Skip to main content

Home/ History Readings/ Group items tagged server

Rss Feed Group items tagged

Javier E

Fast food chains close dining rooms amid protracted labor shortage - The Washington Post - 0 views

  • Fast-food restaurants have a problem: Customers are returning but workers aren’t.And, increasingly, neither are their dining rooms.
  • broke? Or do I want to be broke working 40 hours a week and working my life away?’”
  • That’s 1,734,000 openings vs. an estimated 1,475,000 unemployed people, the Fed data shows.
  • ...17 more annotations...
  • For the industry to meet customer demand, restaurants would probably have to draw workers from other industries, but there are indications that the opposite is true. An analysis of job seekers’ search history data by the company review site Glassdoor found that people who used to search for “restaurant server” are now more likely to type in “office assistant,” “data entry” or “Amazon,” for example.
  • Fast-food wages historically trail those in other service industry jobs, with the typical U.S. worker collecting about $11.80 per hour or $24,540 a year as of May 2020,
  • Some current and former fast-food workers say labor shortages merely reflect the limited appeal of low-wage work that can be physically demanding and stressful, conditions that existed long before the pandemic.
  • some economists question the accuracy of the term “labor shortage” in this context, saying businesses are simply offering too low a wage for an hour’s work.
  • When I go shopping for an Audi and I can’t afford it, I don’t get to declare an Audi shortage,” said Erica Groshen, a labor economist with Cornell University. “At the wage being offered, businesses still aren’t getting as many applicants for work.”
  • “I think the problem is workers are being paid too little working full time. That’s the real scandal,” he said.
  • Of the nearly 10 million job openings in the United States, roughly 1 in 6 are in the leisure and hospitality sector that includes food service workers,
  • Nonsupervisory workers in the accommodations and food service sector made an average of $15.91 per hour as of August, according to the Bureau of Labor Statistics. In February 2020, they made an average of $14.46 per hour.
  • “The fact that nominal wages have been increasing so rapidly over the last several months is itself pretty strong evidence that businesses really are doing a lot to attract and retain workers. … The labor market is just really competitive,”
  • McDonald’s announced that it had raised its hourly rate to a range of $11 to $17 for entry-level workers, and $15 to $20 for managers.
  • one of the company’s locations in Hendersonville, N.C., recently increased its starting hourly wage to $19, for example.
  • For many fast-food establishments, the pandemic has accelerated a trend toward online and app-based ordering, and drive-through technology.
  • quarter — momentum that CEO David Gibbs said was underpinned by the Louisville-based company’s digital investments and “ability to serve customers through multiple on- and off-premise channels.”
  • McDonald’s also reported strong-second quarter gains, boosted by growth in its delivery and digital platforms and higher menu prices. U.S. sales were 25.9 percent higher than the same period in 2020 and 14.9 percent above where they were in a pre-pandemic 2019, the company said.
  • The average cost to close a restaurant to improve or add an advanced drive-through ranges from $125,000 to $250,000
  • drive-throughs account for about half of annual sales for all fast-food and fast-casual restaurants, or roughly $169 billion.
  • “One of other things they have done is turn all of us into the cashiers,” he said, pointing to restaurant apps, and touch-screen kiosks that have taken the place of some food service workers. “We did a study on automation and robotics and found that at least half could be replaced with robots or automation.”
Javier E

Accused document leaker Jack Teixeira fixated on guns and envisioned 'race war' - The W... - 0 views

  • “Jews scam, n----rs rape, and I mag dump.”Teixeira raised his weapon, aimed at an unseen target and fired 10 times in rapid succession, emptying the magazine of bullets.
  • Previously unpublished videos and chat logs reviewed by The Washington Post, as well as interviews with several of Teixeira’s close friends, suggest that he was readying for what he imagined would be a violent struggle against a legion of perceived adversaries — including Blacks, political liberals, Jews, gay and transgender people — who would make life intolerable for the kind of person Teixeira professed to be: an Orthodox Christian, politically conservative and ready to defend, if not the government of the United States, a set of ideals on which he imagined it was founded.
  • For Teixeira, firearms practice seemed to be more than a hobby. “He used the term ‘race war’ quite a few times,” said a close friend who spent time with Teixeira in an online community on Discord, a platform popular with video game players, and had lengthy private phone and video calls with him over the course of several years.“He did call himself racist, multiple times,” the friend said in an interview. “I would say he was proud of it.”
  • ...18 more annotations...
  • In the Black Lives Matter protests of 2020, Teixeira told friends that he saw a storm gathering. “He was afraid they would target White people,” his friend said. “He had told me quite a few times he thought they need to be prepared for a revolution.” The friend said Teixeira spoke approvingly of Kyle Rittenhouse, a teenager who shot three people, two fatally, during protests that summer in Kenosha, Wis., claiming that he had acted in self-defense
  • Teixeira wanted his online companions, many of them teenage boys, to “be prepared for things the government might do, reinforcing to them that the government was lying to them,”
  • Teixeira asserted that “lots of FBI agents were found to have sympathized with the Jan 6 rioters,” and he said naive members of the intelligence community, of which he was technically a part, had been “cucked.” He referred to mainstream press as “zogshit,” appropriating a popular white-supremacist slur for the “Zionist Occupied Government.” Friends said that during live video chats, Teixeira expounded on baseless accusations of shadowy, sinister control by Jewish and liberal elites, as well as corrupt law enforcement authorities.
  • Already united by their love of guns and their Orthodox Christian faith, two members of Thug Shaker Central said their nascent political beliefs became hardened and more polarized during the isolation of the pandemic. Unable to see their local friends in person, the young members spent their entire days in front of screens and came under the influence of outsize online figures like Teixeira. Some on the server saw him as an older brother — others, friends said, like a father figure.
  • In interviews, some of the members struggled to explain worldviews that had developed largely online, and expressed remorse. Several admitted they had become radicalized during the pandemic and were influenced by Teixeira, whose own politics seemed animated by social grievances and an obsession with guns.
  • The members may have sensed they were treading into dangerous political waters, even before leaked classified documents started circulating. During video chats, some hid their faces behind masks, fearful of being publicly identified with a group of self-professed bigots, Teixeira’s close friend said.
  • The interest in video games and conservative politics was accompanied by an acute obsession with violence, the friend said. “He would send me a video of someone getting killed, ISIS executions, mass shootings, war videos. People would screen-share it, and he would laugh very loudly and be very happy to watch these things with everyone else. He absolutely enjoyed gore.”
  • After he enlisted in the U.S. Air National Guard in September 2019, Teixeira also feared that his own racist and violent statements would jeopardize his chances of getting a security clearance. “He was worried something from Discord would come up during his interview,” said the friend, who met him when the application was still pending. Teixeira changed his online handle to an innocuous version of his surname and became “less active” in the community for a time, the friend added, in an effort not to create more incriminating evidence.
  • But Teixeira already had an offline record that arguably should have raised concerns for the officials who approved his security clearance. In March 2018, Teixeira was suspended from his high school “when a classmate overheard him make remarks about weapons, including Molotov cocktails, guns at the school, and racial threats,” according to a Justice Department filing last month that argued Teixeira should remain in jail while he faces charges under the Espionage Act stemming from his alleged leaks.
  • Teixeira’s close friend, who knew him after he had graduated high school, said he had confessed to wanting to take a gun to school and carry out a shooting.
  • “He had told me multiple times about when he was younger, his desire to shoot up his school,” the friend said. “He hated his school.”
  • “To my knowledge, he never hurt anyone physically, but he absolutely talked about it pretty often,” the friend added. Other friends confirmed Teixeira talked about attacking his school, but they said they didn’t take his threats seriously.
  • The YouTuber added that Discord deleted the civil-discussion channel on April 24 after “multiple members” received notices from the company.
  • Teixeira’s gaming and political cultures overlapped, the friend observed. “Once you start getting into the more niche video games, a lot of those communities are much more conservative. I think he found a small place where his views got echoed back to him and made them worse.”
  • The Post obtained previously unpublished screenshots from the server and recordings of members playing games together. Racist and antisemitic language flowed through the community, as did hostility for gay and transgender people, whom Teixeira deemed “degenerate.” The line between sarcasm and genuine belief became increasingly blurred. On video calls, users held up a finger, jokingly imitating members of ISIS. In their rooms were flags associated with Christian nationalism and white power.
  • Friends may not have taken seriously Teixeira’s threats against his high school. But he voiced approval of some shooters, particularly when they targeted people of different races and faiths. Teixeira was especially impressed by a gunman’s rampage at two mosques in Christchurch, New Zealand, in 2019, which left 51 people dead and 4o injured. “He was very happy that those people died,” the friend said, because they were Muslim. The shooter live-streamed his massacre as though he were in a video game.
  • “He was very against gun control. And so he would talk about wanting to kill ATF agents or when ATF agents would show up to his house, like theoretically preparing your house so that they would die in some strange trap.”
  • In arguing that Teixeira should remain in jail while he faces charges, federal prosecutors pointed to his threats of violence in high school. But among online communities whose members hold “more extremist conservative views,” the friend said, “it’s really common to joke about killing government agents like that, so it never seemed worrying to me.”
Javier E

Whistleblower: Twitter misled investors, FTC and underplayed spam issues - Washington Post - 0 views

  • Twitter executives deceived federal regulators and the company’s own board of directors about “extreme, egregious deficiencies” in its defenses against hackers, as well as its meager efforts to fight spam, according to an explosive whistleblower complaint from its former security chief.
  • The complaint from former head of security Peiter Zatko, a widely admired hacker known as “Mudge,” depicts Twitter as a chaotic and rudderless company beset by infighting, unable to properly protect its 238 million daily users including government agencies, heads of state and other influential public figures.
  • Among the most serious accusations in the complaint, a copy of which was obtained by The Washington Post, is that Twitter violated the terms of an 11-year-old settlement with the Federal Trade Commission by falsely claiming that it had a solid security plan. Zatko’s complaint alleges he had warned colleagues that half the company’s servers were running out-of-date and vulnerable software and that executives withheld dire facts about the number of breaches and lack of protection for user data, instead presenting directors with rosy charts measuring unimportant changes.
  • ...56 more annotations...
  • “Security and privacy have long been top companywide priorities at Twitter,” said Twitter spokeswoman Rebecca Hahn. She said that Zatko’s allegations appeared to be “riddled with inaccuracies” and that Zatko “now appears to be opportunistically seeking to inflict harm on Twitter, its customers, and its shareholders.” Hahn said that Twitter fired Zatko after 15 months “for poor performance and leadership.” Attorneys for Zatko confirmed he was fired but denied it was for performance or leadership.
  • the whistleblower document alleges the company prioritized user growth over reducing spam, though unwanted content made the user experience worse. Executives stood to win individual bonuses of as much as $10 million tied to increases in daily users, the complaint asserts, and nothing explicitly for cutting spam.
  • Chief executive Parag Agrawal was “lying” when he tweeted in May that the company was “strongly incentivized to detect and remove as much spam as we possibly can,” the complaint alleges.
  • Zatko described his decision to go public as an extension of his previous work exposing flaws in specific pieces of software and broader systemic failings in cybersecurity. He was hired at Twitter by former CEO Jack Dorsey in late 2020 after a major hack of the company’s systems.
  • “I felt ethically bound. This is not a light step to take,” said Zatko, who was fired by Agrawal in January. He declined to discuss what happened at Twitter, except to stand by the formal complaint. Under SEC whistleblower rules, he is entitled to legal protection against retaliation, as well as potential monetary rewards.
  • A person familiar with Zatko’s tenure said the company investigated Zatko’s security claims during his time there and concluded they were sensationalistic and without merit. Four people familiar with Twitter’s efforts to fight spam said the company deploys extensive manual and automated tools to both measure the extent of spam across the service and reduce it.
  • In 1998, Zatko had testified to Congress that the internet was so fragile that he and others could take it down with a half-hour of concentrated effort. He later served as the head of cyber grants at the Defense Advanced Research Projects Agency, the Pentagon innovation unit that had backed the internet’s invention.
  • Overall, Zatko wrote in a February analysis for the company attached as an exhibit to the SEC complaint, “Twitter is grossly negligent in several areas of information security. If these problems are not corrected, regulators, media and users of the platform will be shocked when they inevitably learn about Twitter’s severe lack of security basics.”
  • Zatko’s complaint says strong security should have been much more important to Twitter, which holds vast amounts of sensitive personal data about users. Twitter has the email addresses and phone numbers of many public figures, as well as dissidents who communicate over the service at great personal risk.
  • This month, an ex-Twitter employee was convicted of using his position at the company to spy on Saudi dissidents and government critics, passing their information to a close aide of Crown Prince Mohammed bin Salman in exchange for cash and gifts.
  • Zatko’s complaint says he believed the Indian government had forced Twitter to put one of its agents on the payroll, with access to user data at a time of intense protests in the country. The complaint said supporting information for that claim has gone to the National Security Division of the Justice Department and the Senate Select Committee on Intelligence. Another person familiar with the matter agreed that the employee was probably an agent.
  • “Take a tech platform that collects massive amounts of user data, combine it with what appears to be an incredibly weak security infrastructure and infuse it with foreign state actors with an agenda, and you’ve got a recipe for disaster,” Charles E. Grassley (R-Iowa), the top Republican on the Senate Judiciary Committee,
  • Many government leaders and other trusted voices use Twitter to spread important messages quickly, so a hijacked account could drive panic or violence. In 2013, a captured Associated Press handle falsely tweeted about explosions at the White House, sending the Dow Jones industrial average briefly plunging more than 140 points.
  • After a teenager managed to hijack the verified accounts of Obama, then-candidate Joe Biden, Musk and others in 2020, Twitter’s chief executive at the time, Jack Dorsey, asked Zatko to join him, saying that he could help the world by fixing Twitter’s security and improving the public conversation, Zatko asserts in the complaint.
  • The complaint — filed last month with the Securities and Exchange Commission and the Department of Justice, as well as the FTC — says thousands of employees still had wide-ranging and poorly tracked internal access to core company software, a situation that for years had led to embarrassing hacks, including the commandeering of accounts held by such high-profile users as Elon Musk and former presidents Barack Obama and Donald Trump.
  • But at Twitter Zatko encountered problems more widespread than he realized and leadership that didn’t act on his concerns, according to the complaint.
  • Twitter’s difficulties with weak security stretches back more than a decade before Zatko’s arrival at the company in November 2020. In a pair of 2009 incidents, hackers gained administrative control of the social network, allowing them to reset passwords and access user data. In the first, beginning around January of that year, hackers sent tweets from the accounts of high-profile users, including Fox News and Obama.
  • Several months later, a hacker was able to guess an employee’s administrative password after gaining access to similar passwords in their personal email account. That hacker was able to reset at least one user’s password and obtain private information about any Twitter user.
  • Twitter continued to suffer high-profile hacks and security violations, including in 2017, when a contract worker briefly took over Trump’s account, and in the 2020 hack, in which a Florida teen tricked Twitter employees and won access to verified accounts. Twitter then said it put additional safeguards in place.
  • This year, the Justice Department accused Twitter of asking users for their phone numbers in the name of increased security, then using the numbers for marketing. Twitter agreed to pay a $150 million fine for allegedly breaking the 2011 order, which barred the company from making misrepresentations about the security of personal data.
  • After Zatko joined the company, he found it had made little progress since the 2011 settlement, the complaint says. The complaint alleges that he was able to reduce the backlog of safety cases, including harassment and threats, from 1 million to 200,000, add staff and push to measure results.
  • But Zatko saw major gaps in what the company was doing to satisfy its obligations to the FTC, according to the complaint. In Zatko’s interpretation, according to the complaint, the 2011 order required Twitter to implement a Software Development Life Cycle program, a standard process for making sure new code is free of dangerous bugs. The complaint alleges that other employees had been telling the board and the FTC that they were making progress in rolling out that program to Twitter’s systems. But Zatko alleges that he discovered that it had been sent to only a tenth of the company’s projects, and even then treated as optional.
  • “If all of that is true, I don’t think there’s any doubt that there are order violations,” Vladeck, who is now a Georgetown Law professor, said in an interview. “It is possible that the kinds of problems that Twitter faced eleven years ago are still running through the company.”
  • “Agrawal’s Tweets and Twitter’s previous blog posts misleadingly imply that Twitter employs proactive, sophisticated systems to measure and block spam bots,” the complaint says. “The reality: mostly outdated, unmonitored, simple scripts plus overworked, inefficient, understaffed, and reactive human teams.”
  • One current and one former employee recalled that incident, when failures at two Twitter data centers drove concerns that the service could have collapsed for an extended period. “I wondered if the company would exist in a few days,” one of them said.
  • The current and former employees also agreed with the complaint’s assertion that past reports to various privacy regulators were “misleading at best.”
  • For example, they said the company implied that it had destroyed all data on users who asked, but the material had spread so widely inside Twitter’s networks, it was impossible to know for sure
  • As the head of security, Zatko says he also was in charge of a division that investigated users’ complaints about accounts, which meant that he oversaw the removal of some bots, according to the complaint. Spam bots — computer programs that tweet automatically — have long vexed Twitter. Unlike its social media counterparts, Twitter allows users to program bots to be used on its service: For example, the Twitter account @big_ben_clock is programmed to tweet “Bong Bong Bong” every hour in time with Big Ben in London. Twitter also allows people to create accounts without using their real identities, making it harder for the company to distinguish between authentic, duplicate and automated accounts.
  • In the complaint, Zatko alleges he could not get a straight answer when he sought what he viewed as an important data point: the prevalence of spam and bots across all of Twitter, not just among monetizable users.
  • Zatko cites a “sensitive source” who said Twitter was afraid to determine that number because it “would harm the image and valuation of the company.” He says the company’s tools for detecting spam are far less robust than implied in various statements.
  • The complaint also alleges that Zatko warned the board early in his tenure that overlapping outages in the company’s data centers could leave it unable to correctly restart its servers. That could have left the service down for months, or even have caused all of its data to be lost. That came close to happening in 2021, when an “impending catastrophic” crisis threatened the platform’s survival before engineers were able to save the day, the complaint says, without providing further details.
  • The four people familiar with Twitter’s spam and bot efforts said the engineering and integrity teams run software that samples thousands of tweets per day, and 100 accounts are sampled manually.
  • Some employees charged with executing the fight agreed that they had been short of staff. One said top executives showed “apathy” toward the issue.
  • Zatko’s complaint likewise depicts leadership dysfunction, starting with the CEO. Dorsey was largely absent during the pandemic, which made it hard for Zatko to get rulings on who should be in charge of what in areas of overlap and easier for rival executives to avoid collaborating, three current and former employees said.
  • For example, Zatko would encounter disinformation as part of his mandate to handle complaints, according to the complaint. To that end, he commissioned an outside report that found one of the disinformation teams had unfilled positions, yawning language deficiencies, and a lack of technical tools or the engineers to craft them. The authors said Twitter had no effective means of dealing with consistent spreaders of falsehoods.
  • Dorsey made little effort to integrate Zatko at the company, according to the three employees as well as two others familiar with the process who spoke on the condition of anonymity to describe sensitive dynamics. In 12 months, Zatko could manage only six one-on-one calls, all less than 30 minutes, with his direct boss Dorsey, who also served as CEO of payments company Square, now known as Block, according to the complaint. Zatko allegedly did almost all of the talking, and Dorsey said perhaps 50 words in the entire year to him. “A couple dozen text messages” rounded out their electronic communication, the complaint alleges.
  • Faced with such inertia, Zatko asserts that he was unable to solve some of the most serious issues, according to the complaint.
  • Some 30 percent of company laptops blocked automatic software updates carrying security fixes, and thousands of laptops had complete copies of Twitter’s source code, making them a rich target for hackers, it alleges.
  • A successful hacker takeover of one of those machines would have been able to sabotage the product with relative ease, because the engineers pushed out changes without being forced to test them first in a simulated environment, current and former employees said.
  • “It’s near-incredible that for something of that scale there would not be a development test environment separate from production and there would not be a more controlled source-code management process,” said Tony Sager, former chief operating officer at the cyberdefense wing of the National Security Agency, the Information Assurance divisio
  • Sager is currently senior vice president at the nonprofit Center for Internet Security, where he leads a consensus effort to establish best security practices.
  • The complaint says that about half of Twitter’s roughly 7,000 full-time employees had wide access to the company’s internal software and that access was not closely monitored, giving them the ability to tap into sensitive data and alter how the service worked. Three current and former employees agreed that these were issues.
  • “A best practice is that you should only be authorized to see and access what you need to do your job, and nothing else,” said former U.S. chief information security officer Gregory Touhill. “If half the company has access to and can make configuration changes to the production environment, that exposes the company and its customers to significant risk.”
  • The complaint says Dorsey never encouraged anyone to mislead the board about the shortcomings, but that others deliberately left out bad news.
  • When Dorsey left in November 2021, a difficult situation worsened under Agrawal, who had been responsible for security decisions as chief technology officer before Zatko’s hiring, the complaint says.
  • An unnamed executive had prepared a presentation for the new CEO’s first full board meeting, according to the complaint. Zatko’s complaint calls the presentation deeply misleading.
  • The presentation showed that 92 percent of employee computers had security software installed — without mentioning that those installations determined that a third of the machines were insecure, according to the complaint.
  • Another graphic implied a downward trend in the number of people with overly broad access, based on the small subset of people who had access to the highest administrative powers, known internally as “God mode.” That number was in the hundreds. But the number of people with broad access to core systems, which Zatko had called out as a big problem after joining, had actually grown slightly and remained in the thousands.
  • The presentation included only a subset of serious intrusions or other security incidents, from a total Zatko estimated as one per week, and it said that the uncontrolled internal access to core systems was responsible for just 7 percent of incidents, when Zatko calculated the real proportion as 60 percent.
  • Zatko stopped the material from being presented at the Dec. 9, 2021 meeting, the complaint said. But over his continued objections, Agrawal let it go to the board’s smaller Risk Committee a week later.
  • Agrawal didn’t respond to requests for comment. In an email to employees after publication of this article, obtained by The Post, he said that privacy and security continues to be a top priority for the company, and he added that the narrative is “riddled with inconsistences” and “presented without important context.”
  • On Jan. 4, Zatko reported internally that the Risk Committee meeting might have been fraudulent, which triggered an Audit Committee investigation.
  • Agarwal fired him two weeks later. But Zatko complied with the company’s request to spell out his concerns in writing, even without access to his work email and documents, according to the complaint.
  • Since Zatko’s departure, Twitter has plunged further into chaos with Musk’s takeover, which the two parties agreed to in May. The stock price has fallen, many employees have quit, and Agrawal has dismissed executives and frozen big projects.
  • Zatko said he hoped that by bringing new scrutiny and accountability, he could improve the company from the outside.
  • “I still believe that this is a tremendous platform, and there is huge value and huge risk, and I hope that looking back at this, the world will be a better place, in part because of this.”
Javier E

Inside the porn industry, AI looms large - The Washington Post - 0 views

  • Since the first AVN “expo” in 1998, adult entertainment has been overtaken by two business models: Pornhub, a free site supported by ads, and OnlyFans, a subscription platform where individual actors control their businesses and their fate.
  • Now, a new shift is on the horizon: Artificial intelligence models that spin up photorealistic images and videos that put viewers in the director’s chair, letting them create whatever porn they like.
  • Some site owners think it’s a privilege people will pay for, and they are racing to build custom AI models that — unlike the sanitized content on OpenAI’s video engine Sora — draw on a vast repository of porn images and videos.
  • ...26 more annotations...
  • he trickiest question may be how to prevent abuse. AI generators have technological boundaries, but not morals, and it’s relatively easy for users to trick them into creating content that depicts violence, rape, sex with children or a celebrity — or even a crush from work who never consented to appear
  • In some cases, the engines themselves are trained on porn images whose subjects didn’t explicitly agree to the new use. Currently, no federal laws protect the victims of nonconsensual deepfakes.
  • Adult entertainment is a giant industry accounting for a substantial chunk of all internet traffic: Major porn sites get more monthly visitors and page views than Amazon, Netflix, TikTok or Zoom
  • The industry is a habitual early adopter of new technology, from VHS to DVD to dot com. In the mid-2000s, porn companies set up massive sites where users upload and watch free videos, and ad sales foot the bills.
  • At last year’s AVN conference, Steven Jones said his peers looked at him “like he was crazy” when he talked about AI opportunities: “Nobody was interested.” This year, Jones said, he’s been “the belle of the ball.”
  • He called up his old business partner, and the two immediately spent about $550,000 securing the web domains for porn dot ai, deepfake dot com and deepfakes dot com, Jones said. “Lightspeed” was back.
  • One major model, Stable Diffusion, shares its code publicly, and some technologists have figured out how to edit the code to allow for sexual images
  • What keeps Jones up at night is people trying to use his company’s tools to generate images of abuse, he said. The models have some technological guardrails that make it difficult for users to render children, celebrities or acts of violence. But people are constantly looking for workarounds.
  • So with help from an angel investor he will not name, Jones hired five employees and a handful of offshore contractors and started building an image engine trained on bundles of freely available pornographic images, as well as thousands of nude photos from Jones’s own collection
  • Users create what Jones calls a “dream girl,” prompting the AI with descriptions of the character’s appearance, pose and setting. The nudes don’t portray real people, he said. Rather, the goal is to re-create a fantasy from the user’s imagination.
  • The AI-generated images got better, their computerized sheen growing steadily less noticeable. Jones grew his user base to 500,000 people, many of whom pay to generate more images than the five per day allotted to free accounts, he said. The site’s “power users” generate AI porn for 10 hours a day, he said.
  • Jones described the site as an “artists’ community” where people can explore their sexualities and fantasies in a safe space. Unlike some corners of the traditional adult industry, no performers are being pressured, underpaid or placed in harm’s way
  • And critically, consumers don’t have to wait for their favorite OnlyFans performer to come online or trawl through Pornhub to find the content they like.
  • Next comes AI-generated video — “porn’s holy grail,” Jones said. Eventually, he sees the technology becoming interactive, with users giving instructions to lifelike automated “performers.” Within two years, he said, there will be “fully AI cam girls,” a reference to creators who make solo sex content.
  • It costs $12 per day to rent a server from Amazon Web Services, he said, and generating a single picture requires users to have access to a corresponding server. His users have so far generated more than 1.6 million images.
  • Copyright holders including newspapers, photographers and artists have filed a slew of lawsuits against AI companies, claiming the companies trained their models on copyrighted content. If plaintiffs win, it could cut off the free-for-all that benefits entrepreneurs such as Jones.
  • But Jones’s plan to create consumer-friendly AI porn engines faced significant obstacles. The companies behind major image-generation models used technical boundaries to block “not safe for work” content and, without racy images to learn from, the models weren’t good at re-creating nude bodies or scenes.
  • Jones said his team takes down images that other users flag as abusive. Their list of blocked prompts currently contains 1,000 terms including “high school.”
  • “I see certain things people type in, and I just hope to God they’re trying to test the model, like we are. I hope they don’t actually want to see the things they’re typing in.
  • Peter Acworth, the owner of kink dot com, is trying to teach an AI porn generator to understand even subtler concepts, such as the difference between torture and consensual sexual bondage. For decades Acworth has pushed for spaces — in the real world and online — for consenting adults to explore nonconventional sexual interests. In 2006, he bought the San Francisco Armory, a castle-like building in the city’s Mission neighborhood, and turned it into a studio where his company filmed fetish porn until shuttering in 2017.
  • Now, Acworth is working with engineers to train an image-generation model on pictures of BDSM, an acronym for bondage and discipline, dominance and submission, sadism and masochism.
  • Others alluded to a porn apocalypse, with AI wiping out existing models of adult entertainment.“Look around,” said Christian Burke, head of engineering at the adult-industry payment app Melon, gesturing at performers huddled, laughing and hugging across the show floor. “This could look entirely different in a few years.”
  • But the age of AI brings few guarantees for the people, largely women, who appear in porn. Many have signed broad contracts granting companies the rights to reproduce their likeness in any medium for the rest of time
  • Not only could performers lose income, Walters said, they could find themselves in offensive or abusive scenes they never consented to.
  • Lana Smalls, a 23-year-old performer whose videos have been viewed 20 million times on Pornhub, said she’s had colleagues show up to shoots with major studios only to be surprised by sweeping AI clauses in their contracts.
  • “This industry is too fragmented for collective bargaining,” Spiegler said. “Plus, this industry doesn’t like rules.”
grayton downing

North Korea Threatens U.S. Bases in the Pacific - NYTimes.com - 0 views

  • North Korea on Thursday threatened to attack American military bases in Japan and on the Pacific island of Guam in retaliation for training missions by American
  • Now that the U.S. started open nuclear blackmail and threat, the DPRK, too, will move to take corresponding military actions.”
  • DPRK stands for the Democratic People’s Republic of Korea,
  • ...2 more annotations...
  • Japan and American Pacific bases are within range of North Korea’s medium-range missiles, according to South Korean defense officials.
  • The hacking attack on Wednesday brought down the servers of the South Korean broadcasters
davisem

FBI reopens Clinton email investigation after new messages found | Fox News - 0 views

  • The move comes after Comey and the Justice Department decided in July not to pursue charges over Clinton's email practices, saying at the time that the investigation was finished. 
  • Comey has since come under criticism from Donald Trump, lawmakers and others who claim the investigation downplayed the mishandling of classified information during Clinton's tenure. 
  • “Hillary Clinton’s corruption is on a scale we have never seen before,” Trump said. “We must not let her take her criminal scheme into the Oval Office.”
  • ...2 more annotations...
  • “The FBI’s decision to reopen its investigation into Secretary Clinton reinforces what the House Judiciary Committee has been saying for months: the more we learn about Secretary Clinton’s use of a private email server, the clearer it becomes that she and her associates committed wrongdoing and jeopardized national security," House Judiciary Committee Chairman Bob Goodlatte, R-Va., said in a statement. 
  • The development comes 11 days before the general election, and is the latest shockwave to hit the race. Clinton had been gaining in the polls over Trump in the wake of the release of footage showing Trump talking about groping women and subsequent allegations of sexual assault and harassment against him. 
  •  
    The FBI re-opened Clinton's because they found new emailss
ethanmoser

October surprises: How Wikileaks and ObamaCare hikes are shaking up the race | Fox News - 0 views

  • October surprises: How Wikileaks and ObamaCare hikes are shaking up the race
  • “A lot has to do with her instincts.” Tanden concurred again: “Her instincts can be terrible.”
  • The spike in ObamaCare premiums and dwindling insurance options gives Donald Trump a much-needed issue against Hillary Clinton, a longtime champion of universal health care.
  • ...10 more annotations...
  • The latest Wikileaks dump shows that Clinton’s own inner circle was worried about her dissembling and reluctance to apologize over the email mess, even as the campaign ripped the press for raising those questions. --The media are a bit bored with the story line that she’s clobbering him and want the race to tighten.
  • But now we have Podesta himself and former Clinton aide Neera Tanden writing frankly about Hillary’s penchant for secrecy and terrible political judgment.
  • Podesta ripped two longtime loyalists, lawyer Cheryl Mills and spokesman Philippe Reines, along with Clinton attorney David Kendall, for not being “forthcoming on the facts.”
  • This roller-coaster campaign has a couple of twists and turns left, and that’s not good news for the woman who many in the media are ready to inaugurate.
  • When the press was harping on the fact that Clinton would not apologize for having a private server, and campaign officials were pushing back hard, it turns out that some privately agreed with the critics.
  • “Everyone wants her to apologize. And she should. Apologies are like her Achilles heel.”
  • The disclosure that ObamaCare premiums are rising an average of 25 percent—more in some states, less in others—has provided a measure of vindication for the program’s conservative detractors. It has also given Trump, who wants to repeal ObamaCare, new ammunition against Clinton, who wants to reform it—in part by increasing government subsidies.
  • The steep premium hikes, and dwindling insurance options in some areas, make clear that President Obama oversold the program.
  • Now Trump clearly bobbled a statement about his own employees being affected by ObamaCare—only a small percentage are, his company pays the rest—but that doesn’t neutralize the larger issue.
  • he press has been hungry for a new story line so people don’t check out in the final two weeks. The Wikileaks dump, ObamaCare news and some tightening polls in Florida are all it takes. Perhaps the media will shelve the speculation about Clinton’s Cabinet and treat this once again as a horse race.
abbykleman

'We Need to Clean This Up': Clinton Aide's Newly Public Email Shows Concern - 0 views

  •  
    In a March 2015 interview, President Obama said that he had learned about Hillary Clinton's use of a private email server as secretary of state "the same time everybody else learned it, through news reports." But that assertion concerned aides of Mrs.
katieb0305

Justice Dept. Strongly Discouraged Comey on Move in Clinton Email Case - The New York T... - 0 views

  • The day before the F.B.I. director, James B. Comey, sent a letter to Congress announcing that new evidence had been discovered that may be related to the completed Hillary Clinton email investigation, the Justice Department strongly discouraged the step and told him that he would be breaking with longstanding policy, three law enforcement officials said on Saturday.
  • Senior Justice Department officials did not move to stop him from sending the letter, officials said, but they did everything short of it, pointing to policies against talking about current criminal investigations or being seen as meddling in elections.
  • Justice Department officials were particularly puzzled about why Mr. Comey had alerted Congress — and by extension, the public — before agents even began reading the newly discovered emails to determine whether they contained classified information or added new facts to the case.
  • ...11 more annotations...
  • but there is no chance that the review will be completed before Election Day, several law enforcement officials said.
  • disgraced former congressman Anthony D. Weiner — opened Mr. Comey up to fierce criticism not only from Democrats but also from current and former officials at the F.B.I. and the Justice Department, including Republicans.
  • The letter is also the latest example of an at-times strained relationship between the Justice Department and Mr. Comey, who technically answers to the attorney general but who — on issues of race, encryption, policing and, most notably, the Clinton investigation — has branded himself as someone who operates outside Washington’s typical chain of command.
  • about the new emails far outweighed concerns about the department guidelines, one senior law enforcement official said.
  • Under Justice Department policy, restated each election cycle, politics should play no role in any investigative decisions.
  • Mr. Weiner had sent illicit text messages to a 15-year-old girl in North Carolina, top prosecutors in Charlotte and Manhattan jockeyed for the case
  • F.B.I.’s New York field office understood that the Weiner investigation could possibly turn up additional emails related to Mrs. Clinton’s private server, according to a senior federal law enforcement official. Mr. Weiner’s estranged wife, Huma Abedin, is a top adviser to Mrs. Clinton.
  • During the course of searching the seized devices, the F.B.I. discovered thousands of emails, according to senior law enforcement officials, some of them sent between Ms. Abedin and other Clinton aides.
  • The government has not yet concluded that the new emails contain classified information, but investigators felt obligated to look.
  • which said emails had surfaced in a case unrelated to the Clinton case. Mr. Comey said that the F.B.I. would review the emails to determine if they improperly contained classified information, adding that the emails “appear to be pertinent.”
  • They charged that just 11 days before an election, he was unnecessarily inserting himself into politics.
mcginnisca

Sorry, uncovering America's racist underbelly wasn't why Trump won-Commentary - 0 views

  • The last wrong explanation for Clinton's loss is one people both on the Left and the Right are making: The Clinton email scandal. Of course, the continuing cloud of the on again/off again FBI investigation into Clinton's illegal private email server didn't help her campaign
  • The largest single economic group in our country has been sold out and ignored by the leaders of both parties for more than a generation. They are the hourly wage-earning Americans who have been bounced around from good manufacturing jobs, to service jobs, to seasonal work without the rest of us noticing that much. And that's even though there are a lot more of them than the college-educated white collar office workers out there. You know the financial uncertainty you felt last night when you saw the Dow futures crash down by 750 points? That's the kind of emotion millions of your fellow Americans have been feeling every night for years even though they're not "poor" or even necessarily unemployed.
  • And it goes beyond economics. This is a divide that truly began in America during the Vietnam War, which was protested and defended by the rich and upper middle class while the lower middle class and poor actually did the fighting in country. That divide and the wounds from it have never really healed. I doubt we'll ever see an exit poll this specific, but I'd be willing to bet that Trump won 60 percent plus of the Vietnam veterans' vote because he spoke to their past and current pain in a way actual Vietnam vets like John Kerry and John McCain — guys who actually served in the war — never could
izzerios

Comey Letter on Clinton Email Is Subject of Justice Dept. Inquiry - The New York Times - 0 views

  • James B. Comey, the F.B.I. director, to inform Congress about a new review in the Hillary Clinton email investigation — a move Mrs. Clinton has said cost her the election.
  • The inspector general’s office said the investigation had come in response to complaints from members of Congress and the public about actions by the F.B.I. and the Justice Department during the campaign that might be seen as politically motivated.
  • decision by Mr. Comey’s to write two letters on the email matter within 11 days of the election, creating a wave of damaging news stories about the controversy late in the campaign.
  • ...16 more annotations...
  • In the end, the new emails that the F.B.I. reviewed
  • proved irrelevant.
  • Both Democratic and Republican administrations have interpreted that policy broadly to prohibit taking any steps that might even hint at an impression of partisanship.
  • Mr. Horowitz has the authority to recommend a criminal investigation if he finds evidence of illegality
  • there has been no suggestion that Mr. Comey’s actions were unlawful
  • The Justice Department and the F.B.I. have a longstanding policy against discussing criminal investigations
  • Michael Horowitz, said he would also be examining other issues, including whether the deputy director of the F.B.I., whose wife ran as a Democrat for the Virginia State Senate, should have recused himself from any involvement in the Clinton email investigation
  • It is extraordinarily rare for the inspector general to publicly disclose its investigations, particularly in such detail
  • Mr. Comey’s actions attracted criticism from members of both parties.
  • Donald J. Trump, on the other hand, accused him of being part of a rigged system because the F.B.I. cleared Mrs. Clinton of criminal liability
  • Since the election, Mr. Trump has not indicated whether he intends to keep Mr. Comey in his job
  • “This is highly encouraging and to be expected, given Director Comey’s drastic deviation from Justice Department protocol. A probe of this sort, however long it takes to conduct, is utterly necessary in order to take the first step to restore the F.B.I.’s reputation as a nonpartisan institution.”
  • also investigating whether the Justice Department’s top congressional liaison, Peter Kadzik, had improperly provided information to the Clinton campaign.
  • WikiLeaks showed that Mr. Kadzik alerted the campaign about an upcoming congressional hearing that would most likely raise questions about Mrs. Clinton.
  • The bureau., which usually keeps its distance from presidential campaigns, found itself much more centrally involved this time because of its yearlong investigation into Mrs. Clinton’s use of private email server.
  • Mr. Comey announced that the F.B.I. would not seek criminal charges against Mrs. Clinton. But he said she had been “extremely careless” in her handling of sensitive national security information during her time as secretary of state, from 2009 to 2013.
Javier E

Did we really elect Donald Trump? - The Washington Post - 0 views

  • These aren’t partisan issues, or shouldn’t be, as evidenced by the Justice Department inspector general’s decision to investigate how FBI Director James B. Comey handled the probe of Hillary Clinton’s email and private server. The focus will be on Comey’s statement in July that Clinton and her colleagues were “extremely careless” with classified information but that he wasn’t recommending criminal charges — as well as his announcement to Congress just a week and a half before Election Day that, because of new information, he was reopening the investigation.
  • This fresh look pertained to new emails found on the laptop of Carlos Danger, a.k.a. Anthony Weiner (but, really, why the name change?), estranged husband of top Clinton adviser Huma Abedin. The emails subsequently were found to be inconsequential, but if there were any fence-sitters left at that point, at least many of them probably toppled into Trump’s camp, from sheer exhaustion if not outright disgust.
  • Eleven days to go and the man who had said there’s nothing to see here suddenly says, Hey, there might be something after all! And no one’s supposed to think this affected the election?
  • ...3 more annotations...
  • We do know that our intelligence community concluded that Russia hacked the DNC, and Trump finally accepted this last week. To concede that Russia was behind the hacking (rather than a 400-pound person sitting on a bed somewhere, as Trump at one point theorized) was, presumably, to admit that Russia helped him win. Well, didn’t it? Didn’t Trump loudly call upon Russia to hack Clinton’s emails?
  • FiveThirtyEight, Nate Silver’s polling/analysis group, reported that Clinton had an 81 percent chance of winning in mid-October. About a week after Comey’s announcement, that number dropped to 65 percent.
  • For the undecided (or the unpersuadable), let’s pose a hypothetical: What if Clinton had publicly asked Russia to hack Trump’s records and release his tax returns — and Russia did? And what if the FBI announced less than two weeks before Election Day that it was going to investigate fraudulent practices at Trump University? Let’s say that Trump’s number dipped dramatically and he lost. Do you reckon Republicans would be a tad upset?
Javier E

Facebook will start telling you when a story may be fake - The Washington Post - 0 views

  • The social network is going to partner with the Poynter International Fact-Checking Network, which includes groups such as Snopes and the Associated Press, to evaluate articles flagged by Facebook users. If those articles do not pass the smell test for the fact-checkers, Facebook will label that evaluation whenever they are posted or shared, along with a link to the organization that debunked the story.
  • Mosseri said the social network still wants to be a place where people with all kinds of opinions can express themselves but has no interest in being the arbiter of what’s true and what's not for its 1 billion users.
  • The new system will work like this: If a story on Facebook is patently false — saying that a celebrity is dead when they are still alive, for example — then users will see a notice that the story has been disputed or debunked. People who try to share stories that have been found false will also see an alert before they post. Flagged stories will appear lower in the news feed than unflagged stories.
  • ...9 more annotations...
  • Users will also be able to report potentially false stories to Facebook or send messages directly to the person posting a questionable article.
  • The company is focusing, for now, on what Mosseri called the “bottom of the barrel” websites that are purposefully set up to deceive and spread fake news, as well as those that are impersonating other news organizations. “We are not looking to flag legitimate organizations,” Mosseri said. “We’re looking for pages posing as legitimate organizations.” Articles from legitimate sites that are controversial or even wrong should not get flagged, he said.
  • The company will also prioritize checking stories that are getting lots of flags from users and are being shared widely, to go after the biggest targets possible.
  • "From a journalistic side, is it enough? It’s a little late.”
  • Facebook is fine to filter out other content -- such as pornography -- for which the definition is unclear. There's no clear explanation for why Facebook hasn't decided to apply similar filters to fake news. “I think that’s a little weak,” Tu said. “If you recognize that it’s bad and journalists at the AP say it’s bad, you shouldn’t have it on your site.”
  • Others said Facebook's careful approach may be warranted. "I think we'll have to wait and see early results to determine how effective the strategy is," said Alexios Mantzarlis, of Poynter's International Fact-Checking Network. "In my eyes, erring on the side of caution is not a bad idea with something so complicated," he said
  • Facebook is also trying to crack down on people who have made a business in fake news by tweaking the social network's advertising practices. Any article that has been disputed, for example, cannot be used in an ad. Facebook is also playing around with ways to limit links from publishers with landing pages that are mostly ads — a common tactic for fake-news websites
  • With those measures in place, “we’re hoping financially motivated spammers might move away from fake news,” Mosseri said
  • Paul Horner, a fake news writer who makes a living writing viral hoaxes, said he wasn't immediately worried about Facebook's new crackdown on fake news sites. "It's really easy to start a new site. I have 50 domain names. I have a dedicated server. I can start up a new site within 48 hours," he said, shortly after Facebook announced its new anti-hoax programs.  If his sites, which he describes as "satire"-focused, do end up getting hit too hard, Horner says he has "backup plans."
maddieireland334

Hillary Clinton's email problems just got much worse - The Washington Post - 0 views

  • The State Department’s inspector general released its report on the email practices of Clinton and a number of other past secretaries of state.
  • The report, which you can read in its entirety here, badly complicates Clinton’s past explanations about the server and whether she complied fully with the laws in place governing electronic communication. And it virtually ensures that Clinton’s email practices will be front and center in Donald Trump’s fusillade of attacks against her credibility and honesty between now and Nov. 8.
  • The inspector general, in a long-awaited review obtained Wednesday by The Washington Post in advance of its publication, found that Clinton’s use of private email for public business was “not an appropriate method” of preserving documents and that her practices failed to comply with department policies meant to ensure that federal record laws are followed.
  • ...5 more annotations...
  • The report says Clinton, who is the Democratic presidential front-runner, should have printed and saved her emails during her four years in office or surrendered her work-related correspondence immediately upon stepping down in February 2013.
  • Clinton’s team has spent months casting the State Department inspector general’s office as overly aggressive and working hand in hand with congressional Republicans to cast the former secretary of state in the worst possible light.
  • It was particularly critical of former secretary of state Colin Powell — who has acknowledged publicly that he used a personal email account to conduct business — concluding that he too failed to follow department policy designed to comply with public-record laws.
  • For a candidate already struggling to overcome a perception that she is neither honest nor trustworthy, the IG report makes that task significantly harder.
  • Clinton remains blessed that Republicans are on the verge of nominating Donald Trump, a candidate whose numbers on honesty, trustworthiness and even readiness to lead are worse — and in some cases, far worse — than hers. But Trump’s task of casting her as “Crooked Hillary” just got easier.
Javier E

The Jig Is Up: Time to Get Past Facebook and Invent a New Future - Alexis Madrigal - Te... - 0 views

  • have we run out of things to say and write that actually are about technology and the companies behind them? Or do we feel compelled to fill the white space between what matters? Sort of like talk radio?
  • There have been three big innovation narratives in the last few years that complicate, but don't invalidate, my thesis. The first -- The Rise of the Cloud -- was essentially a rebranding of having data on the Internet, which is, well ... what the Internet has always been about. Though I think it has made the lives of some IT managers easier and I do like Rdio. The second, Big Data, has lots of potential applications. But, as Tim Berners-Lee noted today, the people benefiting from more sophisticated machine learning techniques are the people buying consumer data, not the consumers themselves. How many Big Data startups might help people see their lives in different ways? Perhaps the personal genomics companies, but so far, they've kept their efforts focused quite narrowly. And third, we have the daily deal phenomenon. Groupon and its 600 clones may or may not be good companies, but they are barely technology companies. Really, they look like retail sales operations with tons of sales people and marketing expenses.
  • we've reached a point in this technology cycle where the old thing has run its course. I think the hardware, cellular bandwidth, and the business model of this tottering tower of technology are pushing companies to play on one small corner of a huge field.
  • ...6 more annotations...
  • We've maxed out our hardware. No one even tries to buy the fastest computer anymore because we don't give them any tasks (except video editing, I suppose) that require that level of horsepower
  • more than the bandwidth or the stagnant hardware, I think the blame should fall squarely on the shoulders of the business model. The dominant idea has been to gather users and get them to pour their friends, photos, writing, information, clicks, and locations into your app. Then you sell them stuff (Amazon.com, One King's Lane) or you take that data and sell it in one way or another to someone who will sell them stuff (everyone). I return to Jeff Hammerbacher's awesome line about developers these days: "The best minds of my generation are thinking about how to make people click ads." 
  • On the mobile side, we're working with almost the exact same toolset that we had on the 2007 iPhone, i.e. audio inputs, audio outputs, a camera, a GPS, an accelerometer, Bluetooth, and a touchscreen. That's the palette that everyone has been working with -- and I hate to say it, but we're at the end of the line.
  • despite the efforts of telecom carriers, cellular bandwidth remains limited, especially in the hotbeds of innovation that need it most
  • Some of it, sure, is that we're dumping the computation on the servers on the Internet. But the other part is that we mostly do a lot of the things that we used to do years ago -- stare at web pages, write documents, upload photos -- just at higher resolutions.
  • The thing about the advertising model is that it gets people thinking small, lean.
Javier E

The Facebook Illusion - Douthat-NYTimes.com - 0 views

  • Mark Zuckerberg’s social networking site has always struck me as one of the most noxious, dependent for its success on the darker aspects of online life: the zeal for constant self-fashioning and self-promotion, the pursuit of virtual forms of “community” and “friendship” that bear only a passing resemblance to the genuine article, and the relentless diminution of the private sphere in the quest for advertising dollars.
  • the problem is not that Facebook doesn’t make money. It’s that it doesn’t make that much money, and doesn’t have an obvious way to make that much more of it, because (like so many online concerns) it hasn’t figured out how to effectively monetize its million upon millions of users.
  • This “huge reach, limited profitability” problem is characteristic of the digital economy as a whole
  • ...5 more annotations...
  • the Internet is a wonder when it comes to generating “cheap fun.” But because “so many of its products are free,” and because so much of a typical Web company’s work is “performed more or less automatically by the software and the servers,” the online world is rather less impressive when it comes to generating job growth.
  • the more purely digital a company’s product, the fewer jobs it tends to create and the fewer dollars it can earn per user
  • From the lowbrow to the highbrow, LOLcats to Wikipedia, vast amounts of Internet content are created by people with no expectation of remuneration. The “new economy,” in this sense, isn’t always even a commercial economy at all. Instead, as Slate’s Matthew Yglesias has suggested, it’s a kind of hobbyist’s paradise, one that’s subsidized by surpluses from the old economy it was supposed to gradually replace.
  • Despite nearly two decades of dot-com enthusiasm, the information sector is still quite small relative to other sectors of the economy; it currently has one of the nation’s higher unemployment rates; and it’s one of the few sectors where unemployment has actually risen over the last year.
  • None of this makes the Internet any less revolutionary. But it’s created a cultural revolution more than an economic one.
Javier E

Here Come the Cloud Cartels - NYTimes.com - 0 views

  • This time through, the winner is the one able to best manage and deploy millions of servers full of data.
  • “They will house the primary computing power, and the core analytics,” Mr. McNabb said of these cartels. With so much of the core computing taken care of, he said, corporate buyers of this information technology will differentiate their customer offerings with software that refines the analytics to single out individuals precisely
  • The analytic software may actually act to hasten the process of taste-changing, since it will offer more variety, and respond faster to choices, than ever before.
Javier E

Acxiom, the Quiet Giant of Consumer Database Marketing - NYTimes.com - 0 views

  • Acxiom. But analysts say it has amassed the world’s largest commercial database on consumers — and that it wants to know much, much more. Its servers process more than 50 trillion data “transactions” a year. Company executives have said its database contains information about 500 million active consumers worldwide, with about 1,500 data points per person. That includes a majority of adults in the United States.
  • But privacy advocates say they are more troubled by data brokers’ ranking systems, which classify some people as high-value prospects, to be offered marketing deals and discounts regularly, while dismissing others as low-value — known in industry slang as “waste.”
  • Julie Brill, a member of the Federal Trade Commission, says she would like data brokers in general to tell the public about the data they collect, how they collect it, whom they share it with and how it is used. “If someone is listed as diabetic or pregnant, what is happening with this information? Where is the information
  • ...14 more annotations...
  • It has recruited talent from Microsoft, Google, Amazon.com and Myspace and is using a powerful, multiplatform approach to predicting consumer behavior that could raise its standing among investors and clients.
  • Acxiom has its own classification system, PersonicX, which assigns consumers to one of 70 detailed socioeconomic clusters and markets to them accordingly. In this situation, it pegs Mr. Hughes as a “savvy single” — meaning he’s in a cluster of mobile, upper-middle-class people who do their banking online, attend pro sports events, are sensitive to prices — and respond to free-shipping offers.
  • Analysts say companies design these sophisticated ecosystems to prompt consumers to volunteer enough personal data — like their names, e-mail addresses and mobile numbers — so that marketers can offer them customized appeals any time, anywhere.
  • Acxiom maintains its own database on about 190 million individuals and 126 million households in the United States. Separately, it manages customer databases for or works with 47 of the Fortune 100 companies. It also worked with the government after the September 2001 terrorist attacks
  • This year, Advertising Age ranked Epsilon, another database marketing firm, as the biggest advertising agency in the United States, with Acxiom second.
  • it’s as if the ore of our data-driven lives were being mined, refined and sold to the highest bidder, usually without our knowledge — by companies that most people rarely even know exist.
  • if marketing algorithms judge certain people as not worthy of receiving promotions for higher education or health services, they could have a serious impact.
  • “Over time, that can really turn into a mountain of pathways not offered, not seen and not known about,”
  • Unlike consumer reporting agencies that sell sensitive financial information about people for credit or employment purposes, database marketers aren’t required by law to show consumers their own reports and allow them to correct errors.
  • ACXIOM’S Consumer Data Products Catalog offers hundreds of details — called “elements” — that corporate clients can buy about individuals or households, to augment their own marketing databases.
  • the catalog also offers delicate information that has set off alarm bells among some privacy advocates, who worry about the potential for misuse by third parties that could take aim at vulnerable groups. Such information includes consumers’ interests — derived, the catalog says, “from actual purchases and self-reported surveys” — like “Christian families,” “Dieting/Weight Loss,” “Gaming-Casino,” “Money Seekers” and “Smoking/Tobacco.” Acxiom also sells data about an individual’s race, ethnicity and country of origin. “Our Race model,” the catalog says, “provides information on the major racial category: Caucasians, Hispanics, African-Americans, or Asians.” Competing companies sell similar data.
  • “At the same time, this is ethnic profiling,” he says. “The people on this list, they are being sold based on their ethnic stereotypes. There is a very strong citizen’s right to have a veto over the commodification of their profile.”
  • race coding may be incorrect. And even if a data broker has correct information, a person may not want to be marketed to based on race.
  • In its system, a store clerk need only “capture the shopper’s name from a check or third-party credit card at the point of sale and then ask for the shopper’s ZIP code or telephone number.” With that data Acxiom can identify shoppers within a 10 percent margin of error, it says, enabling stores to reward their best customers with special offers. Other companies offer similar services. “This is a direct way of circumventing people’s concerns about privacy,” says Mr. Chester of the Center for Digital Democracy.
Javier E

Five myths about social media - The Washington Post - 0 views

  • it’s easy to assume that communications technologies are great equalizers, increasing the political and economic power of the least well-off.
  • n Kyrgyzstan, which maintained a Soviet-style approach toward policing media outlets and phone communications. We were surprised to learn that, partly because of the country’s need for foreign aid, authorities had agreed to relax Internet regulation in exchange for assistance. We also learned how hard it was to monitor Internet users who were widely dispersed, in some cases using proxy servers and IP-address-scrambling technologies to evade surveillance.
Javier E

How Google Dominates Us by James Gleick | The New York Review of Books - 0 views

  • E-mail Single Page Print addthis_pub = 'nybooks'; addthis_logo = 'http://www.nybooks.com/images/logo-150.gif'; addthis_logo_background = 'ffffff'; addthis_logo_color = '666666'; addthis_brand = 'NYRB'; addthis_options = 'favorites, facebook, twitter, tumblr, reddit, digg, stumbleupon, delicious, google, more'; Share (function() { var s = document.getElementsByTagName('script')[0], rdb = document.createElement('script'); rdb.type = 'text/javascript'; rdb.async = true; rdb.src = document.location.protocol + '//www.readability.com/embed.js'; s.parentNode.insertBefore(rdb, s); })(); ← 1 2 3 It does not have to mean “Obey all the laws.” When Google embarked on its program to digitize copyrighted books and copy them onto its servers, it did so in stealth, deceiving publishers with whom it was developing business relationships. Google knew that the copying bordered on illegal. It considered its intentions honorable and the law outmoded.
  • Who, then, judges what is evil? “Evil is what Sergey says is evil,”
  • On all the evidence Google’s founders began with an unusually ethical vision for their unusual company. They believe in information—”universally accessible”—as a force for good in and of itself. They have created and led teams of technologists responsible for a golden decade of genuine innovation. They are visionaries in a time when that word is too cheaply used. Now they are perhaps disinclined to submit to other people’s ethical standards, but that may be just a matter of personality. It is well to remember that the modern corporation is an amoral creature by definition, obliged to its shareholder financiers, not to the public interest.
  • ...4 more annotations...
  • The rise of social networking upends the equation again. Users of Facebook choose to reveal—even to flaunt—aspects of their private lives, to at least some part of the public world. Which aspects, and which part? On Facebook the user options are notoriously obscure and subject to change, but most users share with “friends” (the word having been captured and drained bloodless). On Twitter, every remark can be seen by the whole world, except for the so-called “direct message,” which former Representative Anthony Weiner tried and failed to employ. Also, the Library of Congress is archiving all tweets, presumably for eternity, a fact that should enter the awareness of teenagers, if not members of Congress.
  • Google+ gives users finer control over what gets shared with whom. Still, one way or another, everything is shared with the company. All the social networks have access to our information and mean to use it. Are they our friends?
  • The company always says users can “opt out” of many of its forms of data collection, which is true, up to a point, for savvy computer users; and the company speaks of privacy in terms of “trade-offs,” to which Vaidhyanathan objects: Privacy is not something that can be counted, divided, or “traded.” It is not a substance or collection of data points. It’s just a word that we clumsily use to stand in for a wide array of values and practices that influence how we manage our reputations in various contexts. There is no formula for assessing it: I can’t give Google three of my privacy points in exchange for 10 percent better service.
  • This seems right to me, if we add that privacy involves not just managing our reputation but protecting the inner life we may not want to share.
‹ Previous 21 - 40 of 90 Next › Last »
Showing 20 items per page