Social Nets Need New Privacy Rule Book, Says Senator - 0 views
-
Clear rules are needed to govern what social networks can do with the massive amount of personal data they collect and how they inform their users about their practices, said Sen. Charles Schumer, who has asked the FTC to articulate a set of guidelines. Facebook claims it offers users "powerful" privacy tools, but Paul Stephens of the Privacy Rights Clearinghouse suggested consumers need a PhD to understand them.
The role of Yik Yak in a free society - Boing Boing - 0 views
-
"(And, in fact, anonymity apps have brought positives along with the negatives. Not long ago, a post on Secret reported that Google had acquired the poster's five-person company and had hired everyone but her. Later posts revealed that she was the only female at the company and had been there since it was founded. The thread became the talk of Silicon Valley, generating a lively debate about suppressed sexism in the start-up community. The poster's ability to remain anonymous was key to this information coming out. She could stand up to power, speak without embarrassment, and avoid alienating potential employers who might take a dim view of her controversial statements. That's exactly why the First Amendment protects anonymous speech, and that's why the value of anonymity apps like Yik Yak shouldn't be summarily dismissed. "
8 Skilled Jobs That May Soon Be Replaced by Robots - 0 views
-
"Unskilled manual laborers have felt the pressure of automation for a long time - but, increasingly, they're not alone. The last few years have been a bonanza of advances in artificial intelligence. As our software gets smarter, it can tackle harder problems, which means white-collar and pink-collar workers are at risk as well. Here are eight jobs expected to be automated (partially or entirely) in the coming decades. Call Center Employees call-center Telemarketing used to happen in a crowded call center, with a group of representatives cold-calling hundreds of prospects every day. Of those, maybe a few dozen could be persuaded to buy the product in question. Today, the idea is largely the same, but the methods are far more efficient. Many of today's telemarketers are not human. In some cases, as you've probably experienced, there's nothing but a recording on the other end of the line. It may prompt you to "press '1' for more information," but nothing you say has any impact on the call - and, usually, that's clear to you. But in other cases, you may get a sales call and have no idea that you're actually speaking to a computer. Everything you say gets an appropriate response - the voice may even laugh. How is that possible? Well, in some cases, there is a human being on the other side, and they're just pressing buttons on a keyboard to walk you through a pre-recorded but highly interactive marketing pitch. It's a more practical version of those funny soundboards that used to be all the rage for prank calls. Using soundboard-assisted calling - regardless of what it says about the state of human interaction - has the potential to make individual call center employees far more productive: in some cases, a single worker will run two or even three calls at the same time. In the not too distant future, computers will be able to man the phones by themselves. At the intersection of big data, artificial intelligence, and advanced
Rutgers' online course tracks your knuckles, face, browser history - Boing Boing - 0 views
-
"Rutgers University's new program also uses a "behavior observation tool," which monitors student browser activity throughout an active session. While this feature is intended to prevent students from using the Internet to cheat on exams, the power that this grants instructors is extremely invasive. If a student accidentally leaves a personal or embarrassing website in their browser during an online course, a ProctorTrack instructor might stumble upon their activity."
Machine-Learning Maestro Michael Jordan on the Delusions of Big Data and Other Huge Eng... - 0 views
-
"Now, the number of combinations of these columns grows exponentially with the number of columns. So if you have many, many columns-and we do in modern databases-you'll get up into millions and millions of attributes for each person. Now, if I start allowing myself to look at all of the combinations of these features-if you live in Beijing, and you ride bike to work, and you work in a certain job, and are a certain age-what's the probability you will have a certain disease or you will like my advertisement? Now I'm getting combinations of millions of attributes, and the number of such combinations is exponential; it gets to be the size of the number of atoms in the universe."
Queen Elizabeth II Tweets for the First Time #TheQueenTweets - 0 views
-
"Though she still doesn't have a personal Twitter account, Queen Elizabeth II, the monarch of the United Kingdom, has tweeted for the first time. The Queen tweeted from the official account of the British Monarchy after opening the Information Age exhibition at London's Science Museum on Friday. The tweet, below, is signed "Elizabeth R.""
Multimillion dollar humanoid robot doesn't make for a good cleaner | Technology | The G... - 0 views
-
"Atlas is a semi-autonomous system. The operator tells the robot where to be and what position to take, such as where to put its hands on a vacuum cleaner, and then the robot comes up with a plan of how to do that. For some chores Atlas's actions are logical and human-like. Others require re-thinking of how to get the job done in a way that its quite different to the way a person would perform the action."
Snooper's charter: wider police powers to hack phones and access web history | World ne... - 0 views
-
"The bill will now allow police to access all web browsing records in specific crime investigations, beyond the illegal websites and communications services specified in the original draft bill. It will extend the use of state remote computer hacking from the security services to the police in cases involving a "threat to life" or missing persons. This can include cases involving "damage to somebody's mental health", but will be restricted to use by the National Crime Agency and a small number of major police forces."
Turkey launches probe after hackers leak civilian data and taunt president - 0 views
-
"Turkey on Wednesday launched an investigation after a hacker or hackers posted a database online containing the personal information of nearly 50 million Turkish citizens - more than half of the country's population - and a message taunting President Recep Tayyip Erdogan. The population of Turkey is around 78 million. Experts say the leak could be one of the largest public leaks of its kind."
When Your Boss Is an Algorithm - New York Times Opinion - Medium - 0 views
-
"The algorithmic manager seems to watch everything you do. Ride-hailing platforms track a variety of personalized statistics, including ride acceptance rates, cancellation rates, hours spent logged in to the app and trips completed. And they display selected statistics to individual drivers as motivating tools, like "You're in the top 10 percent of partners!" Uber uses the accelerometer in drivers' phones along with GPS and gyroscope to give them safe driving reports, tracking their performance in granular detail. One driver posted to a forum that a grade of 210 out of 247 "smooth accelerations" earned a "Great work!" from the boss."
Smile, Your Face Is Now in a Database - Benjamin Powers - Medium - 0 views
-
""My concern is that a facial recognition rejection can [create] bias," said Rudolph. "So, if someone has a lot of faith in this technology and thinks that it's foolproof, and someone is rejected by this system, that customs officer or gate agent may be predisposed to saying this person is traveling with fraudulent credentials. That's a crime and a serious issue.""
To regulate AI we need new laws, not just a code of ethics | Paul Chadwick | Opinion | ... - 0 views
-
"Nemitz identifies four bases of digital power which create and then reinforce its unhealthy concentration in too few hands: lots of money, which means influence; control of "infrastructures of public discourse"; collection of personal data and profiling of people; and domination of investment in AI, most of it a "black box" not open to public scrutiny. The key question is which of the challenges of AI "can be safely and with good conscience left to ethics" and which need law. Nemitz sees much that needs law."
The Downfall of Computers - David Koff - Medium - 0 views
-
"These exploits are based on chip engineering flaws, not on software flaws. Apple, Google, Abode, Microsoft, and other software companies didn't write poor software or bad Operating Systems to cause these problems to occur. Rather, the chip manufacturers - Intel, AMD and ARM - designed and then engineered computer chips with flaws built into them. Once discovered, those flaws allow the Meltdown and Spectre exploits to be run. Worse, these chips have been sold with consumer computers, servers and mobile devices since 1995. so the impact is, potentially, both personal and global in scope."
« First
‹ Previous
61 - 80 of 227
Next ›
Last »
Showing 20▼ items per page