THE NEW CHART FROM POPCHART LAB TAKES ON THE WIDE WORLD OF COFFEE.
The folks at PopChartLab have already tackled breweries, cocktails, andpies with their eye-pleasing infographics, each one meticulously researched and gorgeously rendered. It’s a process that undoubtedly involves a lot of coffee. Their newest work celebrates the whole family tree.
The Compendious Coffee Chart lays out the entire coffee ecosystem, outlining how various methods of production, including the French press, Kyoto dripper, and Neapolitan flip, among others, are used to create coffees, cortados, cappuccinos, and more. Coffee devotees can use the graphic as a way to announce their allegiance to the cocoa bean in all its manifestations. For newcomers, it’s a chance to discover that it’s not actually called a “cafe olé.”
Creating the taxonomy was not without its difficulties. “We had to make a judgment call on how to classify the output of the Moka Pot and the Aeropress,” a PopChartLab team member told me. “It’s not quite standard brewed coffee, but we wouldn’t dare call it espresso, so we coined a term for it: fauxpresso.” And while it is, indeed, compendious, there is one notable omission. “I think we got just about every major coffee brewer in here except for K-cups,” he says, “because screw K-cups.”
When you download an app from the Android Google Play store, it will prompt you to accept the permissions it requests from your device. Most people do not pay attention and simply download the app. This is a bad idea. Left unchecked, app permissions can open your device to possible data theft, spam and malware.
An Android app can ask for 124 different types of permissions. According to a study by the UC Berkeley Electrical Engineering and Computer Sciences department in February, 33% of Android apps request more permissions than they need. The researchers asked users if they understood what the permissions requested by an app actually were for, and 97% of those surveyed could not correctly identify what all the app permissions were used for.
For instance, when an app requests access to your device storage, what is it actually asking for? Can it modify or delete your USB storage, and why would it want to do such a thing? When it asks for access to your accounts, which accounts does it want? If it requests SMS privileges, do you know whether it could text premium pay services on your behalf? These are all serious questions, yet most people just click “download” and start using the app.
Researchers found that only 83% of Android users paid attention to permissions when installing an app and 42% did not know what permission were for. This could prove problematic for users who prefer to keep their personal information secret.
Most apps from reputable developers play by the rules when it comes to how permissions are used. But that is not always the case. The mobile social network Path was caught uploading users’ contacts from their address books to Path’s servers without permission. Path apologized and said it wiped its servers of the purloined data, but less scrupulous developers have little incentive to do so when the data gleaned from a device through broad permissions is lucrative enough.
There are a few basic rules to follow when downloading an app. First, where is it coming from? The Apple App Store can generally be trusted, as it pre-screens all apps before publishing them. A few apps have been discovered behaving badly (Path, for instance), but Apple cracks down quickly on apps found to violate its terms of service. Yet Apple does not explicitly show the permissions an app has been granted upon download the way Android does. Google Play is a different matter. Publishers are not subjected to the same type of pre-screening that iOS apps are, and even though permissions are listed upon download, what you think an app is doing may be different from what the app actually does.
Downloading an app is like making any other type of purchase. Instead of opening your wallet willy-nilly and downloading whatever seems interesting, do some research. Read reviews and check comments about the app. Does developer have a good reputation? Do the permissions make sense for what the app is supposed to do? An RSS reader, for instance, probably does not need access to your smartphone’s camera. If it does ask for that permission, even though there is no plausible reason for it, do not download that app.
Driven by breakthrough thinking and a wide-open sense of what’s possible, Alcatel-Lucent delivers the world’s most advanced technologies to companies all across the globe. Our driving motivation is to realize the potential of the connected world – by providing the technologies needed to turn networks into engines of sustainable economic growth, social development and opportunity. We provide a comprehensive suite of software solutions and services offerings designed specifically to meet the needs and demands of communication network operators and strategic industries. These solutions allow our customers to optimize network costs and quickly deploy innovative, value added products and services for their subscribers that increase loyalty and create new revenue streams.
Earlier this week we shared an infographic with you breaking down the costs of being Batman, and if you thought it was expensive to be Batman, just wait and see how much it would cost you to be Iron Man! The infographic comes from MoneySupermarket.com.
Iron Man is one of the richest superheroes of all time with enormous wealth to spend on weapons, gadgets and technology – but how much would it cost you to become Iron Man?
Before you reach for your Platinum Credit Card, it should be noted that Iron Man, like Batman, doesn’t actually possess super human powers, but instead uses his wealth to fund the state of the art gadgets, vehicles and weaponry which he uses to fight crime.
Iron Man aka Tony Stark has an estimated personal wealth of $9.3 billion. The majority of his fortune was accumulated through his company, Stark Industries, which he inherited from his father, Howard. Stark Industries is worth an estimated $20.3 billion!
Stark Industries is a fictional defence contractor that develops advanced weapons systems for the military. With his immense wealth and all that military technology at his fingertips, Tony Stark doesn’t need savings or a loan to fund his extraordinary lifestyle – but how much would it cost you to become this Marvel Comics superhero? Take a look at our infographic below for the costs associated with Iron Man’s suits, cars, home, weapons, gadgets and more!
My question to you is… would you rather be Batman or Iron Man?
Iron Man: $1,612,717,000
The future of the Internet lies in the realm of expansion. Just like computers have been, the Internet has been evolving for decades. Years ago, computers took up the entire floors of buildings, and now they occupy our front pocket with more processing power than those ancient dinosaurs. The Internet is becoming a far more sophisticated place as well. With so many different types of websites and businesses out there, the need to expand top-level domain names has finally come upon us.
This current surge in registration for new domain extensions will see as many as 1,000 new domain extensions being approved. By doing this, it will effectively create a gold rush for those eager to compete in the Internet addressing space. There were nearly 2,000 applicants. The cost to even apply for an evaluation fee is $185,000, with an annual fee of $25,000; so you know it’s largely companies, and massive corporate players paying for these new domains.
The pros of better innovation, the increase in brand visibility, and a clearer and more targeted domain for brands will help lead the charge for the ever expanding Internet and its future.
Click here or the graphic below for a full-sized view.
Just as it’s revolutionized everything from grocery shopping to travel, social and digital media have had an enormous effect on the job hunt. With technology moving forward every day, the job discovery and application process is constantly evolving and in flux. To embrace the future, however, we must look to the past.
The infographic below, compiled by Spark Hire, examines the evolution of applying for a job, chronicling innovations as seemingly mundane as the invention of the post office (remember snail mail?) to the development of a little thing called the Internet.
How have you applied for the jobs you’ve held? Let us know in the comments below.
Teens have long been hiding their racier activity from their parents. According to a new study from security technology company McAfee, the internet is causing that behavior to seriously spike.
According to “The Digital Divide: How the Online Behavior of Teens is Getting Past Parents,” 70% of teens are hiding their online behavior from their parents, up from 45% in 2010. What exactly teens are hiding runs the gamut, but across the board parents are in the dark about most of their kids’ online activity.
For example, 48.1% of teens admitted to looking up assignments and test answers online, while 77.2% of their parents said they don’t worry about their kids cheating in school. And while 32% of teens surveyed have accessed pornographic content online, only 12% of their parents thought they had.
Similarly, 51% of teens reported that they have hacked someone’s social media account and 31% reported pirating movies and music. Meanwhile, less than 1 in 10 parents surveyed were aware that their children engaged in these illegal activities.
The study found that teens are getting creative with how they hide their online content and activity—a majority of teens (53%) regularly clear their browser history to keep their parents out of the loop. Twenty-four percent of teens went so far as to either create private email addresses unknown to their parents or create duplicate/fake social media profiles.
Despite an overwhelming sentiment of “not my kid” denial, parents are stepping up their game with online monitoring in an attempt to keep their kids out of trouble. Many are setting parental controls (49%), obtaining email and social network passwords (44%) and even using location-based devices to keep track of teens (10%). Still, nearly a quarter of parents surveyed admitted that they are so overwhelmed with technology that they can’t monitor their children’s online behaviors and are simply hoping for the best.
Other key findings of the study included statistics indicating a rise in cyberbullying, and Facebook proves to be the epicenter. Sixty-two percent of teens have witnessed cruel behavior online, and 93% of them say that it took place on Facebook.
Researchers conducted 2,017 online interviews during the month of May for this study, evenly split between teens and parents. Teens were between the ages of 13-17, evenly split by gender and geographic distribution according to the US census.
How do you handle your teen’s online activity? Any tips for fellow readers? Let us know in the comments.
Video games aren’t going anywhere. But where and how we play them has shifted dramatically in recent years, thanks in large part to the smartphone explosion.
Sales of physical media are down after a peak in 2008 — no surprise there. But despite the proliferation of apps and digital delivery systems like Steam, Xbox Live Arcade and the PlayStation Network, discs still drive the majority of the industry’s revenue, and consoles remain strong. But tides are slowly turning. In 2011, it was a 69% / 31% split on physical vs. digital downloads.
And while the types of games people play are shifting as well, even the most successful mobile game ever —Angry Birds — only generated $106.3 million in 2011. Compare that with Call of Duty: Modern Warfare, the best-selling game of that year, which reached $1 billion in sales after only 16 days.
Our friends at Statista have broken down a number of compelling figures in the infographic below. Get a bird’s-eye view of the industry, and let us know where you see gaming headed in the next few years.