petej + microsoft   167

Notes From An Emergency
How is it that some dopey kid in Palo Alto gets to decide the political future of the European Union based on what they learned at big data boot camp? Did we lose a war?

Silicon Valley brings us the worst of two economic systems: the inefficiency of a command economy coupled with the remorselessness of laissez-faire liberalism.
nationalism  TrumpDonald  Europe  USA  SiliconValley  Facebook  Google  Amazon  Microsoft  Apple  monopolies  surveillance  personalData  security  authoritarianism  regulation  globalisation  tradeUnions  resistance  accountability 
may 2017 by petej
The need for urgent collective action to keep people safe online: Lessons from last week’s cyberattack - Microsoft on the Issues
Finally, this attack provides yet another example of why the stockpiling of vulnerabilities by governments is such a problem. This is an emerging pattern in 2017. We have seen vulnerabilities stored by the CIA show up on WikiLeaks, and now this vulnerability stolen from the NSA has affected customers around the world. Repeatedly, exploits in the hands of governments have leaked into the public domain and caused widespread damage. An equivalent scenario with conventional weapons would be the U.S. military having some of its Tomahawk missiles stolen. And this most recent attack represents a completely unintended but disconcerting link between the two most serious forms of cybersecurity threats in the world today – nation-state action and organized criminal action.

The governments of the world should treat this attack as a wake-up call. They need to take a different approach and adhere in cyberspace to the same rules applied to weapons in the physical world. We need governments to consider the damage to civilians that comes from hoarding these vulnerabilities and the use of these exploits. This is one reason we called in February for a new “Digital Geneva Convention” to govern these issues, including a new requirement for governments to report vulnerabilities to vendors, rather than stockpile, sell, or exploit them.
WannaCry  malware  ransomware  security  Microsoft  vulnerability  NSA  CIA  state  government  intelligence  responsibility 
may 2017 by petej
TensorFlow and Monetizing Intellectual Property - Stratechery by Ben Thompson
"The fundamental nature of the Internet makes monetizing infinitely reproducible intellectual property akin to selling ice to an Eskimo: it can be done, but it better be some really darn incredible ice, and even then the market is limited. A far more attainable and sustainable strategy is to instead focus on monetizing complements to said intellectual property, resulting in an outcome where everyone wins: intellectual property consumers, intellectual property copiers, and above all intellectual property creators."
intellectualProperty  Microsoft  OpenSource  TensorFlow  Google  Apple  verticality  integration  Amazon  logistics  Facebook  networks  Android 
november 2015 by petej
Microsoft CEO Satya Nadella: women, don't ask for a raise | Technology |
“It’s not really about asking for the raise, but knowing and having faith that the system will actually give you the right raises as you go along,” he answered. Not asking for raise, he added, was “good karma” that would help a boss realise the employee could be trusted and should have more responsibility.
NadellaSatya  Microsoft  pay  wages  women  technology  business  faith  trust  karma  bullshit 
october 2014 by petej
danah boyd | apophenia » why I’m quitting Mendeley (and why my employer has nothing to do with it)
"I’m not arguing that Elsevier will ruin the product. I’m stating that I will not use Elsevier products, provide free labor to Elsevier, or provide data that Elsevier can monetize. Until Elsevier changes its ways, I will boycott Elsevier and publicly condemn their practices. This is not a personal critique of anyone at Mendeley. This is a political statement in an era in which research is being undermined by organizations like Elsevier."

Well said. In so many of these situations, so many people focus on the "is it/isn't it a walled garden?" questions while ignoring the fact that in using the "service" you are providing unpaid labour to monopolist corporations.
Elsevier  Mendeley  business  acquisition  Microsoft  dctagged  dc:creator=boyddanah 
april 2013 by petej
Is Google Drive worse for privacy than iCloud, Skydrive, and Dropbox? | The Verge
"The real questions is what type of company would you trust with keeping your data in the cloud?
Microsoft is a software company, which sells it’s products and services to customers for money. You are the customer.
Apple is a hardware company, which sells it’s products and services to customers for money. You are the customer. You are the customer.
Dropbox is a web-service company , which sells it’s services to customers for money. You are the customer.
Google is an advertising company, which sells it’s services to customers for money. You are not the customer — advertisers are customers. You are Google’s product."
GoogleDrive  tos  storage  Dropbox  Apple  iCloud  Microsoft  Skydrive  advertising  businessModels 
april 2012 by petej
« earlier      
per page:    204080120160

related tags

32bit  64bit  academia  accountability  Acer  acquisition  Adobe  advertising  aggregator  Alexa  algorithms  Amazon  AmazonEcho  ambientComputing  Android  anonymity  anti-Semitism  AOL  Apache  API  Apollo  Apple  appstore  artificialIntelligence  Asda  astroturfing  Asus  Atom  AtomPub  attachments  authoritarianism  availability  AWS  Azure  backdoor  Bash  Berners-LeeTim  Bing  binggate  BIS  Boots  bots  boycott35  BristolCityCouncil  Britvic  browser  BT  bug  bullshit  business  businessModels  CabinetOffice  CambridgeSemantics  capitalism  CardSpace  CarphoneWarehouse  CCTV  centralisation  chat  China  CIA  Cisco  cloudComputing  CMS  codecs  commerce  communication  CommunicationsDataBill  competition  Computacenter  computers  computing  conditions  confidentiality  conspiracyTheory  contentManagement  control  copyright  CosmosDB  culture  cuts  Cypher  data  databases  dataMining  dataPortability  dc:creator=BehrRafael  dc:creator=BelamMartin  dc:creator=BergmanMike  dc:creator=boyddanah  dc:creator=BrayTim  dc:creator=DashAnil  dc:creator=HirstTony  dc:creator=LappinJames  dc:creator=MadrigalAlexis  dc:creator=MasonPaul  dc:creator=MillerPaul  dc:creator=MoodyGlyn  dc:creator=MorozovEvgeny  dc:creator=NowackBenjamin  dc:creator=O'ReillyTim  dc:creator=PestonRobert  dc:creator=PilgrimMark  dc:creator=PowellAndy  dc:creator=RubySam  dc:creator=ScobieRobertt  dc:creator=UdellJon  dc:creator=VerborghRuben  dc:creator=WalshNorman  dc:creator=WeibelStuart  dc:creator=WoodDavid  dctagged  decentralisation  decryption  Dell  democracy  design  desktop  detention  developers  development  Diageo  digitalIdentity  digitalLibraries  disaster  display  DNT  DoNotTrack  DRM  Dropbox  DublinCore  DuraSpace  earthquake  economics  education  Eduserv  electronics  Elsevier  email  EME  employment  encryption  eprints  eresearch  escience  ethics  EU  Europe  event  Exchange  Expansys  exploitation  Facebook  facialRecognition  factory  faith  FBI  Flash  flexibility  formats  Foxconn  fuckbing  Fullers  games  gaming  GatesBill  GCHQ  GDPR  GitHub  globalisation  Gmail  GoodRelations  Google  Google+  GoogleBuzz  GoogleDrive  GooglePlus  government  graphDatabases  graphics  Guardian  H.264  hackers  hacking  HarveyNicols  health  HewlettPackard  higherEducation  HomelandSecurity  Hotmail  HTML  HTML5  humour  HuntJeremy  hyperlinks  IBM  ICE  iCloud  ICOMP  identifiers  identity  IE10  image  IMAP  immigration  informationArchitecture  informationTechnology  infrastructure  Instagram  integration  integrity  Intel  intellectualProperty  intelligence  Internet  InternetExplorer  interoperability  iPhone  IPR  Islamophobia  IT  IWMW2010  Janet  Japan  JobsSteve  jurisdiction  karma  Kinect  Kingfisher  KnowledgeGraph  labour  leak  legal  letter  LibreOffice  licensing  Lifebrowser  LinkedIn  linking  linktypes  LizardSquad  lobbying  localGovernment  logistics  London  lovefilm  maintenance  malware  management  marketing  MarksSpencer  Mendeley  messaging  metadata  microblogging  microdata  microformats  Microhoo  Microsoft  MicrosoftOffice  MicrosoftWord  Minecraft  Mojang  monitoring  monopolies  monopoly  Mothercare  Mozilla  MPEG-4  MSIE  MSIE10  NadellaSatya  nationalism  Neo4j  Neptune  netNeutrality  Netscape  network  networks  news  NewYork  Next  Nintendo  NoSQL  NSA  NUads  NYPD  Office365  OggVorbis  OGP  OneNote  OpenGraphProtocol  OpenId  OpenOffice  OpenSocial  opensource  openStandards  operatingSystem  OS/X  OsborneGeorge  Outlook  Outlook2010  ownership  Palantir  Paltalk  party  PATRIOTAct  pay  persistence  personalData  personalisation  photography  PhotoSynth  PlayStation  Plurk  police  policing  policy  politics  portability  postFordism  power  predictions  presentation  PRISM  privacy  productivity  profiling  programming  pseudonymity  psychology  publicSector  publicSpending  queryLanguage  R  racism  ranking  ransomware  RDF  RDFa  ReadWriteWeb  recommendations  ReedElsevier  regulation  relevance  rentiership  rentism  repcloud  repositories  research  resistance  resolution  responsibility  REST  richSnippets  rights  roa  RSS  Russia  Samsung  SanBernardino  Satori  scale  search  searchEngine  searchEngineOptimisation  security  semanticSearch  semanticWeb  SEO  services  settings  SharePoint  SiliconValley  Silverlight  Sirius  Skydrive  Skype  slides  slideshare  Snapshot  snoopersCharter  SnowdenEdward  SOAP  socialGraph  socialMedia  socialNetworking  socialSearch  socialSoftware  socialWeb  software  Solid  Sony  SPARQL  spendingReview  standards  state  storage  surveillance  SWORD  syntax  takeover  TalkTalk  tax  taxAvoidance  TechCrunch  technology  TEDTalk  Telegraph  Tempora  TensorFlow  terminology  terrorism  Tesla  TheEcologist  theft  TheRegister  ThielPeter  TigerGraph  timeline  TinkerPop  toolbars  tools  ToryParty  tos  tracking  tradeUnions  transparency  TrumpDonald  trust  tutorial  Twitter  ubiquity  UK  universities  URI  USA  usability  VC-1  verticality  video  virtualReality  visualisation  Vizio  voiceRecognition  vulnerability  W3C  wages  walledGarden  WannaCry  Wannacry  WCF  wealth  wearables  web  Web2.0  webServices  WebW3S  WhatsApp  WHATWG  Whitbread  Windows  Windows7  Windows8  Windows10  WindowsXP  women  work  workshop  Xbox  Yahoo  Yammer  Yell  YouTube 

Copy this bookmark: