I am in full agreement, Ron. You, and pcharles' point about the encroachment on the constitution, are right on target.
The pretext of abolishing our constitutional rights in the interests of pursuing leaks, etc., have gone too far. There appears to be no limit on the government agencies when pursuing their interests; whether it is the FBI, IRS, etc.
It is up to us as citizens, and organizations such as Google, to restrain this abuse.
Kim, I agree that the lines get blurry once you connect to the internet. Following my analogy it would follow that once my computer activities cross the treshold of my home network, I am in the plain view of thhe public. However, just like in real life there are places my privacy is not just expected but also assured and protected like the dressing room in a haberdashery or a public toilet. There should be safe zones on the virtual world as well. Places where I have my name on the page where I keep my messages and photos and address book
I don't disagree, Kurt, but we also need to remember that the perimeter around our computer activity is no longer clear. Your hard drive may indeed be your "castle," but what about message you send, sites you visit, content you click on?
I don't have all the answers, but these seem to me to be questions worth posing.
Kim, excellent point. When I'm walking down the street in plain view of the general public, I have relenquished my expectations of privacy with the exceptions of what I am carrying out of plain sight. And it fits with the internet sites I visit from in my own home. If I use "MY PERSONAL" computer, then I expect some personal privacy. However, if I use a computer at a public location, say the downtown library, then I should expect some sort of snooping to take place. A man's home is his castle includes his computer and should be respected and not enchroached without permission or at least a warrant
Kurt, I think it's that we never paused to consider what we thought should be private about or web activity. It's not a private matter when I walk down the street (and there are surveillance cameras everywhere--in the cities, at least). Is it a private matter when I visit a website? I am not sure we've got our ideas about this in any kind of order.
have you never looked at what something like google analetics captures when you visit a blogspot.com web page? It's kinda creepy what a computer tells evey place you visit. The protocol was written in a time when naive people were in charge, people who never thought that bad people would ever find a use for a connected computer. And when some imaginative marketing gurus saw the info that was routinely collected and thought up a way to sell it to coorporate big wigs, bam ANALETICS and BIG DATA are now the buzz words in internet sales
The ThinkerNet does not reflect the views of TechWeb. The ThinkerNet is an informal means of communication to members and visitors of the Internet Evolution site. Individual authors are chosen by Internet Evolution to blog. Neither Internet Evolution nor TechWeb assume responsibility for comments, claims, or opinions made by authors and ThinkerNet bloggers. They are no substitute for your own research and should not be relied upon for trading or any other purpose.
As more information spills out from Edward Snowden's revelations, it's turning into a public relations disaster for US diplomats. Funny, but world leaders don't take too kindly to being spied upon by their allies. One reaction has been to suggest building in-country Internets, a move that could easily erase many of the benefits the Internet currently provides business and consumers alike.
Suppose somebody won the clash of the tech titans. Imagine that one company captured everything we do -- from search to social to online commerce. What if a single business made the devices, wrote the software, and sold us every service?
California Governor Jerry Brown signed a law last week that would allow young people to petition web companies to remove embarrassing items they posted while underage -- effectively erasing the online record of those posts or events.
Last week the powers that be at the National Security Agency showed their warm and fuzzy side and sent out a letter to each of the department's employees and their families to reassure them that they weren't the creepy surveillance state freaks being portrayed by the press. Rather, these hard-laboring people are doing good work on behalf of an ungrateful nation.
A recent release of the popular TweetDeck app for Twitter power-users gives new life to software that had previously taken a wrong turn. Here's a quick walk-through of the new TweetDeck, to show you why it should be at the top of your Twitter toolkit.
US counterterrorism expert Richard Clarke, who came to prominence with his prescient warnings before the 9/11 attacks, tells Smithsonian Magazine the US was responsible for the Stuxnet supersmart worm that attacked parts of nuclear reactors in Iran – and in the process, has given away one of the world's most sophisticated cyberweapons.
As enterprises leap into the Web 2.0 world of blogging, commenting, and social networking, just 'being there' won't deliver ROI. You may want a 'Web Evangelist' to systematically harvest the feedback in order to polish your product or service.
In the final episode of this series about the death of Internet anonymity, Saunders describes how the Internet of the future will start to attain a level of intelligence that requires no human intervention. Scary.
What can users today do to protect their online privacy? The simplest and most obvious option is to not use the Internet – at all. However, once all digital information is consolidated over the Internet, trying to protect digital identity by simply unplugging from the Internet becomes impossible – a fact that has manifest implications for civil liberties, Saunders says.
By 2011 the number of Internet-connected sensors will exceed 1 trillion, making your chances of doing anything or going anywhere unnoticed pretty much zero. Saunders talks about how the 'sensortization' of the Internet is eliminating the traditional divide between online and offline populations.
The 20th Century Internet was characterized by the ability to interact with other people and information on the Internet largely without anyone knowing who you were. The Internet of this century, conversely, will be defined by identity. Saunders explains how Internet users are unwittingly contributing to the demise of the anonymous Internet.
You've heard the expression, "Out of the frying pan, into the fire?" Amazon lives in the fire. The e-tailer wins by keeping things hot for its competitors, employees, and itself, according to a new book.
Positec, a manufacturer of power tools for homes and commercial applications, achieves greater customer service flexibility and cuts hold times in half by using a cloud-based service to manage its call center.
Big-data and analytics tools enable marketers to understand customers as individuals, identifying unmet needs and addressing each customer as a "segment of one," says John Kennedy, VP corporate marketing, IBM.
Expert Integrated Systems: Changing the Experience & Economics of IT In this e-book, we take an in-depth look at these expert integrated systems -- what they are, how they work, and how they have the potential to help CIOs achieve dramatic savings while restoring IT's role as business innovator. READ THIS eBOOK
your weekly update of news, analysis, and
opinion from Internet Evolution - FREE! REGISTER HERE
Wanted! Site Moderators Internet Evolution is looking for a handful of readers to help moderate the message boards on our site as well as engaging in high-IQ conversation with the industry mavens on our thinkerNet blogosphere. The job comes with various perks, bags of kudos, and GIANT bragging rights. Interested?