Category: Technology (page 2 of 10)

How and why I strive to maintain my privacy – a post in light of the Snooper’s Charter

GCHQ at Cheltenham, Gloucestershire

An aerial image of the Government Communications Headquarters (GCHQ) in Cheltenham, Gloucestershire.
Photographer: GCHQ/Crown Copyright. CC BY-SA 2.0


Arguing that you don't care about the right to privacy because you have nothing to hide is no different than saying you don't care about free speech because you have nothing to say.

Edward Snowden, 2015 (source)


I get asked now and then how to improve one's personal privacy, digitally speaking. It's unsurprising that such questions are directed my way given privacy is a core objective of the hi:project, and yet I seemed to have attracted more than the usual number of questions since my last post – Introducing Google Assistant, the Surveillance Interface.

You might want to stop commercial entities intruding – it's difficult to sum up in a sentence or two how egregious the state of commercial surveillance is today. You might want to help head off the realisation of a surveillance state if only because you've read somewhere that such things don't end well. You might simply want to have less data about your movements and purchases and media habits and general proclivities out there because it's not a case of if the corresponding databases are hacked but when.

Importantly, I write this post the very week the UK has passed the most extreme surveillance law ever passed in a democracy. The so-called Snoopers' Charter is disgusting, distressing and, in good part, stupid. Read more

Introducing Google Assistant, the Surveillance Interface (SI)

google assistant by techcrunch

A new kind of interface has surfaced over the past five years – artificial intelligence (AI) based ‘personal assistants’.

Apple Siri started the ball rolling, swiftly followed by Google Now, Microsoft Cortana, Amazon Alexa, and half a dozen others. But it now has a new apogee, a new sector defining moment, a revolution dressed up as evolution. The only thing more alarming than its instrusive, opaque, and society-altering capabilities is the way in which tech pundits have ladled out the accolades, pundits whose worldview appears as limited as a magpie’s regard for shiny things.

Google Now is now Google Assistant, and it comes integrated into Google’s first full-on (i.e. not just a reference design) mobile phone – the Pixel. Read more

Lightning – cryptocurrency and the Internet of Things

lightning

Bitcoin is an experiment. That's granted. The fact that it's trusted and actually useful is nothing short of phenomenal. Last week for example, the trade volume amounted to US$229m.

Nevertheless, Bitcoin has some fundamental constraints that keep it from going mainstream: it has a ballpark limit of 7 transactions per second, and having confidence that a transaction has 'gone through' – non-recourse transactions – takes roughly 20 to 60 minutes depending on the level of confidence you're looking for. (The user experience sucks too, but that's not for this post.)

While 229 million dollars is no small chunk of change, Visa processes many thousands of transactions per second, peaking at tens of thousands, and will have processed around US$130 billion last week.

State channel – more exciting than it sounds

The crypto awesome sauce underpinning Bitcoin is known as the blockchain, perhaps the No.1 tech buzzword of recent times. It's at the heart of the currency's success – preventing users spending the same money twice – but is also the nub of its relatively slothful nature. It's with a fair degree of excitement then that I've been tracking the progress of Lightning, a protocol first mooted to my knowledge in 2013.

The jargon here is state channel – blockchain interactions that could occur on the blockchain but get conducted off-chain without impairing the trust parties have in the interaction. Lightning facilitates state channel to speed things up and attenuate the costs needed to prove transactions (and offers a little more spark in terms of brand appeal!) Read more

Defining Sovereign Technology, so we can build it, and so we know it when we see it

head

Note: the IIW community adopted the qualifying prefix "self-" not too long after this post was first written, ie. self-sovereign technology.


Agency refers not to the intentions people have in doing things but to their capability of doing those things in the first place.

To be able to ‘act otherwise’ means being able to intervene in the world, or to refrain from such intervention, with the effect of influencing a specific process or state of affairs.

(Giddens 1986)

Technology must always be a component of agency as tools change our capacity to ‘act otherwise’. And it’s a component that’s all the more pervading and penetrating as the delineation of the analogue and digital dissolves, as ‘the device’ assumes an exo-brain role and as sensory ‘things’ form our exo-nervous system.

Simultaneously, I have a digital self and a self with digital presence.

Simultaneously, this is me and it is my representative, my agent.

Simultaneously, it is core to my agency and must be subject to it. Read more

Why can’t Deezer answer simple questions about privacy?

Deezer website screenshot

I've just bought an Onkyo TX-8150 network receiver. Lovely. Especially because it can drive two pairs of speakers, eats so-called hi-res music (24/192 with a 32/384 Hi-Grade DAC), and comes ready to play nice with the likes of Spotify, Airplay and Deezer.

Spotify tarnished its reputation somewhat with its privacy cock-up last year, and doesn't yet entertain hi-res. Apple's Airplay looks neat but doesn't do hi-res either, and totally ignores Android. Hmm. So let's check out Deezer I thought to myself. A rare European Unicorn. And while it describes lossless CD quality as hi-res when that's not really what the term means, I'm not sure my 'listening environment' is that sensitive! Lossless CD quality will do me. Read more

On the future of manufacturing

modelling additive manufacture

I was invited last week to talk about the future of manufacturing at an event run by the manufacturing practice of one of the big law firms. Here's a whistle stop summary. It's a mind-blowing vista.

Intro

On considering political, economic, social and technological factors, it's unarguable that we're contemplating major flux in manufacturing. As with any flux, today's players will either win out or lose out, and clearly everyone in this room wishes to contribute to and participate in the winning side of things!

With that in mind, I'd like to explore some major themes:

  • Dehumanisation
  • Dematerialisation
  • Decentralisation
  • Deindustrialisation

That list sounds fairly destructive, yet I believe manufacturing is then transformed, manufacturing is vital, and manufacturing is more exciting than ever. Read more

Google on collaboration – a new study

Google collaboration report June 2015
First published to Gigaom Research.


Our customers often tell us that encouraging and enabling collaboration has dramatically improved their business. We decided to dig a little deeper by conducting some original cross-industry research that measures the power of workplace collaboration in concrete terms.

This is how Google introduces the findings of its recent survey of senior staff and C-suite executives at 258 North American companies across a wide range of business sectors and sizes. (PDF of full report.) The primary conclusion is presented up front:

… collaboration has a significant impact on business innovation, performance, culture and even the bottom line.

This is quite right and quite wrong. Collaboration is at once driven and the driver; it is both a cause and an effect. As is culture come to that. Effectively, Google must grapple with two distinct appreciations of business among its customers and prospects.

Simply complex

If there’s one thing that differentiates organization this century from the last it’s that we may now acknowledge complexity and do something about it. We increasingly have the technologies to help navigate complexity. Choosing to do so offers competitive advantage for the time being; there will soon come a time when failing to do so renders an organization unresponsive, fragile and, consequently, bust. (Note that complexity and complication are different things.) Read more

Work IT: bring-you-and-your-own-everything

your-own-everything

First published to Gigaom Research.

Cast your mind back a decade or more. Did you request specific hardware from your company’s IT team? If so, you started a trend that continues to play out to this day, and will continue to its logical and exciting conclusion.

You may or may not have been successful in your request given IT’s historic intransigence, but nowadays many of us expect to rock up to work with the laptop and tablet and smartphone of our choosing – often our own – and expect the IT team’s full accommodation.

We’re also bringing our own applications. Non-IT staff have adopted software-as-a-service without necessarily going through their IT colleagues. Yammer, Trello and Slack for example. Perhaps Google Docs crept in without organization-wide adoption of Google for Work. Meeting schedulers. Note-takers. Expense trackers. Skype. Dropbox. Instagram. The list is as long as the kind of things you need to get done.

It’s useful to think of this in terms of Enterprise IT and Work IT. The enterprise owns Enterprise IT whereas the worker owns Work IT. In simple terms, Enterprise IT is focused on the organization, Work IT on organizing. Enterprise IT is top-down with the starting position of locking everything down, whereas Work IT is bottom-up, thriving by facilitating sharing and openness. Read more

Toward a social compact for digital privacy and security

toward a social compact for digital privacy and security, Global Commission on Internet Governance
Updated 16th September, embedding the videos of the session below.


The Global Commission on Internet Governance (ourinternet.org) was established in January 2014 to articulate and advance a strategic vision for the future of Internet governance. With work commencing in May 2014, the two-year project is conducting and supporting independent research on Internet-related dimensions of global public policy, culminating in an official commission report.

toward a social compact - Global Commission on Internet GovernanceThe Commission published a statement 15th April 2015 for the Global Conference on Cyberspace meeting in The Hague. It calls on the global community to build a new social compact between citizens and their elected representatives, the judiciary, law enforcement and intelligence agencies, business, civil society and the Internet technical community, with the goal of restoring trust and enhancing confidence in the Internet.

I have been invited to discuss this statement with Dame Professor Wendy Hall and Sir David Omand at a Web Science Institute event this afternoon.

The core elements advocated in building the new social compact are:

  1. Privacy and personal data protection as a fundamental human right
  2. The necessity and proportionality of surveillance
  3. Legal transparency and redress for unlawful surveillance
  4. Safeguarding online data and consumer awareness
  5. Big data and trust
  6. Strengthening private communications
  7. No back doors to private data
  8. Public awareness of good cyber-security practices
  9. Mutual assistance to curtail transborder cyber threats.

Here is the brief slidestack framing my contribution today:

Videos

Dame Professor Wendy Hall introduces session (1min 32sec)

Sir David Omand (12min 45sec)

Me (9min 35sec)

Marketing and PR and the General Data Protection Regulation

EU citizens

My main character in Attenzi – a social business story, the CEO Eli Appel, has this to say over lunch with his chairman:

Good business is about cooperative and interdependent relationships, always has been, yet the humanity was lost when organizations scaled way up during the 20th Century. We want to make those relationships more human again, but the answer can’t be to scale it all back down. We have to scale something else up.

He adds:

... No business can really get to be social in a meaningful and valuable way simply by indulging in social media or by slapping apps onto social devices or by subscribing to a social enterprise network.

Eli is referring here to the visceral difference between 'doing' social (bolted on) and 'being' social (built in), and you know which one you're on the receiving end of in any given situation right? Read more