IBM Watson's perfect data and goodbye, privacy
Computerworld discusses the capabilities of IBM Watson, released to developers in a broad array of applications.
ibm  bigdata  watson 
3 days ago
Mapping the spread of Tor
This article shows how widespread and global the Tor network has become. Leading the world with the biggest number of nodes is Germany, with the US a close second.
privacy  anonymity  tor 
4 days ago
Stop Googling, Let's Talk
Sherry Turkle discusses the ways phones and always-on are causing a generation to fail to acquire the ability to talk to one another.
turkle  mobile  psychology  virtualcommunities 
5 days ago
Facebook blocks ads for articles about marijuana legislation
An editor at The Atlantic tells the story of trying to use a paid ad campaign to promote and article about a cannabis derivative that gives no high and helps children with severe epilepsy. Facebook blocked the campaign on the basis that the product was illegal. (The product in fact is the article, not the oil, but never mind.)
censorship  facebook 
5 days ago
Zurich Insurance: cyber costs threaten to overwhelm cyber benefits
The rising cost of cyber security and data breaches...well, like the headline says.
security  cba 
11 days ago
Why the Internet of Things favours dominance
Maria Farrell argues that we are not opting into the Internet of Things; it's being forced on us, turning us from citizens to pools of data for harvesting.
privacy  internetofthings  balanceofpower 
4 weeks ago
The surprising predictability of Android lock patterns
Just as humans overwhelmingly flock to a few obvious passwords, they also tend to choose the same lock patterns on their smartphones. Not surprisingly, really: the grid is small, and many human fingers aren't.
security  passwords 
7 weeks ago
Australian academics challenge "web of avarice" in scientific publishing
The Guardian reports on a group of Australian academics' efforts to challenge the dominance of a few publishers over scientific publishing that sees institutions paying as much as $19,000 (Elsevier) to $21,000 (Springer) for a single journal subscription.
openaccess  sciencepublishing 
7 weeks ago
Inside Amazon
This NY Times story takes a hard look at Amazon's bruising employment practices. While other tech companies hand out family leave, free food and gym access, and work/life balance, Amazon favors tough employment.
Amazon  labor 
7 weeks ago
We'll see you, anon
The Economist looks at privacy issues with respect to big data and cites Cynthia Dwork's work at Microsoft on differential privacy - techniques for protecting privacy while retaining the data's usefulness.
privacy  bigdata 
7 weeks ago
Gang of Transnational Crime Organizations Roll Out Own Encrypted Communication System
Marcy Wheeler writes about Symphony, a system of communications tools for the financial services sector that "prevent government spying" and have "no backdoors".
banks  finance  surveillance  organizedcrime 
8 weeks ago
Trade dispute about Dental Devices Could End up Changing the Future of the Entire Internet
In the process of stopping ClearCorrect from infringing on patents held by InvisAlign, both makers of clear braces, the International Trade Commission has ruled importing digital files is illegal. This is the first time the agency has taken action against virtual, rather than physical action. The Court of Appeals in Washington, DC will hear arguments on August 11. Briefs have been filed by the Internet Association, EFF, and Public Knowledge.
copyright  patent  intellectualproperty  dentistry 
8 weeks ago
Websites: please stop blocking password managers
This Wired article asks a number of major companies why they block password managers, which help users create and manage strong passwords instead of weak ones, and gets a range of answers.
security  passwords 
10 weeks ago
Why the Internet of Things encourages dominance
In this Guardian article, Julia Powles and Jat Singh argue that the complexity of IoT systems will of necessity reinforce hierarchies and centralized dominance.
internetofthings  centralization 
10 weeks ago
The world's first hack: the telegraph and the invention of privacy
In the Guardian, Thomas McMullan follows in Tom Standage's footsteps and invokes the telegraph as prior art, recounting the capture of murderer John Tawell, Nevil Maskelyne's hack of Marconi's demonstration (recounted by Paul Marks in New Scientist in 2011), and the use of codes and ciphers to protect text.
telegraph  hacking 
12 weeks ago
When algorithms discrminate
In the NY Times, Claire Cain Miller examines the widely held belief that algorithms are neutral, reviewing research from CMU (that showed that men were more frequently shown ads for high-paying executive jobs than women). Deirdre Mulligan suggests what coded discrimination is tolerated in such cases is a matter of public policy.
advertising  CMU  google  algorithmicliving  bigdata  discrimination  Mulligan 
12 weeks ago
The case of the amazing gay-marriage data
Science of Us reports on the efforts of graduate student David Broockman to stand up - and eventually expose fraud in - a study that appeared to show that personal canvassing works to change hearts and minds about gay marriage when the canvasser themselves is gay.
science  sciencefraud 
june 2015
There's an Uber for everything now
While Uber faces regulatory issues in various locations, the Wall Street Journal reports that in San Francisco, at least temporarily, there's a service for almost everything - many of them more useful than it might first appear.
apps  sharingeconomy 
may 2015
Screen time versus play time: what tech leaders won't let their own kids do
The Guardian interviews a number of tech leaders to find out how they approach technology with their kids. Many favor Waldorf schools (which limit screen time) and other techniques to let their kids explore the physical world rather than the virtual world.
education  children 
may 2015
Tiny updates to tech can present obstacles for disabled people
Paul Kotler, who struggles with autism and apraxia, writes in Wired about the opportunities and challenges tech presents. Both are largely by-products of mass market design.
access  disabilities 
may 2015
EFF's 404 Report on copyright
EFF examines the 2014 report of the US Trade Representative under S301 - the one under which USTR dubs nations like Canada "rogue nations" for not enacting the copyright laws the US wants. EFF counters with short case studies from myriad countries about the chilling effects of copyright extremism.
EFF  copyright  UStrade 
may 2015
FBI admits flaws in hair analysis over decades
The Washington Post reports that the FBI has been systematically offering "flawed testimony" in cases featuring hair analysis that favored prosecutors for decades.
fbi  forensics  judicialabuse 
may 2015
Bitcoin is disrupting the Argentine economy
The impact of bitcoin is best seen in places where financial services don't work as well as they do in most of the UK/EU/US. Nicholas Popper examines one such case: Argentina.
bitcoin  money  argentina 
may 2015
Can the Internet Be Saved without Harming Democracy?
29 policy influencers publish a report arguing for the protection and promotion of human rights online. They include Michael Chertoff (first director of the Department of Homeland Security) and David Omand (former director of GCHQ).
internetgovernance  gchq 
april 2015
The Cyber-Threat of Things
My piece at Infosecurity Magazine on the coming security threats posed by the internet of Things as cyberspace invades the physical world.
security  internetofthings  wg 
april 2015
Network Analysis of Third-Party Tracking
This research from Microsoft shows that 99.5% of users (across the world) are captured by the ad tracking networks within 30 clicks.
advertising  tracking 
march 2015
The Cost of Paying Attention
Matthew B. Crawford comments on the privatization of public space and the loss of silence as a resource: in modern airports and elsewhere advertising is creeping into everything from the bins at security to the walls of the London tube (at least there the video is silent; in Rome it includes audio). Silence in such places is increasingly a luxury only the wealthy can afford (for example, by paying admission to airline clubs).
privacy  peace  silence  nytimes 
march 2015
How One Stupid Tweet Ruined Justice Sacco's Life
Jon Ronson writes about interviewing the victims of global public shaming, mostly via Twitter. For most, the experience has been severely traumatic, and recovery very slow. (From conversations I've had with people who've also been through this mill, it can indeed be very scarring.)
publicshaming  twitter  nytimes 
march 2015
Secret History of Silicon Valley
By Steve Blank.
The Secret History of Silicon Valley – Backstory
• Part 1: The Vietnam War
• Part 2: B-52’s and the Soviet Air Defense System
• Part 3: Bill Perry/ESL and the Cold War
• Part 4: Undisclosed Locations
• Part 5: Silicon Valley, the 2nd 100 years
• Part 6: Stanford, Terman and WWII
• Part 7: Stanford, Terman and the Cold War
• Part 8: Stanford and the rise of Cold War Entrepreneurship
• Part 9: Stanford and Electronic Intelligence
• Part 10: Stanford and Weapons Systems
• Part 11: The Rise of Venture Capital
• Part 12: The First Valley IPO’s
• Part 13: Startups with Nuclear Missiles
• Part 14: Spy Satellites in Silicon Valley
• Part 15: Lockheed – Silicon Valley largest employer
• Part 16: Balloon Wars
siliconvalley  history 
february 2015
It's the labels, not Spotify, that are screwing over artists
Pando analyzes streaming revenues to show that while streaming services are often blamed for the small amounts of money they pay artists the reason is that 73% of those revenues go to the labels. The article also says music industry revenues has halved since 2000.
musicbusiness  music  copyright 
february 2015
Inadevertent algorithmic cruelty
In this blog posting - and be sure to read both the comments and the <a href="">follow-up</a> - Meyerweb considers the social theoughtlessness of (social media) algorithms such as the one that assumed they would like to see a summary of their year, which included, prominently pictured, their dead child.
algorithmicliving  facebook 
december 2014
The Fall of the Banner Ad
Farhad Manjoo in the NY Times writes about the rise and now - finally - decline of the ubiquitous banner ad, now being replaced by native ads that load quicker and clutter less.
advertising  media 
november 2014
The decade-long quest to stop Spamford Wallace
The story of trying to bring the notorious 1990s spammer, Sanford Wallace, to justice (arstechnica).
november 2014
Frank Tirole and "Platform Competition in Two-Sided Markets"
Vox discusses Tirole's Nobel prize and his 2002 paper, which does much to explain the "free" service model that drives Google, Facebook, and so many other Internet businesses.
economics  privacy  google  Facebook  dataprotection 
november 2014
The Dark Market for Personal Data
UMD prof Frank Pasquale, writing in the New York Times, advocates a change in the law to regulate the US's estimated 4,000 data brokers, whose services animate all sorts of secret - and often unfair - decisions about all aspects of individuals' lives. A prelude to the release of his "The Black Box Society".
scoring  dataprotection  privacy 
november 2014
Australia's metadata grab
PI's Carly Nyst, writing in the Guardian, discusses Australia's adoption of data retention.
dataretention  surveillance  australia 
november 2014
Be grateful for drizzle (the risks of high-frequency trading)
This piece from the LRB discusses the speed with which the entire market can disappear due to high-frequency trading. Of particular interest is the fact that the company for which a former trader worked had been running automated checks to eliminate bugs such as the sign error that set off an exponential series of trades that, stopped 20 second later than it was, would have bankrupted the firm (and then the clearing house and the market). The firm had stopped running the checks because the company losing the speed race.
automation  risks  finance 
november 2014
Delusions of Big Data and Other Huge Engineering Efforts
UC Berkeley prof Michael Jordan discusses the limitations of machine learning with Lee Gomes.
november 2014
EFF Surveillance Self-Defense Guide
The EFF has updated its guide to privacy and security for Internet users.
privacy  security  eff  surveillance 
november 2014
Google's Right to be Forgotten meeting 2014-10-17
Video of the 4+ hour meeting of the Google Advisory Council in London on the right to be forgotten.
google  dataprotection  righttobeforgotten 
november 2014
Why Google's Self-Driving Car May Never Happen
Lee Gomes, who has written about the Google cars for Slate, discusses all the things that Google's cars currently cannot do: find potholes, respond to ad hoc changes in traffic signals and road layouts, and travel unfamiliar landscapes, which means all but a few thousand miles of the US. The cars rely heavily in inch-perfect maps, which are expensive to collect and even more so to keep up to date.
google  robots  ai 
october 2014
Why kids sext
The Atlantic studies a case of mass uploads of teen sexts and discovers that sexting has become part of the ordinary teen experience. Discusses when and how the law should be involved.
teens  sex  lawenforcement 
october 2014
The complete Feynman lectures on physics
Terrific resource for learning the subject.
physics  education 
august 2014
Not a Tea Party - A Confederate Party
An interesting take on the current state of US politics, which sees the present situation as a reflection of confederate victory in the Civil War. Not the way most people see it, but he argues that we're wrong.
uspolitics  teaparty 
august 2014
Sherlock Holmes: not too "complex" for the public domain
A US 7th Circuit Court judge has ruled against the Doyle estate's argument that because new information about Sherlock Holmes continued to appear in the later stories the earlier stories are still copyrighted, thereby demanding licensing fees from an author compiling a set of modern pastiches by various authors.
copyright  greatdetectives 
june 2014
CFP2014: Debate on the right to be forgotten
Debate features Judith Rauhofer, with possibly the clearest explanation of the ECJ's decision in Google vs Spain you will ever see, Mike Godwin (Internews), and Emma Llanso (CDT).
privacy  freespeech  dataprotection  google 
june 2014
Ghostwriting for Julian Assange - Andrew O'Hagan's account
This is Andrew O'Hagan's lengthy and detailed story of what went wrong in the efforts to produce what eventually was published by Canongate as Julian Assange's "unauthorized autobiography".
Wikileaks  JulianAssange 
february 2014
Fanboys: Have you ever loved something so much it hurt?
Fascinating article examining the pathology and behavior of people who get so obsessed with a particular (smart phone) vendor that they attack anyone who disagrees even a little bit. These are the modern successors to the folks we used to call "Amigoids".
obsession  Google  Apple 
january 2014
Did refrigerators form a spam-sending botnet? Possibly not
At Ars Technica, Dan Goodin picks apart the technical details in the report that 100,000 smart refrigerators have been hacked to form a botnet to send spam. Yes, it *could* happen and security researchers are already warning about the Internet of Things - but *did* it happen?
internetofthings  security  smartliving 
january 2014
Are the technoriche really ruining San Francisco?
This interview with Rebecca Solnit brings her previous essay on the topic up to date. She compares Google's choice to run luxury buses for its employees rather than push and contribute funds to better public transportation to the effect of bottled water on a city with pollution in the public water supply. San Frncisco, the city where many worked just enough to fund idealistic activism, is becoming a bedroom community for (mostly) young (mostly) men with little investment in the city itself, like a company town. For prior art, see also Paulina Borsook's Mother Jones essay (later book) Cyberselfish.
google  socialjustice  siliconvalley 
january 2014
Analysis of the data retention directive opinion
This blog posting from Freedom to Tinker has a helpful analysis of the data retention directive judgment and its compatibility with human rights - and it also has a helpful analysis of EU vs US privacy law and misconceptions.
privacy  dataretention  ecthr 
december 2013
Wikipedia's lamest edit wars
As seen on Slashdot. Many don't seem entirely lame: they tackle questions of classification and principle that librarians have probably wrestled with since time immemorial. Might have made sense to adopt the librarians' solutions, though.
december 2013
Watching a bitcoin heist in real time
Internet users chase the thief of 96,000 bitcoins.
december 2013
A robot walks into a bar...
A profile of Data, the robot comedian. Can robots be funny?
december 2013
The Big Data Brain Drain: Why Science Is in Trouble
Argues that the skills scientific research needs are increasingly the same ones that succeed in industry and proposes some ways that academia needs to change to keep up.
bigdata  science  research 
october 2013
eLifeSciences annual report
One year of open access after its founding, eLife Sciences reports.
october 2013
Privacy fears grow as cities increase surveillance
The New York Times reports on surveillance systems originally deployed for anti-terrorism that are being used for increased surveillance.
privacy  surveillance  functioncreep 
october 2013
Somebody stole 7 milliseconds from the Federal Reserve
Mother Jones covers the story that in the 7ms it took the Fed's news that it would not be tapering its bond-buying program to get out, huge orders were placed. Two problems: 1) the leak of information enabling someone to game the markets; 2) the way high-speed automated trading now dominates and distorts the markets.
finance  security  equalopportunity 
september 2013
Scary search engine finds baby monitors, webcams, power plants...
The search engine Shodan finds Internet-connected devices that can then be taken over and controlled. As the Internet of Things gets deployed, this sort of thing will be a major concern.
securty  surveillance  search 
september 2013
Streaming music: how much are artists paid?
This article looks at the royalties artists are paid for streaming music, based on data Zoe Keating has published on her blog detailing what she's been paid by the various services. Keating would like to see the services provide artists with their raw listener data - as she says, everyone is entitled to that *except* the artists on whose work these services are built. I would agree: instead of recreating the music business in the image of the past, we have the chance to give artists much better understanding of their audiences and doing so should be a standard element of the T&Cs under which the services are allowed to use artists' music.
music  streaming  copyright  musicbusiness 
august 2013
Ideas to get women involved in tech sector
The Guardian considers the reasons for decreasing numbers of women in technology. Meanwhile, at Consulting Adult - - Nancy Householder Hauge reminisces about the various manifestations of sexism she encountered in her early days at Sun.
women  sexualharassment 
august 2013
Russia's response to Snowden leaks: control the Net
The New York Times reports that Snowden's revelations about the NSA have given Russia new impetus to pursue control over the Internet via the ITU.
Russia  nsa  internetgovernance  ITU 
july 2013
Ellen Ullman: How to Be a Woman Programmer
Ullman, a former software engineer, essayist, and novelist, talks about how to prosper in the endemic sexism of geek culture.
women  software 
july 2013
TweetMeme, DataSift, and the shutdown of the Twitter API
Sheds light on the little-known area of Twitter data: DataSift is one of only two authorized resellers of Twitter's firehose. It also performs and sells analytics on, Facebook, forums, logs...overall, it claims to digest most than 90% of the Net's social media data.
socialnetworks  dataprotection  twitter  algorithmicliving 
june 2013
A Cyberattack Campaign for Syria (NY Times)
This is just scarily wrong in so many ways. It is disturbing that it's written by a former cybersecurity advisor to Obam, now consulting for the Department of Defense.
security  dcpolitics  badideas 
may 2013
Mapping exploits on the Internet
Over the course of a year, a researcher messaged almost 4 billion IP addresses. At least 100 million replied - traffic lights, ships at sea - building a pattern of resources available to exploit.
security  internetofthings 
may 2013
Forbes interviews Ray Kurzweil
What could Google and Ray Kurzweil possibly want with each other? Kurweil explains, in some detail, what he'll be working on.
AI  google  kurzweil 
may 2013
When Your Data Wanders to Places You’ve Never Been
Fill out a few online surveys...start getting direct postal mail offering help for your MS. The membrane between online and offline identities gets ever thinner. This piece tries to trace the why and how of a mistaken profile.
privacy  bigdata 
april 2013
Do telepresence robot need visas? (from We Robot 2013)
Technology Review looks at a different aspect of the We Robot discussions: Willow Garage's experiment with allowing remote Internet followers to drive a robot to wash their dishes, and telepresence workers at Mozilla. Both experiments were ended because of concerns over legal issues like liability and who pays taxes where.
robots  werobot  law 
april 2013
Why ITIF rejects Do Not Track
This Web site openly rejects Do Not Track settings (if you have this turned on you'll see a pop-up advising you) on the basis that long-term targeted advertising (and therefore tracking) is necessary to pay for "free" content. The action raises the possibility that more of the Internet will be walled off by "DoNotTrackwalls" to go with paywalls...
intellectualproperty  advertising  tracking  privacy 
march 2013
Life expectancy of Google Keep
Charles Arthur looks at the history of Google products and finds that the average time-to-live of cancelled products is around four years. Something to consider before investing your notes in Google Keep.
march 2013
Facebook, Twitter deleting photo metadata
This piece raises some interesting issues with respect to photographs, the right to identification for copyright purposes (as opposed to the right to privacy!), and ongoing proposals for orphan works. Photographers have long been arguing that the orphan works proposals effectively legalize ripping off their work (by commercial organizations, not just personal use copying), and this is a prime example of what they're talking about.
intellectualproperty  orphanworks  photography  facebook  socialnetworks 
march 2013
Bruce Schneier - The Web is a Surveillance State (CNN)
"One reporter used a tool called Collusion to track who was tracking him; 105 companies tracked his Internet use during one 36-hour period."
privacy  surveillance 
march 2013
Which crypto tool would you use to bring down a government?
A really interesting look at four different crypto tools intended for use by those in hostile situations. Matthew Green concludes they all suffer from the same vulnerability: the host platform.
crypto  security  privacy  tools 
march 2013
What data brokers know about you
Pro Publica looks at the murky world of data brokers, behind-the-scenes players most people don't even know exist.
dataprotection  privacy 
march 2013
Amazon makes a play for .book
Robert X. Cringely discusses ICANN's new generic top-level domains and in particular the plays by Google and Amazon to own the currently up-for-grabs .book and .author - something book authors and competing booksellers oppose.
ICANN  dns  intellectualproperty 
march 2013
Dewayne Hendricks explains the National Information Infrastructure
In this podcast at Community Broadband Bits, Dewayne Hendricks talks about the vision behind and history of the now-forgotten NII, which focused on ad-hoc community networks. It should surprise no one that Apple was an early visionary. The vision broke down in part because of the lack of fiber into communities, and then the spectrum went to wifi. Today's national broadband plan has nothing of the same vision about a national architecture that would include both commercial parts (telcos) and municipal/public parts. You can download the MP3 directly from:
infrastructure  internethistory  dwaynehendricks 
march 2013
FM/AM radio to disappear from US car dashboards within five years?
This is the prediction made by this conference panel, who claim that car manufacturers are telling them they no longer see FM/AM radio as something "young people" want. (via Dewayne Hendricks)
radio  media 
march 2013
Accenture survey shows that most doctors oppose giving patients full access to medical records (PDF)
The existence of the self-quantified movement and several new start-ups enabling individuals to study, analyze, and share their medical data ought to show that at least some percentage of patients feel it's important to have full access to their health records. This study shows that doctors are slow to catch up: only a third of doctors surveyed across 8 countries including the US and UK think patients should have write access to their own records. The study suggests that there is beginning to be evidence that the benefits of patient-write-access outweigh the costs/risks, and it seems likely these will only become more obvious over time.
health  self-quantified  openaccess 
march 2013
« earlier      
access advertising africa ai algorithmicliving amazon anonymity apple apps argentina australia automation badideas balanceofpower banks bigdata bitcoin borders canada cba censorship centralization children china cmu copyright crypto cyberattacks dataprotection dataretention dcpolitics dentistry digitaldivide disabilities discrimination dmca dns dwaynehendricks economics ecthr education eff equalopportunity facebook fbi finance forensics freespeech functioncreep funding gchq google greatdetectives hacking health history ibm icann identityfraud infrastructure intellectualproperty internetgovernance internethistory internetofthings itu judicialabuse julianassange kurzweil labor law lawenforcement media mobile money mulligan music musicbusiness newthreats nsa nytimes obsession openaccess organizedcrime orphanworks passwords patent peace photography physics piracy porn privacy psychology publicshaming radio research righttobeforgotten risks robots russia science sciencefraud sciencepublishing scoring search security securty self-quantified sex sexualharassment sharingeconomy silence siliconvalley smartliving socialjustice socialnetworks software spain spam streaming surveillance teaparty teens telegraph tools tor tracking turkle twitter uavs uspolitics ustrade virtualcommunities watson wearablecomputing werobot wg wikileaks wikipedia women

Copy this bookmark: