‘None of us like to spend money (except on shiny new toys). But even we curmudgeons can understand that companies need to charge for things that cost them money; and profit-making is at the heart of our economy.
‘Still, several charges appear on our bills that can drive even the most complacent techie into a screaming fit. How did this advertised price turn into that much on the final bill? Why are they charging for it in the first place? Herewith, five fees that make no sense at all — and yet we still fork over money for them…’
Outrageous permissions required by mobile payments apps
‘I did about an hour of online research and decided I’d first try Google Wallet, and then maybe download mobile payment apps for a couple of retailers. Ease myself into this thing before becoming the Mobile Payments Master.
‘What I learned quickly made me re-think my entire mobile payments future. Whatever concerns I may have about data security, whatever confusion I have about payment platforms, nothing compares to the outrageous apps permissions demanded by the companies authorizing mobile payments. Just check them out below. This is what they demand in return for authorizing you to use their apps…’
As the digital revolution kills jobs, social unrest will rise
Gartner offers up 10 strategic predictions for the next 10 years
How to Use Skype’s Screen Sharing
‘Skype’s screen-sharing feature allows you to share your desktop with a Skype contact. You can use this feature to quickly troubleshoot someone’s PC without making them install additional remote access software. Or, you can us this feature to give a presentation and or show anything else remotely. You could also choose to share a single window instead of your entire desktop, giving yourself some privacy.
‘While on a Skype call, just click the + button and select Share screens. You could also just click the + button and select Share screens to initiate screen-sharing while not already on a call…’
A web browser extension that makes email “scary” in order to disrupt NSA surveillance. Extending Google’s Gmail, the work adds to every new email’s signature an algorithmically generated narrative containing a collection of probable NSA search terms. This “story” acts as a trap for NSA programs like PRISM and XKeyscore, forcing them to look at nonsense. Each email’s story is unique in an attempt to avoid automated filtering by NSA search systems.