Why the way we receive information is changing

Connected gadgets are generally thought of as tablets, smartphones and laptops. These devices offer a quick and trustworthy connection to the Internet and other such connected devices. However, even more gadgets fit into the connected cannon, like HDTVs, gaming consoles and even most Blu-ray players.

    Access to the Internet is, relatively speaking, easy and the information found online is easier to access. Traditionally, information was gathered through research and manual searching that required a large amount of dedicated time in order to find enough useful information. With an increase in connectivity, all we have to do is type a search query into Google utilizing a smartphone. How has the way we consume content changed now that from almost any location, we can access an almost endless library of knowledge?

Faster Access of Information

    Locating specific information can be done almost instantaneously with the help of the right device. Content was once delivered in hardbound books, but now it’s offered on websites, wikis, blogs and email. Because so many devices can access the Internet, finding the information you need is no longer a matter of locale. This makes the researching process much faster and allows for content to be consumed more quickly.

Faster Generation of Information

    Content generation is simply a matter of supply and demand. Because information is so much easier to consume with connected gadgets, there is an ever growing need for more content. The answer to this, of course, is faster content generation. As most connected devices can also be used to upload new content, online content and information is being generated and published faster than ever.

High Rate of Communication

    The time and effort needed to communicate has decreased due to the speed and connectedness of modern gadgets. Because of this, information can now be communicated from user to user at a much higher rate.  For example, a YouTube video with interesting content can go viral in a matter of minutes. Users can share the video through Facebook, Twitter, Google, email, HTML embedding, Internet enabled TVs, and even texting!

    How have connected devices changed the way we consume content? Speed, speed and speed. The rate at which content is generated, consumed and then disregarded is almost staggering. Information is easier to access than ever before, and at impressively high speeds. What we decided to do with that information is entirely up to us.

Internet Anonymity: The pros and cons

You may have noticed some issues with selecting pseudonyms if you were an early user of Google .  Social media sites have, traditionally, allowed users to create accounts with fake names. Google’s decision to remove anonymity has had made some users upset. One of the great things about the Internet is that it allows anyone the ability to be anonyamous. However, it’s important to consider the pros and cons of cost-free anonymity in an age where more and more social interactions are taking place online.

Pros

    Most account-based websites don’t require users to provide their real name or even utilize effective methods of verifying identity. This practice makes it quite simple to assume multiple personalities on the web. There is a layer of safety in this for many users who might be endangered if they were to reveal their full identity. Considar those who have been victims of stalking or spousal abuse. The ability to act anonymously on the Internet allows users to lower their accessibility and therefore decrease their susceptibility. There are instances in which anonymity on the Internet is a necessity.

Cons

    Most Internet based difficulties begin with the abuse of anonymity. Spam, social media spam and profile hacks start with the generation of a fake Internet identity. While there are ways of tracking down the true identity of users with methods such as IP tracing, most users don’t have the time or resources to do such extensive background checks. Internet bullying, stalking and thievery are all products of cost-free anonymity.

    Is Google on the right track with disavowing Internet anonymity? The truth is, the moral value of using pseudonyms is based on personal responsibility. When deciding your stance on the issue, first consider how you use it.

What Makes Technology Stick Around

New technologies are developed daily; so much so that it seems like the instant we upgrade, a bigger and better version is released. Even though we see technologies come and go, it may surprise you that the primary technology of many of these have stayed the same for decades.

What makes a technology retain its usefulness throughout time? A strong design? Popularity? Whatever the reason, here is a list of a few technologies which have not needed much alteration for over 4 decades.

Virtual Memory – 1962 – This allows systems to utilize hardware memory more resourcefully by recycling space used for memory. This idea led to time-sharing or the ability for systems to multi-task.

MOS Chip – 1967 – Metal-oxide semiconductor. This technology is used today to make computer chips and is known as CMOS (complementary metal-oxide semiconductor). The technology has transformed a bit over time so adaptability is one trait that has kept it alive.

C programming language – 1969 – Designed by Dennis Ritchie at Bell Labs, C is the most popular and widely used programming language in the world. Once you get something right why change it?

These technologies have maintained their credibility for over 50 years and are the core foundation of a variety of technologies today. As we demand more out of our tech we may see these evolve or disappear altogether. But for now they remain some of the most steadfast, innovative creations in the computer world for the past century.

You can find more tech that has withstood the test of time here: http://www.osnews.com/thread?484715


How to recover from a hacked email

We are all familiar with finding annoying spam messages in our e-mail inbox, labeled by subject lines offering cheap Rolex watches or urgent cries for help from friends mysteriously trapped in Europe. But what do you do when the tables are turned and it’s your friends who are receiving spam messages from your personal e-mail account? When this happens, it means your e-mail has been hacked. If you ever find yourself the target of a spamming crime, remember to follow these 3 steps in order to regain control.

Notify Webmail Provider

    The first step you should take is notifying your webmail provider. Make sure to contact them through their helpdesk or contact service and inform them of your hacked account. Reporting any hacking problems will allow the webmail provider to rectify the situation and then enhance their security to ensure that this situation will not be repeated.

Change Password

    Perhaps the most important step to take after finding your e-mail has been hacked is changing your password. This will ensure that whomever has compromised your account won’t be able to do so again. It’s also a great time to create a more intricate password, one that won’t be easily guessed by a traditional hacker. It’s not surprising that randomized password guessing jeopardises most emails. After all, the most common password is “password.”

Notify your contact list

    Let everyone on your contact list know that any emails received from your account over the past several days may have been spam. Doing this will help guarantee that no scams are successful and no viruses are transmitted. Sending out an email to all your contacts is the responsible thing to do in this situation. Make sure to communicate the message clearly in the subject line, as some members of your comment list have already opened a spam message and are currently staying away from your e-mails.

    No one likes having his or her personal information compromised. It’s important to remember that, if your email has been hacked, your online banking and other Internet managed services may also be compromised. If you’d like more information on what you should with a hacked email, please take a look at this article.