“Okay
Bob, what did you screw up now?”
Those Voices at the Call Center? They May Know a Lot About
You
The next time you dial customer service, who answers your
call may be determined by what you have said on
Facebook.
Companies from casino operator
Caesars Entertainment Corp. to wireless
carrier
Sprint Corp. are increasingly
checking social media and other personal data to tailor calls for each
customer.
The practice, however, raises
concerns among privacy advocates.
… A startup called
Afiniti International Holdings Ltd. is trying to change that. Its artificial intelligence software, which
has been installed in more than 150 call centers by dozens of companies,
examines as many as 100 databases tied to landline and cellphone numbers to
determine the best agent to answer each individual caller. Such matching can result in more satisfied
customers and more sales, the company says.
Afiniti’s technology not only pulls callers’ histories for
a business and credit profile, but seeks insights into their behavior by
scouring their public Facebook and
Twitter
posts as well as LinkedIn pages.
For my Data management students. How would this data benefit the organization?
Why Bosses Can Track Their Employees 24/7
… The Fourth
Amendment protects Americans from unreasonable searches and seizures, but it
only constrains the government’s actions. If local police or the FBI wants to track your
car, they have to ask a judge for a warrant first. But if your boss wants to track your phone,
it’s likely within his or her rights.
In fact, businesses track their employees’ locations all
the time. Often, it’s to keep an eye on
their equipment, like company vans or employer-issued cellphones. Other times, tracking helps bosses make sure
their workers are clocking in and out on time, and that remote employees—like a
technician or a plumber who make house calls, for example—are indeed where they
say they are. Tracking systems can also
help employers make sure their employees are reporting mileage correctly, and
that they aren’t taking detours between jobs to pick up groceries.
(Related). Why are
these companies chasing technology?
Digital Dunkin’: Non-Tech Firms Crash CES, Looking to Connect
At the world’s largest consumer electronics show this
week, Carnival cruise lines,
Dunkin’
Donuts and the owner of Absolut vodka unveiled new technology and swapped
tips.
It’s not that the security was bad, it’s that they said it
was good?
FTC takes D-Link to court citing lax product security,
privacy perils
The Federal Trade Commission
has
filed a complaint against network equipment vendor D-Link saying inadequate
security in the company’s wireless routers and Internet cameras left consumers
open to o hackers and privacy violations.
…
For its part,
D-Link Systems said it "is aware of the complaint filed by the FTC.
D-Link denies the allegations outlined in the
complaint and is taking steps to defend the action.
The security of our products and protection of
our customers private data is always our top priority.
" [Update: A
full response fromD-Link can be found here]
According
to the
FTC’s
complaint, D-Link promoted the security of its routers on the company’s
website, which included materials headlined “Easy to secure” and “Advance
network security.”
But despite the
claims made by D-Link, the FTC alleged, the company failed to take steps to
address well-known and easily preventable security flaws, such as:
·
“Hard-coded” login credentials integrated into
D-Link camera software -- such as the username “guest” and the password “guest”
-- that could allow unauthorized access to the cameras’ live feed;
·
A software flaw known as “command injection”
that could enable remote attackers to take control of consumers’ routers by
sending them unauthorized commands over the Internet;
·
The mishandling of a private key code used to
sign into D-Link software, such that it was openly available on a public
website for six months; and
·
Leaving users’ login credentials for D-Link’s
mobile app unsecured in clear, readable text on their mobile devices, even
though there is free software available to secure the information.
The
tech version of “too big to fail?”
How Samsung Weathered the Galaxy Note 7 Recall
A strong earnings forecast from
Samsung Electronics Co. on Friday
offered a fresh reminder of the company’s central place in the global
technology supply chain.
Even with the
recall
of its premium Galaxy Note 7 smartphone in early October last year that
cost it at least $5 billion, Samsung
projected
profits for the last three months of 2016 that would be the highest in more
than three years.
The boost in profits didn’t come from its own lineup of
premium smartphones, but rather from competitors like Apple Inc., Dell Inc.,
HP Inc. and
Sony Corp., whose smartphones, laptops
and televisions rely on components manufactured by the South Korean technology
giant.
“Mess
with me and I’ll sue you!” Probably not
a viable threat in cyber-space.
Law firms subject to same cyber risk as others, but is
compliance required?
…
ALM Legal Intelligence has
reported the following facts on the legal sector.
- Nearly
10% of firms have not performed a formal information security and privacy
assessment.
- Approximately
one-third of firms do not hold cyber liability insurance policies.
- More
than 55% of firms have either already established a cybersecurity practice
or have plans to form one.
- A
whopping 98% of law firm respondents to the ALM intelligence law firm
survey believe that the legal industry is increasingly a target for
attacks.
- 22%
of law firms don’t have a data breach plan in place
- Only
50% of law firms have a cybersecurity team in place
- 87%
state they train users on basic security practices yet only 47% conduct
drills
- Most
view cybersecurity as an IT issue vs the reality, it’s a business
issue
Additionally Daniel Solove, professor at George Washington
University Law School and organizer of the privacy + Security forum, said “On a scale of 1 to 10, the risks law firms are facing
are an 11.”
Another ‘talking car.’
Will all cars talk like KITT? Is
voice a ‘must have?’
Nissan is placing Cortana in the passenger seat
At the CES consumer electronics conference in Las Vegas
today, Nissan announced that, as part of Microsoft’s existing partnership with
the Renault-Nissan Alliance, it’s working with Microsoft around the use of the
Cortana virtual assistant and other services that are part of a new Connected
Vehicle Platform.
…
This comes a day
after Google
said
that Daimler and Hyundai will be integrating the Google Assistant, and Ford
said
Amazon’s Alexa virtual assistant will be coming to its cars.
Apple, for its part, fields CarPlay, which is
integrated into
hundreds
of vehicles.
Technology for those IoT connected devices that don’t
change much over the years.
Intel’s Compute Card wants to give your fridge a brain
transplant
… Hardware
manufacturers, which already include big names like HP, Dell, InFocus, Lenovo,
LG, and Sharp, will use Intel’s specifications to build the Compute Card into
their new products.
It’s an easy way for a company that doesn’t have
experience producing tiny smart internals to add the functionality into a new device.
Now LG doesn’t have to figure out how to
produce the computing portion of its fridge, it can just outsource the problem.
Even better, it means you don’t need to
replace your fridge when you want new features — you can just upgrade the card.
Now children, let’s not get into another “did too!” did
not!” shouting match. The FBI didn’t
think this was worth mentioning at the time?
FBI Says Democrats Refused Access to Hacked E-Mail Servers
The Democratic National Committee rebuffed requests by
federal agents to inspect computer servers that had been breached last year
during the presidential campaign, forcing them to rely on third-party cyber
security data to investigate the hack, the FBI said.
The next great time-waster?
The Internet Archive has created a repository dedicated to
Donald Trump. The Trump Archive is
designed to be a public record of the views the next President of the United
States of America has expressed in recent years. Allowing us all to become fact-checkers.
…
The Trump Archive contains
more than 520 hours of Trump-related videos.
This includes speeches, interviews, debates,
and other televised broadcasts concerning the president.
The earliest video dates back to December
2009, when Trump started expressing views relevant to his presidency.
(Related).
Presidents move markets.
New app alerts users when Trump tweets about stocks they own
Worried that a tweet from President-elect
Donald Trump
might sink your stocks?
There’s an app
for that.
(Related). Hardly
unexpected.
South Korea assigns official to monitor Trump’s tweets:
report
South Korea’s government has assigned an official to
monitor President-elect
Donald Trump’s
Twitter account, according to a new report.
The officer will screen all of Trump’s tweets,
The
Korea JoongAng Daily said Thursday, paying special attention to those
regarding Asia, North Korea and South Korea.
(Related). Usually it
takes a few years to sort out Presidential papers.
White House releases new Obama social media archive tools
The Obama administration's social media archive plan
includes everything from GIFs to Vines, the White House revealed Thursday.
In a
post,
the White House shared links to several platforms that allow users to access a
history Obama’s posts during his time in the White House.
Some of the sites included Giphy, which
archived
every GIF image ever used by the White House, and ArchiveSocial’s
searchable
database of every White House social media post.
The White House’s Twitter, Facebook and Vine posts are
also available for anyone to download in their entirety and use to create their
own data and archival projects.
Not all of the tools are purely archival. One, created MIT
Media Lab’s Electome group,
analyzed
Obama’s tweets and categorized them into policy categories, tracking them
against 2016 election discourse on Twitter.
The charts highlight discrepancies between the
president’s tweets and other tweets in areas like healthcare and employment.
The charts reveal Obama's tweets focusing on these things
much more than other politically focused Twitter users. 2016 political Twitter users did, however,
spend a lot more time than Obama tweeting about foreign policy and national
security matters.
In October, the White House announced its initial plans
for its digital archival project, which included housing all of the president’s
tweets on the Twitter account
@POTUS44.
Obama has been called the first “Twitter president"
What will my geeks do with this? Stay tuned!
You might have heard about PIXEL, the
new
Raspberry Pi desktop environment, that comes as part of the Raspbian Jessie
operating system.
Basically it offers a
slick, new user interface to the low-spec hobbyist mini-computer, and the
results are stunning.
Given the spec of the Raspberry Pi (we’re talking ARM
processors without much RAM and no hard disk drive) it would be rather great if
this OS could be ported to Intel and AMD 32-bit and 64-bit processors, to pump
some new life into older PCs, wouldn’t it?
Well, as fortune would have it,
this
is exactly what has happened.
The
Raspberry Pi team has released a version of PIXEL for x86 and x64 computers,
which means that there is a good chance that your old, low spec PC or laptop
could be persuaded to run, and run well.
.. Your mileage
may vary, but in short, if your computer will run Debian, then it should run
PIXEL.
(Related)
The traffic light is a fun little project, that can be
completed in under an hour.
Learn how to
build your own – using an
Arduino – and how to modify
the circuit for an advanced model.
Don’t worry if you’ve never used an Arduino before, we
have a
beginners guide.