Contributors   |   Messages   |   Polls   |   Resources   |  
Comments
Newest First | Oldest First | Threaded View
Page 1 / 5   >   >>
mhhf1ve
mhhf1ve
9/29/2016 3:01:08 PM
User Rank
Platinum
Re: "Infobesity"
Joe, I think there's been an underwhelming amount of coverage of the Yahoo breach details... did the breach include plaintext passwords? how much info has been compromised? Yahoo hasn't even contacted its users about the details... and only recently reached out to users to change their passwords.... 

50%
50%
mpouraryan
mpouraryan
9/29/2016 10:17:11 AM
User Rank
Platinum
Re: Infobesity
What you've underscored is what I have been noting all along throughout the discourse this month--we have to be human.  Part of being human is to challenge ourselves--and to your point, if we take care of the brain, it will take care of itself in the end.

Onward to the 4th quarter w/all its' pitfalls & possibilities

 

50%
50%
freehe
freehe
9/29/2016 10:04:42 AM
User Rank
Platinum
Infobesity
"infobesity." The cure for infobesity is using digital tools correctly, which includes taking breaks by setting down or walking away from those devices.

This is a huge problem. Viewers are viewing content but the content does not benefit the viewer in any way, it is just for entertainment. Doing the same thing over and over again without challenging the brain is the quickest way to develop alzheimer's later in life.

Mind numbing viewing is a real problem especially among those 16-35.

Infobesity has several disadvantages:
  1. Decreases vision and perception
  2. Reduces the ability to focus on other content
  3. Results in dry eyes
  4. Decrease human interaction and socializing
  5. Develops people who lack social skills

and many more consequences.

50%
50%
Joe Stanganelli
Joe Stanganelli
9/28/2016 11:47:19 AM
User Rank
Author
Re: "Infobesity"
@mhh: Ditto, too, for when you have only one or two datasets related to a particular individual -- but you have the same one or two datasets for every other individual as well.

Case in point: The Adobe breach, where people's hashed passwords and plaintext password hints were compromised -- allowing for deconstruction and transposition.

100%
0%
Joe Stanganelli
Joe Stanganelli
9/28/2016 11:42:05 AM
User Rank
Author
Re: "Infobesity"
@mhh: I did not know that.  In the case of Germany, though, it's strictly a privacy thing -- and how clicking the Like button automatically passes along personal information.

50%
50%
mhhf1ve
mhhf1ve
9/16/2016 1:11:46 PM
User Rank
Platinum
Re: "Infobesity"
> "At least one German state has outright "banned" Facebook's Like button widget -- and urged its denizens to keep from clicking on webpage Like buttons."

The different policies and cultures for handling privacy (among other things) varies wildly around the world... and it actually reminds me that I've never figured out how the Facebook "like" icon is displayed globally. Because in some countries, isn't the "thumbs up" signal a bit offensive? I assume Facebook must use some other icon in "West Africa, Iran, and Greece"..? 

https://en.wikipedia.org/wiki/Thumbs_signal

50%
50%
mhhf1ve
mhhf1ve
9/16/2016 12:53:37 PM
User Rank
Platinum
Re: "Infobesity"
> "@mhh: I'm not so sure about the idea of introducing random noise (do you have a link or other source on how this is being done?)..."

There's a subset of the field of cryptography that studies how to maximize statistically relevant information while minimizing the chances of identifying the individual records in a collected database. Academic surveys asking interviewees about very sensitive/personal topics (or about illegal activities, where the participants wouldn't want to admit to committing a crime) have used a fairly simple "flip a coin before answering the question" process (described here: https://research.googleblog.com/2014/10/learning-statistics-with-privacy-aided.html -- a couple years ago). More recently, companies like Apple are trying to come up with more advanced ways to store personal data without compromising people's privacy. I'm not a mathematician, but it seems like it boils down to making the de-anonymizing process more uncertain, so that you can only say with some (low) probability whether or not the individual records you're trying to uncover are accurate.

Obviously, though, in reality, there may be other datasets that aren't governed by these cryptography efforts that could completely wipe out the effectiveness (if it truly even exists). That is, Apple could be encrypting people's data, so that the odds are low that any of its collected info can be directly tied to particular users, but then a user's wireless carrier might just collect all the metadata for every action a user takes and allow anyone to pinpoint an individual's activity and personal info, regardless of how much random noise is injected to try to throw off prying eyes.

https://en.wikipedia.org/wiki/Differential_privacy

50%
50%
vnewman
vnewman
9/13/2016 4:02:43 PM
User Rank
Platinum
Re: "Infobesity"
I think the problem with that model is people tend to binge watch an entire series over a few days then a few things happen: they get sick of it, lose interest by the time the installment comes around, or just plain forget about it.  

At least with broadcast TV you get your weekly fix for awhile and then it becomes a habit - and we all know habits are hard to break.  

50%
50%
mpouraryan
mpouraryan
9/13/2016 3:03:05 PM
User Rank
Platinum
Re: "Infobesity"
That may well be the true "value add"--amazing how the symbiotic relationship somehow transcends.     And oh, on a side note, Mr. Bezos has a new rocket!!

:)



50%
50%
Joe Stanganelli
Joe Stanganelli
9/13/2016 5:24:41 AM
User Rank
Author
Re: "Infobesity"
@mp: That's a matter of both corporate practices and cultural attitudes.

In the EU, the prevailing attitude is a highly paternalistic and protective one.  At least one German state has outright "banned" Facebook's Like button widget -- and urged its denizens to keep from clicking on webpage Like buttons.

50%
50%
Page 1 / 5   >   >>


Latest Articles
Italy's 5G auction could exceed a government target of raising €2.5 billion ($2.9 billion) after attracting interest from companies outside the mobile market.
The emerging-markets operator is focusing on the humdrum business of connectivity and keeping quiet about some of its ill-fated 'digitalization' efforts.
Three UK has picked Huawei over existing radio access network suppliers Nokia and Samsung to build its 5G network.
Vendor says that it's its biggest 5G deal to date.
Verizon skates where the puck is going by waiting for standards-based 5G devices to launch its mobile service in 2019.
On-the-Air Thursdays Digital Audio
Orange has been one of the leading proponents of SDN and NFV. In this Telco Transformation radio show, Orange's John Isch provides some perspective on his company's NFV/SDN journey.
Special Huawei Video
10/16/2017
Huawei Network Transformation Seminar
The adoption of virtualization technology and cloud architectures by telecom network operators is now well underway but there is still a long way to go before the transition to an era of Network Functions Cloudification (NFC) is complete.
Video
The Small Cell Forum's CEO Sue Monahan says that small cells will be crucial for indoor 5G coverage, but challenges around business models, siting ...
People, strategy, a strong technology roadmap and new business processes are the key underpinnings of Telstra's digital transformation, COO Robyn ...
Eric Bozich, vice president of products and marketing at CenturyLink, talks about the challenges and opportunities of integrating Level 3 into ...
Epsilon's Mark Daley, director of digital strategy and business development, talks about digital transformation from a wholesale service provider ...
Bill Walker, CenturyLink's director of network architecture, shares his insights on why training isn't enough for IT employees and traditional ...
All Videos
Telco Transformation
About Us     Contact Us     Help     Register     Twitter     Facebook     RSS
Copyright © 2024 Light Reading, part of Informa Tech,
a division of Informa PLC. All rights reserved. Privacy Policy | Cookie Policy | Terms of Use
in partnership with