Skip to main content

Home/ Open Intelligence / Web 3X (Social + Mobile)/ Group items tagged research

Rss Feed Group items tagged

D'coda Dcoda

Exploitation and Amazon's Mechanical Turk [26May11] - 0 views

  • Since 2007, the US federal minimum wage has been set at $7.15 an hour, yet workers on Amazon’s Mechanical Turk—many of whom live in the US—make an average of $2 (according to the estimates of Mechanical Turk researcher Alex Quinn).  As illustrated in the above image, Amazon, itself, encourages businesses (at least implicitly) to pay workers (or “turkers” as they are called) less-than-minimum wages.  Moreover, to even qualify for these low-paying tasks called HITs (Human Intelligence Tasks), turkers are often expected to complete unpaid training sessions that can last for up to an hour.  Also, because turkers receive micro-payments for each task and because the time to completion for each task is rationalized to the second, turkers receive no pay during normal periods of rest during the workday.
  • Mechanical Turk is a crowdsourcing platform that allow anyone to recruit laborers for short online tasks, which cannot be effectively completed by computers.  For examples, turkers might compile contact information for various businesses, sort through images and tag offensive ones, or participate in university research experiments.  Because of the piecemeal and spatially-disembedded nature of the work, it is virtually unregulated. Can we simply dismiss this subversion of labor laws—as some commentators have—on the grounds that “$2 an hour is a decent wage in India?”  Even if we are angered by this exploitation of turkers, is it even possible to regulate an international platform of this sort?
  •  
    Crowdsourcing problem
D'coda Dcoda

Verifying Passwords By the Way They're Typed [19May11] - 0 views

  • "There are good passwords and bad passwords, but none of them are totally secure. Researchers at the American University of Beirut, Lebanon, are working on strengthening an approach to password security that's not just about what you type, but how you type it (abstract)." Note that the actual paper appears to be behind some crappy paywall: hopefully the research exists elsewhere on-line.
D'coda Dcoda

A significant security hole has been discovered in Google's Android operating system [2... - 0 views

  • A significant security hole has been discovered in Google’s Android operating system for smartphones, which can allow attackers to gain access to users’ personal information without their permission. The flaw, which was discovered by three research assistants at Ulm University in the southern part of Germany, affects approximately 97% of Android users. In a recent blog post, the researchers found that users of Android devices running versions 2.3.3 and below could be susceptible to attack when they are connected to unencrypted Wi-Fi networks. Anyone else on that network could gain access to, modify or delete Android users’ calendars, photos and contacts.
Jan Wyllie

Next time with feeling - Sentiment Analysis hocum [20Jun11] - 0 views

  • The data that twitter can supply is good for basic mentions, the basic smell of the situation - just not it's meaning -good/ bad, action required, not required. It's a canary in the mine, but it can't tell you what gas it is. This what many brand/ marcomms research dashboards supply - but many aren't optimised for the 'now take action' moment - they are mostly like webcams of rivers - an ongoing situation goes on. What does work is smart , linguistics trained researchers, alerted by flagged moments in data inputs, then raking through data/ tweets to find meaning. Machines are useful for sorting these out but real meaning comes from human analysis still. Your engineers could help by writing some scripts that help the sifting/ alerting. Everywhere data is used for analysis, a human is required for the real interpretation. The robots just aren't that smart yet.
Dan R.D.

Networks Dominated By Rule Of The Few [04Jun11] - 0 views

  • It’s like a Hollywood political thriller come true: a handful of people lurking in the shadows, controlling the minds of millions. New research reveals that it’s possible for a few individuals to enslave an entire network, even if they aren’t highly connected themselves.Scientists have figured out how to identify the nodes — the points that link to other points in a network — that when tweaked can control the entire network. The research, published in the May 12 Nature, might lead to more secure power grids, tricks for controlling the metabolic processes of cells and marketing campaigns that spread like the plague.
Dan R.D.

How This Guy Is Making Your iPhone Virtually Human [17Sep11] - 0 views

  • Today, your iPhone is a gadget, a mere consumer appliance. But your future iPhone will become increasingly human. You’ll have conversations with it. The phone will make decisions, prioritize the information it presents to you, and take action on your behalf — rescheduling meetings, buying movie tickets, making reservations and much more.
  • In short, your iPhone is evolving into a personal assistant that thinks, learns and acts. And it’s all happening sooner than you think,
  • Ultimately, however, human beings are hard-wired to communicate with other people, not computers. And that’s why the direction of interface design is always heading for the creation of artificial humans.
  • ...6 more annotations...
  • There are four elements to a machine that can function like a person: 1) speech; 2) decision-making algorithms; 3) data; and 4) “agency,” the ability to act in the world on your behalf.
  • For speech, Apple has maintained a long-standing partnership with the leading company. A version of iOS 5 with Nuance Dictation has reportedly been sent out to carriers for testing.
  • For decision-making algorithms, Apple can rely on the amazing technology it purchased in April, 2010, when it bought Siri, a company that created a personal-assistant application that you talk to, and it figures out what you want.
  • The most expensive, ambitious and far-reaching attempt to create a virtual human assistant was initiated in 2003 by the Pentagon’s research arm, DARPA (the organization that brought us the Internet, GPS and other deadly weapons).
  • The project was called CALO, for “Cognitive Assistant that Learns and Organizes,” and involved some 300 of the world’s top researchers.
  • The man in charge of the whole project was a brilliant polymath who worked as senior scientist and co-director of the Computer Human Interaction Center at SRI, Adam Cheyer (pictured above).
Dan R.D.

Cracking the code of mobile advertising [22Jun11] - 0 views

  • Mobile advertising revenue reached $700 million in the U.S. in 2011, according to Gartner research group. That’s a drop in the ocean compared to Internet ad revenue, which hit $7.3 billion in just the first quarter of 2011, according to figures from the Interactive Advertising Bureau and PricewaterhouseCoopers.
  • Concerns about privacy, tracking and the disclosure of personal information could limit the number of people opting in to targeted or local ad mobile campaigns, said Jason Koslofsky, an attorney who specializes in consumer privacy and telecommunications at Arent Fox. Businesses have also been hesitant for these same reasons. “It hurts brands if it looks as though they are generating spam,” Koslofsky said, adding,“companies shouldn’t want to be seen as though they are tracking their users’ every move.”
  • While 9% of adults in the U.S. said they would use their phones to learn about in-store promotions or event, interest in location-based offers was low, according to a report in February by Forrester Research. Only 6% of adults in the U.S. said that they are interested in receiving location-based retail offers on their mobile phones and only 4% are interested in receiving time-sensitive promotions such as daily specials.
Dan R.D.

Drawing Power From Electromagnetic Fog [09Jul11] - 0 views

  • Powering remote sensors, which are seen as the key to the future “Internet of Things”, is a problem. Given that sensors may well be embedded, long-life power sources are essential; you don’t want to be changing AA batteries every few months on the predicted 50 billion devices that will be connected to the net. Now U.S. researchers have devised a way of tapping into the energy found in the fog of electromagnetic energy that envelops us all; a fog caused by radio and TV signals, mobile phone transmissions, even domestic WiFi. The researchers have already successfully operated a temperature sensor, according to reports by PhysOrg.
Dan R.D.

Predicting future technology: ask the children, study urges [06Jun11] - 0 views

  • a new study conducted and released by Latitude, a technology research consultancy, published in collaboration with ReadWriteWeb. The study’s main takeaway message: “kids are predicting that the future of media and technology lies in better integrating digital experiences with real-world places and activities. They’re also suggesting that more intuitive, human-like interactions with devices, such as those provided by fluid interfaces or robots, are a key area for development.”
  • Researchers scored the kids’ inventions on the presence of specific technology themes, such as type of interface, degree of interactivity, physical-digital convergence and user’s desired end-goal.
  • The Digital vs. Physical Divide is Disappearing: Children today don’t neatly divide their virtual interactions from their experiences of the “real world.” For them, these two realms continue to converge as technologies become more interactive, portable, connected and integrated.
  • ...3 more annotations...
  • “They naturally think about a future in which traditionally ‘online’ interactions make their way into the physical world, and vice versa – a concept already playing out in augmented reality, transmedia storytelling, the Internet of Things, and other recent tech developments.”
  • Why Aren’t Computers More Human? The majority of kids (77%) imagined technologies with more intuitive modes of input (e.g., verbal, gestural, and even telepathic), often capable of human-level responsiveness, suggesting that robots with networking functionality and real-time, natural language processing, could be promising areas of opportunity for companies in education, entertainment, and other industries
  • Technology Improves and Empowers: Instant access to people, information and possibilities reinforces young users’ confidence and interest in self-development. One-third of kids invented technologies that would empower them by fostering knowledge or otherwise “adult” skills, such as speaking a different language or learning how to cook.
Dan R.D.

Google Invests In Stealth Startup That Aims To 'Accelerate Science' [07Jul11] - 0 views

  • Google Ventures has quietly invested in a stealth startup called Wingu, reports StrategyFacts (subscription required). Indeed, while the Google Ventures website lists four career opportunities for one of its portfolio companies located in Cambridge, Massachusetts without naming Wingu, the stealth startup published the exact same job openings on its job board, leaving nothing to the imagination. Wingu is building a enterprise-grade cloud platform dubbed Elements that will enable research teams to collaborate more effectively and use data in ‘new ways’. Here are the four main selling points of Wingu’s platform, according to its website: MANAGE: Unify your cross-discipline teams on a common platform to share data and ideas. ANALYZE: Drive decision-making with our analytical workflows and discovery tools. SHARE: Connect your researchers across silos and geographical divides for better collaboration, coordination and communication. PROTECT: Breathe easy knowing that your data is backed and protected by leading systems and security experts.
Dan R.D.

Conductive nanocoatings for textiles could lead to thin, flexible electronics [08Jun11] - 0 views

  • Not long ago, we reported on a prototype thin, flexible smartphone known as the Paperphone. While it isn't actually made out of paper, the success of a research project at North Carolina State University indicates that phones in the future could be. Scientists there have been able to deposit conductive nanocoatings onto textiles, meaning that items such as pieces of paper or clothing could ultimately be used as electronic devices.
  • smart fabrics.
  • "Research like this has potential health and monitoring applications since we could potentially create a uniform with cloth sensors embedded in the actual material that could track heart rate, body temperature, movement and more in real time," said Dr. Jesse Jur, NCSU assistant professor of textile engineering, chemistry and science, and lead author of a paper on the technology. "To do this now, you would need to stick a bunch of wires throughout the fabric - which would make it bulky and uncomfortable."
Dan R.D.

Smart Phones Could Hear Your Password [18Oct11] - 0 views

  • The sensors inside modern smart phones present a range of security threats. An attacker who compromises a phone can, for example, track the owner's location by GPS, use the camera to see the phone's surroundings, or turn on its microphone to record conversations. At a conference in Chicago on Thursday, a group of computer researchers from Georgia Tech will report on another potential threat. The researchers have shown that the accelerometer and orientation sensor of a phone resting on a surface can be used to eavesdrop as a password is entered using a keyboard on the same surface. They were able to capture the words typed on the keyboard with as much as 80 percent accuracy.
Dan R.D.

How IT Can Empower Your Employees [25Oct11] - 0 views

  • What do smartphones, tablets, and self-service business information tools have in common? All three are on high-growth trajectories for enterprise adoption. In a new report issued last week by Forrester Research called called TechRadar For Enterprise Architecture Professionals: Technologies For Empowered Employees, Q4 2011, it shows how these and others have taken over the enterprise. It is the classic IT problem. As Gene Leganza writes in the introduction, "Mobile, social, video, and cloud technologies give individuals tremendous access to information and resources. Employees can become the best source of innovation and the breakthrough ideas that CxOs are hungry for. But as employees become empowered, central IT begins losing control of the technology strategy."
Dan R.D.

US Trails China In Almost Every Mobile Usage Trend [24Oct11] - 0 views

  • Mobile device usage has spread across the globe. In terms of mobile penetration, the United States is actually on the lower end of the worldwide spectrum, with only 77% cellular device ownership. That seems counterintuitive to the way the U.S. views itself as the heart of mobile acceptance and innovation. It is China and other Asia-Pacific countries that really lead in mobile adoption. Research firm Forrester released a study last week showing global mobile usage trends. In almost every mobile usage aspect, metropolitan China and other Pacific Rim countries lead the way. That includes mobile social usage, work usage and multiple device ownership. Mobile is near an inflection point, changing the way people interact with information around the globe.
Dan R.D.

App Turns iPhone Into spiPhone: Scientific American Podcast [26Oct11] - 0 views

  • Used to be if spies wanted to eavesdrop, they planted a bug. These days, it's much easier. Because we all carry potential bugs in our pockets—smartphones. One team of researchers used an iPhone to track typing on a nearby computer keyboard with up to 80 percent accuracy.
  • The researchers designed a malicious app for the iPhone 4. When you place the phone near a keyboard, it exploits accelerometer and gyroscope data to sense vibrations as the victim types—detecting whether keystrokes come from the left or right side of the keyboard, and how near or far subsequent keys are from each other. Then, using that seismic fingerprint, the app checks a pre-created "vibrational" dictionary for the most likely words—a technique that works reliably on words of three letters or more.
Jan Wyllie

Social Scoring and Peer Influence | Geoff Livingston's Blog - 0 views

  • The highest scoring “influencers” like to think they deliver widespread impact with their followings. Every single book I’ve read by a blogger on influence claims this. In actuality, that influence lies closer to home. When real researchers parse influence we get a different story than the blogger myth propagated by social scoring. Instead, we see that true influence comes from those who are closest to us in our on and offline social networks, our peers.
  • But generally, their writings serve as a credibility point for readers, just like Consumer Reports, and nothing more. Why? Because relationships — true meaningful interactions beyond social platitudes (Like, love, you rock, etc.) — don’t scale after a certain point.
  • By selecting our friends, we’re also choosing to be influenced by their ideas, beliefs and behavior systems
Dan R.D.

Merging the Digital and Virtual Worlds | Product Design and Development - 0 views

  • Putting sensors and actuators in everything from homes and cars to shoes and coffee cups promises to make our daily lives easier, safer and more efficient. But such 'ambient intelligence' requires a merger of the virtual and digital worlds. EU-funded researchers in the Sensei project are bridging the gap and their results are already leading to 'smart cities' being set up all over Europe.
  • 'Today, the internet world is a virtual world of data mostly stored and accessed from servers,' says Dr Hérault. In the future, we will have an 'Internet of things' in which a multitude of things in the real, physical world will be digitised continuously: in many situations, we won't just be asking web servers for data, we will be asking sensors in everyday objects for data, he suggests. 'We need to understand how best to interconnect the real world and the virtual world.' 
  • An open service interface that uses semantic information to process data means that information is accessible and understandable to both humans and machines.  'You could ask, for example, "What is the temperature on Oxford Street?" The system would decode that semantic information, access sensor networks on Oxford Street that have temperature sensors, check the reliability of each network with regard to information quality, and return an answer,' Dr Hérault explains. 
  • ...4 more annotations...
  • Within the Sensei architecture, each sensor and actuator network is conceived as an 'island' that, through an interface middleware, can be connected to the overall system and can publish data independently of the technologies they are using or the type of information involved. An island could be a home, a bus station, a car or your own personal network of smart clothing and mobile devices. From a privacy and security perspective, each user is able to control which type of information they wish to share and with whom. 
  • 'If we are going to deploy billions of wirelessly interconnected sensors and actuators, the impact in terms of energy consumption and carbon footprint could become very significant. It is thus very important to develop sensors and actuators able to scavenge energy from their environment and communicate with ultra-low power energy consumption,' Dr Hérault says. 
  • Efficient sensors, operating within the Sensei architecture and coupled with technology developed in a parallel EU-funded project 'Wireless sensor network testbeds' (Wisebed), are already in the process of making their real world debut. As part of the 'SmartSantander' initiative, a follow-up project to Sensei, 12,000 devices are being deployed in the northern Spanish city of Santander over the coming year. In a first implementation they will be used to monitor available parking places and inform drivers about where there is space available, helping to smooth the flow of traffic in the city and reduce pollution. 
  • In this project, sensor and actuator networks will be set up in Santander to provide smart street lighting, dimming the lights to save energy when there is no one on the street, for example, and turning them up if some kind of incident or increased activity is detected. In Aarhus, the main focus will be to collect data about the water and sewage infrastructure, shape the information and use it in an intelligent and autonomous way. In Berlin, partners are working on the development of 'intelligent waste baskets' in order to optimise waste management. The Trento partners, meanwhile, are focusing on the development of intelligent water management in order to improve the utilisation of water for both drinking and energy generation in mountain areas. In Birmingham, transport infrastructure and services, including trams, buses, roads, cycle paths and walkways, will be optimised leading to streamlined transitions between modes, time saving and greater efficiency across the board. 
Marc-Alexandre Gagnon

PayByPhone adds NFC to Mobile Payments for San Francisco'​s 30,800 parking sp... - 0 views

  • PayByPhone, a leading international provider of systems for parking and urban mobility payments, has announced one of the largest deployments of near field communications (NFC) payment solutions in the world. The San Francisco Municipal Transportation Agency (SFMTA), which selected the PayByPhone mobile payment system for parking, is currently adding NFC-enabled stickers to the city's 30,800 parking spaces to give drivers the option to pay for parking with NFC-enabled mobile phones in addition to mobile apps and mobile web for regular phones. All parking meters continue to accept payment with coins.
  • The PayByPhone system, already deployed in the Castro district will be extended citywide as installation of the stickers is completed. The PayByPhone NFC sticker has a passive electronic chip that does not require a battery and stores information such as the parking space number that can be read wirelessly by any NFC-enabled phone.
  • Since each meter in San Francisco will have a PayByPhone sticker, users can simply wave or tap their NFC-enabled phones over the NFC sticker on the meter to automatically launch the parking application. The mobile payment system recognizes the user, identifies the individual parking location, and the driver enters the desired parking time to complete the transaction. The system then sends a text message reminder before the parking period expires, and if needed, allows additional time to be purchased by phone from any location (subject to time limit restrictions). A receipt is automatically sent to the user's email account. Payment is processed against a credit or debit card associated with the mobile phone number.
  • ...4 more annotations...
  • "This is one of the largest deployments of NFC technology in the United States and shows the practical benefits this technology can deliver in terms of ease of use and convenience. There has been a lot of hype around NFC recently and PayByPhone is pleased to now put the technology in the field for real world applications," said Neil Podmore, VP of Business Development at PayByPhone. "We expect this to help kick start the more widespread adoption and understanding of the practical benefits of NFC in 2012."
  • The installation of mobile electronic payment systems is already catching the imagination of cities and towns around the world. With a proven role of providing parking authorities with efficient, easier-to-manage and cost effective solutions also comes real-time data to fine tune parking policies and provide parking guidance systems.
  • Analyst firm Juniper Research predicted that consumers around the world could generate as much as $50 billion in sales through NFC-based mobile payments by 2014. The potential for this nascent technology is huge, according to Jupiter.
  • PayByPhone, the largest provider of payment systems for parking across North America, has ongoing contracts in more than 60 cities, towns and universities including Miami; Dallas; Vancouver, BC; London, Paris and now San Francisco, the largest installation in the United States. Worldwide, the company handles more than 55,000 transactions per day. The company experienced rapid growth in FY 2011, logging an estimated 8 million transactions over the first six month period.
Marc-Alexandre Gagnon

Wikitude Augmented Reality Browser Now Supports BlackBerry 6 Devices | N4BB - News for ... - 0 views

  • As part of BlackBerry Dev Con Asia taking place in Singapore right now, Wikitude has announced additional support for smartphones running on the BlackBerry 6. Bringing Wikitude to devices running BlackBerry 6 will help answer considerable demand expressed by users who want to experience Wikitude’s extensive content offering including more than 2,000 content Worlds consisting of approx. 150 million places around the globe. Users of the BlackBerry Bold 9700, 9780,9788 and BlackBerry Torch 9800 smartphones can download Wikitude on BlackBerry App World starting today.
  • After being crowned “The Most Addictive Social App Using the BBM Social Platform” at BlackBerry DevCon Americas in October, Wikitude most recently won the BlackBerry® EMEA Innovation Award for “Best BBM Connected App”, awarded in Alicante 1stDecember. “Extending the Wikitude platform to millions of BlackBerry 6 smartphone users will make the BBM experience richer than ever before. We are extremely happy to finally bring this version of Wikitude to even more BlackBerry smartphone users,” says Martin Herdina, Wikitude’s CEO.
  • Alec Saunders, VP Developer Relations, Research In Motion, said: “We’re delighted that Wikitude has integrated BBM support within their app. Integration with BBM can allow much greater viral discovery for apps, as well as enrich and transform the user experience with important social elements.”
  • ...1 more annotation...
  • About Wikitude Wikitude GmbH are the creators of the world’s first mobile augmented reality (AR) platform and the company behind the internationally renowned Wikitude World Browser for iOS, Android, Symbian, and BlackBerry devices. The browser has been voted “Best Augmented Reality Browser” by the readers of Augmented Planet for both 2009 and 2010. Wikitude is leading the international AR technology standardization as part of the Open Geospatial Consortium (OCG). More information on Wikitude here:www.wikitude.com
« First ‹ Previous 41 - 60 of 133 Next › Last »
Showing 20 items per page