an amazing way to learn

Thursday, January 18, 2007

my youtube page

Youtube is a no limit website, where i can spend hours.
one of the fonctions allow to create its own personal page.
By this way, we can save our favorites videos and send same to friends, but also send our own videos and see who have seen them!
these functions are not used a lot at this moment, but i guess it could make of youtube the larger online community

my wiki

here is the wiki i have done with some classmates to develop communication and marketing subjects

http://newmediaeconomy.metawiki.com/

a funny video

Youtube is a huge place where we can find everything, it is a testimony of stupidity, genuine, intelligence, and fun.
I have chosen this video cause what they do is both crazy and funny.
Enjoy the watch

video cv


with the evolution of technology, we can see that all the supports we usually use are changing.
emails have replaced letters...
in the work world, we begin to see changes. At this time, we can send cvs and motivation letter by mail, but now, many companies propose to create a video cv.
I can see a lot of good things with that : it is more interactive, and less boring for the watcher.
Moreover, it is a real representation of you, there is no only your formation, but also how you speak, your presentation.
To me, we shld all have, in a few years, a video cv

2006 was youtube, 2007 will be....


it is really difficult to anticipate what is going to explode this year, because it dep
ends on people's behaviour.
If we could see it, we would be rich!
more seriously, at this moment, the site which is very important is second life, with billions of users, it could be THE thing of 2007, but, in web 2.0 we could also imagine the apparition of a new website for communities, maybe a new messenger but improved.
Well, guess we just have to wait and see!

Tuesday, November 14, 2006

bob's english class


This year, we have experimented a whole new way to improve our english!
I really like this experience because we both have to talk and to write!
moreover, we have to think and to discuss about subjects that really touch to new technologies, and that will be useful for our knowledge and culture.
I can not really see negative aspects, but i have thought about some thing : maybe we could select videos on youtube, and write an article about it in the blog, or discuss about it in class.
But in generally, i really enjoy working like that!

Monday, November 06, 2006

shttp for dummies


SHTTP means Secure Hypertext Transfer Protocol which is developed by Enterprise Integration Technologies in 1995 to ensure security with commercial transactions on the Internet. A protocol that provides secure transactions over the Web. It is endorsed by a variety of organizations.
SHTTP encrypts data transfers, but does not authenticate the client. The responsibility for authentication remains with the website (i.e. the responsibility for determining whether the visitor should be shown the information in the first place).
S-HTTP is capable of distinguishing the origin of a particular document on any server, thereby protecting property rights. S-HTTP provides a wide variety of mechanisms to provide for confidentiality, authentication, and integrity.

be rss or not to be?


RSS is a simple XML-based system that allows users to subscribe to their favorite websites. Using RSS, webmasters can put their content into a standardized format, which can be viewed and organized through RSS-aware software or automatically conveyed as new content on another website.
RSS solves a problem for people who regularly use the web. It allows you to easily stay informed by retrieving summaries of the latest content from the sites you are interested in. You save time by not needing to visit each site individually. You ensure your privacy, by not needing to join each site's email newsletter.
RSS is just another language of the web, but you can actually completely ignore the code itself, just like you can ignore the source code behind web pages that you visit - you are only interested in the end product that the code is designed to produce for you, the end user.
I have experimented rss for the first time last week on my blog, and i think it can allow nice uses.

a story about cybercrime


Cybercrime is a term used broadly to describe criminal activity in which computers or networks are a tool, a target, or a place of criminal activity. These categories are not exclusive and many activities can be characterized as falling in one or more categories.Although the term cybercrime is usually restricted to describing criminal activity in which the computer or network is an essential part of the crime. This term is also used to include traditional crimes in which computers or networks are used to enable the illicit activity.
There are a lot of examples of cybercrimes :

-data diddling :
This kind of an attack involves altering raw data just before it is processed by a computer and then changing it back after the processing is completed. Electricity Boards in India have been victims to data diddling programs inserted when private parties were computerizing their systems.

-salami attacks :
These attacks are used for the commission of financial crimes. The key here is to make the alteration so insignificant that in a single case it would go completely unnoticed. E.g. a bank employee inserts a program, into the bank's servers, that deducts a small amount of money (say Rs. 5 a month) from the account of every customer. No account holder will probably notice this unauthorized debit, but the bank employee will make a sizable amount of money every month.
To cite an example, an employee of a bank in USA was dismissed from his job. Disgruntled at having been supposedly mistreated by his employers the man first introduced a logic bomb into the bank's systems.

-virus :
Viruses are programs that attach themselves to a computer or a file and then circulate themselves to other files and to other computers on a network. They usually affect the data on a computer, either by altering or deleting it. Worms, unlike viruses do not need the host to attach themselves to. They merely make functional copies of themselves and do this repeatedly till they eat up all the available space on a computer's memory. 170 The VBS_LOVELETTER virus (better known as the Love Bug or the ILOVEYOU virus) was reportedly written by a Filipino undergraduate.
In May 2000, this deadly virus beat the Melissa virus hollow - it became the world's most prevalent virus. It struck one in every five personal computers in the world. When the virus was brought under check the true magnitude of the losses was incomprehensible. Losses incurred during this virus attack were pegged at US $ 10 billion

-trojan attacks:
A Trojan as this program is aptly called, is an unauthorized program which functions from inside what seems to be an authorized program, thereby concealing what it is actually doing.
There are many simple ways of installing a Trojan in someone's computer. To cite and example, two friends Rahul and Mukesh (names changed), had a heated argument over one girl, Radha (name changed) whom they both liked. When the girl, asked to choose, chose Mukesh over Rahul, Rahul decided to get even. On the 14th of February, he sent Mukesh a spoofed e-card, which appeared to have come from Radha's mail account. The e-card actually contained a Trojan. As soon as Mukesh opened the card, the Trojan was installed on his computer. Rahul now had complete control over Mukesh's computer and proceeded to harass him thoroughly.

When i had a pc, i often, like everyone else, received viruses, i activated one once, and it blocked my computer for days.
After that, i bought an apple computer, and i never had this problem anymore, because there are nearly no viruses on apple.
To protect oneself against cybercrime, it is necessary to have a good antivirus, and to be very careful when opening an email. But hackers are more and more performant, and we have to be aware constantly.

youtube, a star is born!!


YouTube is a popular free video sharing web site which lets users upload, view, and share video clips. Founded in February 2005 by three employees of PayPal, the San Bruno-based service utilizes Adobe Flash technology to display video. The wide variety of site content includes movie and TV clips and music videos, as well as amateur content such as videoblogging. It is staffed by 67 employees. In October 2006, Google, Inc., announced its acquisition of the company for $1.65 billion USD in Google's stock.
At present, YouTube is one of the fastest-growing websites on the World Wide Web, and is ranked as the 10th most popular website on Alexa, far outpacing even MySpace's growth. According to a July 16, 2006 survey, 100 million clips are viewed daily on YouTube, with an additional 65,000 new videos uploaded per 24 hours.
In its short time on the web, YouTube has grown quickly and received much attention. Online word-of-mouth has been primarily responsible for YouTube's growth since its inception, and gave the site its first surge of publicity when it hosted the popular Saturday Night Live short Lazy Sunday.
The success of youtube is the easiness of utilization, and the number of video shared.
I use youtube daily. For me, it is like google. Each time i am looking for a video or a clip, it takes two clicks to find it on youtube.
For me utube is a reflect of the new use of internet, and it will keep developping in the future.
I think that the use will evoluate. : youtube could be an interface for people all over the world.
For instance : we could imagine that people could put a video cv online. It could be easier for recruteers.
I also think of artists : actors, singers, that could put their videos for casting directors.
But like internet, i think youtube will find plenty new uses. This website is a little revolution, and if google wanted so much to buy it (and bought it so much) there are reasons...

be careful with thieves, even on internet!


Identity theft occurs when one person intentionally assumes another person's identity. Identity theft comes in many fashions from in person, to mail, to now the blooming of Internet theft. Thus far, identity thieves have typically gone on shopping sprees at the expense of their victims, but the possibilities for abuse through identity theft will grow as the functionality of the Internet expands. With the Internet, the key goal is to gather information. Some ways to gain information is from credit banks and trying to steal credit card numbers and passwords. Another way of theft is through Internet shops that store credit card numbers for the one step shopping. Another way thieves deceive individuals is to have the victims store his/her credit information on the fraudulent site.
The lowest form of theft is through asking children for key information about their parents (where do you live, what are your parents' names, how long have you lived at that house, what are your grandparents' names, etc.). Through e-mail or chat rooms, unsuspecting children could give away their parents key information - maybe even their credit card numbers. There are many ways that the thieves can get their information - but how are the victims giving it to them unsuspectingly?
One common aspect with all on-line businesses is personal information stored for use of repeat shoppers. The storage of information can save histories of their purchases and can eliminate steps of entering data each time the customer comes back to the site. The hackers look for loopholes in different ISPs to gain necessary information they are looking for. Internet sites not only leave information available each time someone visits a site, but they also sell this information to whoever will buy it.
Here is a list of items that are common among web sites:
web sites may freely gather as much personal data as desirable from consumers.
web sites need not ask permission to gather personal data.
web sites need not inform consumers of their data gathering practices.
web sites may use personal data in any manner they prefer, such as selling or licensing it to third parties.
web sites need not allow consumers access to their data.
web sites need not provide security for personal data in their possession

Protecting your self on-line has become such a key issue that the Federal Trade Commission (FTC) has made a web site available with tips on how to protect yourself. Such issues as how you pay for items on-line, what to look for on web sites, and how to determine if web sites are safe to browse are common issues addressed. Each of these issues separate may seem simple and trivial, but ignoring these issues collectively might leave one's credit open for the taking

As far as i am concerned, i try to protect myself by using logiciels of protection. I also pay very attention when i make transactions on internet. I only use paypal on protected websites.
At this moment, i still had no problems with identity theft.

Thursday, October 26, 2006

an amazing way to learn


Internet offers us an infinity of ways to learn and especially languages : forums, communities, and also websites which gives directly lessons online.
But i do use an other way to learn : i go on msn and i look for people living in englisk-speaking countries.
By this way, i can speak with people all over the world with webcam and microphone.
I like this because i have fun, and learn by the same time very fast, and in the same time i meet new people.
For me internet is made for that : gather people all around the world that should have never met without technology...

commandment 6 : comprehension will be your weapon


Comprehension is the cognitive process involving the intentional interaction between reader and text to convey meaning.
On the internet, ang generally in the e-technologies, we use our sense of comprehension at every moment.
More precisely, i can think at the tutorials. They help us in the use of all the technicals things.
For instance : this tutorial for specific programation language. : c+

comandment 5 : insight yourself


Insight is a very complex term, wich has religious and psychics dimensions.
It is both the ability to have a deep analysis of the situations, but also a comprehension of the inner nature of things.
Insight is one of the most important things in bouddhism, it is associated with meditation and consists, in application, to a deep reflexion.
We should all be able to use insight at anytime of our lives, but it something very difficult that brings us to the deepest part of us.
But in our modern society, and moreover on the internet, things go so fast that we do not take time to think.
For me, insight is not something we can find on the internet. We can not share it. But we are given an access to many websites above religion, where we can find a start to our insight.

links : bouddhism quotations

comandment 4 : abuse of perseverance


"The difference between perseverance and obstinacy is that one comes from a strong will, and the other from a strong won't"
Internet gives us access to an huge knowledge. But like everything in life, it takes time to be able to understand everything.
For instance, some websites gives us the keys to practice cartomancy. This art takes a very long time because we have at first to memorize all the significations of the cards, then the combinaisons, ad at last the interpretations.
If we stop in front of dificulties, we will not manage in anything.

commandement 3 : patient you will be


"patience will achieve more than force " Edmund Burke

Patience is not, at first, a quality i would have thought of with internet.
Indeed, Internet is a media of instantaneity, where we can find any information in few seconds.
Nevertheless, i can find an occasion where patience is important : when we have a virus, or a technical problem, that can take a lot of time...
In these occasions, reality comes on fiction and suddenly we come back to a real perception of time, that internet can makes us lose.
In our society, nowadays, patience becomes very rare...

commendement 2 : keep disciplined!


Internet is an infinite place of exchange, learning, sharing...
It seems like there are no rules, no necessities, no imperatives.
But actually, we have to be structured and to be organized : to autodiscipline ourselves.
As an example, i would take the auctions websites such as ebay. In fact, it is exactly like a real sell : we pay for an object, or we are paid for the object, but as everything is done on the internet, it is virtual, and can easily become as a game. We have to be honnest and disciplined to respect our engagements.

commandement 1 : be generous


Generosity is obviously very important in life in general, and moreover in social life.
On the internet, we can find a lot of examples of it : on the forums, where people help one another to find solutions to their problems, in any domain : cooking, games, studies, informatics...

Peer to peer is also a fine demonstration of generosity, because on it, we can choose whether we want do share our files with the whole community or not, and we can constat that a large majority of people decides to share!

At last, the best example of generosity on internet is, for me, the website "youtube". On it, we can see peolple who peer online sitcoms, hardly few hours after their diffusion on tv, and moreover, they do themselves the subtittles in an aim of helping people. Their only willing is to give pleasure to people without waiting for anything in return...that is generosity....

the six commandements


When we walk on the internet, we have to apply some commandements that we will help us in an important way!

Monday, October 23, 2006

nodes and links : secret of social network


A social network is a social structure made of nodes which can be individuals or organizations. The average size is about 120 persons. It is better for individual success to have connections to a variety of networks rather than many connections within a single network
On the internet, social networks exists around msn, blogs or for instance the forums. But also with websites such as “copains d’avant” or others school’s websites where we can find old classmates.
In these communities, an initial set of founders sends out messages inviting members of their own personal networks to join the site. New members repeat the process, growing the total number of members and links in the network
I have different social networks from the schools I went to, and the activities I have done : dance for instance.
Social networks are very important. They are contacts that we will use for anything : a job, a contact abroad, an important adress. The bigger is the network, the more different people we will find in it, and the most interesting it will be for us.
There are some countries, such as japan, where creating a social network is one of the most important things in the life of a person. It depends of the society, but also of the mentalities. In France, the importance of social networks is highlighted mainly in marketing schools such as essec or hec.
The use an the composition of social networks are such important that they are especially studied by a branch of social science.

drm


Digital Rights Management (generally abbreviated to DRM) is any of several technologies used by publishers (or copyright owners) to control access to and usage of digital data (such as software, music, movies) and hardware, handling usage restrictions associated with a specific instance of a digital work. The term often is confused with copy protection and technical protection measures (TPM). These two terms refer to technologies that control or restrict the use and access of digital media content on electronic devices with such technologies installed, acting as components of a DRM design.
Digital Rights Management is a controversial topic. Advocates argue DRM is necessary for copyright holders to prevent unauthorized duplication of their work to ensure continued revenue streams.Some critics of the technology, including the Free Software Foundation, suggest that the use of the word "Rights" is misleading and suggest that people instead use the term Digital Restrictions Management.The position put forth is that copyright holders are attempting to restrict use of copyrighted material in ways already granted by statutory or common law applying to copyright. Others, such as the Electronic Frontier Foundation consider some DRM schemes to be anti-competitive, citing theitunes store as an example.
So drm affects more those who pirate media, than the legal users, that’s why it is used as a way to fight pirates, even it they always find others way to turn beyond legacy.

does neutrality exists?


There's a debate raging over the future of the Internet that could have a profound effect on the services Web surfers enjoy.

"Network neutrality" is the term commonly used to describe the battle between the telecom industry and a varied coalition of groups arguing over whether content providers should be able to pay in order for surfers to get faster access to their sites.

Part of the fear is that those who can afford to pay will thrive, while those who cannot won't survive.
The Evolving Internet

"The history of the Internet has been one of open access, one that has allowed many different voices to be heard," said Ross Rubin, an analyst with the NPD Group. "The concern is that offering ISPs [Internet service providers] this capability will lead to the squelching of many voices or a playing field that isn't level."

Because of that, the groups -- including strange bedfellows like Microsoft, the American Civil Liberties Union and the Christian Coalition of America -- are pushing for legislation to keep the Internet from becoming tiered, where service providers would have discretion over which sites came up faster than others and which sites didn't come up at all.

The telecom companies argue, however, that regulating the Internet would stifle creativity and competition, and lead to more legislation and a more restricted Internet.

"Regulatory or legislative solutions wholly without justification in marketplace activities would stifle, not enhance the Internet," Walter McCormick, head of the U.S. Telecom Association, said to the the Senate Commerce Committee in May.

Companies like AT&T, Verizon and Comcast say that by keeping the government out of it, consumers would have the power to leave a provider who they felt was limiting access to certain sites. Competition would keep everyone honest.

On the other hand, the coalition argues that the telecom industry would be motivated to slow or even prevent access to sites critical of the provider or of companies affiliated with them.

"The assumption has been that they [telecom companies] would move very aggressively to reduce choice," said Rubin of the NPD Group.

Rubin's not convinced of that and doesn't see why there can't be options that are beneficial to both the consumer and the corporation.

He suggests that maybe consumers will be offered options like a "net neutrality" subscription where the company promises not to favor any sites, but perhaps forces the surfer to endure some advertising to offset the cost.

Or maybe an option that admits to favoring some sites over others, but costs significantly less or significantly more?

"I think a lot of the concern is reactionary, saying, 'This is not how the Internet grew up,'" he said. "But who knows how the Internet will evolve?"

For me, like in journalism, it very difficult to respect neutrality, because there is too much money on the table. There are always influences in such important economic markets.

web 2.0


We are living a real revolution of internet. Not really in technology way, but in the uses.

In Web 1.0, a small number of writers created Web pages for a large number of readers. As a result, people could get information by going directly to the source: Adobe.com for graphic design issues, Microsoft.com for Windows issues, and CNN.com for news. Over time, however, more and more people started writing content in addition to reading it. This had an interesting effect—suddenly there was too much information to keep up with! We did not have enough time for everyone who wanted our attention and visiting all sites with relevant content simply wasn’t possible. As personal publishing caught on and went mainstream, it became apparent that the Web 1.0 paradigm had to change.

Enter Web 2.0, a vision of the Web in which information is broken up into “microcontent” units that can be distributed over dozens of domains. The Web of documents has morphed into a Web of data. We are no longer just looking to the same old sources for information. Now we’re looking to a new set of tools to aggregate and remix microcontent in new and useful ways.
Web 2.0 refers to a second generation of internet, based on services, such as social networking sites.
People collaborate and share information online. It is a social phenomenon in the approach of the web, wich is now tending to be free and decentralized.

We can find many examples of websites reflecting these new attitudes towards internet.

in communication : skype. fr wich is a free way to communicate through the computer.
in auctions websites : ebay.fr a real community of seller and buyers
in information : wikipedia, which is the perfect illustration of what is web 2.0 : a collaboration of people in a same aim.
But there are many others : blogs, podcasts, etc...

podcasts


Podcast is a multimedia distributed over the internet. The term appeared in 2004 in an article in the Guardian. It is a mix of "broadcasting" and "ipod".
The term podcast means both the content and the method of delivery. The host or author of a podcast is often called a podcaster. Though podcasters' web sites may also offer direct download or streaming of their content, a podcast is diferent from other digital audio formats by its ability to be downloaded automatically using software.

The editors of the New Oxford American Dictionary declared "podcasting" the 2005 word of the year, defining the term as "a digital recording of a radio broadcast or similar program, made available on the Internet for downloading to a personal audio player".
However, the word is not registered, and has been defined by the use. It does not belong to one company. Apple is trying to register all the words containing “pod” including “podcast” but it will be a long juridic fight because there is much money involved.
But, for many people, podcast is associated to ipod, we can see it when putting "podcast" on google image. Most of the results shows ipods.
To conclude, podcasts are the visible part of a deep change in people’s comportment towards media. Internet is now used as a place of exchange.

Thursday, October 12, 2006

try

first try , one two three, test