criteria, and the way people interact in workplaces. He presents a glimpse of the new networked enterprise and way of working.

 

Cyber War Games | NOVA


Researchers from all over the world can use DETER, a practice Internet, to discover the best ways to combat hackers and prevent a “Cyber Pearl Harbor.” Host David Pogue met with cyber security experts at DETER, who taught him about a common attack called the Distributed Denial of Service, or DDoS, attack.