The power of Big Tech has been growing slowly, and in a way that many of us have accommodated as a necessary infiltration. But the scope of that power—and its costs to the culture we have ordered—have been less transparent.
There will be no more apologies from facebook today as it takes the offensiveaditi agarwal
Mark Zuckerberg, the corporation's chief executive officer, has signed off on an attempt to reveal customers pro-Facebook memories and to distance himself from scandals.
The removal of a russian app raises new concerns for apple and googleaditi agarwal
The app in query, referred to as Smart Voting, became a tool for establishing competition to Russia President Vladimir Putin beforehand of elections held over the weekend.
Realizing Governance 2.0: Capturing the Value of Networked Citizens and the Fifth Estate. Presentation for the Institute of Communication and New Technologies, University Mayor, Chile, 29 July 2011.
Lee Rainie, Director of Internet and Technology Research at the Pew Research Center, presented this material on October 14, 2020 at a gathering sponsored by the International Institute of Communications. He described the most recent Center public opinion surveys since mid-March, covering the impact of the COVID-19 outbreak, racial justice protests that began in the summer, and the final stages of the 2020 presidential election campaign. He particularly examined how and why people are using the internet in the midst of multiple national crises and their concerns about digital divide and homework gap issues. And he covered how the Center has researched the impact of misinformation in recent years.
ONA San Diego presentation on the top 10 trends to watch in 2017 by Tom Mallory of San Diego Union-Tribune and Amy Schmitz Weiss of San Diego State University (Presented Jan. 26, 2017).
There will be no more apologies from facebook today as it takes the offensiveaditi agarwal
Mark Zuckerberg, the corporation's chief executive officer, has signed off on an attempt to reveal customers pro-Facebook memories and to distance himself from scandals.
The removal of a russian app raises new concerns for apple and googleaditi agarwal
The app in query, referred to as Smart Voting, became a tool for establishing competition to Russia President Vladimir Putin beforehand of elections held over the weekend.
Realizing Governance 2.0: Capturing the Value of Networked Citizens and the Fifth Estate. Presentation for the Institute of Communication and New Technologies, University Mayor, Chile, 29 July 2011.
Lee Rainie, Director of Internet and Technology Research at the Pew Research Center, presented this material on October 14, 2020 at a gathering sponsored by the International Institute of Communications. He described the most recent Center public opinion surveys since mid-March, covering the impact of the COVID-19 outbreak, racial justice protests that began in the summer, and the final stages of the 2020 presidential election campaign. He particularly examined how and why people are using the internet in the midst of multiple national crises and their concerns about digital divide and homework gap issues. And he covered how the Center has researched the impact of misinformation in recent years.
ONA San Diego presentation on the top 10 trends to watch in 2017 by Tom Mallory of San Diego Union-Tribune and Amy Schmitz Weiss of San Diego State University (Presented Jan. 26, 2017).
Presentation given at the ALIA Conference (Sept 1st, 2010) http://conferences.alia.org.au/access2010/
NOTE: slide 2 is a screenshot from Mike Wesch's "The Machine is Us/ing Us" (http://www.youtube.com/watch?v=6gmP4nk0EOE) while the last 2 minutes of this video is played.
As we approach the six-year mark from the original Web 2.0 thesis, the trends are becoming clearer than ever. Tim O'Reilly, CEO and Founder of O'Reilly Media, and John Battelle, Founder and Chairman of Federated Media Publishing present the trends that are adding up to something profound and different. When web meets world, we get Web Squared.
Consumption of news, information and entertainment has radically changed, and not just online. Lee Rainie, director of the Pew Internet & American Life Project, presents the latest data and trends.
Reinventing Journalism: Trends, Innovations and Unanswered QuestionsDamian Radcliffe
A round-up of some key recent developments in the world of journalism related to evolving and emerging business models. These slides outline changes in consumption and advertising, as well as innovations in content creation, consumption and distribution. Finally, it also explores whether our concepts of journalism need to evolve and how the sector might move forward.
Associate Director for Research Kristen Purcell will be discussing Pew Internet's groundbreaking data on local news information ecosystems at Ohio State's Journal of Law and Policy for the Information Society's 2012 symposium, “The Future of Online Journalism: News, Community and Democracy in the Digital Age.”
Presentation given at the ALIA Conference (Sept 1st, 2010) http://conferences.alia.org.au/access2010/
NOTE: slide 2 is a screenshot from Mike Wesch's "The Machine is Us/ing Us" (http://www.youtube.com/watch?v=6gmP4nk0EOE) while the last 2 minutes of this video is played.
As we approach the six-year mark from the original Web 2.0 thesis, the trends are becoming clearer than ever. Tim O'Reilly, CEO and Founder of O'Reilly Media, and John Battelle, Founder and Chairman of Federated Media Publishing present the trends that are adding up to something profound and different. When web meets world, we get Web Squared.
Consumption of news, information and entertainment has radically changed, and not just online. Lee Rainie, director of the Pew Internet & American Life Project, presents the latest data and trends.
Reinventing Journalism: Trends, Innovations and Unanswered QuestionsDamian Radcliffe
A round-up of some key recent developments in the world of journalism related to evolving and emerging business models. These slides outline changes in consumption and advertising, as well as innovations in content creation, consumption and distribution. Finally, it also explores whether our concepts of journalism need to evolve and how the sector might move forward.
Associate Director for Research Kristen Purcell will be discussing Pew Internet's groundbreaking data on local news information ecosystems at Ohio State's Journal of Law and Policy for the Information Society's 2012 symposium, “The Future of Online Journalism: News, Community and Democracy in the Digital Age.”
How to protect privacy sensitive data that is collected to control the corona...Ulf Mattsson
In Singapore, the Government launched an app using short-distance Bluetooth signals to connect one phone using the app with another user who is close by. It stores detailed records on a user's phone for 21 days decrypt the data if there is a public health risk related to an individual's movements.
China used a similar method to track a person's health status and to control movement in cities with high numbers of coronavirus cases. Individuals had to use the app and share their status to be able to access public transportation.
The keys to addressing privacy concerns about high-tech surveillance by the state is de-identifying the data and giving individuals control over their own data. Personal details that may reveal your identity such as a user's name should not be collected or should be protected with access to be granted for only specific health purposes, and data should be deleted after its specific use is no longer needed.
We will discuss how to protect privacy sensitive data that is collected to control the coronavirus outbreak.
8Dangers of Social MediaThe world has been evolving in a v.docxsodhi3
8
Dangers of Social Media
The world has been evolving in a very swift rate. In just a matter of years modernization has reached countries with leading economies to even those that have limited means of communication or travelling. The last years of the 20th century and the start of the 21st century can be considered to be one of the most evolving eras of human kind. Technology and urbanization have just rocketed to the top, capitalism and profitability have become a priority over other thing and communication or travelling have become faster and easier. One of the main components responsible for all these changes is the computer and the internet, which has slowly paved ways of new online platforms like the Social Media. This innovation has replaced many different things has completely changed the lifestyle of people around the world. Businessman use social media to communicate with other personals, instead of travelling or one to one interacting with them. Online university programs have been created with the help of online video or audio calls, so students don’t need to be present in the class rooms during lectures for attending classes. This essay will talk about the negative and positive effects of social media on kids and adults, especially in the United Arab Emirates. The essay is opinioned, however to prevent bias, I have used sources from scholarly article to support my arguments about social media. The thesis statement for this essay is, Social media is very harmful for kids in UAE because kids get addicted to it easily and it can possess serious safety risks.
The computers were introduced initially in the 20th century for multiple reason, like the Enigma was used to encrypt the messages being sent by the German naval force during the World War 2. Moreover, the computer was also designed to help scientists with quick calculations and results. It is with time that new companies like the Apple and Microsoft, introduced new ways of using the computer. It was never used to be a tool of communication, however things changed further when the interned was established. Like, the computer, it was also very different to what it is today. The internet was used an alternate to phones, as the scientists tended to transfer their results to other places quickly by using it. The next stage was when smartphones were introduced and revolutionized the internet. Everything became portable, from getting information, to communication. Social Media was one of the main innovations during this time and it today, it can be considered to be one of the most influential and important inventions in human history. People of today, from kids to adults always have a phone with themselves, especially in developed and modernized countries like the United States of America, England and United Arab Emirates. Social Media is used by people in these countries in many different forms. YouTube is one of the most profitable and used component of social media today as it all.
8Dangers of Social MediaThe world has been evolving in a v.docxblondellchancy
8
Dangers of Social Media
The world has been evolving in a very swift rate. In just a matter of years modernization has reached countries with leading economies to even those that have limited means of communication or travelling. The last years of the 20th century and the start of the 21st century can be considered to be one of the most evolving eras of human kind. Technology and urbanization have just rocketed to the top, capitalism and profitability have become a priority over other thing and communication or travelling have become faster and easier. One of the main components responsible for all these changes is the computer and the internet, which has slowly paved ways of new online platforms like the Social Media. This innovation has replaced many different things has completely changed the lifestyle of people around the world. Businessman use social media to communicate with other personals, instead of travelling or one to one interacting with them. Online university programs have been created with the help of online video or audio calls, so students don’t need to be present in the class rooms during lectures for attending classes. This essay will talk about the negative and positive effects of social media on kids and adults, especially in the United Arab Emirates. The essay is opinioned, however to prevent bias, I have used sources from scholarly article to support my arguments about social media. The thesis statement for this essay is, Social media is very harmful for kids in UAE because kids get addicted to it easily and it can possess serious safety risks.
The computers were introduced initially in the 20th century for multiple reason, like the Enigma was used to encrypt the messages being sent by the German naval force during the World War 2. Moreover, the computer was also designed to help scientists with quick calculations and results. It is with time that new companies like the Apple and Microsoft, introduced new ways of using the computer. It was never used to be a tool of communication, however things changed further when the interned was established. Like, the computer, it was also very different to what it is today. The internet was used an alternate to phones, as the scientists tended to transfer their results to other places quickly by using it. The next stage was when smartphones were introduced and revolutionized the internet. Everything became portable, from getting information, to communication. Social Media was one of the main innovations during this time and it today, it can be considered to be one of the most influential and important inventions in human history. People of today, from kids to adults always have a phone with themselves, especially in developed and modernized countries like the United States of America, England and United Arab Emirates. Social Media is used by people in these countries in many different forms. YouTube is one of the most profitable and used component of social media today as it all ...
Impact of the globalization of social media(advantages and disadvantages)ZeeshanMajeed15
Impact of the Globalization of social media :
Social media, if used strategically, is one of the most powerful tool to communicate and engage with masses. While brand marketers are innovatively using the web to engage with potential customers, there are many who harnessed this impactful platform to raise attention and initiate action on social causes. There have been some majorly successful campaigns that used an out of the box approach of inducing a comic factor to grab attention of the masses. These campaigns, besides tickling audience's funny bone, also instigated a sense of responsibility in them to participate in a larger than life issue behind the humour.
Social media trends can be very influential and make a real difference. From clicktivism like the ALS Ice Bucket Challenge from 2014 to the many movements promoting inclusivity and body positivity, social media has been a catalyst for many positive changes in our society. However, there's a different breed of social media trends that serve no good purpose. And actually, can be dangerous to anyone replicating them. The very worst development in social media during 2021 was the acceleration of pernicious political posts. Social media has been a friendly platform for spewing irresponsible ideology for years, but 2021 set a new record. And then other trends emerged on Facebook, Instagram, and TikTok that proved dangerous and, at times, have resulted in serious injuries as well as death. From the "choking game" to"Devious licks," as well as "slap a teacher" contest, are all very disturbing.
These platforms are now upstream of both politics and culture, they set the norms for our societies. The solution is reducing the virality. No one company can do that alone, it has to be across Facebook, TikTok, Instagram, Twitter, all at once.
Regulations
Concerns about the public regulation of social media platforms emerged after the 2016 presidential elections in the U.S. and the U.K. with the Brexit referendum, The government of Pakistan recently passed a new set of regulations that critics say will give the government more control over how Pakistanis can use social media. The "Citizens Protection (Against Online Harm) Rules, 2020" oblige social media platforms like Facebook, Twitter and Google to block or remove posts that are considered objectionable by the government. The government can also acquire data and information from the companies.
According to current government guidelines, everyone who cannot do their job from home should now go to work, provided their workplace is open. As people start to trickle back into the workplace over the next few months, we’re going to see the emergence of a very dierent workplace. More people are going to continue to work remotely, whether full-time or part-time, and businesses are going to have to deal with the impact of the predicted recession.
Adding Incident Response Containers To The Cyber Security Tool BeltDharmendra Rama
"In order to perform a successful investigation, you are going to need to have access to dierent tools in the environment." So says PayPal's Renana Friedlich. Beyond that, Renana suggests to ensure that you know the criteria that you are investigating- number of users impacted, regulatory risk to the company, etc." It's only at that point that an enterprise can consider an incident response container.
The Corsair Vengeance a4100 is part of its newest line of gaming PCs, introduced alongside the i4200 series earlier this summer. This AMD Ryzen powered system comes with an Elgato 4K60 Pro capture card pre-installed, which makes it a dope option for anyone looking for a powerful pre-built PC for streaming and content creation.
MINI “GAMING PC” NAILS THE LOOK, STREAMS THE GAMESDharmendra Rama
To have a proper gaming “rig”, you need more than a powerful GPU and heaps of RAM. You’ve also got to install a clear side-panel so lesser mortals can ogle your wiring, and plenty of multicolored LEDs to make sure it’s never actually dark when you’re up playing at 2 AM. Or at least, that’s what the Internet has led us to believe
Building a gaming computer may sound daunting — like a hobby reserved for those who know a lot about computers and are tech-savvy. But the truth is, with a bit of time, patience and willingness to learn, anyone can build a computer
PC gaming can be cheap when it comes to buying games, thanks to endless Steam and Epic sales, but it’s less forgiving on your wallet when it comes to buying the actual hardware, right? Not if you build your next gaming PC with a little smart shopping and planning.
How I accidentally built a tech startup — without any technological knowledgeDharmendra Rama
In 2012, I was working in some of the most remote areas of Pakistan, aiming to empower local farmers’ waste energy projects and advance sustainability in the region. I was traveling hundreds of kilometers to carry out face-to-face negotiations, racking my brain thinking about ways to guarantee transparency in an environment where cash payments weren’t just the norm, but often the only option.
computer engineering teaches a person how to develop both computer hardware and software. Computer engineering students also learn electronic (and sometimes electrical) engineering, as well as software design. Dharmendra Rama.
You might have heard or read about the Internet of Things on the net somewhere. If you’re clueless about it, the Internet of Things, or IoT for short, involves interconnecting smart gadgets together using internet connectivity with the purpose of collecting data and controlling these devices. Dharmendra Rama
With pandemic-era acquisitions,big tech is back in the anti trust crosshairsDharmendra Rama
Facebook has indicated it wants to forge new developer and content relationships for Giphy, but what the world’s largest social network really wants with the popular gif platform might be more than meets the eye. As Bloomberg and other outlets have suggested, it’s possible that Facebook really wants the company as a lens into how users engage with its competitors’ social platforms. Giphy’s gif search tools are currently integrated into a number of messaging platforms, including TikTok, Twitter and Apple’s iMessage.
Apple, Google rework coronavirus tracking tech to address privacy concernsDharmendra Rama
As companies and governments around the world battle the coronavirus pandemic, Apple and Google are making changes to the contact tracing technology they've developed to help inform people when they may have been exposed to the virus.
21 tech gadgets we use to boost our productivity and comfort when we work fro...Dharmendra Rama
One of the biggest challenges of working from home is setting up a home oce with the right tools, but once you've got everything in place, it's easier to get your work done.
13 Smart Ways To Measure Your Tech Team's ProductivityDharmendra Rama
When leading a tech team, it’s important to measure your team’s overall productivity. This metric can be used for major business decisions down the line. However, measurin
GETTYP hoto: your tech team’s productivity isn’t as simple as counting revenue gained or units produced. Beyond the outcome of the project, there are several other factors that should be taken into account.
Computer Engineering 101: Stripping computers to their two most basic partsDharmendra Rama
Every computer in the world and almost every electronic device for that matter has two basic parts, which can be considered their prime building blocks.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Big Tech, Privacy, and Power
1. T
First Principles
Big Tech, Privacy, and Power
The power of Big Tech has been growing slowly, and in a way that many of
us have accommodated as a necessary infiltration. But the scope of that
power—and its costs to the culture we have ordered—have been less
transparent.
he ground is shifting quickly beneath our feet when it comes to tech, privacy, and
power. And, although tech companies, their advocates, and even some policymakers,
would like us to imagine these issues are cut and dried, they are not.
In their book The Sovereign Individual [https://www.amazon.com/Sovereign-Individual-Mastering-
Transition-Information/dp/0684832720] , published on the eve of the year 2000, James Dale
Davidson and William Rees-Mogg attempt to grapple with the forthcoming technological changes
By Rachel Bovard • April 25, 2020
2. That a private company can now unilaterally decide to simply delete the
promotion of protests it deems unacceptable is a remarkable expansion of its
power over what was once a sacrosanct and constitutionally protected
that the new millennium inevitably would bring. “As technology revolutionizes the tools we use,” they
wrote, “it also antiquates our laws, reshapes our morals, and alters our perceptions.”
This is the dynamic that has been unfolding slowly over the last 20 years, as Google, Facebook,
Twitter, and other social media platforms have transformed how we engage with communications,
culture, commerce, and one another.
But the COVID-19 pandemic has pushed that transformation into overdrive, while exposing just how
significantly power dynamics—between individuals and corporations, and individuals and the state—
have shifted.
Earlier this week, Facebook announced it was removing posts intended to organize rallies protesting
government stay-at-home policies in various states. Initially, a Facebook spokesman claimed the
company was doing this at the behest of state governments. Nearly 12 hours later, the company
clarified [https://thefederalist.com/2020/04/21/facebook-isnt-actually-colluding-with-state-
governments-but-its-still-removing-protest-posts/] it was independently removing posts “when
gathering[s] do not follow the health parameters established by the government.”
Facebook did not clarify if this meant gatherings in violation of state laws, or executive orders with no
force of law, or merely violations of government suggested practices.
This opens up a new, concerning lane for Facebook, and for tech more broadly. As Big Tech cements
itself as our primary facilitator of communication (as it most certainly has during this pandemic), it
wields outsized power.
Kalev Leetaru at George Washington University recently pointed out
[https://www.realclearpolitics.com/articles/2020/04/22/facebooks_covid-
protest_ban_renews_censorship_concerns_143003.html] the significance of this shift, and the lines
that blur as a result:
3. freedom. As we cede the public square to private companies, however, those
constitutional freedoms of speech and expression no longer apply in some
cases. Through those private companies, in fact, government officials can in
effect restrict speech they are obligated to protect.
The irony is that less than a year ago, Mark Zuckerberg gave a speech
[https://www.washingtonpost.com/technology/2019/10/17/zuckerberg-standing-voice-free-
expression/] at Georgetown University where he extolled tech’s many virtues, including how tech
platforms “have decentralized power by putting it directly into people’s hands.” Yet Facebook’s most
recent actions confirm that power of communication for the 70 percent
[https://www.pewresearch.org/internet/fact-sheet/social-media/] of American adults who use
Facebook, rather than being made disparate, is still very much centralized in the tech platform.
YouTube has also put itself in the position of defining “correct” speech—but this time, by aligning itself
with the World Health Organization. YouTube’s CEO announced
[https://www.dailywire.com/news/watch-youtube-ceo-well-remove-any-content-that-goes-against-
who-recommendations] that the platform would remove “anything that would go against World
Health Organization (WHO) recommendations.”
YouTube’s apparent motivation is to keep people safe from misinformation—which makes their choice
of WHO recommendations an interesting one. In mid-January, the organization was telling the world
that COVID-19 wasn’t contagious. WHO also publicly opposed
[https://www.technologyreview.com/2020/01/30/275959/the-china-coronavirus-is-officially-an-
international-emergency/] the travel restrictions put in place by multiple countries and didn’t declare
coronavirus a pandemic until March 11. All along [https://amgreatness.com/2020/04/18/who-are-
you-a-pattern-of-deceit-at-the-world-health-organization/] , the organization has taken China’s
obviously false claims at face value, allowing the virus to spread.
Yet this is the banner behind which YouTube will fly its “user safety” flag, thus imposing WHO’s views
on its massive user base [https://www.pewresearch.org/internet/fact-sheet/social-media/] .
Tracking You—For Your Health.
4. Then there is the thorny notion of contact tracing—the way in which public health experts attempt to
contain a viral pathogen by tracing where an infected individual has been, and with whom they’ve
been in contact. Traditionally, contact tracing has been analog, based on a conversation between
patient and doctor.
But the digital age has exploded contact tracing exponentially. It is much more efficient and accurate to
trace a virtual trail, particularly as we leave immense digital footprints wherever we go. South Korea
has typified this type of response, tracking [https://www.smartcitiesworld.net/news/news/south-
korea-to-step-up-online-coronavirus-tracking-5109] COVID-19 patients using credit card data,
surveillance camera footage, and cell phone location data. The South Korean government recently
announced [https://en.yna.co.kr/view/AEN20200411000500320] they’d be requiring infected
individuals to wear electronic wristbands to ensure patients did not breach quarantine.
It is unlikely U.S. citizens would tolerate such intense and mandatory surveillance measures. But that’s
where Big Tech comes in.
Without being asked, Google already has been sharing aggregate user location data with governments
interested in compliance with social distancing measures. The House Freedom Caucus, a group of
conservatives, sent a letter [https://twitter.com/freedomcaucus/status/1248677702875439107?s=20]
to Google raising concern over the “frightfully detailed, specific, and granular” data being provided to
government officials.
Google and Apple recently have announced the development of a contact tracing technology that will
use cell phone Bluetooth proximity data to alert individuals if they have come into contact with an
infected person. The app’s effectiveness depends upon people self-reporting their own positive
diagnosis. Already, security experts have raised concerns [https://themarkup.org/ask-the-
markup/2020/04/14/will-googles-and-apples-covid-tracking-plan-protect-privacy] about false
positives, spoofing, re-anonymization, and “proximity marketing” (yes, you’re just trying to avoid
getting sick, but tech advertisers could still make money). Experts [https://www.protocol.com/oped-
john-ackerly-surveillance-coronavirus] have also pointed out how easy it would be for this system to
be abused [https://www.marketwatch.com/story/this-could-be-abused-privacy-experts-take-
cautious-approach-to-apple-and-googles-coronavirus-contact-tracing-technology-2020-04-16] .