Cyberculture roundup: Majestic Mega launch, The Next Five Battles For Internet Freedom, from Crowdsourcing to Microtasking…

Mega hits 100,000 registered users in one hour as Kim Dotcom teases MPAA with ?MegaMovie? screenshot

from The Next Web by Alex Wilhelm

Update: Mega crossed the 250,000 user mark and massive usage has brought the site to a crawl. So far, Mega has won the day.

After calling Barack Obama out on Twitter, Kim Dotcom has launched Mega, the replacement to Megaupload

from The Next Web by Alex Wilhelm

A Year After SOPA, A Look At The Next Five Battles For Internet Freedom

from Updates by Trevor Timm
One year ago today, Internet users of all ages, races, and political stripes participated in the largest protest in Internet history, flooding Congress with millions of emails and phone calls to demand they drop the Stop Online Piracy Act (SOPA)?a dangerous bill that would have allowed corporations and the govenrment to censor larger parts of the Web.

Digital Humanitarian Response: Moving from Crowdsourcing to Microtasking

from iRevolution by Patrick Meier

A central component of digital humanitarian response is the real-time monitor-ing, tagging and geo-location of relevant reports published on mainstream and social media. This has typically been a highly manual and time-consuming process, which explains why dozens if not hundreds of digital volunteers are often needed to power digital humanitarian response efforts. To coordinate these efforts, volunteers typically work off Google Spreadsheets which, needless to say, is hardly the most efficient, scalable or enjoyable interface to work on for digital humanitarian response.


Google?s Eric Schmidt calls for an open Internet as he lifts the lid on his visit to North Korea

from The Next Web by Ken Yeung

Twitter: 100% of the Senate, 90% of the House are active on the social platform

from The Next Web by Alex Wilhelm

How to Protect Your Privacy from Facebook’s Graph Search

from Updates by Adi Kamdar
Earlier this week, Facebook launched a new feature?Graph Search?that raised some privacy concerns with us. Graph Search allows users to make structured searches to filter through friends, friends of friends, and strangers. This feature relies on your profile information being made widely or publicly available, yet there are some Likes, photos, or other pieces of information that you might not want out there.

The Creepy Details of Facebook’s New Graph Search

from Updates by Adi Kamdar

Google+ Communities: A Beginner?s Guide

from Mashable! by Ryan Lytle

10 Things We Learned From Facebook?s Graph Search

from Mashable! by Emily Price

Map of 500M Foursquare checkins demonstrates how they built a ?Google PageRank for the real world?

from The Next Web by Matthew Panzarino

Fortune?s top 100 employers for 2013: Google first, Microsoft #75, Apple and Facebook don?t make it

from The Next Web by Emil Protalinski

5 Instagram Alternatives If You?re Worried About Your Photos

from social media vb by meloniedodaro
The latest storm around the terms of service changes has prompted many users to seek out Instagram alternatives due to the prospect of having their precious moments sold without their approval. Here are the top 5 Instagram alternatives that take pictures just fine.

7 Ways Mobile Apps Are Driving Revenue for Businesses

from Mashable! by Ryan Matzner

Google Grants $3.7 Million to Civic Innovation and Open Data Projects

from Mashable! by Zoe Fox

Kaspersky uncovers Red October malware campaign targeting governments for the last 5 years

from The Next Web by Emil Protalinski

Smartphones Consuming More Data Than Tablets for the First Time

from Mashable! by Anita Li

Twitter in 2012: A year of conflicts, product evolution and cranking up the cash machine

from The Next Web by Robin Wauters

10 Epic Works of ASCII Art

from Mashable! by Christine Erickson

Can Twitter Predict the Future? Pentagon Says Maybe

from Mashable! by Nextgov

‘Red October’ cyber-attack found

from BBC News | Europe | World Edition
A ‘significant’ cyber-attack that may have been stealing confidential documents since 2007 has been discovered by Russian researchers.

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

%d bloggers like this: