Skip to main content

Home/ Open Intelligence / Web 3X (Social + Mobile)/ Group items tagged risk

Rss Feed Group items tagged

Jan Wyllie

Mobile phones 'more dangerous than smoking' [30Mar08] - 0 views

  • Mobile phones could kill far more people than smoking or asbestos, a study by an award-winning cancer expert has concluded. He says people should avoid using them wherever possible and that governments and the mobile phone industry must take "immediate steps" to reduce exposure to their
  • radiation.
  • It draws on growing evidence – exclusively reported in the IoS in October – that using handsets for 10 years or more can double the risk of brain cancer. Cancers take at least a decade to develop, invalidating official safety assurances based on earlier studies which included few, if any, people who had used the phones for that long
  • ...1 more annotation...
  • Noting that malignant brain tumours represent "a life-ending diagnosis", he adds: "We are currently experiencing a reactively unchecked and dangerous situation." He fears that "unless the industry and governments take immediate and decisive steps", the incidence of malignant brain tumours and associated death rate will be observed to rise globally within a decade from now, by which time it may be far too late to intervene medically.
Dan R.D.

Part 2 - Facebook, Google: Welcome to the new feudalism [10Sep11] - 0 views

  • Local data Alec Muffett is working on a scheme called the Mine Project. This aims to give consumers a local place to store their credentials and sensitive data, so they can choose which services they want to expose the data to.
  • "I believe the structure of the internet encourages individuals to host their own data. In some ways, it's a little unfortunate that everyone thinks it's easier to have a big company do it on their behalf, but it's entirely understandable," he says.
  • "It's a karmic cycle," he says. But sooner or later it is going to swing the other way, and people should prepare for an age when their data is once again their own, he argues.
  • ...1 more annotation...
  • There are some steps people can take to counter the castles and keep their data mobile. If you use Twitter, then cross-post your tweets to Identi.ca. With Facebook, do the same with Diaspora. With Google, keep a log of all your search recommendations. If people keep control of the data they put into the world, they will be able to search it themselves as the social networking providers do. An open-source revolution could decentralise the data and bring the castles down.
Dan R.D.

Facebook, Google: Welcome to the new feudalism [10Sep11] - 0 views

  • In the modern web, Google and Facebook are the feudal lords and people are the peasants — at least when it comes to control of the photos, comments, 'likes' and other data that each person posts online.
  • "The users contribute their own content to you for free. You sell it back to them with banner ads put on there. And on top of that, you spy on them to gather profiling data," says Michiel de Jong, of the Unhosted project to decentralise user data.
  • As your friends talk to each other, they feed Facebook data about how information flows between its users. It's likely that your friends will have their own friends and will talk to them as well. Every time these first- and second-level contacts interact, it gives Facebook more pointers to where you fit within your network. To you, it's a bunch of your mates; to Facebook, it's an expanding cloud of data to be harvested.
  • ...5 more annotations...
  • According to Metcalfe's Law, the value of a communications network is proportional to the number of users connected to the system.
  • Mistrust People mistrust this handing over of their data, in much the same way IT managers have concerns about uploading their enterprise's data into the cloud, or web users have misgivings about Gmail and Yahoo automatically scanning their emails.
  • Privacy concerns Meanwhile, Facebook has responded to people's concerns about their privacy on its network by providing more tools for adjusting privacy settings. This does not go far enough, according to de Jong. Read this Why Google+ may change the web for good Read more "If a building company put up a tollway and made drivers cede ownership of their cars whenever on that tollway, the traditional justice system would prohibit that," he argued. "Yet this is exactly what is happening on the 'information highway', and the situation is largely overlooked by justice departments, who still live largely in a brick-and-mortar world."
  • Methods of controlWhat makes this modern feudalism powerful is that the key parties are keeping their methods of control from the users.
  • Neither company openly gives details to users about how their data is being used. We never see inside Google's algorithms, or gain a view of how our connections interweave with every other person on Facebook, but their services see all.
Dan R.D.

The Agile Model comes to Management, Learning, and Human Resources [17Sep11] - 0 views

  • This agile model (which is now well known in Silicon Valley and in the software engineering world) has transformed software.  It has many benefits:  it reduces the long cycle times that create risk; it enables engineers to take advantage of the fact that requirements change quickly; and it honors the fact that people perform best when they work on small projects they can finish quickly.
  • Agile is also built on the understanding that people learn in small chunks - so while it may in fact take a year or two to build a highly complex website, no person needs to try to understand the entire engineering program in advance.  And as the image on the right shows, daily work becomes a part of a bigger project in a continuous, dynamic process.
  • Look at where Agile fits in Management and HR:
  • ...8 more annotations...
  • Traditional annual performance appraisals use an older "waterfall" method - continuous feedback and recognition is an "agile" approach.
  • Traditional formal training and certification is a "waterfall" model -  rapid e-learning and informal learning is an "agile" approach.
  • Top down cascading goals are a "waterfall" approach - rapidly updated "objectives and key results" (sometimes called OKR - widely used at Google) is an "agile" model.
  • Traditional annual rewards and bonuses are a "waterfall" model - continuous recognition and social recognition systems are an "agile" model.
  • The annual employee engagement survey is a "waterfall" model - continuous online idea factories and open blogs are an "agile" model for employee engagement.
  • The annual development planning process is a "waterfall" model - an ongoing coaching relationship is an "agile" model for leadership.
  • The traditional recruiting process is a "waterfall" model - this is being replaced by a continuous process of social recruiting and referral-based recruiting which can be rolled out in a few hours.
  • Consider what has happened to the corporate training industry.  While formal education and training has not disappeared, today people want to learn "on the job" through informal and social networks on a real-time basis.  This is a form of "agile learning"
Dan R.D.

Why an Amazon tablet can rival the iPad - TNW Mobile - 0 views

  • Without so much as a whisper from the retailer itself, Amazon’s Android tablet is heading our way. Rumoured to launch at the end of the third quarter in time for the holiday season, Amazon is hoping it can steal a little of Apple’s thunder and steal a little of its market share.
  • Amazon’s decision to launch an Appstore was a surprising one, especially because there was no shortage of alternative Android marketplaces at the time. Incorporating its patented recommendation system and its “Free App A Day”, the third-party application store won many fans in the US primarly because it has been providing customers with downloads of some of the most popular Android apps and games.
  • Amazon is one of, if not the world’s number one Cloud storage and service provider and is seen by many to have led the march towards the Cloud, with affordable and reliable online services that even the most bootstrapped startups could afford. Asserting itself in the hosting market has helped the company make the best of its other web-based services, namely online music downloads and its new Android Appstore.
  • ...7 more annotations...
  • Amazon’s DRM-free downloads are not only be cheaper but they will work on a range of different devices – including an iPod – so if a tablet buyer has music on the mind, an Amazon tablet would be a good place to start, after-all it’s a brand trusted by millions all over the world.
  • Amazon, despite not having a device to backup to its Cloud, pipped Apple to the punch with the launch of the Amazon Cloud Player. The service isn’t necessarily revolutionary (it requires a user to upload their entire music collection to an online digital locker or synchronise new Amazon MP3 purchases), but it provides a dedicated storage platform for a user’s music, regardless of where they bought it. In fact, users can upload any file they wish to the service.
  • Apple’s closest competitor in the mobile industry is Google, a company that develops and maintains the fastest growing mobile operating system on the planet. But even Google was forced to admit that its Honeycomb operating system was not up to standard, having previously condemned vendors for creating tablet devices that ran Android builds that were specifically tailored for smartphones.
  • Because Google has restricted the use of alternative apps on its operating system, Amazon requires the user to download the app to their smartphone or their tablet before they can browse or download apps. This poses a risk for the company in the general market but if it intends on releasing its own tablet, it can bundle the necessary software (including its MP3 store and Cloud Player service) before the device is even powered-on by its owner.
  • In July the previous year, Amazon announced that Kindle books had passed hardcovers and predicted that Kindle would surpass paperbacks in the second quarter of this year. According to Jeff Bezos, for every 100 hardcover books Amazon was selling, it was selling 143 Kindle eBooks. In just the U.S. Kindle Store alone, there were more than 810,000 books.
  • Kindle fans worried that Amazon would kill its e-ink reader, don’t worry. Amazon CEO Jeff Bezos has already said “we will always be very mindful that we will want a dedicated reading device.” Throughout the article I have referred to the Amazon tablet as a singular. However, there it is highly likely that Amazon will release a family of tablets; one a 10-inch model and a smaller, more portable 7-inch tablet. Chinese sources have indicated that both devices will sport LCD touchscreens, but in the very near future will move to technologies that will be able to switch between e-ink and a colour LCD screen.
  • Analysts have already issued reports suggesting Amazon will sell 2.4 million tablets in 2012. Whilst that figure doesn’t even compete with the 10-12 million iPads that Apple is expected to sell in its third quarter alone, Amazon has time on its side. By subsidising its devices, it can heavily reduce its offerings to get customers investing into its technologies, hitting them with the upsell once they are onboard. Amazon can push its value-added services to boost revenues, whilst slowly building sales of physical devices.
Dan R.D.

The Internet of Things and the cloud [09Oct11] - 0 views

  • We are in the early stages of the Internet of Things, the much anticipated era when all manner of devices can talk to each other and to intermediary services. But for this era to achieve its full potential, operators must fundamentally change the way they build and run clouds. Why? Machine-to-machine (M2M) interactions are far less failure tolerant than machine-to-human interactions. Yes, it sucks when your Netflix subscription goes dark in a big cloud outage, and it’s bad when your cloud provider loses user data. But its far worse when a fleet of trucks can no longer report their whereabouts to a central control system designed to regulate how long drivers can stay on the road without resting or all the lights in your building turn out and the HVAC system dies on a hot day because of a cloud outage.
  • The current cloud infrastructure could crumble under the data weight In the very near future, everything from banks of elevators to cell phones to city buses will either be subject to IP-connected control systems or use IP networks to report back critical information. IP addressability will become nearly ubiquitous. The sheer volume of data flowing through IP networks will mushroom. In a dedicated or co-located hardware world, that increase would result in prohibitively expensive hardware requirements. Thus, the cloud becomes the only viable option to affordably connect, track and manage the new Internet of Things.
  • That is critical, in turn, to mitigate growing latency risks for mobile connectivity resulting from the wild proliferation of IP enabled devices on mobile networks coming in the new era of the Internet of Things.
  • ...1 more annotation...
  • Because on the Internet of Things, no one can blame it on user error and simply ask a hotel air conditioner, an airplane, or a bank of traffic lights to restart their virtual server on the fly and reset their machine image.
Dan R.D.

And Now You Have One More Reason To Ignore QR Codes [21Oct11] - 0 views

  • canning that mysterious QR code sticker that someone stuck on the wall in a tame but oh-so-technophilic act of modern vandalism.
  • Instead, the nasties are using QR codes to lure people into downloading Android malware. While some users are likely to assume that QR codes are unique to the Android market and thus be comfortable scanning them, these codes actually take you to an Android install package hosted on some third-party server. The QR code itself isn’t bad — but the link it’s obfuscating is.
  • Once downloaded, the dirty app (which, in the most recent case, was a hacked version of the Russian ICQ client, Jimm) begins firing off text messages to a premium number. Each text it sends (without your knowledge) sets you back around $5+. You can find an outline of the method by Kaspersky Labs here.
  • ...1 more annotation...
  • It’s not hard to imagine how this concept could get nasty quick. Users, for the most part, would trust a QR code the same way they just a link on a company’s own website. Take a QR-enabled ad on a public wall, for example; how simple would it be for the “hacker” to simply slap a sticker of his nefarious QR code on top of yours? Would anyone notice?
Dan R.D.

App Turns iPhone Into spiPhone: Scientific American Podcast [26Oct11] - 0 views

  • Used to be if spies wanted to eavesdrop, they planted a bug. These days, it's much easier. Because we all carry potential bugs in our pockets—smartphones. One team of researchers used an iPhone to track typing on a nearby computer keyboard with up to 80 percent accuracy.
  • The researchers designed a malicious app for the iPhone 4. When you place the phone near a keyboard, it exploits accelerometer and gyroscope data to sense vibrations as the victim types—detecting whether keystrokes come from the left or right side of the keyboard, and how near or far subsequent keys are from each other. Then, using that seismic fingerprint, the app checks a pre-created "vibrational" dictionary for the most likely words—a technique that works reliably on words of three letters or more.
Dan R.D.

Coming Soon to a Bank Near You: Cloud Computing [02Nov11] - 0 views

  • The financial services industry is warming up to the idea of using the cloud for some of its critical computing needs. More than half of bank transactions will be supported by cloud-based infrastructure and software by 2015, according to a recent report from Gartner.
  • That is the expectation of about 39% of financial services CIOs worldwide, according to the survey. In Europe, the Middle East and Africa, 44% of CIOs for banking firms expect that more than half of their institutions' transactions will take place via infrastructure that lives in the cloud, and 33% expect most of them will be processed using some type of SaaS application.
  • For banks, the cloud can offer far greater computing power and scalability. Migrating critical operations there won't be without its risks, however. Security and stability are always a concern when moving to the cloud, and that's especially true when highly sensitive data like financial transactions are involved. It simply requires that systems are architected in a secure and fail-proof way.
  • ...1 more annotation...
  • As Gartner Managing Vice President Peter Redshaw summed it up, "Successful new cloud services can displace the existing and dominant process for design, distribution or transacting in a disruptive way, rather than just incrementally improving them."
Dan R.D.

Study confirms dangers of violent video games | Machines Like Us [02Nov11] - 0 views

  • New research by Dr Brock Bastian from UQ's School of Psychology has found evidence that playing violent video games leads players to see themselves, and their opponents, as lacking in core human qualities such as warmth, open-mindedness, and intelligence.
  • In a recently published paper in the Journal of Experimental Social Psychology, Dr Bastian and his co-authors looked at whether the experience of cyber-violence had dehumanising consequences for the self-concept of game players and well as their opponents.
  • Dr Bastian said given his findings, it was not surprising that many people were concerned about the effects of playing violent video games, especially when they appeared to reflect changes in people's behaviour, emotions, and cognitions in ways consistent with a loss of humanity.
  • ...1 more annotation...
  • "There are good reasons to be concerned: the negative effects of violent video games have been well documented and appear to be more significant than those associated with other forms of violent media," he said.
Dan R.D.

Selected Interactive Graphics - The New York Times - 0 views

  • 2008 Elections From the Jan. 3 Iowa caucuses to the Nov. 4 general election, information graphics were a major component of the New York Times election coverage. Interactive maps on the nytimes.com home page and inside the web site were rich with information, but easy to navigate.
  • 2008 Olympics Coverage In August 2008, The New York Times graphics department published more than 30 interactive graphics covering subjects ranging from the Olympic torch to the medal count. The package included graphics produced in advance of the games, plus more than a dozen produced on deadline analyzing results from a vareity of events. Because NBC tape-delayed the showing of many events, these graphics frequently were readers' first visual picture of how a race was won.
  • Flight 1549 Lands in the Hudson River When U.S. Airways Flight 1549 made an emergency landing in the Hudson River, graphics editors immediately began reporting what happened in the air, building 3-D models of the plane and developing an interactive graphic. The graphic was initially published the same day as the emergency landing, and updated over the next several days as more information was released. Published Jan. 15, 2009
  • ...7 more annotations...
  • Inaugural Words An interactive graphic published this January shows the number of times words were used in inaugural speeches. Readers could view the use of the word in context, and then read the entire speech, or compare the words used by every president to date. Published Jan. 17, 2009
  • Twitter Chatter During the Super Bowl Using data gathered from Twitter's API, this mash-up shows what words people around the country were tweeting minute-by-minute as the Cardinals and Steelers battled it out on the field. Published Feb. 2, 2009
  • Where Immigrants Settled An interactive map shows where immigrant groups settled across United States over the last century. Readers can drill into more than 20 different immigrant groups and see the number who lived in each county in the U.S. at the time of every census since 1880. Published March 10, 2009
  • The Year in Markets An interactive graphic produced for the nytimes.com home page explains how 2008 became a dismal year for the financial markets. Published Dec. 31, 2009
  • Mapping Parking Tickets A interactive graphic mashes up data on the number of parking tickets given on each of 80,000 blocks in New York City with a Google street map. Published Nov. 28, 2008
  • The Danger of Digging Deeper An information graphic explains the risks involved in a new project that attempts to harvest geothermal energy from hot bedrock in an area prone to earthquakes. Published June 23, 2009
  • Failed Prostate Procedures An interactive graphic explains how brachytherapy — a procedure to treat prostate cancer — is commonly performed, and how a cancer unit at the Philadelphia V.A. botched 92 of 116 procedures. Published June 20, 2009
« First ‹ Previous 81 - 91 of 91
Showing 20 items per page