Search This Blog

Showing posts with label Information technology. Show all posts
Showing posts with label Information technology. Show all posts

Thursday, 29 October 2015

Google degenerates into Ministry of Truth; all knowledge must now be pre-approved by search algorithm

Jonathan Benson
Natural News

Gone are the days when you could search Google and pull up neutral, relevant content appropriate to your search query. The search engine giant is reportedly pioneering a new search algorithm that will tailor search results not based on popularity or accuracy, but rather on what Google itself deems to be truthful or untruthful.

The world's new "Ministry of Truth", Google believes that screening and censoring information requested by its users will help avoid "websites full of misinformation" from showing up at the top of the search list. Known as the "Knowledge Vault," the novel algorithm is described by The New American as "an automated and super-charged version of Google's manually compiled fact database called Knowledge Graph."

Google's Knowledge Graph, in case you didn't know, was the search engine's first attempt at becoming a purveyor of knowledge rather than just information -- a "smart" search tool, if you will, designed to enhance the relevancy of search results by analyzing various facts, figures, and other data appropriate to a user's intended query.

The Knowledge Vault builds upon this concept, but takes it another step further. By sorting through the actual content of websites to determine whether or not they fit the official narrative for the particular idea or concept presented, the Knowledge Vault will act as a type of knowledge gatekeeper in censoring out information and content deemed to be "false."

"[The Knowledge Vault] promises to let Google answer questions like an oracle rather than a search engine, and even to turn a new lens on human history," wrote Hal Hodson for NewScientist about the project.

 

Wednesday, 18 January 2012

Open Source, Transparent, Global Voting


  http://appvoices.org/images/uploads/2010/11/voterX.png
 approvedvoices.org
Half Past Human

First a disclaimer...i don't vote. Can't stand the control mechanisms put into place over the voting system. It is the same in every country. The evil central banksters, officialdom, masons, and the 'party' system control the vote. So i don't. No point.

But, there are times i would like to be able to vote. Usually there are no personalities among the scum floating to the top of the political pond worth wasting breath cursing. Some though, such as Ron Paul, do say all the correct words, and may be the correct person for the karios of the moment. But, as i say, i do not vote....because it is rigged. Certainly here in the USA, and likely everywhere.

It was this last thought that brought forth the screwy idea....since they are trying to control voting by clamping down on the local through national level, why not 'occupy' the vote by taking the vote in Olympia, WA State, global? That is, if i knew that my vote could be tallied globally, by anyone, and everyone, would that make me trust the system more?

Well, in my case, yes. As a computer software designer, i would love to be able to reach out and tally/monitor the vote in any region/locality globally. Why? Well, probably just because i am nosy, but there is a real point to it. If i could determine that the vote in a parish in Louisiana had been locally (in Louisiana) reported inaccurately, they could be called on the crime. Now, as the saying goes, "if you ain't diebold, you CAN'T know". 

So, here is a screwy idea, released out into the wild....for all those legions of unemployed programmers... open source, transparent, global voting system.

Read more



Stop American Censorship

SOPA Strike!


On Wednesday Jan. 18th thousands of sites will go dark to protest SOPA & PIPA, two US bills racing through Congress that threaten prosperity, online security, and freedom of expression.

Saturday, 14 January 2012

Obama czar proposed government should ‘infiltrate’ social network sites, chat rooms, message boards.


 image


Just prior to his appointment as President Obama’s so-called regulatory czar, Cass Sunstein wrote a  lengthy academic paper suggesting the government should “infiltrate” social network websites, chat rooms and message boards. 

Such “cognitive infiltration,” Sunstein argued, should be used to enforce a U.S. government ban on “conspiracy theorizing.”

Among the beliefs Sunstein classified as a “conspiracy theory” is advocating that the theory of global warming is a deliberate fraud.

The find comes as a government document reportedly relates the U.S. Department of Homeland Security’s command center routinely monitors dozens of popular websites, including Facebook, Twitter, Hulu, WikiLeaks and news sites including the Huffington Post and Drudge Report.

Reuters reported that a “privacy compliance review” issued by DHS last November confirms that since at least June 2010, the department’s national operations center has been operating a “Social Networking/Media Capability” which involves regular monitoring of “publicly available online forums, blogs, public websites and message boards.”

The government document states such monitoring is meant to “collect information used in providing situational awareness and establishing a common operating picture” to help manage national or international emergency events.

While the DHS may be monitoring websites for security reasons, Sunstein advocated such actions with another goal in mind.

Sunstein’s official title is Administrator of the White House Office of Information and Regulatory Affairs.

In a 2008 Harvard law paper, “Conspiracy Theories,” Sunstein and co-author Adrian Vermeule, a Harvard law professor, ask, “What can government do about conspiracy theories?”

“We can readily imagine a series of possible responses. (1) Government might ban conspiracy theorizing. (2) Government might impose some kind of tax, financial or otherwise, on those who disseminate such theories.”

In the 30-page paper – obtained and reviewed by KleinOnline – Sunstein argues the best government response to “conspiracy theories” is “cognitive infiltration of extremist groups.”

Continued Sunstein: “We suggest a distinctive tactic for breaking up the hard core of extremists who supply conspiracy theories: cognitive infiltration of extremist groups, whereby government agents or their allies (acting either virtually or in real space, and either openly or anonymously) will undermine the crippled epistemology of believers by planting doubts about the theories and stylized facts that circulate within such groups, thereby introducing beneficial cognitive diversity.”

Sunstein said government agents “might enter chat rooms, online social networks, or even real-space groups and attempt to undermine percolating conspiracy theories by raising doubts about their factual premises, causal logic or implications for political action.”

Sunstein defined a conspiracy theory as “an effort to explain some event or practice by reference to the machinations of powerful people, who have also managed to conceal their role.”

Some “conspiracy theories” recommended for ban by Sunstein include:
  • “The theory of global warming is a deliberate fraud.”
  • “The view that the Central Intelligence Agency was responsible for the assassination of President John F. Kennedy.”
  • “The 1996 crash of TWA flight 800 was caused by a U.S. military missile.”
  • “The Trilateral Commission is responsible for important movements of the international economy.”
  • “That Martin Luther King Jr. was killed by federal agents.”
  • “The moon landing was staged and never actually occurred.”
Sunstein allowed that “some conspiracy theories, under our definition, have turned out to be true.”
He continued: “The Watergate hotel room used by Democratic National Committee was, in fact, bugged by Republican officials, operating at the behest of the White House. In the 1950s, the CIA did, in fact, administer LSD and related drugs under Project MKULTRA, in an effort to investigate the possibility of ‘mind control.’”
Sunstein’s paper advocating against the belief that global warming is a deliberate fraud was written before the November 2009 climate scandal in which e-mails hacked from the Climatic Research Unit at East Anglia University in the U.K. indicate top climate researchers conspired to rig data and keep researchers with dissenting views from publishing in leading scientific journals.

Sunstein: Ban ‘right wing’ rumors

Sunstein’s paper is not the first time he has advocated banning the free flow of information.
In his 2009 book, “On Rumors,” Sunstein argued websites should be obliged to remove “false rumors” while libel laws should be altered to make it easier to sue for spreading such “rumors.”

In the book, Sunstein cited as a primary example of “absurd” and “hateful” remarks, reports by “right-wing websites” alleging an association between President Obama and Weatherman terrorist William Ayers.

He also singled out radio talker Sean Hannity for “attacking” Obama regarding the president’s “alleged associations.”

Ayers became a name in the 2008 presidential campaign when it was disclosed he worked closely with Obama for years. Obama also was said to have launched his political career at a 1995 fundraiser in Ayers’ apartment.


Thursday, 12 January 2012

ES&S Voting Machine Improves Vote Fraud in America


E-voting machine freezes, misreads votes, U.S. agency says DS200 optical scanner from ES&S doesn't meet federal standards, but remains certified, Election Assistance Commission says.

An electronic ballot scanning device slated for use in the upcoming presidential elections, misreads ballots, fails to log critical events and is prone to freezes and sudden lockups, the U.S. Elections Assistance Commission has found.

The little noticed EAC report on the DS200 Precinct Count Optical Scanner in the Unity 3.2.0.0 voting system built by Election Systems & Software (ES&S) was released late last month.

The 141-page Formal Investigative Report (download pdf) highlights multiple "substantial anomalies" in the DS200, including intermittent screen freezes, system lockups and shutdowns, and failure to log all normal and abnormal system events.

For example, the DS200 in some cases failed to log events such as a vote being cast, when its touch-screen is calibrated or when the system is powered on or off, the EAC said.



 

Thursday, 5 January 2012

Code, scan, trade and profit. A new wave of computer enabled insider trading.


A new Wall St. scam

Rumors are circulating about a new Wall St. research service scam that goes like this… 

Research reports are written with both recommendations and coded phraseology that enables pre-market manipulation. 

The way it works – a report that gives recommendations also contains coded phraseology that programs trading bots on the exchange that ‘read’ the report and make various trades. Certain word, symbol and number combinations in the report are picked up by the bots who put on the trades based on the coded info. 

In the following research report – the report spells out a recommendation – that will make the trades put on as the result of the previous report profitable. 

Let’s say in January, the research says “We love tech. and big pharma” but hidden in the report is coded info that was picked up by trading bots who went long Co. X. 

The following report recommends Co. X, making those pre-trades profitable (while containing new coded messages for the trading bots in anticipation of the next report). 

This ‘research’ service is sold to traders for a hefty fee. It’s inside info that is virtually impossible to detect available to a firm’s best clients on a regular basis. 

Simply buy the service and enable your computer software that ‘reads’ the research to pick up the code that will trigger what trades will be profitable when the next report is published. 


Tuesday, 3 January 2012

28c3: The Coming War on General Computation



Children becoming 'addicted' to computers

 Children are being overexposed to computers and other technology, said Barnaby Lenon, head of the Independent Schools Council.
  Children are being overexposed to computers and other technology, said Barnaby Lenon, 
head of the Independent Schools Council. Photo: ALAMY

Children’s access to smartphones and computers should be limited to stop them becoming “addicted” to electronic gadgets, according to a schools' leader. 

Barnaby Lenon, chairman of the Independent Schools Council, said young people’s reading and conversational skills were being put at risk by overexposure to modern technology.He said parents should resist buying sons and daughters a smartphone until they are at least 15 and limit computer use to an hour or two a day.

Mr Lenon, the former headmaster of Harrow School, also called for the greater use of multiple choice questions in exams, saying they were an effective method of covering more of the syllabus and less susceptible to marking errors. In an interview, he said that exposure to computers was particularly damaging to boys, harming their long-term development.
“Far too many children, and particularly boys, become quite addicted to computer use,” he said.

“It is very hard to prevent children from accessing damaging material through the computer, but the main issue is that children spend far too long on computers and, as a result, they are not doing the two things that we want [them] to do, which are reading and conversation.” 


Mr Lenon told The Times that parents should be advised to restrict children’s access to computers and televisions in favour of reading stories together.He also said computer use should be limited to one hour a day for children aged up to 12 and two hours for older pupils. 



Monday, 2 January 2012

Hackers plan space satellites to combat censorship

  
Graphic of a Vostok spaceship
  50 years after Russia's first piloted mission, 
hackers plan to send their own people beyond orbit
Computer hackers plan to take the internet beyond the reach of censors by putting their own communication satellites into orbit. The scheme was outlined at the Chaos Communication Congress in Berlin. The project's organisers said the Hackerspace Global Grid will also involve developing a grid of ground stations to track and communicate with the satellites. Longer term they hope to help put an amateur astronaut on the moon.

Hobbyists have already put a few small satellites into orbit - usually only for brief periods of time - but tracking the devices has proved difficult for low-budget projects.The hacker activist Nick Farr first put out calls for people to contribute to the project in August. He said that the increasing threat of internet censorship had motivated the project.

"The first goal is an uncensorable internet in space. Let's take the internet out of the control of terrestrial entities," Mr Farr said.

Read  More

Monday, 19 December 2011

Founder Of Internet Fears 'Unprecedented' Web Censorship


Legendary computer scientist Vint Cerf -- widely hailed as one of the founders of the Internet itself -- came out against the Stop Online Piracy Act (SOPA) on Thursday, joining a coalition of most of the Internet's major sites that are attempting to foil the bill.

SOPA was proposed to help end online copyright infringement, an issue the Motion Picture Association of America and the recording industry have long complained about. The House on Friday continued to debate the bill, which would require service providers to take action against "foreign infringing websites" that post stolen content. Cerf argued that it would put harsh demands on most websites -- and could lead to massive Internet censorship.

"Requiring search engines to delete a domain name begins a worldwide arms race of unprecedented 'censorship' of the Web," Cerf wrote in a letter to Chairman Lamar Smith that Rep. Darrell Issa (R-Calif.) presented to the panel Thursday. CNET posted the full text of the letter to its site late Thursday night.

"I continue to have concerns regarding the efficacy and wisdom of this legislation," he wrote, noting that he joined the many Internet and cybersecurity experts that have already expressed concern about certain provisions within the original version of the SOPA bill.

Read more

Friday, 16 December 2011

Reality as Subversion


http://www.creativepanes.com/wp-content/uploads/2011/02/subversion_large.jpg

Douglas Rushkoff

I wrote this piece six years ago for Arthur magazine, anticipating or at least wishing for the Occupy movement. LSD magazine just republished it in their latest issue with some beautiful graphics, here.

Here's the original text version:
(Originally published in Arthur, June 2005)

I had a weird vision the other day.

Having brought our newborn back from the hospital just days before, my wife and I weren’t getting much sleep. I lied on the bed next to the baby and slipped into one of those theta wave trances you can reach on the way to a magick spell, visionquest, or psychedelic trip.

I was in a natural chamber of some kind, maybe a cave or clearing in a woods. It was a starting place from which any number of journeys could be taken. At each opening, another creature or entity beckoned me to follow it. And, had it been any other time in my life, I probably would have picked the one that seemed the most promising and followed it down the twists and turns of its path – and been either delighted or terrified by what happened. (The idea of being an experienced traveler or magician is getting better at predicting, guiding, or simply tolerating the variety of what’s on offer, and learning to bring back things or ideas of value.)

This time, however, for no particular reason other than really being okay with floating in that little entrance foyer, decided to stay put. The beckoning entities gave up and scurried or drifted down their reality tunnels, and I lied there, motionless.

Only then, after I decided to do nothing, did I notice the Elders. Three or four of them - shamans, prophets, zen masters, or some combination – sitting on a bench to my side, looking down at me. “Welcome,” they said, nodding. And I immediately got it. By doing nothing, I was doing everything. The path of no path. Just be.

And though I’ve spent a career, maybe even a whole lifetime creating realities for myself and others as a way of retreating from the oppressive consensus culture of the American Marketplace, I’m wondering if we might best abandon that tactic. Maybe, it’s time to stand still and let them do the conjuring.

Hear me out.

What I teach in my classes is that the evolution of media sees control of the story move away from the teller, and towards the reader or listener. The invention of text allowed people other than priests and royals to read and write, showing human beings that they were contributing to the human story. Thanks to the alphabet, we got the Judeo-Christian tradition, laws, and all those notions of progress.

The printing press put texts in the hands of many, leading to the democratization of interpretation, the development of “perspective,” and eventually the Enlightenment. If all perspectives matter, then all people matter equally.

Although TV set things back a bit, deconstruction and post-modernism came to the rescue, giving us all the ability to take apart what we see, and dissemble the many messages being piped into our living rooms and brains. Master deconstructionists, from William Burroughs and Bryon Gysin to Genesis P-Orridge and Negativeland, cut-up the news and paste it back together in news ways, in Burroughs words, to find out “what it really says.”

Of course, they were only foretelling the advent of the Internet, which turned the whole mediascape – the primary landscape of alternative media creation – over to us. Now, at least in theory, we are as capable of creating and disseminating a message as anyone else. Your basic middle class American teen (admittedly, among the planet’s better equipped individuals) can build a set of images, texts, or videos that extend his visions to the greater world. Rupert Murdoch’s ideas matter no more than those of the kid posting on Slashdot.

And so we fight for our rights or even just our freedom to do what we want to in the media space. To keep our Bittorrents flowing and our alternative media blogs rolling. We know the power of image creation, and want to retain our ability to make the images that stimulate, hypnotize, and program our world.

That’s why the powers that be are so committed to retaking their control over the image factory. Whether it’s American Idol recasting its stacked deck talent show as some sort of SMS-enabled democracy, or Project Echelon monitoring all our keystrokes so that truly subversive material can be cut off at the source, we’re witnessing first hand the dismemberment of our new body politic. Just as the forces of business turned the original Internet into a strip mall, they are now bribing the most popular bloggers with ad-based revenues and creating watered down simulations of online autonomy.

Meanwhile, they distract us with scary stories about how the latest and greatest technologies will be used against us. Neuromarketing, for example, the latest new tool in the advertising arsenal, is supposedly capable of using MRI technology to measure, definitively, our response to packages and advertisements. They shove some poor soul into an MRI machine (that could be used for a diagnosing a sick person) and then show him some Coke or Pepsi labels and then see what parts of the brain light up. Then fascinated but misguided journalists write bestselling books about that moment of decision that supposedly takes place independent of any conscious or rational process. Worse, these subconscious triggers can be tripped intentionally by any marketer or political linguist with the access and money.

That’s magick, people. And fake magick, at that, except for the fact that we believe this shit. It just isn’t true. It’s the kind of tripe that marketers and advertisers use to peddle their wares to the companies trying to compete with real culture, real thought, and real human progress. Of course the books claiming that our most important decisions happen in a “blink” are going to sell well, because they are part of the culture of selling.

It’s no wonder we get fooled by such stuff. For in our effort to exert some measure of control over our reality, we have migrated to the semiotic landscape – fighting with image and symbol, rhetoric and reason. In the spirit of Hegel, we match their faulty thesis with our daring antithesis, but forget that neither one necessarily brings us any closer to the truth. Just because you’ve got two opposing arguments doesn’t mean they resolve into some reality-based synthesis. (Two politicians can argue about whether the tax code should have 39 or 40 lines while a peasant starves on the Capitol steps.)

The realities that marketers offer us, just like the ones we offer back in return, are speciously detached from reality on the ground. Sure, they provide solutions to our problems, but from where do those problems originate?

As a new parent, I’ve been painfully aware of how little real community there is around us. This is a market success. Our parents are too far, our friends are too shy, the mothering old ladies are nowhere to be found. So who teaches my wife to breast feed? The “lactation consultant.” Yes – there is such a thing! And who watches the baby when we have to take a shower or get to work? Not a family member or friend down the hall, but a professional babysitter, daycare center or nanny. The diminishment of community is what fuels these new markets.

The greatest magic act of all – the unrecognized king of all sigils – was the creation of the dollar itself. We support the reality of this symbol whether we’re going after dollars or complaining about the lack of opportunity to accumulate them. By taking the very real values of wealth and prosperity and assigning them to the symbol of money, we dissociated our labor from the real. Sure, if we had some authority over that symbol system we might be in business. But we don’t; it’s the most protected and inaccessible set of mythology around. No cut and paste permitted, William.

I’m thinking we should let them win. Surrender the unreal realities to the bad guys. If they want broadcast television, mainstream newspapers, or even the web, let ‘em have it. They’ve conjured up an alternative universe that has very little true connection to what’s really going on here. And the market-based, competitive, reality-as-propaganda dream has swallowed them up. They are the victims of their own illusions. We don’t have to be.

We can take charge of the real reality they left behind. I mean the world we’re actually living in. The yards and streets and fingers and tongues. Let’s build bike lanes and barbecues, after school programs and AIDS care networks, places to play music and playgrounds for kids. They’re so busy monitoring the airwaves for signs of treason against the market or state that they’ve lost track of what’s happening between real people. Turn off your cell phone and speak to that guy sitting next to you on the bus. That’s about the most subversive thing you could do.

Instead, like well-meaning Pied Pipers, we play our tunes hoping the children might follow us instead of the other guy taking them off the cliff. But when we enter into that competition, we’re no better than the tune we can muster at that moment. If ours is more hypnotic or captivating than theirs, we win for the time being, and keep the kids believing our version of things until the next round.

And in entering that pissing contest, we deny ourselves the home field advantage. We live here, after all. If we can learn to sit still for a moment rather than following any of those phantoms, we can take over real reality, instead. It’s right here for the taking.



Cashless Voice Recognition System Now Being Converted to Analyze Behavior

Activist Post

In 2011, it is scarcely even possible to keep up with the new methods of surveillance and control being introduced by governments, corporations, and universities on what seems like a daily basis. I, myself, have had quite a time over the last few months trying to keep track of them all.

Indeed, in just a matter of months, we have seen the implementation of the Google Wallet Smartphone app in places like New Jersey and New York transportation systems, as well as the development of implantable microchips that can both react to -- and control -- the human brain. Not only that, but we have recently witnessed the introduction of vein scanners to the general public for the purpose of payment and identification.

However, with a recent announcement made by Homeland Security News Wire, it appears we can add one more strand in the web of the high-tech security grid that is being built before our eyes.

The Carrier IQ Conspiracy

Activist Post
Madison Ruppert

Just weeks ago Trevor Eckhart, a security researcher and Android operating system developer, discovered a mysterious process running in the background of his Android-based device.

This program turned out to be Carrier IQ, or CIQ, and specifically the IQ Agent which is installed on mobile devices from all major carriers before they reach the consumer, totaling some 150 million phones, mostly in the United States.

The software is billed as a diagnostic tool which allows cellphone carriers to “better understand how mobile devices interact with and perform on their network,” according to an official Carrier IQ document that attempts to dispel what they bill as rumors and unfounded concerns of consumers and researchers.

The document is somewhat opaque and esoteric for those of us not familiar with the terminology and technology at work in these highly complex systems but some of it is quite easy to understand.

Thursday, 15 December 2011

Israel pays propagandists to write comments on the internet


Worth resurrecting this one from January of this year as a reminder of the potent nature of Israeli propaganda. They have certainly taken on the neo-con meme of "information dominance" to a very high degree.

--------------------

Wikipedia Mulls Total Blackout to Oppose SOPA

TorentFreak

Wikipedia founder Jimmy Wales wants to blank out all pages of the online encyclopedia to oppose the pending SOPA anti-piracy bill in the US. Wales, who has asked the Wikipedia community for input on the idea, fears the bill could seriously hurt the Internet and thinks that blanking out Wikipedia will send a strong message to lawmakers.

Later this week, the Senate’s House Judiciary Committee will vote on the “Stop Online Piracy Act” (SOPA).

Supporters of the bill say it’s needed to safeguard the interests of rightsholders who claim their businesses are threatened by online piracy. Those opposing are worried that the unprecedented censorship tools it introduces will take out many websites on baseless or faulty claims of copyright infringement.

Wikipedia founder Jimmy Wales belongs to the latter group, and behind the scenes he is mulling plans to blank out all Wikipedia pages in protest against the pending SOPA bill. On Saturday he posted a message on his user page asking the community for input on the idea.

Wales explains that the idea of a ‘self-censorship’ protest is inspired by a campaign the Italian Wikipedia community ran earlier this year.

“A few months ago, the Italian Wikipedia community made a decision to blank all of Italian Wikipedia for a short period in order to protest a law which would infringe on their editorial independence. The Italian Parliament backed down immediately,” he writes.

“As Wikipedians may or may not be aware, a much worse law going under the misleading title of ‘Stop Online Piracy Act’ is working its way through [the Senate] on a bit of a fast track.”

Read More

Wednesday, 14 December 2011

Amazon Big Brother patent knows where you'll go


http://files.dsng.net/uploaded_images/banksy_what_full-769135.jpg
 Banksy / dsng.net/

CBS 

Location tracking has become a hot privacy issue. Google (GOOG), Apple (AAPL), and Microsoft (MSFT) have all stepped into massive PR messes over the question. Now there's a new entry: Amazon (AMZN).

A patent, made public last week, covers a system to not only track, through mobile devices (Kindle, anyone?), where individuals or aggregated users have been, but determine where they're likely to go next to better target ads, coupons, or other messages that could appear on a mobile phone or on displays that individuals are likely to see on their routes. The system could also use someone's identity to further tailor the marketing according to demographic information.

You'd better watch out, you'd better not cry

The patent, granted on Dec. 6, was first applied for in March 2007. As with any patent or application, there are two big considerations. One is the extent of the legal protection the claims seek, which describes the specific system. That tells you how easily the company could use the patent as a defensive or offensive competitive weapon. The other is the insight you can get into a company's strategy. 

We'll start by looking at the first independent claim of the patent:
A system, comprising: a processor; and a memory coupled to the processor, wherein the memory comprises program instructions executable by the processor to: determine one or more locations a user of a mobile device has visited on a current path; predict a next destination for the user of the mobile device based on the one or more locations the user of the mobile device has visited on the current path, wherein to predict the next destination, the program instructions are further executable to: predict a plurality of likely destinations, and receive one or more bids for communicating advertising content regarding one or more of the likely destinations for the user of the mobile device, wherein the next destination corresponds to a likely destination for which a selected bid was received; and communicate advertising content to a display device other than the mobile device located along the current path between a current location for the mobile device and the next destination.
Breaking it down, a mobile device determines/provides locations. The system calculates a path and then predicts a set of likely next destinations. Then the system takes bids from third parties that want to send marketing messages to displays along the route the person takes, probably monitoring speed and direction to time displays for maximum chance of visibility.

Additional claims make clear that the ad could also go to the mobile device -- including a message to tell the person to look over at a particular display. Shades of a science fiction story (or Minority Report), where personalized ads follow and appear on public displays wherever you go.

What is most interesting in this patent isn't how easily Amazon might block competitors from using similar systems, though the protection might be broad enough to enable that. The key is how Amazon is approaching the strategy of literally following people and trying to guess where they'll go and what they're interested in.

They know when you're awake

According to the patent's description, location could be specific spots inside a mall:
In some embodiments, mobile device users' current and past travel patterns may be analyzed to determine a predicted next destination. For instance, by analyzing the recent movements of a mobile device user among stores in a shopping mall, it may be determined that a particular store is a predicted next destination for the mobile device user. Thus, advertising content for the predicted destination, such as coupons, may be sent to the mobile device user.
This is a bare-knuckled approach to tracking and analysis that other companies have yet to publicly admit (though it doesn't mean they aren't working on similar concepts). Consider what "analyzing" would mean. It's unlikely to only be examining a pattern of movement, though that would obviously be part of it. Such a system goes beyond malls:
For example, a mobile device user may be tracked while attending a large entertainment venue or sporting event and coupons advertising a discount at a restaurant that the mobile device user is likely to visit based on the user's traffic or travel patterns at the entertainment venue or sporting event. Similarly, mobile device users attending a large venue may be tracked and provided coupons for vendors the mobile device users are likely to pass based on their recent travel patterns in and around the venue.
Location ties to function. If you know what sort of establishment is at a spot, you can start to make more intelligent guesses of what a person is doing. The more stops, the more chances of putting together a picture of what a person is doing. And if you store this data over time, you might build a more complete picture.

They're everywhere, they're everywhere

Now consider where the ads might show up. It's not hard to imagine Amazon trying to partner with retailers that have TVs, computer monitors, digital signs, or other ways of displaying advertising.

Amazon's approach is more sophisticated than the usual proximity marketing, where a person's location would trigger messages for nearby businesses. Maybe GPS provides the location, or maybe cell tower triangulation, according to the patent.

But location determination isn't limited to those. You could locate someone based on a mobile commerce purchase, where some company or other notes the exact store in which the purchase was made. Technically, you could pinpoint someone based on Wi-Fi hotspot triangulation (an approach that both Apple and Google can use). Maybe such a system uses facial recognition and licenses surveillance camera data to literally see who is around.

Not all patents get turned into products or services, but this one might be too tempting to pass up. Is such a system ready to roll out to Kindle software running on mobile devices? Will it be included on Kindles? Has it been already?



Tuesday, 13 December 2011

Internet Piracy Bill: A Free Speech ‘Kill Switch’


Not good. Not good at all....

-------------------

Cryptogon via The Hill

What began as an attempt to restrain foreign piracy on the Internet has morphed into a domestic “kill switch” on First Amendment freedom in the fastest-growing corner of the marketplace of ideas.

Proposed federal legislation purporting to protect online intellectual property would also impose sweeping new government mandates on internet service providers – a positively Orwellian power grab that would permit the U.S. Justice Department to shut down any internet site it doesn’t like (and cut off its sources of income) on nothing more than a whim.

Under the so-called “Stop Online Piracy Act” (SOPA) the federal government – which is prohibited constitutionally from abridging free speech or depriving its citizens of their property without due process – would engage in both practices on an unprecedented scale. And in establishing the precursor to a taxpayer-funded “thought police,” it would dramatically curtail technology investment and innovation – wreaking havoc on our economy.

Consider this: Under the proposed legislation all that’s required for government to shutdown a specific website is the mere accusation that the site unlawfully featured copyrighted content.  Such an accusation need not be proven – or even accompanied by probable cause. All that an accuser (or competitor) needs to do in order to obtain injunctive relief is point the finger at a website.

Additionally, SOPA would grant regulators the ability to choke off revenue to the owners of these newly classified “rogue” websites by accusing their online advertisers and payment providers as co-conspirators in the alleged “piracy.” Again, no finding of fact would be required – the mere allegation of impropriety is all that’s needed to cut the website’s purse strings.

Who’s vulnerable to this legislation?

“Any website that features user-generated content or that enables cloud-based data storage could end up in its crosshairs,” writes David Sohn, senior policy council at the Center on Democracy and Technology. “(Internet Service Providers) would face new and open-ended obligations to monitor and police user behavior. Payment processors and ad networks would be required to cut off business with any website that rights-holders allege hasn't done enough to police infringement.”



Sunday, 11 December 2011

Learning high-performance tasks with no conscious effort may soon be possible


http://s.ph-cdn.com/newman/gfx/news/hires/2011/visionscient.jpg


In the future, a person may be able to watch a computer screen and have his or her brain patterns modified to improve physical or mental performance. Researchers say an innovative learning method that uses decoded functional magnetic resonance imaging could modify brain activities to help people recuperate from an accident or disease, learn a new language or even fly a plane.
 
New research published today in the journal Science suggests it may be possible to use brain technology to learn to play a piano, reduce mental stress or hit a curve ball with little or no conscious effort. It's the kind of thing seen in Hollywood's "Matrix" franchise.

Experiments conducted at Boston University (BU) and ATR Computational Neuroscience Laboratories in Kyoto, Japan, recently demonstrated that through a person's visual cortex, researchers could use decoded functional magnetic resonance imaging (fMRI) to induce activity patterns to match a previously known target state and thereby improve performance on visual tasks.

Think of a person watching a computer screen and having his or her brain patterns modified to match those of a high-performing athlete or modified to recuperate from an accident or disease. Though preliminary, researchers say such possibilities may exist in the future.

Experiments conducted at Boston University (BU) and ATR Computational Neuroscience Laboratories in Kyoto, Japan, recently demonstrated that through a person's visual cortex, researchers could use decoded functional magnetic resonance imaging (fMRI) to induce activity patterns to match a previously known target state and thereby improve performance on visual tasks.

Think of a person watching a computer screen and having his or her brain patterns modified to match those of a high-performing athlete or modified to recuperate from an accident or disease. Though preliminary, researchers say such possibilities may exist in the future.

Experiments conducted at Boston University (BU) and ATR Computational Neuroscience Laboratories in Kyoto, Japan, recently demonstrated that through a person's visual cortex, researchers could use decoded functional magnetic resonance imaging (fMRI) to induce activity patterns to match a previously known target state and thereby improve performance on visual tasks.

Think of a person watching a computer screen and having his or her brain patterns modified to match those of a high-performing athlete or modified to recuperate from an accident or disease. Though preliminary, researchers say such possibilities may exist in the future.



 

Tuesday, 29 November 2011

Feds Seize 130+ Domain Names in Mass Crackdown


Torrent Freak

US authorities have initiated the largest round of domain name seizures yet as part of their continued crackdown on counterfeit and piracy-related websites.

With just a few days to go until “Cyber Monday” more than 100 domain names have been taken over by the feds to protect the commercial interests of US companies.

The seizures are disputable, as the SOPA bill which aims to specifically legitimize such actions is still pending in Congress.

Read more

Monday, 28 November 2011

Fake forum comments are 'eroding' trust in the web


Trust in information on the web is being damaged by the huge numbers of people paid by companies to post comments online, say researchers.

Fake posters can "poison" debate and make people unsure about who they can trust, the study suggests.

Some firms have created tens of thousands of fake accounts to flood chat forums and skew debate.

The researchers say there are reliable ways to spot fakes and urge websites to do more to police users.

The researchers from Canada and China say paying people to post comments is an "interesting strategy in business marketing" but it is not a benign activity. 

"Paid posters may create a significant negative effect on the online communities, since the information from paid posters is usually not trustworthy," they wrote.

Battles
 
In some cases, rival companies have used competing armies of workers to wage comment wars that confused members of the public looking for unbiased information.

The researchers say the fake comments can overwhelm some users, causing them to find it hard to trust any information found online.

They give the example of a spike in activity on a World of Warcraft chat forum on the Chinese website Baidu. 

A thread titled "Junpeng Jia, your mother asked you to go back home for dinner!" received over 300,000 replies over a two day period.

A PR company later claimed it had employed 800 individuals to run 20,000 separate accounts on the site to help maintain interest in the videogame while it was down for maintenance.

Growing problem
 
While the practice of flooding forums with fake comments is most widespread in China, where such posters are called the Internet Water Army, it is becoming common in other nations too.

The US military is known to use fakes to infiltrate chat forums to gather information about potential terror groups. 

Similarly many Facebook pages are plagued by bogus friends and "social bots" that are used to stage debates. 

Many marketing firms also seed forums with comments in a bid to create "viral" interest in a company or event.

However, fakes can be spotted by analysing their patterns of activity and the words they use, say the researchers. 

Fakes are more likely to start new comment threads, make inane comments rather than add to a debate, and repeat former comments with minor changes, the study suggests.

The researchers say they are refining software tools to help website administrators tackle the "painful" problem.



Related Posts Plugin for WordPress, Blogger...