• Providing quality teaching resources for the 'computer subjects' (CAT and IT) since 1995.
  • We believe that all learners should be comfortable with computers as part of their lives.
  • Content is presented through real-life examples and scenarios, so that learners may identify with the material more easily and make it relevant to their lives / experiences.
  • We provide videos, PowerPoint presentations, solutions to exercises and data files for exercises - all to make life easier for teachers and learners.
Stacks Image 58588

This Week in Tech

Europe trying to break the internet with copyright law

If you thought that Europe's GDPR which came into effect in May had an impact on the digital world, well, you ain't seen nothing yet! Article 11 and Article 13. Both are part of a set of copyright reforms that the European Union plans to pass this year. These two articles have the potential to seriously break the internet / WWW. They passed their first hurdle on the process of becoming law by ONE vote this week.

Article 11 requires that if you even link to a news story you need both permission from the publisher and you need to pay a license fee. That means that this blog, for example, would have to pay for every link included in a post (if the link were to a European publisher / web site).

Article 13 requires that anything posted by anyone in Europe be run through a copyright screening process before it could appear on the web. If it contains any part that appears to contain anything from a copyrighted work the post will be blocked.

I'm not going to go into it in detail, but these regulations create great potential for abuse, censorship and misuse - and could effectively transform the internet from a uniquely free medium accessible to all for purposes of publishing back into the bad old days where only those with deep pockets can afford to publish (putting control of news and media back into the hands of the elite few).

Read about it:

What is interesting is that big media in the states (New York Times, Washington post, etc.) is not giving this much coverage.

Social Implications

Hardware

Malware, Hacks, Privacy, etc

Data comms

Robots and robotics

Social Media

That's it for this week. Good luck with marking and reports...

Comments

The shamefaced catchup edition

AWOL. Sorry. Been busy wrestling with a project that I will be very pleased to reveal later in the year. Time and other tasks blurred into the background. That's no excuse for the blog to suffer - after all, the news keeps coming... I come back today shamefaced and contrite and will attempt not to do it again. As the title says, this edition will be largely a catchup - lots of bullets and links for you to explore on your own; little or no commentary from yours truly (you probably prefer it this way). Anyway, enjoy.

Robots and robotics:

Software Design

E-Waste

Social Implications

Privacy

Cybercrime - hacks, cracks, scams, etc.

Network & Internet

Hardware

AI

  • Want to experiment with Deep Learning? Lobe is a tool that makes it easy. Daring Fireball has more
  • Google Duplex - Amazing demo but is it for real?
    • Axios explains why it could all be fake
    • BGR takes it further

Software Bugs

Human error

Medicine

Humour

  • What is Amazon existed in the 80's? Someone created a mockup of a BBS style version of the site.

  • Try to imagine WhatsApp without smartphones....
  • And how about Siri?

Resources

Comments

KRACKs, Microwaves and leaks

Two HUGE hacks dominate the news this week.

KRACK - patch your WiFi fast!

KRACK affects WiFi at its lowest level - the WPA2 password security that encrypts and protects communication on the network. The bad news is that this security has been cracked, making all communication on the affected network vulnerable. The good news is that most new OS's have patches out there or patches will be coming in the near future. Fixes for routers may take time, but as long as your OS is fixed you should be safe, so make sure you install those updates as soon as they become available! Ars Technica explains how the KRACK exploit works.

SA Database leak - 60 Million affected - and that includes YOU!

This one is a bit more tricky. A database of more than 60 Million South Africans' information has been leaked online - the source of the leak is yet to be determined (read it at My Broadband). The bad news: The leak contains Names, full ID numbers, email addresses, contact details, age, marital status and income estimates. It is a perfect source for identity thieves. The database contains records of almost anyone involved in economic activity between 1990 and 2015. This includes people who have passed away in that time - hence the fact that the leak is larger than our current population!

The good news: There is none. The information is out there and you can't get it back. Watch out for any signs of Identity Theft... You can check if your data is in the leak - go to Have I Been Pwned, enter your email and hold your breath...

What can you do? Not much. Check your credit status now and regularly to see if someone has stolen your identity and obtained credit in your name. Then try to get the credit cancelled / revoked.

Backup and data recovery

The Hacker News has an interesting article on how a ransomware attack took down an American city for four days. Their point is to show the cost of the breach - I think it is a good illustration of the importance of doing backup right...

Microwaves make 40tb hard drive possible

Western Digital has announced that a new microwave technology will enable 40tb hard drives by 2025. Engadget has the details.

LED foils copyright breaking photography

This is an interesting story of how pulsing LED lights can ruin the photos taken by digital cameras and prevent them being used to take copyright breaking images in museums, etc. Digital Trends has the story.

"Hey Siri"

Ever wondered how your smart device (or home speaker, or smart TV) is able to tell when you want to give it a command by using its own special trigger phrase? Apple has published a full explanation of how its "Hey Siri" feature works. As complex as the process is, the astonishing thing is that it takes place all the time without having a noticeable effect on battery life. NB: The same explanation cannot be applied to other devices (all companies use their own technology).

The Uncanny Valley

What is it? This video explains perfectly!

The same people have a well reasoned explanation of why to be sceptical (as I am) of the VR hype...

That's it for this week....

Comments

Show more posts

Navigation


Contact Information

E-mail:

Fax:

Tel:

Postal Address:

soemail

086 293 2702 or 012 546 5313

012 565 6469

PO Box 52654, Dorandia, 0188

Copyright Study Opportunities 2016 - 2018. All rights reserved.

Privacy Policy | Terms of use