A recent TV ad
for Cheerios depits a heartwarming family vignette: An adorable tyke asks her mother if the cereal is good for the heart, her mother says yes, and the dad wakes up from his nap to find a pile of Cheerios on his chest.
But the fact that the mother is white, the dad is black and the child mixed-race has touched off a firestorm of criticism
that one media critic described as "a progressive-looking commercial collides with the ugliness of the Internet."
Parent company General Mills says it is has no plans to stop airing the spot or to take it down from its YouTube channel. [more inside]
posted by Gelatin
on Jun 7, 2013 -
Washington Post: NSA and FBI are mining data from nine major tech companies in formerly secret program.
Microsoft, Yahoo, Google, Facebook, PalTalk, AOL, Skype, YouTube, Apple are being monitored, with Dropbox "coming soon". The program, called PRISM, is reportedly the most prolific contributor to the President's Daily Brief.
posted by brentajones
on Jun 6, 2013 -
I turned around to face an approaching figure. It was Larry Page, naked, save for a pair of eyeglasses. “Welcome to Google Island. I hope my nudity doesn’t bother you. We’re completely committed to openness here. Search history. Health data. Your genetic blueprint. One way to express this is by removing clothes to foster experimentation. It’s something I learned at Burning Man,” he said.
posted by Horace Rumpole
on May 17, 2013 -
A Logic Named Joe
is a short science-fiction story by Murray Leinster. Published in 1946, the story depicts data-mining, massively networked computers, search engines, privacy/censorship filters and internet porn. Read it here.
posted by The Whelk
on May 13, 2013 -
"It's a been a year now since I 'surfed the web' or 'checked my email' or 'liked' anything with a figurative rather than literal thumbs up. I've managed to stay disconnected, just like I planned. I'm internet free. And now I'm supposed to tell you how it solved all my problems. I'm supposed to be enlightened. I'm supposed to be more 'real,' now. More perfect." Paul Miller is back on the Internet after spending a year offline.
posted by desjardins
on May 1, 2013 -
How stores spy on you: Many retailers are snooping more than ever Gaze trackers are hidden in tiny holes in the shelving and detect which brands you’re looking at and how long for each. There are even mannequins whose eyes are cameras...Cisco is testing a system [that] automatically detects your mobile device and connects you to the retailer’s free Wi-Fi network. "Once the customer gets on the network, he has opted in, and the privacy concerns are allayed..."
] [more inside]
posted by mediareport
on Mar 28, 2013 -
"While playing around with the Nmap Scripting Engine (NSE) we discovered an amazing number of open embedded devices on the Internet. " After completing the scan of roughly one hundred thousand IP addresses, we realized the number of insecure devices must be at least one hundred thousand. Starting with one device and assuming a scan speed of ten IP addresses per second, it should find the next open device within one hour. The scan rate would be doubled if we deployed a scanner to the newly found device. After doubling the scan rate in this way about 16.5 times, all unprotected devices would be found; this would take only 16.5 hours. Additionally, with one hundred thousand devices scanning at ten probes per second we would have a distributed port scanner to port scan the entire IPv4 Internet within one hour. [more inside]
posted by jquinby
on Mar 18, 2013 -
Global Internet Porn Habits:
An interactive map that lets you see the most commonly searched porn terms by state or country. No porn images, but obviously porn-related language and the word porn in the URL, so whether it is SFW is up to you.
posted by jacquilynne
on Mar 17, 2013 -
It’s not often that one has the opportunity to be the target of a cyber and kinetic attack at the same time. But that is exactly what’s happened to me and my Web site over the past 24 hours. On Thursday afternoon, my site was the target of a fairly massive denial of service attack. That attack was punctuated by a visit from a heavily armed local police unit that was tricked into responding to a 911 call spoofed to look like it came from my home.
Well, as one gamer enthusiast who follows me on Twitter remarked, I guess I’ve now “unlocked that level.”
posted by infini
on Mar 16, 2013 -
"Relatives don’t really show me any examples, but there was a point where my daughter, who is about to turn 20, when she was in her early teens, she thought it was a hoot when she was mad at me to compare me to Hitler. She’d look at me with a very mischievous look and say, 'You know, you’re acting just like Hilter.'
posted by vidur
on Mar 13, 2013 -
With a database of over 5,000 scientists, from Nobel prize winners to postdocs and PhD students, Sense About Science
works in partnership with scientific bodies, research publishers, policy makers, the public and the media, to change public discussions about science and evidence. They make these scientists available for questions from civic organizations and the public looking for scientific advice from experts
, campaign for the promotion of scientific principles in public policy
, and publish neat guides to understanding science intended for laypeople. [more inside]
posted by Blasdelb
on Feb 28, 2013 -
"Pop quiz: what is the favorite social networking site of Americans under age 25? If you guessed Facebook you are way behind the eight-ball, because Tumblr now enjoys more regular visits from the youth of America." Tumblr is not what you think.
"Tumblr provides its users with the oldest privacy-control strategy on the Internet: security through obscurity and multiple pseudonymity [... it] proves that the issue is less about public vs. private and more about whether you are findable and identifiable by people who actually know you in real life."
posted by Rory Marinich
on Feb 19, 2013 -
To understand what is at stake we need to make our way through the rhetorical smog. For months prior to the WCIT, the Euro-American press trumpeted warnings that this was to be an epochal clash between upholders of an open Internet and would-be government usurpers, led by authoritarian states like Russia, Iran and China. The terms of reference were set so rigidly that one European telecom company executive called it a campaign of “propaganda warfare” (2).
~ Masters of the Internet, Le Monde Diplomatique
posted by infini
on Feb 12, 2013 -