23 Jul 2014

Nimekutana nayo hii katika Facebook


Tafsiri ya alichoandika Chiume, rafiki yangu mmoja huko Twitter na Facebook, ni hii:

"Utasalmu amri kwa intaneti. Duka hili katika kitongoji cha Sinza, Dar,linatumia picha yetu ya harusi. ambalo ni jambo la kufurahisha/kupendeza lakini ingekuwa vema kama tungelipwa! Kuna mwanasheria yeyote mzuri (wa kufuatilia ishu hii?) Lol! Asanteni aliyeleta picha na 'aliyetutonya' kuhusu ishu hii, ambayo 'tumekanusha' kwa kudai ni kushabihiana tu."




Mtandao wa kijamii wa Twitter unazidisha ushindani miongoni mwa apps za ku-chat, hususan Whatsapp, kwa kuboresha huduma yake ya ujumbe wa moja kwa moja (Direct Message) au DM kama inavyojulikaza.

DM ni tweets zinazotumwa faragha kati ya watu wawili 'wanaofuatana' (follow each other), au kwa ujumbe wa moja kwa moja kwa watu maarufu wenye akaunti zilizohakikiwa (verified) ambazo zinawawezesha kupokea ujumbe wa aina hiyo hata kwa watu wasiowa-follow.

"Katika wiki chache zijazo, tutatambulisha update itakayorahisisha kufuta DM kiurahisi mtandaoni na katika simu au tablet," wameeleza Twitter,na kuongeza, "pia tutatambulisha update kwa iPhone na Android itakayomwezesha mtumiaji kuona historia nzima ya DMs.

DM zinawakwaza watumaiji kutokana na limit ya tarakimu 140 na mapungufu katika ku-sync kati ya mtandao na simu au tablet.

Mafanikio ya Whatsapp yalijidhihirisha mwezi Februari mwaka huu baada ya app hiyo kununuliwa na Facebook kwa dola bilioni 19, na sasa app hiyo inatumiwa na watu zaidi ya milioni 500.


ENDELEA KUTEMBELEA BLOGU HII KUFUATILIA MAENDELEO YA HABARI HII NA NYINGINEZO KWA KUBONYEZA KIPENGELE CHA 'TEKNOLOJIA' HAPO JUU

22 Jul 2014

.

.
.
.


.
.
.

.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.


20 Jul 2014

twitter etiquette
I love Twitter for a lot of reasons. There’s a lot to like and a lot of really awesome people using it effectively. But then there are those people who don’t use it so well – or at least those who have annoying Twitter behaviors. While this post isn’t a full rant, it’s a mini rant – about how to properly say thank you on Twitter.
Here’s the thing, when someone takes the time and effort to share your content on Twitter, you should take the time to thank them for it.
Yes, it’s that simple.
Now, there are various ways you can go about thanking them. And these will vary depending on how you use Twitter but you should still be thanking people.
But, first, let’s look at what is NOT a good thank you on Twitter. Retweeting someone’s Twitter post that shared your content is NOT a thank you. It is selfish and self-aggrandizing.
All this does is acknowledge that you saw they shared it, but that you’d rather more people see that they shared it. It doesn’t thank them for their time. It promotes you. It doesn’t thank them for reading your post. It promotes you.
So. STOP. Doing. This. (If you currently do.)
Instead, here is how you should thank people on Twitter.

Say Thank You

I know, crazy concept! But actually saying thank you is the best way to say thank you. Reply to their original tweet (so they know what you’re thanking them for) and actually say “thank you”. Or “thanks”. Or “I appreciate it”. Or something else with gratitude.
thank you on twitter
You can even wish them a lovely day, nice weekend, or other greeting. You can ask them a question or start a conversation with them.
twitter etiquette

Favorite the Tweet

If you get a lot of shares and notifications or maybe you just don’t have enough time to thank everyone, you can at least throw up a “favorite” on the tweet to let the person know you saw it and appreciate it.
When possible though, or when someone writes up a comment or summary of your content in their tweet, take the extra time to thank them.

Tweet their Content

One of the most rewarding ways to thank someone (and, yes, it will take more time) is to share their content as reciprocation for them sharing yours. Take a look at their Twitter feed, find a post or link that is of relevance to you and your audience and retweet it to your followers.
SOURCE: Jenn's Trends


Oscars zero dark thirty jessica chastain
It's not often we get a look inside the secret world of spies.
While intelligence officers continue to operate in the shadows, a fantastic article by Josef Hufelschulte of Focus Magazine gives a rare look inside their secret training regimen.
We picked out the five most interesting skills new recruits learn at Germany's version of the CIA, the Bundesnachrichtendienst (BND).

Spies need to learn their most important skill: how to recruit sources to give up secrets.

The bread and butter of a spy is acquiring secret information from sources. In the Focus report, one intelligence officer was given the location of a visiting lord and after 90 minutes, the young woman had learned the lord's marital status, occupation, career, hobbies, and daughter's college exam grades. By the end of the rendezvous, the officer had accomplished her mission while the lord had fallen in love.
"You also have to figure out what motivates people, and what their vulnerabilities are," former CIA officer Lindsay Moran revealed in an interview with Pursuit Magazine. "Because this is the information you will use to manipulate them to get what you want — which is secret information."

They need to know how to lie — and to tell when someone else is lying.

The world of secrecy includes a lot of lying and officers better be good at it. Not only do they have to be good at lying, but they must be able to spot when someone else is. This starts from day one, as friends and family are kept in the dark.
Officers even create elaborate stories to use to practice lying when their fellow officers ask them personal questions. In examples of how to spot a liar, former U.S. President Bill Clinton is presented as a textbook example, and students pored over the tells the former president made during the Lewinsky scandal. 

Spies are taught advanced driving skills, like how to lose someone who may be following them.

All aspects of driving are covered. Officers are taught how to avoid being followed, how to tell if someone's on their tail, and how to shake them.
"They teach you tricks, such as making left-hand turns so you can see if there are cars behind you," former CIA officer Lindsay Moran revealed of her CIA vehicle training.
BND officers are taught not only how to avoid suspicion but also how to handle high-speed and violent chases. Three officers credit their survival of a gunshot-filled chase through the streets of Saudi Arabia to the skills learned in driving classes.  

Spies must be able to conduct espionage operations in crisis regions.

For six weeks, students are relocated to a hidden compound to complete operations training. The training includes explosions and realistic scenarios that mirror conditions in countries with high levels of terrorist activity.
Everything from how to handle an attack on an embassy, to first aid and helicopter evacuations is covered. Weapons proficiency is also taught but from a defensive mindset: If you have to engage with a weapon, something has gone terribly wrong.

Classwork is an all-day event and covers everything from languages to psychology.

20% of classroom curriculum includes law classes with practical applications like how to respond to a kidnapping in a foreign country — a situation particularly dicey for a spy. Their classwork stretches deep into the evening and covers subjects as diverse as international politics, Islam, geography, psychology, observation, photographic technology and foreign languages. English proficiency is required and other language skills are developed. 
According to the class subject to the Focus report, of 800 men and women who applied to the BND, only 40 made it to graduation

Seven internet service providers have filed a legal complaint against the UK's intelligence agency GCHQ.

ISPs from the US, UK, Netherlands and South Korea have joined forces with campaigners Privacy International to take the agency to task over alleged attacks on network infrastructure. 

It is the first time that GCHQ has faced such action.

The move follows allegations about government snooping made by US whistleblower Edward Snowden. 'Infected with malware' The ISPs claim that alleged network attacks, outlined in a series of articles in Der Spiegel and the Intercept, were illegal and "undermine the goodwill the organisations rely on".

 The allegations that the legal actions are based on include:

  •  claims that employees of Belgian telecommunications company Belgacom were targeted by GCHQ and infected with malware to gain access to network infrastructure
  •  GCHQ and the US National Security Agency, where Mr Snowden worked, had a range of network exploitation and intrusion capabilities, including a "man-on-the-side" technique that covertly injects data into existing data streams to create connections that will enable the targeted infection of users
  •  the intelligence agencies used an automated system, codenamed Turbine, that allowed them to scale up network implants 
  • German internet exchange points were targeted, allowing agencies to spy on all internet traffic coming through those nodes 
While the ISPs taking the action were not directly named in the leaked Snowden documents, Privacy International claims that "the type of surveillance being carried out allows them to challenge the practices... because they and their users are at threat of being targeted". 


Privacy International has previously filed two other cases - the first against alleged mass surveillance programmes Tempora, Prism and Upstream, and the second against the deployment by GCHQ of computer intrusion capabilities and spyware.

'Strict framework' Eric King, deputy director of Privacy International, said "These widespread attacks on providers and collectives undermine the trust we all place on the internet and greatly endangers the world's most powerful tool for democracy and free expression." 

The ISPs involved in the action are UK-based GreenNet, Riseup (US), Greenhost (Netherlands), Mango (Zimbabwe), Jinbonet (South Korea), May First/People Link (US)and the Chaos Computer Club (Germany). 

Cedric Knight, of ISP GreenNet, added: "Snowden's revelations have exposed GCHQ's view that independent operators like GreenNet are legitimate targets for internet surveillance, so we could be unknowingly used to collect data on our users. We say this is unlawful and utterly unacceptable in a democracy." 

GCHQ maintains that all its work is conducted "in accordance with a strict legal and policy framework which ensures that our activities are authorised, necessary and proportionate".

SOURCE: BBC



19 Jul 2014

.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.


Categories

Blog Archive

© Evarist Chahali 2006-2022

Search Engine Optimization SEO

Powered by Blogger.