Monday, March 20, 2017

Algorithms Learn From Us, and We've Been Bad Parents

“I was nothing more than a thug with Tolstoy in my pocket.”
David Adams Richards, Mercy Among the Children 







Don Foster, Commvault (Story image for revenue outage from CSO Online

Complacency and cheeseburgers.  “Cowen is optimistic in general, but not necessarily for you.”


6 Ways Liberal Celebrities Could Make A Difference



Disaster recovery: How is your business set up to survive an outage? 

Jason Dinesen, Glossary: Audit Technique Guides. “Audit Technique Guides are IRS guidebooks that give detailed insight into various industries IRS auditors may encounter.”






Different groups — frontline workers, auditors, the public — value different aspects of evaluation for different reasons. It’s important to keep these competing values in mind.


“When I use a word,” Humpty Dumpty said in rather a scornful tone, “it means just what I choose it to mean — neither more nor less.”
“The question is,” said Alice, “whether you can make words mean so many different things.”
“The question is,” said Humpty Dumpty, “which is to be master — that’s all.”
(Lewis Carroll, Through the Looking Glass)



How worried should we be about AI?  A pithy symposium.  And “how to beat the robots” (NYT
 
How the Internet Found a Better Way Than Illegible Squiggles to Prove You're Not a Robot or a Horse
Captcha has evolved from identifying mangled letters to web users unwittingly training Google’s AI. Now, finally, you won’t have to do anything ...

How the internet found a better way than illegible squiggles to prove you're not a robot 
 



 Feminist’ brand behind ‘period-proof’ underwear slammed over allegations of toxic working conditions – with one ex-employee claiming ‘it was like being in an abusive relationship.’ Why are lefty institutions such cesspits of abuse and exploitation?



Internet of things: Home is where the hackers are Financial Times. Clive will have much to say if he shows up. Oh, and my bank keeps offering me voice verification, and I keep saying, “No way!” And my God, who needs to operate a Roomba remotely?





U.S. government hackers began developing destructive malware meant to disrupt Iran’s nascent nuclear program as early as 2006, and deployed an early version of the worm in Iran the following year. But it wasn’t until 2010 that the first public reports about the cyberattack—dubbed Stuxnet—began to surface. At around the same time as the U.S. was working on Stuxnet, it attempted a similar attack on North Korea’s nuclear program. That effort failed: The malware never reached the computers that controlled the country’s nuclear centrifuges. But it wasn’t reported until 2015, years after it happened. Just this weekend, The New York Times described a series of cyberattacks on North Korea’s missile launches that took place in 2016, during Barack Obama’s final year as president. The timing of these landmark reports emphasizes the yawning gap that often opens between a high-profile state-on-state cyberattack and the moment it’s revealed to the public


7 questions to guide your voice as a writer

Crowdfunding: Everything you need to know