Categories
Artificial Intelligence Blockchain Education Innovation Reading Technology

Latest Read: Customer Data and Privacy

Customer Data and Privacy: The Insights You Need from Harvard Business Review. HBR is providing a good series of article addressing how your data is collected and the impact upon your privacy.

Customer Data and Privacy: The Insights You Need from Harvard Business Review by Harvard Business Review, Timothy Morey, Andrew Burt, Christine Moorman, Thomas C. Redman

For some, this may be rather jarring. Nevertheless, how did Facebook generate $116 Billion in revenue in 2022? Accordingly the sale of ads on Facebook is…. you. Yes, in fact you are what Facebook is selling.

It would also be fair to understand the role of Machine Learning coupled with Data Science that created this revenue stream. Facebook is collecting every ‘Like’ you make, every photo uploaded is scanned with facial recognition and every article posted is data mined.

Add this all up and Facebook is literally sitting on overwhelmingly vast amounts of user data. To their credit, Facebook has become the champion of mining profits from all the data they have about you.

Yet are these companies also building trust with you? They know everything about you, and when combined with ‘free’ apps, the tracking continues. We are aware of Europe’s General Data Protection Regulation (GDPR) and the California Consumer Privacy Act (CCPA). Yet for everyone not living in California, there is a real lack of regulation. This allows companies to remain in control of you.

Categories
Education Innovation Reading Technology

Latest Read: Crypto

Crypto: How the Code Rebels Beat the Government—Saving Privacy in the Digital Age by Steven Levy. He is the former chief technology correspondent for Newsweek. Today he is an editor at Wired, and author of eight books. Crypto, won the Frankfurt E-book Award for the best non-fiction book of 2001.

Crypto: How the Code Rebels Beat the Government - Saving Privacy in the Digital Age by Steven Levy

If you’ve ever made an e-commerce purchase with your credit card, then you have used cryptography.

Steven guides the reader into learning about the history of cryptography. This book begins with Whitfield Diffie. He authored initial developments of cryptographic keys. He was then joined by Martin Hellman in 1976.

From this point, Steven reveals how Ron Rivest, Adi Shamir, and Leonard Adleman, teaching at MIT also furthered cryptography research. Their development led to the formation of their company, RSA.

The National Security Agency (NSA) certainly interpreted these cryptography developments as a threat and began working to thwart their developments.

Categories
Education Globalization Reading Technology

Latest Read: An Ugly Truth

An Ugly Truth: Inside Facebook’s Battle for Domination by Sheera Frenkel and Cecilia Kang. Sheera is a prize-winning technology reporter based in San Francisco. Cecilia covers technology and regulation.

An Ugly Truth: Inside Facebook’s Battle for Domination by Sheera Frenkel and Cecilia Kang

This story of Facebook’s corruption and lack of a moral compass cannot not be any more clearer than this book. In addition, this is a story of greed, control, egos of company leaders. At first glance you may think this is simply not possible.

In contrast, the authors are tapping into current and former employees. All paint a rather horrific picture of Facebooks’ single focus: profits.

Above all, documents and interviews reveal how company wide lack of action weakened American democracy. Furthermore, ignoring the genocide of Rohingya peoples across Myanmar paints a rather shocking picture of Facebook as a company.

A key point certainly overlooked is how Facebook ‘arrived’ at the beginning of the internet’s gilded age. Therefore, no rules applied, just profits whatever the cost. Profit is certainly the only focus for Mark Zuckerberg. On the other hand, attempting to derail his profit focus results with aggressive and sometimes illegal tactics.

Chapter 7: Company over Country

An acknowledgment by Facebook’s security team that Russian spies hacked user accounts of GOP politicians certainly was not a surprise. Yet, the Russians hacked accounts of children from those GOP candidates. This also was certainly very shocking. Accordingly, all this activity was culminating in an internal report to company leadership:

Hence, Facebook did nothing. No notice to American intelligence services. Ultimately Facebook engineers held a rather unique eye on all user interactions.

Categories
Education Google Innovation Reading Technology

Latest Read: Data and Goliath

Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World by Bruce Schneier. He is a fellow at the Berkman Klein Center for Internet & Society at Harvard University, lecturer in Public Policy at the Harvard Kennedy School, and board member of the Electronic Frontier Foundation, AccessNow, and the Tor Project.

Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World

Bruce is moreover, writing a book about surveillance. He is addressing the who and why, how it works, and the business models. This is certainly a complicated issue. Most importantly, your privacy is very important.

Above all, we live in a surveillance state today. Bruce is sharing enormous amounts of resources revealing how vast amounts our personal data are harvested. In addition, Facebook is the greatest abuser, with Google’s Gmail not far behind.

One of the important lessons is that much of this has become voluntary. We want free services (email, cloud storage) or cheap hardware mobile phones and big, smart TVs, so we actually permit corporate surveillance within our living rooms.

In addition, this reminds me of lessons from The Age of Surveillance Capitalism by Shoshana Zuboff. Companies promise cheaper services and convenience to justify their surveillance technology, while local, state and federal governments make a promise of protection and physical security.

Apps are tracking us all day long

We certainly all understand by now that cellular carriers track everywhere you travel. Facebook records your location each time you open their app on your phone. In addition, Google Maps and their Waze traffic app records your GPS data, and even your credit card purchases.

Categories
Artificial Intelligence Education Innovation Reading Technology TED

Latest Read: Hello World

Hello World: Being Human in the Age of Algorithms by Hannah Fry, Today Hannah is a senior lecturer at University College London’s Centre for Advanced Spatial Analysis.

Hello World Being Human in the Age of Algorithms by Hannah Fry

Generally speaking, Hannah has written a wonderful book addressing algorithms and artificial intelligence. Society has certainly fallen behind the moral implications of algorithms and Hannah speaks truth to power.

Above all, do not let the idea of learning about algorithms, artificial intelligence, or machine learning intimate you. Hannah explains all of these terms with easy to understand examples. This is why her book is popular and well regarded.

I really appreciate how Hannah is addressing algorithm technology across the following chapters: Power, Data, Justice, Medicine, Cars, and Crime. However, I will save her best lesson for last.

Machines that see

So, Hannah reveals artificial intelligence allows a computer to identify dogs. Once a computer has identify over one million dog photos, artificial intelligence can identify dogs like an expert.

Yet, when applying this to breast cancer diagnosis the magic of machine learning can truly shine. Feed a computer millions images of breast cancer tissue images and a local doctor at a small community hospital in remote Iowa can tap into machine learning to help diagnose with a better degree of accuracy once only for a doctor with 20 years of breast cancer diagnosis at Memorial Sloan Kettering Cancer Center in New York City.