<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>IgLou Launchpad</title>
	<atom:link href="https://launchpad.iglou.com/feed/" rel="self" type="application/rss+xml" />
	<link>https://launchpad.iglou.com</link>
	<description></description>
	<lastBuildDate>Thu, 17 Nov 2016 17:37:39 +0000</lastBuildDate>
	<language>en</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.1</generator>
	<item>
		<title>Smaller ISPs have happier customers</title>
		<link>https://launchpad.iglou.com/uncategorized/smaller-isps-have-happier-customers/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Thu, 17 Nov 2016 17:37:39 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">http://launchpad.iglou.com/?p=817</guid>

					<description><![CDATA[If you have eschewed the big names and opted for a smaller ISP, you probably have a happier broadband experience. These are the findings of a report which says the big four ISPs in the UK &#8212; BT, Sky, Virgin Media and TalkTalk &#8212; are rated lower than their smaller rivals. In fact, the highest [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><a href="http://launchpad.iglou.com/wp-content/uploads/2016/11/hosting_iconig.png"><img decoding="async" class="size-full wp-image-818 alignleft" src="http://launchpad.iglou.com/wp-content/uploads/2016/11/hosting_iconig.png" alt="hosting_iconig" width="200" height="200" srcset="https://launchpad.iglou.com/wp-content/uploads/2016/11/hosting_iconig.png 200w, https://launchpad.iglou.com/wp-content/uploads/2016/11/hosting_iconig-150x150.png 150w" sizes="(max-width: 200px) 100vw, 200px" /></a>If you have eschewed the big names and opted for a smaller ISP, you probably have a happier broadband experience. These are the findings of a report which says the big four ISPs in the UK &#8212; BT, Sky, Virgin Media and TalkTalk &#8212; are rated lower than their smaller rivals.</p>
<p><span id="more-817"></span></p>
<p>In fact, the highest rated provider, SSE, has only been in the broadband game since 2014, with Yorkshire-based Plusnet coming in second place, says <a href="http://www.cable.co.uk/" target="_blank">Cable.co.uk</a>.</p>
<div class="articleBoxad"></div>
<p>Of the big names, TalkTalk provides broadband to 13 percent of UK internet users, yet it scored just 6.66 out of 10 and placed in ninth position. The four biggest companies account for 87 percent of the market, but the best performer &#8212; Sky &#8212; only managed to hit fifth place.</p>
<p>Full article found <a href="http://betanews.com/2016/11/16/uk-isp-satisfaction/">here</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Why Homeland Security Just Recommended That You Uninstall QuickTime Right Away</title>
		<link>https://launchpad.iglou.com/uncategorized/why-homeland-security-just-recommended-that-you-uninstall-quicktime-right-away/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Fri, 15 Apr 2016 20:58:34 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">http://launchpad.iglou.com/?p=801</guid>

					<description><![CDATA[IT security firms and the United States government are recommending all Windows users to uninstall their QuickTime software, after cybersecurity experts picked up two bugs that could leave users vulnerable to viruses and remote attackers. The news came about when IT security firm Trend Micro issued a statement on Thursday April 14 that said: “We’re putting the [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><img fetchpriority="high" decoding="async" class="wp-image-802 alignright" src="http://launchpad.iglou.com/wp-content/uploads/2016/04/shutterstock_171257759.jpg" alt="shutterstock_171257759" width="276" height="183" srcset="https://launchpad.iglou.com/wp-content/uploads/2016/04/shutterstock_171257759.jpg 640w, https://launchpad.iglou.com/wp-content/uploads/2016/04/shutterstock_171257759-300x199.jpg 300w" sizes="(max-width: 276px) 100vw, 276px" />IT security firms and the United States government are recommending all Windows users to uninstall their QuickTime software, after cybersecurity experts picked up two bugs that could leave users vulnerable to viruses and remote attackers.</p>
<p dir="ltr">The news came about when IT security firm <a href="http://blog.trendmicro.com/urgent-call-action-uninstall-quicktime-windows-today/"><u>Trend Micro</u></a> issued a statement on Thursday April 14 that said: “We’re putting the word out that everyone should follow Apple’s guidance and uninstall QuickTime for Windows as soon as possible.</p>
<p dir="ltr"><span id="more-801"></span></p>
<p dir="ltr">&#8220;The only way to protect your Windows systems from potential attacks against these or other vulnerabilities in Apple QuickTime now is to uninstall it.”</p>
<p dir="ltr">It is worth noting that the warning does not apply for Apple users.</p>
<p dir="ltr">Quicktime is a popular software developed by Apple that allows users to play media files such as videos, images, and audio. Apple have now stopped producing updates of Quicktime for Windows users. This means that Windows users will now be permanently vulnerable, as Apple will not provide security updates to patch the problem.</p>
<p>The Department of Homeland Security&#8217;s United States Computer Emergency Readiness Team also issued a <a href="https://www.us-cert.gov/ncas/alerts/TA16-105A"><u>security alert</u></a> on Thursday, which stated: “Potential negative consequences include loss of confidentiality, integrity, or availability of data, as well as damage to system resources or business assets. The only mitigation available is to uninstall QuickTime for Windows.”</p>
<p>However, don’t fret – the bulk of recent media-related programmes on Windows do not use Quicktime anymore. Instead, most can play the media directly or through media support integrated into Windows. That includes iTunes 10.5 or later.</p>
<p>That said, even if you did not actively download the programme, there’s a chance it could still be on computer through downloading other software, such as older versions of iTunes. So, perhaps you better give you tech-savvy grandma a heads up.</p>
<p>For more information on the more technical details on the bugs visit the <a href="http://blog.trendmicro.com/urgent-call-action-uninstall-quicktime-windows-today/">Trend Micro</a>website. You can also see how to simply uninstall QuickTime for Windows <a href="https://support.apple.com/en-gb/HT205771">here</a>.</p>
<p>[H/T <a href="http://www.reuters.com/article/us-apple-quicktime-warning-idUSKCN0XB2U0"><u>Reuters</u></a>]</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>New study reveals internet video more important than tv for young audiences</title>
		<link>https://launchpad.iglou.com/uncategorized/new-study-reveals-internet-video-more-important-than-tv-for-young-audiences/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Wed, 30 Mar 2016 16:42:02 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">http://launchpad.iglou.com/?p=795</guid>

					<description><![CDATA[A survey conducted by the digital media firm Defy Media has found that teens and young adults watch significantly more content via online services then on regular cable or satellite television. According to the survey, and alarmingly for the television industry, it was found that only 36% of the audience surveyed, consumers aged 13-24, said [&#8230;]]]></description>
										<content:encoded><![CDATA[<h3 class="intro"><a href="http://launchpad.iglou.com/wp-content/uploads/2016/03/generic_1_generic-300x197.png" rel="attachment wp-att-796"><img decoding="async" class="size-full wp-image-796 alignright" src="http://launchpad.iglou.com/wp-content/uploads/2016/03/generic_1_generic-300x197.png" alt="generic_1_generic-300x197" width="300" height="197" /></a>A survey conducted by the digital media firm Defy Media has found that teens and young adults watch significantly more content via online services then on regular cable or satellite television.</h3>
<p>According to the survey, and alarmingly for the television industry, it was found that only 36% of the audience surveyed, consumers aged 13-24, said they can&#8217;t live without traditional television.</p>
<p><span id="more-795"></span></p>
<p>Online entertainment source <a href="http://variety.com/2016/digital/news/millennial-gen-z-youtube-netflix-video-social-tv-study-1201740829/">Variety</a> revealed that online services like YouTube and Netflix topped the list of must-have sources with general social media services taking up third place as video content is increasingly shared and viewed on these platforms.</p>
<p>For financially independent young viewers, only 56% expect to subscribe to traditional TV cable or satellite while 86% expect to subscribe to Netflix.</p>
<p>Article found <a href="http://www.timeslive.co.za/scitech/2016/03/30/New-study-reveals-internet-video-more-important-than-tv-for-young-audiences" target="_blank">here.</a></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Guilty plea in nude photo hack reveals &#8216;phishing&#8217; scam</title>
		<link>https://launchpad.iglou.com/uncategorized/guility-plea-in-nude-photo-hack-reveals-phishing-scam/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Wed, 16 Mar 2016 15:58:23 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">http://launchpad.iglou.com/?p=789</guid>

					<description><![CDATA[Prosecutors have announced the first criminal conviction in connection with the 2014 hacking of Hollywood celebrities that resulted in the online release of hundreds of private nude photos. Officials in Los Angeles said Tuesday that 36-year-old Ryan Colins of Pennsylvania agreed to enter a guilty plea on hacking charges as part of the &#8220;Celebgate&#8221; investigation. [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><a href="http://launchpad.iglou.com/wp-content/uploads/2016/03/Phishing-Scam_iStock_000017435282Medium-e1458143855659.jpg" rel="attachment wp-att-790"><img loading="lazy" decoding="async" class="alignleft wp-image-790" src="http://launchpad.iglou.com/wp-content/uploads/2016/03/Phishing-Scam_iStock_000017435282Medium-1024x603.jpg" alt="Phishing scheme" width="289" height="170" /></a></p>
<p>Prosecutors have announced the first criminal conviction in connection with the 2014 hacking of Hollywood celebrities that resulted in the online release of hundreds of private nude photos.</p>
<p>Officials in Los Angeles said Tuesday that 36-year-old Ryan Colins of Pennsylvania agreed to enter a guilty plea on hacking charges as part of the &#8220;Celebgate&#8221; investigation.</p>
<p>Authorities said Collins admitted to a &#8220;phishing&#8221; scheme to obtain passwords of more than 100 people, many of them movie stars, and then using that to obtain nude pictures from their &#8220;cloud&#8221; storage accounts.<span id="more-789"></span></p>
<p>But the officials said there was no evidence that Collins published the pictures online, and that the investigation was continuing.</p>
<p>The 2014 hack resulted in the release of hundreds of nude photos including those of models and actresses such as Jennifer Lawrence and Kate Upton, stunning Hollywood.</p>
<p>The US attorney&#8217;s office said Collins accessed at least 50 iCloud accounts and 72 Gmail accounts, most of which belonged to female celebrities.</p>
<p>&#8220;Today, people store important private information in their online accounts and in their digital devices,&#8221; said US Attorney Eileen Decker.</p>
<p>&#8220;Lawless unauthorized access to such private information is a criminal offense. My office remains committed to protecting sensitive and personal information from the malicious actions of sophisticated hackers and cyber criminals.&#8221;</p>
<p>According to the plea agreement, Collins from November 2012 until September 2014 used a scheme in which he sent e-mails to victims that appeared to be from Apple or Google and asked victims to provider their usernames and passwords.</p>
<p>This allowed him to access data from the accounts including photographs stored in the cloud. In some instances, Collins would use a software program to download the entire contents of the victims&#8217; Apple iCloud backups.</p>
<p>Prosecutors said the agreement, which must be approved by a judge, calls for an 18-month prison sentence. The case is set to be transferred from California to Pennsylvania under the deal.</p>
<p>Article found <a href="http://www.dailymail.co.uk/wires/afp/article-3495338/Guility-plea-nude-photo-hack-reveals-phishing-scam.html" target="_blank">here</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Apple Macs targeted by KeRanger ransomware for first time</title>
		<link>https://launchpad.iglou.com/uncategorized/apple-macs-targeted-by-keranger-ransomware-for-first-time/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Mon, 07 Mar 2016 16:26:49 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">http://launchpad.iglou.com/?p=783</guid>

					<description><![CDATA[Apple Macs targeted by KeRanger ransomware for first time Apple customers were targeted by hackers over the weekend in the first campaign against Macintosh computers using a pernicious type of software known as ransomware, researchers with Palo Alto Networks have revealed. Ransomware, one of the fastest-growing types of cyber threats, encrypts data on infected machines, [&#8230;]]]></description>
										<content:encoded><![CDATA[<h3 class="content__headline js-score">Apple Macs targeted by KeRanger ransomware for first time</h3>
<p><a class="u-underline" href="http://www.theguardian.com/technology/apple" data-link-name="auto-linked-tag" data-component="auto-linked-tag">Apple</a> customers were targeted by hackers over the weekend in the first campaign against Macintosh computers using a pernicious type of software known as ransomware, researchers with Palo Alto Networks have revealed.</p>
<p>Ransomware, one of the fastest-growing types of cyber threats, encrypts data on infected machines, then typically asks users to pay ransoms in hard-to-trace digital currencies to get an electronic key so they can retrieve their data.</p>
<p><span id="more-783"></span></p>
<aside class="element element-rich-link element--thumbnail element-rich-link--upgraded" data-component="rich-link" data-link-name="rich-link-2 | 1">
<div class="rich-link tone-news--item "></div>
</aside>
<p>Security experts estimate that ransoms total hundreds of millions of dollars a year from such cyber criminals, who typically target users of Microsoft’s Windows operating system.</p>
<p>Ryan Olson, threat intelligence director at Palo Alto, said the “KeRanger” malware, which appeared on Friday 4 March, was the first functioning ransomware attacking Apple’s Mac computers.</p>
<p>“This is the first one in the wild that is definitely functional, encrypts your files and seeks a ransom,” Olson said in a telephone interview with Reuters.</p>
<p>An Apple representative said the company had taken steps over the weekend to prevent attacks by revoking a digital certificate from a legitimate Apple developer that enabled the rogue software to install on Macs. The representative said he could not immediately provide other details.</p>
<p>The malware is programmed to encrypt files on an infected personal computer three days after the original infection, according to Olson.</p>
<p>That means that if Apple’s steps prove ineffective in neutralising malware that has already infected Macs, the earliest victims will have their files encrypted on Monday, three days after the malicious program first appeared on the<a class="u-underline" href="https://www.transmissionbt.com/" data-link-name="in body link" data-component="in-body-link">Transmission </a>website, he said.</p>
<p>The Transmission site offers the open source software that was infected with the ransomware.</p>
<p>Palo Alto said it planned to release a blog advising Mac users on ways to check to see if they were infected with the virus and steps they can take to protect against it harming their data, Olson said.</p>
<p>Transmission is one of the most popular Mac applications used to download software, videos, music and other data through the BitTorrent peer-to-peer information sharing network, according to Olson.</p>
<p>Representatives with Transmission could not be reached immediately for comment.</p>
<p>Transmission carried a warning on Sunday saying that version 2.90 of its Mac software had been infected with malware.</p>
<p>It advised users to immediately upgrade to version 2.91 of the software, which was available on its website, or delete the malicious one.</p>
<p>It also provided technical information on how users could check to see if they were affected.</p>
<p>Article found <a href="http://www.theguardian.com/technology/2016/mar/07/apple-targeted-by-keranger-ransom-malware-for-first-time?CMP=fb_gu">here.</a></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>VIRUS ALERT &#8211; Locky ransomware virus spreading via Word documents</title>
		<link>https://launchpad.iglou.com/uncategorized/virus-alert-locky-ransomware-virus-spreading-via-word-documents/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Fri, 19 Feb 2016 20:22:38 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">http://launchpad.iglou.com/?p=775</guid>

					<description><![CDATA[New updated story here: https://medium.com/@networksecurity/you-your-endpoints-and-the-locky-virus-b49ef8241bea#.pthlo2yk6 The email users get look a bit like this: Attached is an Invoice Word document. It talks about remit payments.Virustotal here. If Office macros are enabled it drops ladybi.exe, Virustotal here. AV coverage is very poor &#8211; after over 24 hours in the wild, only 3 very niche vendors detect [&#8230;]]]></description>
										<content:encoded><![CDATA[<p id="4ebe" class="graf--p graf-after--h4"><strong class="markup--strong markup--p-strong">New updated story here</strong>: <a class="markup--anchor markup--p-anchor" href="https://medium.com/@networksecurity/you-your-endpoints-and-the-locky-virus-b49ef8241bea#.pthlo2yk6" rel="nofollow" data-href="https://medium.com/@networksecurity/you-your-endpoints-and-the-locky-virus-b49ef8241bea#.pthlo2yk6">https://medium.com/@networksecurity/you-your-endpoints-and-the-locky-virus-b49ef8241bea#.pthlo2yk6</a></p>
<p id="7297" class="graf--p graf-after--p">The email users get look a bit like this:</p>
<p class="graf--p graf-after--p"><a href="http://launchpad.iglou.com/wp-content/uploads/2016/02/1-UmXi8XPy9qmWv9Q4_GMlFg.png" rel="attachment wp-att-776"><img loading="lazy" decoding="async" class="alignnone wp-image-776" src="http://launchpad.iglou.com/wp-content/uploads/2016/02/1-UmXi8XPy9qmWv9Q4_GMlFg.png" alt="1-UmXi8XPy9qmWv9Q4_GMlFg" width="595" height="245" srcset="https://launchpad.iglou.com/wp-content/uploads/2016/02/1-UmXi8XPy9qmWv9Q4_GMlFg.png 1022w, https://launchpad.iglou.com/wp-content/uploads/2016/02/1-UmXi8XPy9qmWv9Q4_GMlFg-300x124.png 300w, https://launchpad.iglou.com/wp-content/uploads/2016/02/1-UmXi8XPy9qmWv9Q4_GMlFg-768x316.png 768w" sizes="auto, (max-width: 595px) 100vw, 595px" /></a></p>
<p class="graf--p graf-after--p"><span id="more-775"></span></p>
<p id="42e9" class="graf--p graf-after--figure">Attached is an Invoice Word document. It talks about remit payments.<a class="markup--anchor markup--p-anchor" href="https://www.virustotal.com/en/file/97b13680d6c6e5d8fff655fe99700486cbdd097cfa9250a066d247609f85b9b9/analysis/" rel="nofollow" data-href="https://www.virustotal.com/en/file/97b13680d6c6e5d8fff655fe99700486cbdd097cfa9250a066d247609f85b9b9/analysis/">Virustotal here</a>.</p>
<p id="7034" class="graf--p graf-after--p">If Office macros are enabled it drops ladybi.exe, <a class="markup--anchor markup--p-anchor" href="https://www.virustotal.com/en/file/17c3d74e3c0645edb4b5145335b342d2929c92dff856cca1a5e79fa5d935fec2/analysis/" rel="nofollow" data-href="https://www.virustotal.com/en/file/17c3d74e3c0645edb4b5145335b342d2929c92dff856cca1a5e79fa5d935fec2/analysis/">Virustotal here</a>.</p>
<p id="6abd" class="graf--p graf-after--p">AV coverage is very poor &#8211; after over 24 hours in the wild, only 3 very niche vendors detect it. <strong class="markup--strong markup--p-strong">Update:</strong> most major antivirus products now detect, with the latest updates.</p>
<p id="046e" class="graf--p graf-after--p">That loads itself into memory, deletes itself, encrypts your documents as hash.locky files, changes the desktop wallpaper, drops a .bmp file and opens it, drops a .txt file and opens it, and delete VSS snapshots. Encrypted files can include network files.</p>
<p><a href="http://launchpad.iglou.com/wp-content/uploads/2016/02/1-CPHDauwajHAR6wAOgzVsRQ.png" rel="attachment wp-att-777"><img loading="lazy" decoding="async" class="alignnone wp-image-777" src="http://launchpad.iglou.com/wp-content/uploads/2016/02/1-CPHDauwajHAR6wAOgzVsRQ.png" alt="1-CPHDauwajHAR6wAOgzVsRQ" width="592" height="184" srcset="https://launchpad.iglou.com/wp-content/uploads/2016/02/1-CPHDauwajHAR6wAOgzVsRQ.png 800w, https://launchpad.iglou.com/wp-content/uploads/2016/02/1-CPHDauwajHAR6wAOgzVsRQ-300x93.png 300w, https://launchpad.iglou.com/wp-content/uploads/2016/02/1-CPHDauwajHAR6wAOgzVsRQ-768x239.png 768w" sizes="auto, (max-width: 592px) 100vw, 592px" /></a></p>
<p>Article found <a href="https://medium.com/@networksecurity/locky-ransomware-virus-spreading-via-word-documents-51fcb75618d2#.9agk6b1xc" target="_blank">here.</a></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>To achieve healthy ageing, keep surfing the web: study</title>
		<link>https://launchpad.iglou.com/uncategorized/to-achieve-healthy-ageing-keep-surfing-the-web-study/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Wed, 10 Feb 2016 18:23:33 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">http://launchpad.iglou.com/?p=768</guid>

					<description><![CDATA[Washington: A new study has found that meaningful and Internet-based activities, which promote experiences of participation in society, are actually important for healthy ageing. In the Umea University study, occupational therapists are shown to promote participation, reduce experiences of loneliness and strengthen seniors&#8217; social network using an Internet-based intervention programme. Researcher Ellinor Larsson said that [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong><a href="http://launchpad.iglou.com/wp-content/uploads/2016/02/ipad-web-surfer.png" rel="attachment wp-att-769"><img loading="lazy" decoding="async" class="size-full wp-image-769 alignleft" src="http://launchpad.iglou.com/wp-content/uploads/2016/02/ipad-web-surfer.png" alt="ipad-web-surfer" width="350" height="197" srcset="https://launchpad.iglou.com/wp-content/uploads/2016/02/ipad-web-surfer.png 350w, https://launchpad.iglou.com/wp-content/uploads/2016/02/ipad-web-surfer-300x169.png 300w" sizes="auto, (max-width: 350px) 100vw, 350px" /></a>Washington:</strong> A new study has found that meaningful and Internet-based activities, which promote experiences of participation in society, are actually important for healthy ageing.</p>
<p>In the Umea University study, occupational therapists are shown to promote participation, reduce experiences of loneliness and strengthen seniors&#8217; social network using an Internet-based intervention programme.</p>
<p>Researcher Ellinor Larsson said that digitization is increasing the risk of excluding seniors who often can have limited experiences of Internet-based activities, adding that a steadily increasing amount of everyday activities require access to the Internet, and to achieve increased participation in society, we need to pay attention to an increased inclusion of seniors.</p>
<p>Larsson noted that the senior citizen can also experience social change at the loss of loved ones, which makes the loneliness more evident. A joint effort focusing on how the well-being of the elderly can be promoted through meaningful Internet-based activities is becoming more important in order to support the ageing population of today&#8217;s society.</p>
<p>In her dissertation, Larsson describes how health-promoting efforts aimed at the seniors can be developed. To enable Internet-based social interventions for seniors, collaboration between several parties in society is needed.</p>
<p>The study appears in DISSERTATIONS.</p>
<p>Article found <a href="http://www.deccanchronicle.com/lifestyle/health-and-wellbeing/100216/to-achieve-healthy-ageing-keep-surfing-the-web.html" target="_blank">here.</a></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Pew: Study Finds Willingness to Trade Data For Products/Services</title>
		<link>https://launchpad.iglou.com/uncategorized/pew-study-finds-willingness-to-trade-data-for-productsservices/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Thu, 14 Jan 2016 17:37:28 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">http://launchpad.iglou.com/?p=763</guid>

					<description><![CDATA[But it depends on the circumstances A large portion of Americans appear to be willing to share their personal information in exchange for a product or service, but some offers are more attractive than others. That is the takeaway from a new Pew Research Center report based on a survey of 461 U.S. adults and [&#8230;]]]></description>
										<content:encoded><![CDATA[<h5>But it depends on the circumstances</h5>
<p>A large portion of Americans appear to be willing to share their personal information in exchange for a product or service, but some offers are more attractive than others.</p>
<p>That is the takeaway from a new Pew Research Center report based on a survey of 461 U.S. adults and 80 participants in nine focus groups on attitudes toward what Pew billed as the &#8220;key tradeoff&#8221; of the digital economy.</p>
<p>Pew offered up six hypothetical tradeoffs involving sharing varying degrees of personal data and asked whether that tradeoff was acceptable.</p>
<p>The largest percentage (54%) said they were OK with facial recognition cameras in the workplace to catch thieves of employees&#8217; personal belongings, with the footage staying on file as long as the company wished, and even if it were used to measure employee attendance and performance. Only 24% said that would not be acceptable, with 21% saying it would depend on circumstances. There were no statistically significant differences in answers by age or gender or income.</p>
<p>Far fewer would trade personal data for receiving targeted advertising in the scenario presented by Pew. That scenario was free access to a social media platform that allowed for interaction with other alumni for an upcoming reunion in exchange for creating a profile and supplying a photo that would be used by the site to deliver tailored advertising.</p>
<p>Only 33% said that tradeoff would be acceptable, while 51% said it was not and 15% said it depended on the circumstances.</p>
<p>The generational breakdown is telling. Four of 10 under 50 said they were OK with that, but only 24% of those over 50 said it was acceptable.</p>
<p>“Many policy makers and companies are anxious to know where Americans drawn the line on privacy – when they will resist privacy intrusions and when they are comfortable with sharing personal data,” said Lee Rainie, director of Internet, science, and technology research at Pew and author of the report. “These findings show how people’s decisions are often context-specific and contingent. A phrase that summarizes their attitudes is, ‘It depends.’ Most are likely to consider options on a case-by-case basis, rather than apply hard-and-fast privacy rules.”</p>
<p>Article found <a href="http://www.broadcastingcable.com/news/technology/pew-study-finds-willingness-trade-data-productsservices/146963" target="_blank">here</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>A Brain Scan Study On The Dress That Broke The Internet Helps Explain Our Divide</title>
		<link>https://launchpad.iglou.com/uncategorized/a-brain-scan-study-on-the-dress-that-broke-the-internet-helps-explain-our-divide/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Fri, 13 Nov 2015 15:11:11 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">http://launchpad.iglou.com/?p=756</guid>

					<description><![CDATA[Do you remember The Dress? Ah, how could you forget it? Well now, there&#8217;s an official, peer-reviewed brain scan study on The Dress, and it helps to explain our divide between seeing blue and black and white and gold. When the striped wonder came onto the Internet, it quickly divided opinions, but much of the [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><a href="http://launchpad.iglou.com/wp-content/uploads/2015/11/f8a83980-62f0-0133-ecbc-0aa00699013d.png"><br />
</a>Do you remember The Dress? Ah, how could you forget it? Well now, there&#8217;s an official, peer-reviewed <a title="Link: http://digest.bps.org.uk/2015/10/first-brain-scan-study-to-feature-that.html" href="http://digest.bps.org.uk/2015/10/first-brain-scan-study-to-feature-that.html" target="_blank">brain scan study on The Dress</a>, and it helps to explain our divide between seeing blue and black and white and gold. When the striped wonder came onto the Internet, it quickly divided opinions, but much of the <a title="Link: http://www.wired.com/2015/02/science-one-agrees-color-dress/?sf7701352=1" href="http://www.wired.com/2015/02/science-one-agrees-color-dress/?sf7701352=1" target="_blank">commentary on what was happening</a> was unfortunately a bit speculative. Thanks to science, The Dress has become the subject of a proper study, and contributes to our modern body of scientific knowledge.<img loading="lazy" decoding="async" class="wp-image-759 aligncenter" src="http://launchpad.iglou.com/wp-content/uploads/2015/11/f8a83980-62f0-0133-ecbc-0aa00699013d.png" alt="f8a83980-62f0-0133-ecbc-0aa00699013d" width="483" height="362" srcset="https://launchpad.iglou.com/wp-content/uploads/2015/11/f8a83980-62f0-0133-ecbc-0aa00699013d.png 684w, https://launchpad.iglou.com/wp-content/uploads/2015/11/f8a83980-62f0-0133-ecbc-0aa00699013d-300x225.png 300w" sizes="auto, (max-width: 483px) 100vw, 483px" /></p>
<p><span id="more-756"></span></p>
<p>Neurologists from two universities in Germany (BG University Hospital Bergmannsheil and Ruhr University Bochum) and led by Lara Schlaffke teamed up to begin to understand the <a title="Link: http://www.sciencedirect.com/science/article/pii/S0010945215003226" href="http://www.sciencedirect.com/science/article/pii/S0010945215003226" target="_blank">physical basis of this odd sensory perception provided by The Dress</a>. They used functional magnetic resonance imaging (fMRI) to view the brains of 28 experimental participants while viewing the dress (14 who saw it as black and blue, and 14 who saw it as white and gold). The hope was that the activity shown in the brains of the two groups would be somehow different, offering a clue as to what was going on to generate the difference of opinion.</p>
<p>There was indeed a difference in the brain scans of the two groups of dress viewers. As published in the journal <i>Cortex, </i>&#8220;the people who see the dress as white and gold showed extra activation in a raft of brain areas, including in frontal, parietal (near the crown of the head) and temporal (near the ears) regions.&#8221; These regions of the brain are involved in active interpretation of visual stimuli, so basically the scans suggest that white and gold dress viewers&#8217; brains were doing more active processing of the dress image to arrive at their opinion.</p>
<p>It&#8217;s normal for our brains to do some active processing of visual stimuli. For instance, an ability known as &#8220;<a title="Link: http://www.sciencedirect.com/science/article/pii/S0042698910004402" href="http://www.sciencedirect.com/science/article/pii/S0042698910004402" target="_blank">color constancy</a>&#8221; means that humans understand that some objects maintain their same colors even when viewed in different levels of ambient lighting. The software in our minds does this automatically; we don&#8217;t have to choose to adjust for lighting conditions when we see stuff. But this same automaticity means that there are a few edge cases, like The Dress, where people&#8217;s brains are drawing different conclusions as to its &#8220;real&#8221; color, and feeling absolutely sure of their own opinion because it was generated so naturally. Interestingly, the participants did <i>not</i> disagree on the colors when shown modified images of The Dress where the lighting around it was less weird. So something about this judgment mechanism is what&#8217;s causing our disagreements.</p>
<p>If you combine these findings with pre-existing results about surveys on The Dress, it actually has interesting implications. <a title="Link: http://www.bustle.com/articles/67167-blue-and-black-dress-that-broke-the-internet-has-us-more-evenly-divided-than-we-thought" href="http://www.bustle.com/articles/67167-blue-and-black-dress-that-broke-the-internet-has-us-more-evenly-divided-than-we-thought" target="_blank">Dress viewers were pretty evenly divided</a> between team black and blue and team white and gold across several demographic categories, including gender, location, and iPhone/Android. Though it&#8217;s too little data to draw broad conclusions, the new study might suggest, for instance, that there is no broad gender difference in active versus passive color processing, because otherwise The Dress viewers would have split less evenly along gender lines. Hopefully more future research can examine these and other possibilities.</p>
<p>Article found <a href="http://www.bustle.com/articles/120867-a-brain-scan-study-on-the-dress-that-broke-the-internet-helps-explain-our-divide" target="_blank">here.</a></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Google Trends Now Shows the Web’s Obsessions in Real Time</title>
		<link>https://launchpad.iglou.com/uncategorized/google-trends-now-shows-the-webs-obsessions-in-real-time/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Thu, 18 Jun 2015 17:33:06 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">http://launchpad.iglou.com/?p=749</guid>

					<description><![CDATA[GOOGLE TRENDS HAS long been a tool for journalists tracking what people wanted to know about in the recent past. The function hasn’t changed, but the tense has: Trends now tracks stories in real time, giving unfettered access to what the Internet wants to know in the moment. &#160; Trends had been largely unchanged since [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><span class="lede" tabindex="-1">GOOGLE TRENDS HAS </span>long been a tool for journalists tracking what people wanted to know about in the recent past. The function hasn’t changed, but the tense has: Trends now tracks stories in real time, giving unfettered access to what the Internet wants to know in the moment.</p>
<p><a href="http://launchpad.iglou.com/wp-content/uploads/2015/06/google-1024x323.jpg"><img loading="lazy" decoding="async" class="aligncenter wp-image-750 " src="http://launchpad.iglou.com/wp-content/uploads/2015/06/google-1024x323-1024x323.jpg" alt="google-1024x323" width="578" height="182" srcset="https://launchpad.iglou.com/wp-content/uploads/2015/06/google-1024x323.jpg 1024w, https://launchpad.iglou.com/wp-content/uploads/2015/06/google-1024x323-300x95.jpg 300w" sizes="auto, (max-width: 578px) 100vw, 578px" /></a></p>
<p>&nbsp;</p>
<p><span id="more-749"></span></p>
<p>Trends had been largely unchanged since 2012, a helpful but slightly backdated look at subjects people were searching for over the last day or more. As of today, you can see minute-by-minute information culled from the 100 billion searches that take place on Google at any given month. Not only that, but Trends now pulls in information from Google News and YouTube, for a fuller view of what people want to know.</p>
<p>In many ways, insight into what people are searching for is even more powerful than what they already know, says Steve Grove, head of Google’s News Lab.</p>
<p>“Social media data focuses on what people are talking about publicly. Search data goes a layer deeper than that, in some ways, to what people are really interested in.” Grove tells to WIRED. “When you’re searching, you’re not really editing yourself. You find out what people are really interested in. It’s very real, very raw, very personal.”</p>
<p>It also highlights the distance between what’s being reported and what people want to know; if you already have a good read on the Nest Cam, you’re less likely to use Google to find additional information about it. That in turn helps explains why real-time trends can be so illuminating. There’s a much larger curiosity gap on breaking news—when there are still plenty of unknowns to to the media as well—and, say, the state of the Republican primary race.</p>
<p>While that may appear to make Google Trends a sort of populist news ticker—showing what people are genuinely interested in versus what a newsroom bestows importance on—Trends doesn’t quite work that way. Rather than pure volume, it tracks surges of interest relative to how much those items usually generate. “We’re looking for spikes in particular topic areas that we then normalize,” explains Grove. “You can imagine if it was just volume overall, you’d see the same sort of topics every day.” That’s why headliners like the NBA Finals sit alongside less obvious hits like the Alameda County Fair in the top 10 “trending stories” as of this writing.</p>
<p>The new Google Trends also goes well beyond just headlines, though many of the features are just cleaner, more detailed versions of what was previously available. You can still access handy charts comparing how various search terms have fared over time, just now with minute-by-minute granularity. A “featured stories” section displays search data pre-sorted in a variety of visually grabby ways. A series of regularly updated data sets provide pre-packaged looks at everything from how interest in MERS and Ebola has evolved to which Copa America teams are the most search-engine sought-after. And the whole page has gotten a healthy dollop of material design.</p>
<p>If you’re a journalist or a researcher, the benefits of insight into what people want to know <em>right now</em>should be self-evident; you’re probably already tinkering. Even if you’re not, though, it’s worth touring the new Google Trends for the fun visualizations, sure, but also for a look at where the Internet is out of step with the news. Or maybe just a quick rundown of what’s going on in Alameda County; I hear they’ve got a great fair lined up.</p>
<p>Article found <a href="http://www.wired.com/2015/06/google-trends-real-time/">here</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
