Neutralité Des Plateformes
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Uila Supported Apps
Uila Supported Applications and Protocols updated Oct 2020 Application/Protocol Name Full Description 01net.com 01net website, a French high-tech news site. 050 plus is a Japanese embedded smartphone application dedicated to 050 plus audio-conferencing. 0zz0.com 0zz0 is an online solution to store, send and share files 10050.net China Railcom group web portal. This protocol plug-in classifies the http traffic to the host 10086.cn. It also 10086.cn classifies the ssl traffic to the Common Name 10086.cn. 104.com Web site dedicated to job research. 1111.com.tw Website dedicated to job research in Taiwan. 114la.com Chinese web portal operated by YLMF Computer Technology Co. Chinese cloud storing system of the 115 website. It is operated by YLMF 115.com Computer Technology Co. 118114.cn Chinese booking and reservation portal. 11st.co.kr Korean shopping website 11st. It is operated by SK Planet Co. 1337x.org Bittorrent tracker search engine 139mail 139mail is a chinese webmail powered by China Mobile. 15min.lt Lithuanian news portal Chinese web portal 163. It is operated by NetEase, a company which 163.com pioneered the development of Internet in China. 17173.com Website distributing Chinese games. 17u.com Chinese online travel booking website. 20 minutes is a free, daily newspaper available in France, Spain and 20minutes Switzerland. This plugin classifies websites. 24h.com.vn Vietnamese news portal 24ora.com Aruban news portal 24sata.hr Croatian news portal 24SevenOffice 24SevenOffice is a web-based Enterprise resource planning (ERP) systems. 24ur.com Slovenian news portal 2ch.net Japanese adult videos web site 2Shared 2shared is an online space for sharing and storage. -
Bbg), 2011-2015
Description of document: FOIA Logs for the Broadcasting Board of Governors (BBG), 2011-2015 Requested date: 02-March-2016 Released date: 06-May-2016 Posted date: 08-August-2016 Source of document: BBG FOIA Office Room 3349 330 Independence Ave. SW Washington, D.C. 20237 Fax: (202) 203-4585 The governmentattic.org web site (“the site”) is noncommercial and free to the public. The site and materials made available on the site, such as this file, are for reference only. The governmentattic.org web site and its principals have made every effort to make this information as complete and as accurate as possible, however, there may be mistakes and omissions, both typographical and in content. The governmentattic.org web site and its principals shall have neither liability nor responsibility to any person or entity with respect to any loss or damage caused, or alleged to have been caused, directly or indirectly, by the information provided on the governmentattic.org web site or in this file. The public records published on the site were obtained from government agencies using proper legal channels. Each document is identified as to the source. Any concerns about the contents of the site should be directed to the agency originating the document in question. GovernmentAttic.org is not responsible for the contents of documents published on the website. Broadcasting 330 Independence Ave.SW T 202.203.4550 Board of Cohen Building, Room 3349 F 202.203.4585 Governors Washington, DC 20237 Office ofthe General Counsel Freedom ofInformation and Privacy Act Office May6, 2016 RE: Request Pursuant to the Freedom of Information Act-FOIA #16-035 This letter is in response to your Freedom of Information Act (FOIA) request dated March 2, 2016 to the Broadcasting Board of Governors (BBG), which the Agency received on March 14, 2016. -
D1.1 Somedi Vision
D1.1 SoMeDi Vision D1.1 SoMeDi Vision WP1 Vision, architecture and data integration – T1.1 SoMeDi Vision and context Delivery Date: Project Number: Responsible partner: M3 - 28/02/2017 ITEA3 Call2 15011 1 D1.1 SoMeDi Vision DOCUMENT CONTRIBUTORS Name Company Email Elena Muelas HIB [email protected] Inmaculada Luengo HIB [email protected] Carlos A Iglesias UPM George Suciu BEIA [email protected] Cristina Ivan Siveco ROMANIA [email protected] Mirela Ardelean Siveco ROMANIA [email protected] Dragos Papatoiu Siveco ROMANIA [email protected] Emilio Madueño Innovati [email protected] DOCUMENT HISTORY Version Date Author Description 0.1 16.12.2016 HIB First ToC distribution requesting contributions 0.2 30.12.2016 BEIA Romanian contributions to SotA 0.3 04.01.2016 Innovati Contributions to architecture 0.4 10.01.2017 HIB New version with restructuration of the sections, integration of the different contributions. Also added Beyond SotA contribution to sentiment analysis, Manifesto section and Marketing use case description. 0.5 17.01.2017 UPM Contribution to Dashboards for social media 0.6 18.01.2017 SIVECO, BEIA Romanian contribution 0.7 18.01.2017 HIB Improvement on use cases and SOMEDI Manifesto 0.8 19.01.2017 INNOVATI Contributions to section 2 and 5 0.9 02.02.2017 BEIA, SIVECO Review of contributions 0.10 06.02.2017 Taiger, HIB Contribution to machine learning and big data technologies/Contribution to sentiment 2 D1.1 SoMeDi Vision analysis 0.11 20.02.2017 BEIA, SIVECO Small contribution on section 2 and 6, add references for section 3 AI 1.0 22.02.2017 HIB Final version distributed for review 3 D1.1 SoMeDi Vision TABLE OF CONTENTS 1. -
TECH TOOLS for ACTIVISTS Published : 2012-10-04 License : CC-BY T ABLE of CONT ENT S
TECH TOOLS FOR ACTIVISTS Published : 2012-10-04 License : CC-BY T ABLE OF CONT ENT S Tech Tools For Activism 1 An introduction to this booklet 2 2 Securing your email 4 3 Anonymous Blogs and Websites 7 4 Microblogging Beyond Twitter 9 5 Browsing the Internet 11 6 Organising and Networking Online 14 7 Mobile Phone Security and Android Apps 18 8 Publishing and Networking News 21 9 Producing and Publishing Media to the Internet 23 10 Green Computing 25 11 Hiding & Deleting Things on your PC 27 TECH TOOLS FOR ACTIVISM 1. AN INTRODUCTION TO THIS BOOKLET 2. SECURING YOUR EMAIL 3. ANONYMOUS BLOGS AND WEBSITES 4. MICROBLOGGING BEYOND TWITTER 5. BROWSING THE INTERNET 6. ORGANISING AND NETWORKING ONLINE 7. MOBILE PHONE SECURITY AND ANDROID APPS 8. PUBLISHING AND NETWORKING NEWS 9. PRODUCING AND PUBLISHING MEDIA TO THE INTERNET 10. GREEN COMPUTING 11. HIDING & DELETING THINGS ON YOUR PC 1 1. AN INT RODUCT ION T O T HIS BOOKLET T his booklet will help you to: use email securely publish news and upload media anonymously make your web browsing more anonymous and secure use Facebook and Twitter more securely get organised online without relying on corporate social networking sites use encrypted messaging on mobile phones hide stuff on your computer so it can't be found find a more secure and decentralised replacement for Twitter support free software, open licences and decentralised/ federated communication. Why this booklet is important: This booklet provides an introduction to the effective use of technology for activism, with links to step-by-step guides and further information. -
Perlstein2010social Networking.Pdf (1.828Mb)
The Application of Social Networks to the Marketing of Industrial Products ________________________ A Master’s Thesis Presented to School of Information Design Technology State University of New York Institute of Technology Utica, New York _____________________ In Partial Fulfillment of the Requirements for the Master of Science Degree ________________________ by Roger Perlstein December 2010 Roger C. Perlstein 2010 SUNYIT DEPARTMENT OF INFORMATION DESIGN AND TECHNOLOGY Approved and recommended for acceptance as a thesis in partial fulfillment of the requirements for the degree of Master of Science in Information Design and Technology _____________________________________ DATE ____________________________________________________ Stephen Schneider Thesis Advisor ____________________________________________________ Russell Kahn ____________________________________________________ Kathryn Stam ii Abstract Social networking changes the way people share ideas and communicate. Advantages in portability, reach, and access contribute to acceptance of social networks and the likelihood that they will continue to grow. While these systems were initially used by individuals, they were not as widely employed by businesses. Some firms however are leveraging these tools and integrating social networking into their marketing. Where social networks are used by businesses, they are primarily focused on consumer goods, home and family, electronics and entertainment. Business-to-business applications are not as widely used and some question whether such tools offer significant benefits in such settings. This thesis studies social network marketing for a vehicle lift manufacturer. It addresses viability, strategy and practices for a vehicle maintenance equipment manufacturer. It analyzes data collected from other similar companies to identify best practices for the use of such tools and details the current state of the industry for this market. iii TABLE OF CONTENTS PAGE LIST OF TABLES s, , vi LIST OF FIGURES vi Chapter 1. -
Social Media & Audience Participation in Regard to Television
The University of Akron IdeaExchange@UAkron The Dr. Gary B. and Pamela S. Williams Honors Honors Research Projects College Spring 2015 Social Media & Audience Participation in Regard to Television Jean Marie McBride The University Of Akron, [email protected] Please take a moment to share how this work helps you through this survey. Your feedback will be important as we plan further development of our repository. Follow this and additional works at: http://ideaexchange.uakron.edu/honors_research_projects Part of the Communication Technology and New Media Commons, Social Media Commons, and the Television Commons Recommended Citation McBride, Jean Marie, "Social Media & Audience Participation in Regard to Television" (2015). Honors Research Projects. 120. http://ideaexchange.uakron.edu/honors_research_projects/120 This Honors Research Project is brought to you for free and open access by The Dr. Gary B. and Pamela S. Williams Honors College at IdeaExchange@UAkron, the institutional repository of The nivU ersity of Akron in Akron, Ohio, USA. It has been accepted for inclusion in Honors Research Projects by an authorized administrator of IdeaExchange@UAkron. For more information, please contact [email protected], [email protected]. Social Media & Audience Participation in Regard to Television: Jean McBride 1 Social Media & Audience Participation in Regard to Television: Jean McBride Introduction Social media has been on the rise for years. From Twitter and Facebook, to Pinterest and Instagram, the social media world has grown. Originally, social media was used for teenagers’ enjoyment; however, in recent years broadcasters have jumped on the social media bandwagon, and used social media to “innovatively enhance consumer engagement, traditional marketing campaigns and promotions” (Benedict, 2013, p.1). -
Is Bob Sending Mixed Signals?
Is Bob Sending Mixed Signals? Michael Schliep Ian Kariniemi Nicholas Hopper University of Minnesota University of Minnesota University of Minnesota [email protected] [email protected] [email protected] ABSTRACT Demand for end-to-end secure messaging has been growing rapidly and companies have responded by releasing applications that imple- ment end-to-end secure messaging protocols. Signal and protocols based on Signal dominate the secure messaging applications. In this work we analyze conversational security properties provided by the Signal Android application against a variety of real world ad- versaries. We identify vulnerabilities that allow the Signal server to learn the contents of attachments, undetectably re-order and drop messages, and add and drop participants from group conversations. We then perform proof-of-concept attacks against the application to demonstrate the practicality of these vulnerabilities, and suggest mitigations that can detect our attacks. The main conclusion of our work is that we need to consider more than confidentiality and integrity of messages when designing future protocols. We also stress that protocols must protect against compromised servers and at a minimum implement a trust but verify model. 1 INTRODUCTION (a) Alice’s view of the conversa-(b) Bob’s view of the conversa- Recently many software developers and companies have been inte- tion. tion. grating end-to-end encrypted messaging protocols into their chat applications. Some applications implement a proprietary protocol, Figure 1: Speaker inconsistency in a conversation. such as Apple iMessage [1]; others, such as Cryptocat [7], imple- ment XMPP OMEMO [17]; but most implement the Signal protocol or a protocol based on Signal, including Open Whisper Systems’ caching. -
The a to Z of Social Media
FACT SHEET 4 THE A TO Z OF SOCIAL MEDIA A Blogroll: a list of sites displayed in the sidebar of blog, showing which other blogs the blog-owner AddThis: a social bookmarking service that provides reads regularly. a code users can put on their websites so that when people visit that site, they have the option to share BoardReader: a free search engine that allows users via Facebook, Twitter, etc. Its analytics service can to search for keywords only in posts and titles of show you which pages are trending, where people are online forums. interacting with your brand, and what they’re saying about your content on Twitter. Boxee: a social video application that allows users to watch online videos on their TVs and computers. Algorithm: a set of formulas developed for a computer Users can share and watch videos from a variety of to perform a certain function. This is important in the online videos sources for free. social sphere as the algorithms sites like Facebook and Google use are critical for developing content- Bookmarking: allows you to mark something you sharing strategies. found important, enjoyed, or where you left off to continue reading later. Bookmarking is made possible Application Programming Interface (API): a via online services such as Delicious. documented interface that allows one software application to interact with another application. An example of this is the Twitter API. C Avatar: an image or user name that represents a person online within forums and social networks. Chat: refers to any kind of communication over the Internet but traditionally refers to one-to-one communication through a text-based chat application B commonly referred to as instant messaging applications. -
1. 210830 E2EE Report Paper
TERRORIST USE OF E2EE: STATE OF PLAY, MISCONCEPTIONS, AND MITIGATION STRATEGIES REPORT 1. Background And Scope 04 2. Methodology 04 Part 1 – Use and Perception of E2EE: Landscape Review 3. Use and Perception of E2EE: Key Findings 05 4. Public Perception of E2EE: User Concerns for Privacy And Security 06 5. Landscape Review: Use of E2EE Across The Internet 13 6. E2EE: Challenges for Content Moderation 23 7. Challenges for Law Enforcement Access 26 8. Policymakers Calls for Access to and Traceability of E2EE 29 9. Key Arguments Against the Creation of Backdoors 39 Part 2 – Assessing Terrorist and Violent Extremist Use of E2EE 10. Terrorist and Violent Extremist Use of E2EE: Key Findings 42 11. Terrorist and Violent Extremist Use of E2EE: Assessment 42 12. Suspected Use of E2EE In Terrorist Attacks And Its Impact on The Encryption Debate 54 13. Monitoring of Encrypted Platforms By Law Enforcement Agencies 56 Part 3 – Strategies for Risk Mitigation 14. Strategies for Risk Mitigation: Key Findings 62 15. Countering Criminal Use of E2EE 63 16. Preventing Criminal Use – EMS Feature Attributes 63 17. Identifying Patterns of Criminal Use – Metadata Analysis 66 18. Disrupting Criminal Use – Technical Tools to Detect Illegal Content 78 19. Going Beyond The Encryption Debate 85 Part 4 – Tech Against Terrorism’s Recommendations for Tech Platforms 20. Recommendation: Mitigating Risks of Terrorist and Violent Extremist Use of EMS 93 21. Recommendation: Taking A Stand For Encryption 99 Annex Annex 1. Encryption Technology 103 Annex 2. Encryption: A Backbone Of Today’s Digital World 108 Annex 3. The Encryption Debate 110 Annex 4. -
Lista Ofrecida Por Mashe De Forobeta. Visita Mi Blog Como Agradecimiento :P Y Pon E Me Gusta En Forobeta!
Lista ofrecida por mashe de forobeta. Visita mi blog como agradecimiento :P Y pon e Me Gusta en Forobeta! http://mashet.com/ Seguime en Twitter si queres tambien y avisame que sos de Forobeta y voy a evalu ar si te sigo o no.. >>@mashet NO ABUSEN Y SIGAN LOS CONSEJOS DEL THREAD! http://blog.newsarama.com/2009/04/09/supernaturalcrimefightinghasanewname anditssolomonstone/ http://htmlgiant.com/?p=7408 http://mootools.net/blog/2009/04/01/anewnameformootools/ http://freemovement.wordpress.com/2009/02/11/rlctochangename/ http://www.mattheaton.com/?p=14 http://www.webhostingsearch.com/blog/noavailabledomainnames068 http://findportablesolarpower.com/updatesandnews/worldresponsesearthhour2009 / http://www.neuescurriculum.org/nc/?p=12 http://www.ybointeractive.com/blog/2008/09/18/thewrongwaytochooseadomain name/ http://www.marcozehe.de/2008/02/29/easyariatip1usingariarequired/ http://www.universetoday.com/2009/03/16/europesclimatesatellitefailstoleave pad/ http://blogs.sjr.com/editor/index.php/2009/03/27/touchinganerveresponsesto acolumn/ http://blog.privcom.gc.ca/index.php/2008/03/18/yourcreativejuicesrequired/ http://www.taiaiake.com/27 http://www.deadmilkmen.com/2007/08/24/leaveusaloan/ http://www.techgadgets.in/household/2007/06/roboamassagingchairresponsesto yourvoice/ http://blog.swishzone.com/?p=1095 http://www.lorenzogil.com/blog/2009/01/18/mappinginheritancetoardbmswithst ormandlazrdelegates/ http://www.venganza.org/about/openletter/responses/ http://www.middleclassforum.org/?p=405 http://flavio.castelli.name/qjson_qt_json_library http://www.razorit.com/designers_central/howtochooseadomainnameforapree -
Contagious Is Ten
Social Change / xxx Contagious is ten. Welcome... 14 28 31 47 THE CONTAGIOUS DECADE SMALL BUT PERFECTLY FORMED 06 A Primer 40 Little brands, big thinkers Log off, lean in and pore over Katrina Dodd’s attempt In each of our past 20 issues, Contagious has at imposing neatly alphabetised order on the chaos of celebrated seven small companies hoping to change the Contagious zeitgeist. the world. We take a look at some of our favourites – and add a few more to the ranks. WELCOME TO CONTAGIOUS X 14 Brands for the next decade STRENGTH STUDY / Publishing Application instructions for this special dose of the 47 By Chloe Markowicz magazine. Side effects may include broad inspiration, Landscape Brands evolve from being publicists brand bravery and a healthy dose of disdain for the to publishers status quo. Brand Spotlight Red Bull Opinion Tyler Brûlé, editor in chief, Monocle STRENGTH STUDY / Disruption 19 By Emily Hare STRENGTH STUDY / Data Landscape How can brands make disruption work 57 By Chris Barth while protecting themselves against challengers? Landscape The fine art of surfacing signal from noise Brand Spotlight Tesla Brand Spotlight IBM Opinion Jonathan Mildenhall, CMO, Airbnb Opinion Vikram Somaya, general manager of WeatherFX, The Weather Company 28 CUT OUT AND KEEP A brief history of (Contagious) time / FEATURE / The technology boneyard The ten commandments 66 Explosive digital development has its casualties. Will A crunched-down illustration of the major tech, social Sansom considers those that became cautionary tales. and business developments on one side and Contagious’ non-denominational lessons to live by on the other. -
Social Media E-Book
E-Book This e-book and workbook are provided by the Kutztown University Small Business Development Center. Last update: January 18, 2015 For comments and inquiries, please contact: Main center Kutztown University Small Business Development Center 1-877-472-7232 15155 Kutztown Road Kutztown, PA 19530 [email protected] Outreach offices Exton outreach office 737 Constitution Drive www.kutztownsbdc.org Exton, PA 19341 Harrisburg outreach office @KutztownSBDC 3211 North Front Street Harrisburg, PA 17110 www.youtube.com/KUSBDCtv Lancaster outreach office 100 South Queen Street Lancaster, PA 17608 Reading outreach office 237 Court Street Reading, PA 19601 York outreach office 600 North Hartley Street York, PA 17404 An accredited affiliate of the national network of Small Business Development Centers. Copyright © 2015 Kutztown University Small Business Development Center. All Rights Reserved. E-Book The contents of these pages are provided as an information guide only. No legal liability or other responsibility is accepted by or on behalf of the Kutztown University Small Business Development Center for any errors, omissions, or statements on these pages, or any site to which these pages connect. The Kutztown University Small Business Development Center accepts no responsibility for any loss, damage or inconvenience caused as a result of reliance on such information. This guide is provided by the KU SBDC and all sample business stories within are fictional. Any similarity to real businesses is coincidental. Funding support and resources are provided by the Commonwealth of Pennsylvania through the Department of Community and Economic Development; through a cooperative agreement with the U.S. Small Business Administration, and through support from Kutztown University.