Martes, Disyembre 24, 2013

The Kinds of People You Meet On the Internet





People use the internet for different reasons. Hence, there are different personalities or kinds of people you can meet on the web.  

1.       The Researcher. The internet is like a glorified library. Instead of a hundred shelves housing thousands of books, the internet is packed with websites where various resources can be found. The researcher is usually a student or a teacher. If there is a topic that they are currently working on, the researcher will most likely sit down on a chair in front of a computer, search for the concerned topic and get loads of references in just a few clicks. Aside from accessing books digitally, the researcher also gets to access similar papers made by co-students or co-teachers from around the world.

However, there is also the danger that with the many resources that can be found online, some may not be verified references or the author is not credible enough. For the researcher, he or she must be responsible in verifying what he or she sees on the internet. 

2.       The Business Man. With the ubiquity of the internet, it is possible to manage an entire business as some would for a physical storefront. Businesses today make it a point that their actual storefront has an online counterpart to accommodate customers who are online as well. Thus, a popular person you can meet on the internet is a businessman fully and constantly engaged in marketing the products or services that he or she has to offer. 

The online business man has a shop that he manages online. If you know him personally, chances are he has asked (or forced) you to like his business’ Facebook page or follow his business’ Twitter account. If he has a promo or a contest, he will urge you to join and have you invite your friends to join the promo or contest too to influence his business’ popularity. 

3.       The Socially Well-Connected. This person is everywhere – on Facebook, Twitter, Pinterest, Instagram, Foursquar, you name it. This person knows that technology is a daily requirement. It is his bread and butter to stay in the know and to be connected with friends and family. The socially well-connected is found with a smart phone or tablet computer in hand. 

With the attachment the socially-well connected has towards handheld gadgets, this person usually loses touch with reality. Invite them over dinner and chances are they are already hooked on their smart phone even before desserts and conversations start pouring in. 

4.       The Trolls. There are people who simply love stirring a commotion or provoking anger and other related emotion. Trolls are everywhere since to make their trolling effective, they first need to know where the commotion is coming from. When there is a buzz over a controversial topic where almost every single person on the web has an opinion over, they will naturally join the thread and create a comment that is 180 degrees different from the common emotion. 

      Once they drop the bomb, they will leave the thread and simply watch responders lose their mind. Cyber bullying may be illegal, but then the anonymity of trolls makes it possible for them to proliferate and proceed with their activities undetected.

Ultimately, there are more profiles of internet users lurking around the World Wide Web. As the internet continues to be a platform for different activities, more and more personalities will be born.

Martes, Disyembre 17, 2013

What Does the The Australian Law Reform Commission Have for Flustered Australians




In this age of camera-enabled smart phones and hardcore social media usage, nothing goes undetected and undocumented especially if it is something  controversial and defamatory at the expense of others. 

If you wake up the next day with your news feed on Facebook showing compromising photos of you from an event you attended the night before, The Australian Law Reform Commission is having the European Union consider its proposed "right to be forgotten” now “right to erasure" amendment. 

This “right to erasure” proposal urges organisations especially social media providers to delete compromising information on their platform at the request of the person who is the subject of that information. This right applies only to information uploaded with the person’s consent. They should have the right to withdraw their consent and have the necessary erasures done immediately upon their request.  

However, this may seem like a pretty ambitious solution since information such as photos and videos when deleted are naturally backed up and archived. To erase history is an exercise in futility, and this definitely applies in digital media. 

Is “right to erasure” truly the solution to compromising information uploaded to the web? If it comes with our consent, then there is the assumption that we have thought about it before sealing our fate on the web. However, what is most glaring in the proposal is that the “right to erasure” does not apply for information uploaded without the person’s consent. Should it be the other way around?

What are the lessons that we can pick up from this?

First, it is our responsibility to control the information we give about ourselves. This prevents the dilemma of erasing every single embarrassing photo uploaded on Facebook and hoping that it is too early for Google to index it all the way to eternity. 

Second, be careful in the photos and videos that you make about yourself and others. Just because it has been captured on your smart phone does not mean that it has to be shared with everyone in your network. If the intention is to stir unnecessary attention even after receiving the consent of the parties involved, be the bigger person in the situation.

And third, learn from other people’s experiences. While compromising photos and videos may seem trivial to others, the impact it has on the person involved can be psychologically damaging. For some unlucky ones, their embarrassing photo or video has made them the subject of cyberbullying. The internet can be a great place to spend time in, but the same cannot be assumed for everyone.
What is your personal take on this?

Miyerkules, Disyembre 4, 2013

Throwback Thursday: Fax Machines



 
Fax machines may have been essential office equipments back in the 70s, but it does not have as much significance today with the availability of so many alternatives to send documents. Along with the slight obsolescence of landlines is the declining need for fax machines that also run through copper wires. Although it has been previously reported that at least 700,000 fax machines were sold in the last 2 years in the United States alone, technologies that we have today are slowly and undoubtedly replacing these machines.

With the rise of camera-enabled smart phones, anyone who owns one can simply take a photo of a document they need to send and deliver it to its intended recipient via email using the same device. Just as it is easy to capture a photo and send it too via email using only a smart phone, the role of fax machines truly becomes dwarfed mostly in terms of convenience. 

Also, with the speed and easy of use of scanners, you get to have a hard copy of the document you want to send, save it in your ‘My Documents’ folder and deliver it to your recipient via email as well. If your recipient needs to sign the document, all he or she needs to do is to print the scanned document, scan it back and deliver it to you via email. Although printing it, signing it then scanning it back again may entail some work, it is naturally more cost-efficient than using a fax machine for its transmission. After all, who does not own a printer and a scanner anyway in the 21st century?

Also, did you know that there are Scan-PDF-Email website applications that you can use? It's pretty much self-explanatory, but using these websites such as www.scantopdf.eu or www.onlinerocr.net allows you to convert to PDF format any document that you scan before sending it via email. This makes it a lot fitting for formal documents that you need to send. And with the ubiquitous capability of so many devices such as iPads and iPhones aside from laptops to read PDF documents, you won't have to worry about your emailed document not read by your recipient. You can even password-protect scanned PDF documents for that extra layer of security.

How about you? What do you think are great alternatives to a fax machines? Send it to us privately on Facebook!