The Path to Data Privacy and Security

On February 22, 2012, in Opinion, by Scott Willsey


The advent of social networks and cloud computing have brought with them questions about privacy and security, both from technical and ethical standpoints. This was brought to the forefront again this past week, as many iOS users might know, when a social network called Path was found to be uploading its users’ contact information without notifying them that it was doing so.

The reaction in the online media was pretty much one of condemnation. Certainly Path made several mistakes. First, they should have alerted users that they were going to upload contact information, request permission to do so, and inform them as to exactly why they were doing this and what they were doing with this information. They also should not have sent the information to their servers in plain text rather than as encrypted data, because doing so allows anyone on a public Wi-Fi network to potentially gain access to your contact data if they are sniffing network traffic at the time the contact information is sent to Path’s servers.

Continue reading »

Tagged with:  

The Twitter Book, Second Edition
Book Review

On February 7, 2012, in Book Review, Review, by Mark Greentree

The Twitter Book, Second Edition
Tim O’Reilly and Sarah Milstein

Publisher: O’Reilly Media
Print ISBN: 978-0-596-80281-3 | ISBN 10: 0-596-80281-1
EBook ISBN: 978-0-596-80410-7 | ISBN 10: 0-596-80410-5
Price: eBook: US$15.99 | Print: US$19.99

How complex could Twitter be? After all the service condenses messages into 140 characters!

Twitter is one social network service that you shouldn’t judge solely by its outwards appearance. It is incredibly versatile.

The Twitter Book, Second Edition will take you deeper into the inner workings of Twitter than you ever thought was possible.

Continue reading »

Looking for something?

Use the form below to search the site:

Still not finding what you're looking for? Drop a comment on a post or contact us so we can take care of it!