The moment I heard about the Boston Marathon bombing, I did what many people did: I immediately sought out as much information as possible online. I watched the now widely dispersed videos of the bomb exploding, I looked at the gruesome pictures of victims of the attacks, and I read countless articles about the unfolding tragedy. It is of course trite to observe that the internet has fundamentally altered the way people consume news, breaking or otherwise, but the importance of this fact, however obvious it may be, was made especially vivid to me as I watched the story of the Boston Marathon bombing unfold over the last few days from England, where I am currently in graduate school.
The Boston Marathon bombing, like most tragedies, has prompted countless reflections and questions; some of this soul-searching has been quite general – how is humanity capable of both ruinous evil and heroic good? – and some of it is quite specific – how many people where injured, who are they, exactly how did they get hurt? The much-discussed topic of how technology and social media have impacted the response to the Boston Marathon killings is both general and specific. It is general in that people are asking expansive questions about what role, if any, amateurs armed with computers and an internet connection should play in an active terrorist investigation, and it is specific in that, regardless of how you answer the first question, amateurs are playing a role in an active terrorist investigation, zeroing in on the minutest details of the thousands of photos of the crime scene floating around the internet. We’ll attempt to navigate between the two poles, exploring the intersection of technology, social media, and the Boston Marathon bombing details that have emerged so far.
More and more in an economy that’s squeezing the number of jobs — and relying heavily on the online resume submission — jobs sites and employers alike are using candidate management software to screen applicants. Gone are the days of people-intensive metrics as keywords, buzz words, and software dominate the way resumes are processed with talent management software. Is it a trend that’s not really working the way applicants and employers would like?
What is The Harlem Shake? That depends on whether you’re talking about the Harlem Shake dance, the Harlem Shake song, or the Harlem Shake video — by either Al B, Albee, Baauer, Bauer, Bauuer, or the Russian Army. And, the infectious internet meme doesn’t get any less complicated from there. But since the original Sunlight Harlem Shake, it has gone viral on YouTube (or uTube if you prefer) at breathtaking speed.
When Tyler Anderson posted shocking video detailing the violent aftermath that befell spectators as a result of Kyle Larson’s wreck on Saturday, NASCAR intentionally — but falsely — claimed copyright infringement which triggered the video being taken down by YouTube (or “utube” as the kids call it). The video was quickly replaced and, now, NASCAR admits it made the claim knowing no such copyright violation had occurred.
Readers of all ages and backgrounds love a trip to Barnes & Noble for the selection, the atmosphere, and the service. And that really great coffee. But lovers of e-books have ignored Barnes and Noble’s proprietary Nook e-reader in favor of the iPad from Apple and Kindle from Amazon. As a result, the foray into its own tablet has hemorrhaged loses to the point that the retailer appears to have given up on the much ballyhooed effort.
What is rickrolling? Well, if you’ve never been rickrolled, the best description is a zesty combination of an imaginative but harmless phishing technique, 80′s pop sensation Rick Astley, and a fun but cautionary lesson in taking care before you click ANY link online.
Once again Facebook, your friendly social media hotspot, is the target of marketers wanting and gaining access to your personal data — as a loyalty frequent shopper card program can use that data to cross-reference your likes and interactions to target your pocketbook. And all of it is correlated to you, personally, without so much as a choice to opt-in.
Tony Stewart was the winner of this year’s Drive4COPD 300 at Daytona, but the big talk was NASCAR’s removal of a spectator video from utube. Shot by a fan in the stands, the video shows a pileup, and debris hitting the catch fence — but more importantly, a tire in the stands which had clearly injured a spectator. YouTube quickly reposted the video as both sides issued dueling statements about the incident. And here it is.
Whether you call it spear phishing, spear fishing, or spearphishing, it’s a computer hack of your email in a way that’s targeted toward you, where you work, or a group you belong to. And, it masquerades as coming from someone you know and trust from your family, friends, workplace, or social group.
The concept of “The Internet Of Everything,” the notion that all products, people, and services communicate for the sake of personalization and efficiency, is more than just the wave of the tech future. It could mean very big business. According to Cisco Systems, the concept is worth $14 trillion in revenue over the ten years.
Apple Computers was apparently a victim of the same sophisticated cyberattack that targeted Facebook, Twitter, and three of the largest newspapers in the United States. The company announced that no data left the company, and only a small number of employee computers were influenced by malware infected through a software developer site — via the Java programming language.
Cybersecurity experts have revealed that an army unit in China nicknamed “Advanced Persistent Threat 1″ has been launching cyberattacks and data theft against American firms for some time. There seems to be enough evidence from the cybersecurity firm Mandiant to even pinpoint the origin of the attacks which have been linked to People’s Liberation Army Unit 61398.