On Sunday, Facebook activated a new safety feature in response to the horrifying massacre at the gay night club in Orlando, Florida that left 49 dead and many more wounded. Safety Check had been activated in other countries, but Sunday makes the first day that the feature will be available in the United States.
The feature was activated first in Paris after last year’s terrorist attacks ravaged the city for a night. Safety Check allows for users to notify loved ones and friends that they’re safe in a time of crisis, whether the issue is caused by meaningless violence, civil unrest, natural disasters or otherwise. Users can check on the people thought to be in whatever area is affected by the danger and mark friends and loved ones safe when they can confirm that they’re OK.
According to Facebook, Safety Check has been tweaked since its initial release in order to streamline its deployment in places other than Paris:
“Many people practically live on Facebook, so this feature is a convenient way for people to notify others of their status,” explained program manager at Stratecast/Frost & Sullivan Mike Jude. “Rather than having to call many people discretely, this allows anyone on your Facebook network to obtain your status.”
Facebook’s Peter Cottle wrote about Safety Check on June 2, not realizing that the feature would need to be used only 10 days later:
“We’re excited to continue working on Facebook’s role in crisis response over this coming year, as well as to test new ways for the community to initiate and spread Safety Check in the coming weeks.”
Cottle went on the explain how the feature works. Apparently, given the occurrence of a crisis, Facebook will run a small piece of code or hook that executes itself after every News Feed load. If someone is in the affected area, Facebook then invites that person to mark himself or herself safe with a feed prompt and a notification. Then Facebook searches for the person’s friends that are also in that area. Each friend will get a notification that invites them to participate in a Safety Check, and then Facebook will search through those people’s friends to see who might be affected. According to Facebook, it takes only a few minutes to move through up to 100,000 people. At full capacities, the feature can check in on millions of people in only 10-15 minutes.
“Police tend to get inundated during [emergencies], and they have very little information until well after the event is over,” commented principal analyst the Enderle Group Rob Enderle. “This is more real time and lets people communicate en masse.”
According to Charles Kind at Pund-IT, Facebook’s “massive user base could make Safety Check a valuable resource for people trying to establish the whereabouts and condition of loved ones.”
“Safety Check’s effectiveness depends on how, and how well, users utilize it,” he continued. “If they don’t buy in, Safety Check will be, at best only partially successful.”
Nothing not obvious in that statement. Safety Check has proven helpful not only in the Paris terrorist attacks but also after the devastating earthquake in Nepal last year.
A 25-page report released by Flashpoint last week stated that the Islamic State’s cyberwar capabilities remain unsophisticated, but are on the rise. The report, titled “Hacking for ISIS: The Emergent Cyber Threat Landscape,” purported that IS’s “overall capabilities are neither advanced nor do they demonstrate sophisticated targeting.” That said, the group is taking steps to increase the effectiveness of its attacks, making its internet exploits no laughing matter.
“Their capability of hacking military or NSA servers in the United States is far-fetched, but it’s not completely impossible,” stated Laith Alkhouri, the director of Middle East and North Africa research at Flashpoint and one of the authors of the report.
“Concern is high, not because they have sophisticated hacking skills but because they’re utilizing multiple ways of bringing in new talent, utilizing all the freely available tools online, trying to utilize malware that’s already available and building their own malware.”
According to the report, ISIS hasn’t developed the organization and skills of more capable and threatening adversaries of the United States. Flashpoint’s Director of Security Research Allison Nixon had this to say:
“Chinese and Russian hackers are organized criminal gangs or nation-state supported groups…They’re highly educated, highly skilled. They use custom malware and custom tools… On the other hand, ISIS supporters are more like script kiddies or hactivists. They have a low level of sophistication and engage in behavior patterns and use toolsets that we would see in any other attention-seeking group.”
“They’re using open source tools and very old public exploits,” Nixon continued. “They’re only capable of hacking sites that aren’t well maintained in the first place.”
Nixon went on to define the difference between ISIS and hacktivists: “Hacktivists don’t threaten physical violence. Physical violence is an important part of ISIS hackers… They’re interested in translating these online threats into physical attacks.”
Most of ISIS cyberwarriors’ hacking tools are taken from publicly available open source projects owing to the ease of obtaining an open sourced tool. Creating their own tools that functioned with the same effectiveness would require a significant amount of time and skill that is difficult for ISIS to access at this current time.
“As pro-ISIS cyber attacks and capabilities have gradually increased over time but remained relatively unsophisticated, it is likely that in the short run, these actors will continue launching attacks of opportunity,” said the report.
That said, the ISIS cyberactors are demonstrating an upward trajectory in both number of attacks and sophistication of attacks.
“We’re starting to see these groups coalesce their brand. They’re increasing their ranks in number. They’re increasing their ranks in skill. They’re increasing their ranks in languages, which means they’re increasing the channels on which they operate and which they distribute their claims of responsibility,” stated Alkhouri. “That menas they have a much more powerful message and a more robust structure than before… They are coalescing their ranks to become a hacking powerhouse.”
There were 20 companies that presented at the forum this past year. Of those 20 companies 18 are listed on the ASX and UBS said there is clearly a better application to the tech model when we consider this in context of the global trends of late. “The market in my view seems to be a lot more accepting of taking on a bit more risk earlier on in the development of a company,” said Zach Gottesman in an interview last weekend at a bubba gump shrimp co bar during all you can eat popcorn shrimp. He went on to say that “A while back you would have had to go through more venture capital rounds and more pre-IPO rounds. But the market seems to be more accepting of taking on more risk earlier, a lot of the time before the company is even at profitability.”
The emerging markets will be our judge.
Goatman is some times wrong, but he makes some compelling points considering this.
“But essentially what the market is saying is, I’m prepared to pay over the odds for better than market growth and I won’t pay anything for less than market growth. So I can’t get that cyclical growth in an environment where the globe just isn’t growing and I need to go to structurally different models which is IT.”
His intellectual rival Marvin Claymore says that ,
“Generally investors in the small cap end need $100 million of free float before its starts to be reasonably meaningful. I would say $80 million to $100 million is where you start to get the attention of the market.”
At any rate we need to point to the fact that all signs point to bubble and beyond that its going to be a crash, so get what ever nuggets you can you can out of the market and head for the hills. What I would do if I were you is ensure that you are staying invested in markets that seem as if they are somewhat recession prone and affect necessarily markets. For instance energy, everyone is going to need it and its not going anywhere anytime soon, but if you want to keep you tech portfolio diverse you should consider something like solar city. We all know that Elon Musk has the midas touch and for many reasons his name alone cashes checks. If we are sure that you want to make a quick buck then Musk is your boy. He has a kind of messiah complex in the eyes of Americans and we know that when someone is seen in this way the market wants to put all they can into them. But if we want to play it safer then you should look into something like gold, if you think about it for whatever reason people always put an unjustifiable value on this useless thing but its not very techie. So if I were you I would look into the tech industry as the solution rather than the problem, if we are going to do that then we are going to good things.
As late as 35 years ago, first wearable as we understand them hit the market. Not really a wearable by our standards today, but for all intensive purposes the Casio C-80 calculator watch. This little puppy couldn’t bark with the big dogs today, but without it we wouldn’t have the path of the wearable we are on today. The wearable that got us started was the Star Trek communicator, and from there it was in the collective consciousness, to say ‘hey, lets get a little tech in our daily lives on our person.’ This boxy little derp stop watch, a full numeric keyboard and dedicated buttons for all your favy basic math functions trig excluded, and it told what time of the day it was. What more could you want?
Fast forward t0, today and the stakes are a little bit higher. With all of the innovations we’ve unlocked in the past 35 years 2016 is likely to be the year of the wearable as we know it, and its a beautiful thing. The apple watch debuted in 2015 and was the avant garde of this market, now they are a dime a dozen in the wearable world. Now we have the fitbit being not only a tech conscious choice for consumers but a product that is being marketed as a health conscious product, as if to say “if you care about your health, you should really consider getting a fit bit.” Following on the coat tails of that is the Nike Fuel Band which is basically the same thing, but probably more stylish by most accounts. What this means for your computer is no laughing matter.
It goes deeper than any particular product, it is the very way we think of the way we move in the world. For instance we no longer just learn some cool skill or trait today we learn “life hacks” as if what we have done in the real world can only make sense in relation to our devices and their hold on our taints.
Another thing the first wave of wearable has taught us is that at our core we want devices that can help us in our competitive and individualistic endeavors. Every app is great in what it can tell you about yourself, but you are not likely to stand the test of time if you don’t also have the means to compare yourself to national averages and compare yourself against others. Consider the app luminosity.com at its core the point is sold as a means for you to better yourself intellectually and remain sharp into old age. What it has become however is a kind of pissing contest where you compare yourself to national averages which has a duly beneficial marketing advantage for the company. If you are at a low end of the average you are going to want to continue to have it an hopefully rise among the ranks. Whereas if you are at the top it gets you really happy to know you are there and you are going to keep it as a conversation starter.
On Wednesday March 3, 2016 the brand Meta Technologies announced it would be starting to take preorders for it’s Meta 2 augmented reality wearable headset. Not only is this news big in the world of electromagnetism but the company has also set the lofty goal for itself that they would be shipping this mere $949 dollar head set no later than the third fiscal quarter this year.
Meta has painstakingly striven to develop a synthesis experience that CEO Meron describes as “the art of user interface, design with the the science of the brain,” at a 2016 TED talk conference.
as early as this fall they hope, developers can have the opportunity to as he believes, “make their augmented reality dreams come true”, promised Ryan M. Pamilin who is VP of sales at Meta. But make this augmented reality a reality is no easy step as he states. Siting not only the difficulties of scale and operation but the sheer lack of synergy or dynamic data solutions surrounding the industry and its operators as a whole.
That said the developers are confident that after only a few minutes of wearing the glasses you come to forget that you are wearing them at all, although many are skeptical because their is nothing like it to support such a claim. To this skepticism the Meta Developers are saying “bring it on” and taking the gloves off and believe it is so hard for people to take this leap because they’re hasn’t being anything like this. a wearable augmented reality headset for under $1,000.
There will be a learning curve similar to the in home computer or wide spread use of cell phones, However, many believe that this will not be a passing fad and will take over the way we experience data, and navigate the internet. a future is on the horizon where the line of real vs fake will be forever blurred. Where the meta physical implications that have been espoused will now be thrown into question leaving us to wonder “where am I?”
It is very likely the case that this technology will be used on a daily basis, from work to home, and in very much the same way we are always on the internet via our smart phones or computers the relationship will be even more invasive. i.e. today we know we are interacting with something, and that this thing, which is exists is separate of us, we go on our computer we and peak into a landscape or experience; but tomorrow we live the experience. Email updates will emerge in the foreground, as we walk to our desk, graphs appearing for the meeting the moment we wake up as we make breakfast for the kids. although this does have an obvious benefit to our productivity in the systematic execution of prescribed tasks it is important that we take pause and consider if this constant stimulation will affect the creativity that is borne out of reflective moments of boredom, that we consider our surroundings and our place in it.
That said, The Meta 2 drops this year, and demand is high so if you want to be in the first wave of the revolution now is the time to up your name on the list.
Whether you prefer classic hard disk drives or solid-state drives (also called flash drives), you rely on some form of electromagnetism to store your precious data. Your data has to be able to be converted into digital form to be stored in a computer, and as you likely know, digital data is stored in binary code, or a sequence of 0’s and 1’s.
But it’s not as if there’s just a bunch of 0’s and 1’s in your physical hard drive that your computer then configures into the data you recognize when you see it on your monitor. No, the physical way of storing binary code is through either the presence or absence of magnetism or electrical current.
In the case of a hard disc drive, if there’s no magnetism, that means 0. If there is magnetism, that means 1. A piece of magnetized metal reads the presence or absence of magnetism on tiny (microscopic) units of space on a spinning disk and from that understands what binary code to send to the computer, which then uses software to translate that code into more digestible information for you to read from your monitor.
In the case of a solid state drive, the absence of an electric current means 0, and the presence of an electric current means 1. Because electric currents can be created by transistors and transistors are able to be made smaller and smaller as time goes on (while hard disk drives can only be so small and still be functional due to their reliance on a spinning disk mechanism), solid-state drives are capable of being much smaller and storing the same amount of information as hard disk drives. However, if your SSD fails, it’s going to be way less likely that you’re able to recover the information.
But this give and take between electricity and magnetism goes much deeper than a choice between storage drives. Magnetism actually begets electricity, and the other way around. Here’s how:
It comes down to subatomic particles, as things so often do. Each electron is surrounded by a force called an electric field. When an electron moves, it creates a second field called a magnetic field. When electrons are made to move together, or flow in an electric current through a conductor (i.e. a metal or other substance with a structure that enables electrons to weave through the place comfortably), the conductor becomes a temporary magnet.
But that’s electricity begetting magnetism. How would that current even be forced to be created? If you get a coil of wire and place it near a magnet with an unchanging magnetic filed, nothing happens. However, if that magnetic field is changed by moving the magnet back and forth or spinning the wire, the changing magnetic field can produce an electric current in the wire.
Electricity and magnetism have always been extremely closely related, in an interactive relationship known as electromagnetism. Flowing electrons produce a magnetic field and spinning magnets cause an electric current to flow. Simple as that.
Amnesty International and the African Resources Watch (Afrewatch) released a report today regarding child labor in the Democratic Republic of Congo. According to the report, children ages seven and up are working 12-hour days in dangerous conditions to mine cobalt, a material that many tech firms use to create smartphones. The report also claims that large tech companies like Apple, Microsoft and Samsung have not performed the basic checks necessary to ensuring that their mineral mining operations don’t use child labor.
Cobalt is integral to the creation of rechargeable lithium batteries, which are found in many smart mobile devices. Over half the cobalt used globally originated in the Dominican Republic of Congo, which has often been criticized for its tolerance of child labor.
This is not news to human rights enthusiasts. In 2012, Unicef uncovered the fact that over 40,000 children had worked in DRC mines in the past year and that many of those mines harvested cobalt. Adult and child mine workers were interviewed, and many described being paid as little as $1 daily and enduring violence, intimidation and health problems on the job.
Amnesty International and Afrewatch claim that mines employing those people provided the cobalt in lithium batteries sold to 16 multinational brands. According to the report, the cobalt came from Congo Dongfang Mining, which is owned by the Chinese mineral company Huayou Cobalt. Huayou Cobalt then sells its minerals to battery manufacturers, who then sell their batteries to Apple, Microsoft, Samsung, Sony, Vodafone, and a variety of other tech giants.
According to Huayou Cobalt, company heads were not aware that their suppliers relied upon child labor and in general labor in unsafe working conditions.
Samsung, Sony and Vodafone apparently denied an claims to having a connection with this supply chain or to DRC Cobalt in the first place. Apple responded by saying it was evaluating many different materials including cobalt for labor and environmental risks. Microsoft claimed that it had not traced cobalt use in its products all the way to the mine level “due to the complexes and resources required.”
The DRC has met a variety of conflicts as a result of its possession of huge amounts of highly valuable natural resources. The demand for these resources brings plenty of buyers, causing the DRC to build up the largest workforce of miners in the world. However, these miners work in uncontrolled and dangerous conditions and are unchecked by environmental regulations, leading to land degradation and pollution.
Globally, the cobalt market has remained unregulated due to its possession outside the “conflict mineral” legislation that regulates the extraction of other minerals like gold and tin. Cobalt’s extremely high utility in the manufacture of smartphones and other mobile devices that run off small lithium batteries have perhaps made it necessary for it to be upgraded to “conflict mineral” status. This however, would likely face powerful lobbying by tech companies that prefer lower prices to human rights.
As to how knowledgable these companies were about the sources of their cobalt, it’s difficult to say. Though I for one would not be surprised if the secret’s outing was the biggest surprise this event had to offer the tech giants.
Obviously society has been hugely affected by the rise of the internet and the information that it makes available to users. Many of these effects have been measured, but many more are so useless or subtle that no one has seen fit to look into them. One question this writer asks because she’s being paid to say anything is: do people laugh more as a result of the emergence of the internet? Probably yes. But what does that mean for society as a whole? Let’s start out by looking to what laughter is and how it affects you.
Laughter is simply the physiological response to humor, which is itself a difficult thing to explain. Laughter as a phenomenon consists of two different parts: a set of gestures and a produced sound (though we have all had times in which we laugh so hard we produce no sound at all). When we laugh, our brain pressures us to participate in both of these activities, and hearty laughs allow for changes to occur in many parts of the body such as the arm, leg and trunk muscles.
Laughter is described by the Encyclopedia Britannica as “rhythmic, vocalized, expiratory and involuntary actions.” It involves the contraction of at least fifteen facial muscles and the stimulation of the zygomatic major muscle, which is responsible for moving your upper lip. The respiratory system is interrupted by the epiglottis half-closing the larynx, which is responsible for you gasping. Tear duct activation may occur, and the face may become red and wet.
Unfortunately for behavioral neurobiologist and laughter researcher Robert Provine, studying laughter is extremely difficult. He has found, however, that there are certain similarities among all laughter and that there a neurological process in the brain that leads people to be more prone to laughing if the people around them are also laughing.
Humor researcher Peter Derks claims that laughter response is “a really quick, automatic type of behavior.”
“In fact, how quickly our brain recognizes the incongruity that lies at the heart of most humor and attaches an abstract meaning to it determines whether we laugh,” he explained.
Cultural anthropologist Mahadev Apte had this to say: “Laughter occurs when people are comfortable with one another, when they feel open and free. And the more laughter, the more bonding within the group.”
Studies have also found that dominant individuals tend to use humor more than their subordinates. Controlling the laughter of a group can be a way of exercising power by controlling the emotional climate of said group. Some believe that laughter may have evolved to change the behavior of others.
What does this mean for an internet community ranging from trolls to bloggers? To some extent it means the creation of new circles of people across the world united by a shared sense of humor. It means that new social systems can function with humor as a major foundation of what everyone has in common and how power is attributed across the board. Memes are a thing.
You’ve likely heard of them; internet radio stations you can download and listen to at your leisure instead of making sure to clear your schedule and tune in on the right day at the right time. Podcasts are a great invention that came alongside the internet, and they’ve allowed for huge amounts of niche radio stations to pop up and spout all kinds of knowledge and opinions. Here’s a little info on where podcasts came from and how you can start your own.
The first podcast ever was created in 2004 by MTV video jockey Adam Curry and a software develeoper named Dave Winer. Curry had written a program called iPodder that allowed him to automatically download Internet radio broadcasts to his iPod, and then other software developers saw what he was going and improved on his idea, eventually creating the format for podcasting. Curry’s The Daily Source Code is now one of the most popular podcasts on the internet.
What’s great about podcasting is that it’s totally free from government regulation (unlike radio broadcasting, which requires that you purchase a license and comply with the Federal Communications Commission’s broadcast decency regulations). If you enjoy a good four-letter word now and then, chances this is good news. Despite this lack of regulation, copyright law still does apply to podcasters, so the government protects podcasters’ intellectual property without regulating it.
Podcasters are anything from highly paid employees of major corporations to people podcasting from home studios. They don’t rely on ratings or money, so people are free to talk about anything they want regardless of it being popular, allowing for there to be a podcast for every niche subject, from people just shooting the s*** to people totally committed to discovering UFOs and paranormal activity.
Some companies are actively trying to find a way to make money with podcasting. There are websites like podcastalley.com and podcast.net that act as a source for podcasts and now feature advertisements. Popular podcasts hosted by Tom Segura as well as the Stuff You Should Know podcast have their hosts present commercials for Me Undies and other random products.
If you’d like to start listening to a podcast, just choose a podcasting site and click on the hyperlink for whatever podcast sounds good to you. You could check out the iTunes store, The Podcast Network or The Podcast Directory if you want to browse for possible podcasts that suit your fancy. There are also apps on your mobile phone that you can download.
Audio files made for different sizes and capacities of audio streaming have been invented to compete with the standard MP3; there’s AAC (Advanced Audio Coding) and WMA (Windows Media Audio) for example. These advancements are so prevalent that no matter what you want, you can be sure that there’s a free version out there.
Maybe you’d like to create a podcast. Don’t even hesitate! It’s super easy. Just plug a microphone into your computer, install an audio recorder for Windows, Mac or Linux, create an audio file by making a recording of whatever you want on your podcast, and upload that audio file to one of the podcasting sites. If you want anyone to listen to it ever, you’re going to have to promote it pretty heavily.
You can also opt into videocasts if you’re interested in making more of a TV show type thing.
Malicious software is always engineered to hide that it’s malicious. Programs meant to fight malicious software must be sophisticated enough to identify it despite its attempts at camouflage. So far the conflict has raged on with neither type of software able to eliminate the other completely and each type of software having no choice but to become ever more advanced. However, resolution may be just around the corner.
Cybersecurity company Deep Instinct just released a security solution that utilizes “deep learning” to enable a program to learn to identify bad code on its own, without being programmed to recognize anything in particular.
“Deep learning draws its inspiration from the human mind. It organizes itself into a structure of synthetic neurons. It’s another term for neural networks,” explained Bruce Daley, principal analyst at Tractica. “It was rebranded because there was so little progress with neural nets.”
Daley went on to explain exactly what kind of advantage deep learning capabilities can offer an application: “With traditional programming, as you code, you have to anticipate all the situations that arise that you have to deal with. What deep learning does is take the data and build a model from what it finds in the data that’s statistically relevant.”
“So you don’t have to anticipate all the relationships the program will encounter,” he added. “It turns into something like making beer or making bread.”
Another distinction: deep learning is more advanced than machine learning. For example, in the context of facial recognition software, a program would contain information about how to identify a nose, eyes, bone structure, etc. A facial recognition program outfitted with deep learning capabilities would be able to learn the facial features itself.
The difference between a normal program and one equipped with deep learning is profound; traditional programming methods allow for the slightest change in malicious code to fool a program. Deep Instinct CTO Eli David explained, “It’s as if I show you the picture of a cat, then I modify a few pixels, and you can’t recognize it’s a cat.”
Deep learning allows a program to have a much more comprehensive understanding of what makes malicious software what it is, so a few metaphorical “pixels” won’t make all the difference.
“With deep learning, you can show just the tail of the cat, and it will return with high confidence that it’s a cat. It is extremely resilient to variance and modification,” explained David.
Deep Instinct clearly believes it, and is now wagering on cybersecurity being a fruitful subset of deep learning applications. Given 2015’s proliferation of high-profile cyberattacks and the push towards increased government surveillance, it’s not a bad bet.
For how advanced Deep Instinct’s security solution is, it remains pretty small; it takes up only 10 MB of memory, and is generally inactive so it doesn’t take up much processing power either.
“Most of the time this agent does nothing,” said David. “When it detects a new file–any type of file– it passes it through the deep learning module on the device. If the file is malware, it will remove it or quarantines it.”