Skip to main content

Home/ Open Intelligence / Web 3X (Social + Mobile)/ Group items tagged Need

Rss Feed Group items tagged

Dan R.D.

What Deficit? - The Social Currency Imperative [22Apr10] - 0 views

  • 9.6 Trillion dollars was spent to educate every American. Just because a “corporation” does not exist to employ them and utilize their talents to the highest productivity level, does not mean that the talent and value does not exist. According to the 1:1000 rule, The GDP of the US in Social Currency is a minimum of 9,600 Trillion. What deficit?The dollar has a 1:1000 control leverage over social currency. It is not at all surprising to see social media expand at the rate proportional to that which the doom-gloom crowd predicts that the financial system will collapse. They are related, they hedge each other. Don’t let anyone convince you otherwisethe dollar will no longer control the value; that is, the social value wedged between people’s ears is free to be capitalized and securitized directly. We need to capture social currency in a new financial paradigm.Read more at www.ingenesist.com
  •  
    The dollar may be doomed, but the real value is wedged between your ears.
Dan R.D.

Google's Catch 22 - Security vs. Transparency [29Apr10] - 0 views

  • So I think that one of the biggest problems that Google has, taking Google as probably the best example of someone trying to build a reputation currency, is that as soon as Google gives you any insight into how they are building their reputation system it ceases to be very good as a reputation system. As soon as Google stops measuring something you created by accident and starts measuring something you created on purpose, it stops being something that they want to measure. And this is joined by the twin problem that what Google fundamentally has is a security problem; they have hackers who are trying to undermine the integrity of the system. And the natural response to a problem that arises when attackers know how your system works is to try to keep the details of your system secret—but keeping the details of Google’s system secret is also not very good because it means that we don’t have any reason to trust it. All we know when we search Google is that we get a result that seems like a good result; but we don’t know that there isn’t a much better result that Google has either deliberately or accidentally excluded from its listings for reasons that are attributable to either malice or incompetence. So they’re really trapped between a rock and a hard place: if they publish how their system works, people will game their system; if they don’t publish how their system works it becomes less useful and trustworthy and good. It suffers from the problem of alchemy; if alchemists don’t tell people what they learned, then every alchemist needs to discover for themselves that drinking mercury is a bad idea, and alchemy stagnates. When you start to publishing, you get science—but Google can’t publish or they’ll also get more attacks.Read more at craphound.com
  •  
    If Google publishes their secrets then security is compromised. If Google doesn't publish then users trust in them diminishes. If we will never know how Google measures value, then we will never know if there can be a better way?
D'coda Dcoda

Launching Today: Zaarly.com - a Location-Based, Real-Time Commerce Platform [18May11] - 0 views

  • Described as a location-based, real-time commerce platform that “makes the buying and selling of g
  • How Zaarly Works • According to the company, consumers can post what they're looking for on Zaarly, describe how much they're willing to pay for it, and announce how soon they need it. • Zaarly will immediately share that request in the local community through the Zaarly platform. Users may also use Facebook, Twitter and other social media channels to find what they're looking for. • Nearby people or businesses will see what you want and connect to Zaarly to fulfill your request. • Zaarly allows buyers and sellers to “anonymously message and talk on the phone to facilitate the logistics of a transaction, enabling an in-person or virtual meeting to complete the transaction,” the company says.
  • • To pay for the transaction, Zaarly features an integrated credit card payment system, “all within a safe and secure platform.” Users can also pay with cash
  • ...1 more annotation...
  • Zaarly is available on the iPhone, Android, “and all Web-enabled mobile phones via your mobile Web browser, as well as through the Web and Facebook on your desktop computer,” the company says. “The integrated Zaarly platform allows buyers and sellers to connect while they are on-the-go or from the convenience of home or office.
D'coda Dcoda

Bill Would Require Warrants For Govt to Access Your Email, Cloud Services [18May11] - 0 views

  • Sen. Patrick Leahy on Tuesday unveiled an overhaul to a 25-year-old digital privacy law that would require the government to obtain warrants before accesssing email and other cloud-based data. The update to the Electronic Communications Privacy Act (ECPA), would also extend to location-based data, and allow private companies to collaborate with the government in the event of a cyber attack. The ECPA was first enacted in 1986, well before the Internet, email, or smartphones. As a result, it is "significantly outdated and out-paced by rapid changes in technology and the changing mission of our law enforcement agencies after September 11," said Leahy, a Vermont Democrat. As a result, Leahy's updated 2011 version of the ECPA would apply to technologies like email, cloud services, and location data on smartphones. If the government wanted an ISP to hand over emails on a particular customer, for example, they would need to first obtain a warrant. At this point, the government abides by a rule that provides access to email after 180 days, depending on the circumstance.
D'coda Dcoda

Senator Has 'Serious Doubts' About Privacy of Google, Apple Location Apps [10May11] - 0 views

  • At the close of an almost three-hour hearing on cell-phone tracking, Sen. Al Franken said Tuesday that he still has "serious doubts" that consumers' privacy rights are being respected when it comes to location-based services via iOS and Android. "I think that people have a right to know who is getting their information, and a right to decide how that information is shared and used," said Franken. "After having heard today's testimony, I have serious doubts that those rights are being respected in law or in practice."
  • "We need to think seriously about how to address this problem, [especially since] mobile devices are only going to become more and more popular," he continued. "This is an urgent issue we'll be dealing with." Franken, a Minnesota Democrat who chairs the new Senate Judiciary Subcommittee on Privacy, Technology and the Law, heard testimony from Apple and Google executives today about how their mobile platforms collect and use location-based data, and what type of control users have over that information. Google said that any location-based data it collects via its Android mobile operating system is anonymous in nature and the majority of that information is deleted after one week. "The location information sent to Google servers when users opt in to location services on Android is anonymized and stored in the aggregate and is not tied or traceable to a specific user," said Alan Davidson, director of public policy at Google. "The collected information is stored with a hashed version of an anonymous token, which is deleted after approximately one week."
  •  
    Combine this with the TED talk on selective searches and it looks like a cross between 1984 and The Matrix is brewing up.
D'coda Dcoda

why i don't like "augmented reality" » Cyborgology - 0 views

  • i have a few complaints about the use of “augmented reality.” the first is primarily semantic. it seems (to me at least) like the term it implies some kind of (pre-digital?) “non-augmented” reality. this is more or less explicit when we refer to things like “augmented revolution” or “augmented conference.” it seems like the idea of augmented reality was introduced to make a point against a false binary (“digital dualism”) and i agree that this is important, both academically and in real life (see what i did there?). but i think the way we talk about augmented reality is sneaking a version of that binary back in. not the naive real v virtual but maybe something like real v “real+” and i think that is a mistake. and it is a strange mistake to read here, on a blog called “cyborgology” that proclaims (rightly i’m sure) that we have always been cyborgs. our friends from sst especially, i think, are sensitive to how reality has always been “augmented” if we are paying attention. so quoting sst hero latour:
  • If we wanted to project on a standard geographical map the connections established between a lecture hall and all the places that are acting in it at the same time, we would have to draw bushy arrows in order to include, for instance, the forest out of which the desk is coming, the management office in charge of classroom planning, the workshop that printed the schedule that has helped us find the room, the janitor that tends the place, and so on. And this would not be some idle exercise, since each of these faraway sites has, in some indispensable way, anticipated and preformatted this hall by transporting, through many different sorts of media, the mass of templates that have made it a suitable local—and that are still propping it up.* and he goes on for literally pages. he starts on p 200 (where the quote is from) and ends somewhere on p 203. then he picks it up again on p 206 with more. by 207 he is talking about the “plug-ins”, “patches” and “applets” that actors in a lecture need to make sense of what is happening. and cyborgs:
  • As we have witnessed so many times throughout this book, information technologies allow us to trace the associations in a way that was impossible before. Not because they subvert the old concrete ‘humane’ society, turning us into formal cyborgs or ‘post human’ ghosts, but for exactly the opposite reason: they make visible what was before only present virtually. In earlier times, competence was a rather mysterious affair that remained hard to trace; for this reason, you had to order it, so to speak, in bulk. As soon as competence can be counted in bauds and bytes along modems and routers, as soon as it can be peeled back layer after layer, it opens itself to fieldwork.
  • ...1 more annotation...
  • so what has changed, latour argues, is not reality but rather our ability to trace reality. so i guess in that sense what i want us to start talking about now is an augmented sociology instead of an augmented reality, but that is maybe a topic for another time.
  •  
    Suggests a term "augmented sociology" rather than "augmented reality" since what has changed isn't reality but rather our ability to trace reality.
D'coda Dcoda

Why Twitter's Oral Culture Irritates Bill Keller (and why this is an important issue) [... - 0 views

  • Bill Keller of the New York Times has just written a provocative piece lamenting that new technologies are eroding essential human characteristics. I would certainly agree that almost all technologies, especially those with a cognitive element, transform the way we organize, value and manage our intellectual and social lives–-indeed, such complaints were raised, most famously by Plato about how writing was emptying words of their soul by disconnecting them from their living speakers. However, Keller makes not one but at least three distinct claims in his piece. I want to primarily discuss the one that he makes least explicitly and perhaps has never formulated directly himself.
  • first, let’s clarify the other two which are explicit.
  • First Keller talks about how we no longer need to remember everything and how his father used to use a slide rule and now there are calculators and who knows their multiplication table anymore… This is a familiar argument from cognitive replacement and I believe it is worth discussing not necessarily because there is something inherently wrong with machines making certain cognitive tasks easier, but I do deeply worry about what this means for valuing humans. Cheaper computers increasingly capable of taking over human tasks means that we face a profound human problem: how will we deal with the billions of people who will be potentially redundant if the only way of measuring a human’s worth is their price on the labor market? For me, this is an important political question rather than a technological lament. It’s not about what machines can do, it’s about the criteria by which we judge the worth of our fellow human beings, and how advances information technology increasingly leads us to devalue each other
  • ...9 more annotations...
  • Second, Keller argues that “there is something decidedly faux about the camaraderie of Facebook, something illusory about the connectedness of Twitter.” This line of argument, that our social ties are being hollowed out by digital sociality, is also fairly common. I’d like to start by saying that it is not supported by empirical research.
  • Increasing numbers of people even make connections online which then they turn into offline connections (See Wang and Wellman, for example), so that even actual “virtual” connections –which I have just argued are less common—are valuable for many communities who otherwise do not have abundant peers around them, say cancer patients or gay youth in small towns.
  • here are the parts of Keller’s comments which have intrigued me
  • My mistrust of social media is intensified by the ephemeral nature of these communications. They are the epitome of in-one-ear-and-out-the-other, which was my mother’s trope for a failure to connect.
  • The shortcomings of social media would not bother me awfully if I did not suspect that Facebook friendship and Twitter chatter are displacing real rapport and real conversation, just as Gutenberg’s device displaced remembering. The things we may be unlearning, tweet by tweet — complexity, acuity, patience, wisdom, intimacy — are things that matter.
  • Then along came the Mark Zuckerberg of his day, Johannes Gutenberg.
  • But this comparison between Gutenberg and Zuckerberg makes little sense unless you realize that Keller is actually trying to complain about the reemergence of oral psychodynamics in the public sphere rather than about memory falling out of favor.
  • If the latter were the case, his ire would be more about Google; instead, most of his frustration is directed against social media, and mostly Twitter, the most conversational, and thus most oral of these mediums.
  • The key to understanding this is that while writing did displace the value of memory, the vast abundance of printed material it did something else also, something less remarked upon, both to the shape of our public sphere and also to our psychodynamics. It replaced the natural, visceral human oral psychodynamics with those of literate and written ones
Dan R.D.

$500 To Turn Your iPhone Into a EEG Heart Monitor (video) [31May11] - 0 views

  • Every 34 seconds someone suffers from a heart attack in the US. In the fight against this insane plague, startups are scrambling to find ways to leverage popular technology. The latest attempt is SHL Telemedicine‘s SmartHeart, a smart phone enabled electrocardiagram (ECG) device that only takes 30 seconds to analyze your heart and email the results to your doctor. Now nearly anyone can take an ECG by strapping the palm sized monitor to your chest and pushing a few buttons on your phone. No need for bulky machines, conductive gel, or an on site trained clinician. Check out the video presentation on SHL’s newest health gadget below. Aiming to come to market with a price tag near $500, SmartHeart could be an affordable way to recruit everyday citizens in the fight against cardiovascular disease.
Jan Wyllie

The Human Algorithm [20May10] - 0 views

  • A common mistake for those seeking to cope with this profound disruption is to confuse technology with innovation. Algorithms, apps and search tools help make data useful but they can’t replace the value judgements at the core of journalism.
  • Genuine innovation requires a fundamental shift in how journalists think about their role in a changed world. To begin with, they need to get used to being ‘curators’; sorting news from the noise on the social web using smart new tools and good old fashioned reporting skills.
  • I find it helps to think of curation as three central questions: * Discovery: How do we find valuable social media content? * Verification: How do we make sure we can trust it? * Delivery: How do we turn that content into stories for a changed audience?
  • ...11 more annotations...
  • With some like-minded souls, I founded Storyful in early 2010.
  • he only way a curator can ultimately sort news from noise is to join the social media conversation which emerges from news events. Not just listen, but engage directly, openly and honestly with the most authentic voices.
  • Every news event in the age of social media creates more than a conversation, it creates a community.
  • When news breaks, a self-selecting network gathers to talk about the story. Some are witnesses – the creators of original content – others are amplifiers – passing that content on to a wider audience. And in every group are the filters, the people who everyone else looks to for judgement.
  • Twitter is the door to that community.
  • We had more profound experiences of this Human Algorithm at work in recent weeks, most notably with reports of mass graves being discovered outside the besieged Syrian town of Deraa. Interaction with Facebook groups led us to Twitter conversations and YouTube videos. E-mail conversations with US-based academics has led us to key translations and satellite imagery.
  • This is the ‘Human Algorithm’ at work; the wisdom of a social media community harnessed through open, honest and informed engagement.
  • Storyful judges the credibility of a source on social media by their behaviour and status within the community
  • Proximity to the event. • Established journalistic, academic, or official credentials. • Past behaviour on the social web. • Status withi
  • established activist/political/social media group.
  • it is the oldest journalistic skill of all which gives this process meaning and that is engagement.
Dan R.D.

Scientists push to implement edible RFID tracking chips in food [03Jun11] - 0 views

  • these are some of the enticing claims made by the developers of a new system that embeds edible radio frequency identification (RFID) chips directly into food. Its creators insist the technology will revolutionize the way humans eat for the better, but critical-thinking onlookers will recognize the ploy as just another way to track and control human behavior.
  • Developed by Hannes Harms from the Royal College of Art in London, the “NutriSmart” system is based on the idea that RFID wafers injected directly into food can help better track the food supply chain, further automate the supermarket shopping experience, and simplify the eating experience by programming data into food so that humans essentially do not have to think about what they are doing.The technology makes both eating and dealing with food in general mindless, as a person simply needs to plop an RFID-embedded food item onto a special RFID-laced plate, which then tells the person all about the item and how much of it to eat. RFID ovens and microwaves also eliminate having to think about how long to cook an RFID food item — simply put it in the RFID microwave, oven, or toaster, and the machine will know exactly how long to cook the item.
  • mad scientists have already developed edible RFID tags for use in pharmaceutical drugs
  • ...3 more annotations...
  • (http://www.naturalnews.com/028663_health_care_technology.html)
  • if such technology also ends up in food, it is safe to assume that evil powers will seek to control the food supply with it, as well as monitor the types of food people eat.
  • it is plausible that RFID technology can assess illegal intake of such nutrients, and immediately send this data to the appropriate enforcement agencies.
Dan R.D.

The Singularity Just Got A Lot Closer - 0 views

  • The Topic-Mapper software development kit (SDK) by ai-one inc. reads and understands unstructured data without any human intervention. It allows developers to build artificial intelligence into almost any software program.
  • Unlike other machine learning approaches, ai-one’s technology extracts the inherent meaning of data without the need for any external references. A team of researchers spent more than eight years and $6.5 million building what they call “biologically inspired intelligence“ that works like a brain.
  • First, it automatically creates what ai-one describes as a “lightweight ontology” (LWO), The system determines the relationships between data elements as they are fed into the system. The primary benefit of LWO is that it is completely objective -- it makes associations without editorial (human) bias. LWOs are also very adaptive, automatically recalculating when ingesting new data. Unlike traditional ontologies, LWOs require no maintenance.
  •  
    It works like a brain... the more it reads, the more it learns, the better it gets at recognizing patterns and answering questions. http://diigo.com/0hqgr
D'coda Dcoda

EU to Recommend Location Data Protections [16May11] - 0 views

  • The European Union's data protection advisory body will reportedly recommend that location data about cell phone users be subject to strict privacy protections, a move that could challenge technology company practices
  • The panel will recommend that the location data that the mobile industry collects about users to provide location-based services and target advertising should be subject to the same protections as people's names, birthdays and other highly personal data.
  • Companies shoul
  • ...2 more annotations...
  • d not only need consent to collect the information, but should have to delete it after a certain amount of time and keep it anonymous, according the panel.
  • The recommendations are not binding in themselves, but are likely to inform national policy decisions in EU countries.
D'coda Dcoda

Facebook Death App Hunts Down Live People With Location Services [16May11] - 0 views

  • Agencies Mizbala and twentythree created an eerie location-based campaign for If I Die, a Facebook application that lets people record a message that will only be published after they die. Of course, no one think they're going to die anytime soon so people needed a bit of prompting. Mizbala used th APIs of popular location services such as Foursquare, Gowalla, Facebook Places, Twitter and Google Latest to track checkins all over the world. Once they located a person, they'd place a call to the location the person had checked into and asked to have the establishment to put the person on the line. Once they had the person on the line, they'd leave a creepy message and tell the person to go to the If I Die Facebook app. You can check out the demo call to Mashable's Adam Ostrow in this video to see what it's all about. Did the campaign work? Oh yes it did. Without any advertising, the campaign received lots of press in newspapers, blogs, radio and TV coverage which resulted in an 800 percent increase in recorded messages being left on "If I Die". But ask yourself. Do you really wants to be found this easily?
D'coda Dcoda

Adulterous Site Outsmarts Apple & Google [16May11] - 0 views

  • A few weeks ago, iPhone users were outraged to discover that their iPhones were tracking their every move, storing the information (in an unencrypted file, no less), and sending the data directly to Apple when synced with iTunes. Even more shocking was the news that iPhones do this even when they do not have location-based services enabled. Users concerned about their privacy were left vulnerable, with nothing they could do about it while they waited for Apple to offer a patch.
  • Naturally, Ashley Madison's specialty is guaranteeing privacy and anonymity for its customers (well, that and "an affair to remember!"). Users choose whom they share their photos with. Conversations on the site are password-protected. When users delete their accounts, also deleted is all evidence that they were ever members of the site. All messages and correspondence, photos, and personal data -- gone.
  • Ashley Madison is an online dating service owned and operated by Toronto-based Avid Life Media Inc. Nearly ten years old, Ashley Madison claims to be the world's largest dating site, with nearly 9.3 million members. What truly distinguishes Ashley Madison from its competitors, however, is its target demographic: married people.
  • ...4 more annotations...
  • Enter Ashley Madison.
  • And now, Ashley Madison is giving privacy lessons to the big boys.
  • To battle smartphone location-tracking, Avid Life has released a new privacy application called iWipe. Completely free to download and use, iWipe not only erases an iPhone's entire location history, it also prevents future tracking.
  • At present, you need a Mac to download and use iWipe (it is not a straight phone app) and then sync your phone to your Mac. A Windows version has been announced as well (it was due for last week, but has not yet been released as of press time). Avid Life is also considering versions of the iWipe utility for other smartphone platforms, such as Google’s Android (which also geo-tracks its users).
  •  
    Here's an app that wipes clean all location history off of iPhones. It may come out with one for android.
D'coda Dcoda

Netflix Isn't Swamping the Internet [20May11] - 0 views

  • "Remember the Sandvine report from earlier this week that said Netflix gobbles up 30% of Internet traffic during peak hours? It needs clarification on a couple of important points, says blogger Kevin Fogarty. First, yes, Netflix traffic spikes during prime time, but only across the last mile. Second, ISPs underestimate what a 'normal' level of Internet use really is. 'When AT&T announced its data caps – 150GB per month for DSL users and 250GB for broadband – it called the data levels generous and said limits would only affect 2 percent of its customers. It turns out Netflix users take up an average of 40GB per month just from streaming media, according to a different Sandvine report (PDF).'"
D'coda Dcoda

Valve's Newell: One-Price-For-Everyone Business Model 'Broken' [17May11] - 0 views

  • Fysx writes with recent comments from Valve co-founder Gabe Newell about how he thinks the traditional video game business model is flawed: "The industry has this broken model, which is one price for everyone. That’s actually a bug, and it’s something that we want to solve through our philosophy of how we create entertainment products. What you really want to do is create the optimal pricing service for each customer and see what’s best for them. We need to give customers, all of them, a robust set of options regarding how they pay for their content. An example is – and this is something as an industry we should be doing better – is charging customers based on how much fun they are to play with. Some people, when they join a server, a ton of people will run with them. Other people, when they join a server, will cause others to leave. We should have a way of capturing that. We should have a way of rewarding the people who are good for our community."
  •  
    Suggests pricing for video games ought to be based on how much fun someone is to play with.
D'coda Dcoda

Kaspersky Calls For 'Internet Interpol' [18May11] - 0 views

  • "With cybercrime now the second largest criminal activity in the world, measures such as the creation of an 'Internet Interpol' and better cooperation between international law enforcement agencies are needed if criminals are to be curtailed in the future, Kaspersky Labs founder and security expert Eugene Kaspersky has argued. He said, 'We were talking about that 10 years ago and almost nothing has happened. Sooner or later we will have one. I am also talking about Internet passports and having an online ID. Some countries are introducing this idea, so maybe in 15 years we will all have it.'"
D'coda Dcoda

Robots Successfully Invent Their Own Language [18May11] - 0 views

  • "One group of Australian researchers have managed to teach robots to do something that, until now, was the reserve of humans and a few other animals: they've taught them how to invent and use spoken language. The robots, called LingoDroids, are introduced to each other. In order to share information, they need to communicate. Since they don't share a common language, they do the next best thing: they make one up. The LingoDroids invent words to describe areas on their maps, speak the word aloud to the other robot, and then find a way to connect the word and the place, the same way a human would point to themselves and speak their name to someone who doesn't speak their language."
D'coda Dcoda

Twitter permission change hurts third-party mobile apps [21May11] - 0 views

  • Twitter is updating its authentication system to give users more control over how third-party applications can access their accounts. Applications will now have to explicitly request additional permission from the user during the authentication process in order to send and receive direct messages on behalf of the user. At first glance, the change seems like a welcome improvement to the Twitter APIs. Support for granular permission tiers is one of the technical advantages of authority delegation systems like OAuth
  • Twitter's approach to implementing the feature comes with some serious problems for third-party client implementors
  • The OAuth standard was originally intended to enable server-to-server authentication for limited third-party access to non-public APIs. It is poorly suited for open APIs with an arbitrary number of independent third-party applications. More significantly, it doesn't address the needs of desktop and mobile authentication at all. Despite the significant limitations of the standard, it is being adopted and mandated by a number of social networking services, including Twitter.
  • ...2 more annotations...
  • OAuth authentication process must be carried out in a Web browser and involves a series of redirects: a third-party site sends the user to the Twitter website to log in and approve access and then Twitter redirects the user back to the initiating third-party site and appends a token that the third-party site can extract and use to identify the user to Twitter. The advantage of this system is that the third-party site never gets the user's actual password, just a revokeble token
  • The obvious problem with this system is that the redirect dance doesn't work for native non-web applications.
D'coda Dcoda

Apple Support Forums Suggest Malware Explosion [18May11] - 0 views

  • "According to ZDNet, the volume of in-the-wild malware reports on discussions.apple.com is truly exceptional. With the launch of the first malware DIY kit for OS X earlier this month, and now this, has the malware industry threat finally caught up with the growth of Apple, and what do Mac users need to do?"
« First ‹ Previous 121 - 140 of 181 Next › Last »
Showing 20 items per page