“A 6,000-word report published in the New York Times last week disclosed in humiliating detailthe lengths to which Facebook has gone to protect its dominance and attack its critics. As various interlocking crises concerning hate speech, misinformation, and data privacy widened, top executives ignored, and then kept secret, evidence that the platform had become a vector for misinformation campaigns…
Over the past year, I’ve spent time trying to wean myself off tech mega-platforms, generally with little success. Google’s search, for all my complaints, is still the best way for me to navigate the internet; Amazon is still so unbelievably convenient that the thought of quitting it exhausts me. But I logged out of Facebook more than a year ago and have logged back in fewer than a dozen times since. Checking Facebook had been a daily habit, but it also hadn’t improved my life or made itself necessary. Not many Roman plebes would have said that about the Pax Romana. Some empires fall because they’re invaded from the outside or rot from within. Zuckerberg’s could be the first in history to collapse simply because its citizens logged out.“
“A startup called HyperSurfaces wants to completely change how you interact with the physical world — and based on some recently released demo videos, it might just meet that lofty goal. The London-based startup recently unveiled a new technology that can transform any object into a user interface. Essentially, this tech lets you communicate with a computing system using virtually anything you like as a conduit — a glass wall, a car door, even a metal clothes rack — and it has the potential to end our reliance on keyboards, buttons, and touch screens forever.“
“Let’s apply that reality to our robe example. Let’s say the robe costs $60, and yields a $20 profit for our e-commerce advertiser, not including marketing costs. That means that same advertiser is can spend upwards of $19.99 per unit on advertising (more, if a robe purchaser turns out to be a “big basket” e-commerce spender). So what does our advertiser do? Well, they set a retargeting campaign aimed anyone who ever visited our erstwhile robe’s page. With CPMs averaging around a buck, that robe’s going to follow nearly 20,000 folks around the internet, hoping that just one of them converts.“
Nice: Looks like Instagram is trying to compete with Linkedin in terms of password in-security: Instagram accidentally exposed some user passwords through its data download tool – The Verge … :
“According to Instagram, some users who used that feature had their passwords included in a URL in their web browser, and that the passwords were stored on Facebook’s servers, Instagram’s parent company. A security researcher told The Information that this would only be possible if Instagram stores its passwords in plain text, which could be a larger and concerning security issue for the company. An Instagram spokesperson disputed this, saying that the company hashes and salts its stored passwords.“
“Women in computing have shaped the evolution of information technology. They were among the first programmers in the early-20th century, and contributed substantially to the industry. As technology and practices altered, the role of women as programmers has changed, and the recorded history of the field has downplayed their achievements.“
“This is a timeline of women in computing. It covers the time when women worked as “human computers” and then as programmers of physical computers. Eventually, women programmers went on to write software, develop Internet technologies and other types of programming. Women have also been involved in computer science, various related types of engineering and computer hardware.“
Ein guter Vortrag über Teambuilding und Führung: “Erfolg im Team: So geht Führung” von Bernhard Zytariuk
Money quote: “Die Fehler bei uns Menschen zu finden, das ist total einfach. Wir sind alles Mangelwesen mit großen Unzulänglichkeiten und die zu finden ist wirklich keine große Kunst. Aber die Stärken der Mitarbeiter zu finden, das ist die Hohe Schule. Und die Stärken dann noch zu entwickeln, das ist noch viel wichtiger.”
“An analysis of recently declassified U.S. military documents confirms suspicions that, during the late stages of the Vietnam War, a powerful solar storm caused dozens of sea mines to explode. It’s a stark reminder of the Sun’s potential to disrupt our technological activities in unexpected ways. As part of Operation Pocket Money, the U.S. Navy planted a series of Destructor sea mines near strategic ports off the coast of North Vietnam. A few weeks later, on August 4, 1972, crew members aboard U.S. Task Force 77 aircraft suddenly observed a batch of explosions south of Hai Phong. In all, some 20 to 30 explosions were documented in just 30 seconds. Another 25 to 30 patches of muddy water were also observed, indicative of further explosions.”
“A team of security researchers has discovered another serious side-channel vulnerability in Intel CPUs that could allow an attacker to sniff out sensitive protected data, like passwords and cryptographic keys, from other processes running in the same CPU core with simultaneous multi-threading feature enabled.
The vulnerability, codenamed PortSmash (CVE-2018-5407), has joined the list of other dangerous side-channel vulnerabilities discovered in the past year, including Meltdown and Spectre, TLBleed, and Foreshadow.”
“Silicon Valley technology giants such as Facebook and Google have grown so dominant they may need to be broken up, unless challengers or changes in taste reduce their clout, the inventor of the World Wide Web told Reuters.“
… : Smart Home: Google will Staubsaugerdaten von iRobot nutzen – Golem.de … :
What could possibly go wrong?
“Dass Kunden wollen, dass Google Daten über den Grundriss ihrer Wohnungen sammelt, ist allerdings unwahrscheinlich. Google sagte The Verge daher direkt, dass die Daten nicht im Werbegeschäft verwendet würden.“
Lise Meitner erkannte die Kernspaltung: ein Meilenstein, der die schlimmste aller Waffen ermöglichte. Doch davon ahnte die vor 50 Jahren verstorbene Physikerin nichts.
“In an unexpected report, Bloomberg stated IBM is close to announcing that it will be acquiring Red Hat. The news has been confirmed. IBM is acquiring Red Hat for $190.00 per share in cash. This a total enterprise value of approximately $34 billion.”
“Rometty continued,”Most companies today are only 20 percent along their cloud journey, renting compute power to cut costs. The next 80 percent is about unlocking real business value and driving growth. This is the next chapter of the cloud. It requires shifting business applications to hybrid cloud, extracting more data and optimizing every part of the business, from supply chains to sales.”
… and Jim himself on the Red Hat blog:
“We have barely scratched the surface of the opportunity that is ahead of us. Open source is the future of enterprise IT. We believe our total addressable market to be $73 billion by 2021. If software is eating the world – and with digital transformation occurring across industries, it truly is – open source is the key ingredient.
Powered by IBM, we can dramatically scale and accelerate what we are doing today. Imagine Red Hat with greater resources to grow into the opportunity ahead of us. Imagine Red Hat with the ability to invest even more and faster to accelerate open source innovation in emerging areas. Imagine Red Hat reaching all corners of the world, with even deeper customer and partner relationships than we have today. Imagine us helping even more customers benefit from the choice and flexibility afforded by hybrid and multi-cloud. Joining forces with IBM offers all of that, years ahead of when we could have achieved it alone. Together we can become the leading hybrid cloud solutions provider.”
Here’s the full press release by Red Hat …
… and what you can do about it. http://ncase.me/trust has a great, in fact the best explanation I have seen so far. (From my Leadership presentation).
Reality update: Open source and the demise of proprietary software – Timescale … :
“The challenges with the open-source model
Developing a successful open-source project is not easy As we can see from its history, there has always been a tension in open source: e.g., philosophical licenses focused on preserving “freedom” vs. permissive licenses taking a pragmatic approach. But there are two larger tensions today: (1) how to balance openness with sustainability and (2) how to manage the transition to the cloud.“
“An example of DCShadow confirms that new enterprise attack vectors appear. It is essential to stay on the crest of the wave in this ocean of information security, look ahead, and act quickly.“