From a broader context, our work highlights an unexpected consequence of discrimination. Specifically, when minority members are slighted by the majority, they might tend to turn to one another for social support, resulting in a network of informal relations that may (ironically) enable them to achieve better outcomes. For example, observers have noted that women are slowly making inroads in male-dominated markets such as technology entrepreneurship and private equity. READ MORE: A Study of the Champagne Industry Shows That Women Have Stronger Networks, and Profit from Them | HBR
Remember a few weeks back, when we learned that Google’s artificial neural network was having creepy daydreams, turning buildings into acid trips and landscapes into Magic Eye pictures? Well, prepare to never sleep again, because last week, Google made its “inceptionism” algorithm available to the public, and the nightmarish images are cropping up everywhere.
The “Deep Dream” system essentially feeds an image through a layer of artificial neurons, asking an AI to enhance and build on certain features, such as edges. Over time, pictures can become so distorted that they morph into something entirely different, or just a bunch of colorful, random noise.
Now that the code for the system is publicly available, anyone can upload a photo of their baby and watch it metamorphose into a surrealist cockroach, or whatever. If you need some inspiration, or an excuse to crawl back into bed, pull the covers over your face, and wait for the world to end, just check out the hashtag ‘DeepDream’ on your social media platform of choice. READ MORE: Google’s Dream Robot Is Running Wild Across the Internet | Gizmodo.
Every day, you hear about security flaws, viruses, and evil hacker gangs that could leave you destitute — or, worse, bring your country to its knees. But what’s the truth about these digital dangers? We asked computer security experts to separate the myths from the facts. Here’s what they said.
Adobe’s Digital Editions e-book and PDF reader—an application used by thousands of libraries to give patrons access to electronic lending libraries—actively logs and reports every document readers add to their local “library” along with what users do with those files. Even worse, the logs are transmitted over the Internet in the clear, allowing anyone who can monitor network traffic such as the National Security Agency, Internet service providers and cable companies, or others sharing a public Wi-Fi network to follow along over readers’ shoulders.
Ars has independently verified the logging of e-reader activity with the use of a packet capture tool. The exposure of data was first discovered by Nate Hoffelder of The Digital Reader, who reported the issue to Adobe but received no reply.
Networked Worlds & Networked Enterprises
Lee Rainie, Director of the Pew Research Center’s Internet Project, shows how the large, loosely knit social circles of networked individuals expand opportunities for learning, problem solving, decision making, and personal interaction.
The new social operating system of “networked individualism” requires us to develop networking skills and strategies, work on maintaining ties, and balance multiple overlapping networks. The “triple revolution” that has brought on this transformation: the rise of social networking, the capacity of the Internet to empower individuals, and the always-on connectivity of mobile devices.
Drawing on extensive evidence, Rainie examines how the move to networked individualism has driven changes in organizational structure, job performance criteria, and the way people interact in workplaces. He presents a glimpse of the new networked enterprise and way of working.
Net neutrality is a dead man walking. The execution date isn’t set, but it could be days, or months (at best). And since net neutrality is the principle forbidding huge telecommunications companies from treating users, websites, or apps differently — say, by letting some work better than others over their pipes — the dead man walking isn’t some abstract or far-removed principle just for wonks: It affects the internet as we all know it.
Once upon a time, companies like AT&T, Comcast, Verizon, and others declared a war on the internet’s foundational principle: that its networks should be “neutral” and users don’t need anyone’s permission to invent, create, communicate, broadcast, or share online. The neutral and level playing field provided by permissionless innovation has empowered all of us with the freedom to express ourselves and innovate online without having to seek the permission of a remote telecom executive.
But today, that freedom won’t survive much longer if a federal court — the second most powerful court in the nation behind the Supreme Court, the DC Circuit — is set to strike down the nation’s net neutrality law, a rule adopted by the Federal Communications Commission in 2010. Some will claim the new solution “splits the baby” in a way that somehow doesn’t kill net neutrality and so we should be grateful. But make no mistake: Despite eight years of public and political activism by multitudes fighting for freedom on the internet, a court decision may soon take it away.
As Web companies and government agencies analyze ever more information about our lives, it’s tempting to respond by passing new privacy laws or creating mechanisms that pay us for our data. Instead, we need a civic solution, because democracy is at risk.
Snip: “When all citizens demand their rights but are unaware of their responsibilities, the political questions that have defined democratic life over centuries—How should we live together? What is in the public interest, and how do I balance my own interest with it?—are subsumed into legal, economic, or administrative domains. “The political” and “the public” no longer register as domains at all; laws, markets, and technologies displace debate and contestation as preferred, less messy solutions.
But a democracy without engaged citizens doesn’t sound much like a democracy—and might not survive as one.”
A lengthy but thought provoking read on the right to privacy and democracy. Read: Evgeny Morozov on Why Our Privacy Problem is a Democracy Problem in Disguise | MIT Technology Review.
Last year we introduced the initial set of OverDrive APIs that enable approved vendors to deeply integrate OverDrive-hosted catalogs and nearly 1 million digital titles with their apps and platforms. These included the ability to access catalog metadata, see availability of a title and search the library’s collection.
Today, we are excited to announce that the all-new Circulation APIs are available on the OverDrive Developer Portal. The Circulation APIs will allow approved partners to request checkouts, downloads, holds, and returns from within their own discovery interface. This means users will now be able to browse and search their library’s digital collection, see what’s available and check out a title or place a hold all without ever leaving the library OPAC.
The fact that there will be a global system of interconnected computer networks, sensors, actuators, and devices all using the internet protocol holds so much potential to change our lives that it is often referred to as the internet’s next generation via How the Internet of Things Changes Everything – Stefan Ferber – Harvard Business Review.
The article provides a business perspective on the importance of the Internet of Things.