Judge Has Doubts About Gmail Privacy Deal

Two proposed settlements involving Google drew very different reactions from two federal judges on Thursday in San Jose, with one headed toward approval and the other drawing a rebuke over the clas…

SafeJunction technology prevents providers like Google from viewing or analyzing emails in-transit or even after they are stored.

Source: Judge Has Doubts About Gmail Privacy Deal

Thanks to Courthouse News Service

Big Data vs. Privacy: A balancing act

How can businesses continue to respect privacy concerns while still permitting the use of big data to drive business value?

Companies will now have an even greater obligation to protect the personal information entrusted to them, no matter how it’s processed’

Big data use is expected to grow exponentially in the next few years now that the noise and excitement over the volumes of data we have at our fingertips are starting to be replaced by action and practical experimentation, and many organizations start to really capitalize on their investments in analytics, data collection and storage.

The facts of Internet life in 2017 are that privacy still seems unimportant to most users, but the increasing number of incidents of abuse and cyber crime will attract more and more public attention.

Source: Big Data vs. Privacy: A balancing act

Thanks to Predictive Analytics Times

What is Access Management and Why is it Important? | The Cloud Is Huge 2.0

Reblog from another of SafeJunction’s Blog Sites

Access Management is a really “dry” term that probably glazes over the eyes of most computer and mobile device users. I like to use a “gated community” or “storage unit” analogy because it illustrates a couple of significant pieces of both the concept and the practice itself. To enter a gated community or off-site storage unit in a vehicle I must possess an entry code. The road or driveway I use to enter is like the network connection to a computer or mobile device. Without the code, the gate won’t open and I won’t be able to drive through. The code is like the username and password of my device, but over time this device “entry point” has been “modernized” so that the operating system or apps on the device have taken over issuing the code without my having to or even knowing that it has. Even though we can still manually accomplish these functions, we’ve become so inattentive, lazy, and impatient that we now delegate permission to the device, operating system, apps, or other

Source: What is Access Management and Why is it Important? | The Cloud Is Huge 2.0

Thanks to The Cloud is Huge 2.0

Web of Trust browser add-on caught selling users’ data

“For now, anyone using the WOT extension is strongly recommended to immediately uninstall the extension right now.”

Just another nasty example of the lack of privacy, trust, or security on the Internet.  It continues to be a jungle out there.  What will it take?

Source: Web of Trust browser add-on caught selling users’ data

Trust

Thanks to SafeUM

Yahoo wants to spy on users through smart advertising

“Yahoo has filed a patent for a type of smart billboard that would collect people’s information and use it to deliver targeted ad content in real-time.

Using a combination of sensors, including microphones and cameras located either on the billboard or on drones nearby, it would watch and listen to people near the billboard to get a sense of who they were and how they were reacting, which would help it to tailor what it showed them.The patent showed that the billboard might work with advertising exchanges, meaning that it wouldn’t just display its own ads, but might also put them devices including tablets, phones, smartwatches and TVs.
“The ubiquity of mobile devices and the ability to craft individualized marketing strategies to meet the needs and interests of specific consumers have made a compelling case for such techniques as the most efficient use of marketing budgets. Nevertheless, a significant portion of such budgets is still devoted to more traditional channels.”

Source: Yahoo wants to spy on users through smart advertising

Thanks to SC Magazine

Software Flags ‘Suicidal’ Students, Presenting Privacy Dilemma

“School administrators increasingly have the power to track students’ Web browsing on school-issued laptops, even when the students are at home. The implications are complicated.”

Giving new meaning to Big Data!

Source: Software Flags ‘Suicidal’ Students, Presenting Privacy Dilemma : NPR Ed : NPR

Thanks to NPR

IBM and ARM partner for IoT domination

 

The mbed system is synonymous with tracking and Big Data of one kind or another.  As we continue to discover, IoT and tracking are mixed blessings to Internet users.  On the one hand the surveillance provided by tracking assists law enforcement agencies with solving crimes, but each users privacy (at some levels) is compromised.

SafeJunction continues to ask that users be given the option or revealing or protecting their privacy – at least as it has to do with information or data that is personal (like financial, medical, and family-centered stuff).

“ARM is adding IBM’s cloud into the guts of its Internet of Things mBed system.”

Source: IBM and ARM partner for IoT domination – Business Insider – Linkis.com

dig-ID

Thanks to- Business Insider – Linkis.com

Analytics for government: big data and Big Brother

“Transparency and privacy are two key areas where the public sector will not be able to rely on the private sector for innovation”

The gulf between national security surveillance efforts and the publics’ desire for privacy on the Internet continues to widen throughout the world.  As long as cybercrime is a viable “industry”, the situation will continue unabated,

Source: Analytics for government: big data and Big Brother – Telegraph

Thanks to The Telegraph

Privacy vs progress: the ethical quandary of big data

“These days, massive volumes of data about us are collected from censuses and surveys – but this data can also reveal personal and sensitive information about…”

We continue to struggle with the right to privacy vs. our penchant to use anything that’s free.  It’s kinda like using the highway without understanding that someone must bear the costs of repair and construction. Oh well!

Source: Privacy vs progress: the ethical quandary of big data

Thanks to Business Tech

And We Could Fly to Mars but We Couldn’t Build a Web Site

How an unlikely group of high-tech wizards revived Obama’s troubled HealthCare.gov website

Lessons learned from the team that fixed the HealthCare.gov website that failed in the Fall of 2013.

“Coders and troubleshooters from across the country joined forces in Washington, D.C. to power-up the efforts to get the site back on track. Google site-reliability engineer and Obama campaign veteran, Mikey Dickerson, was responsible for stamping out bugs and speeding up response times. He and Jini Kim, a former Google product manager, relied heavily on the APM dashboard that was rolled out to everyone on the team to monitor the site and stay on the same page.”

“Last Oct. 17—more than two weeks after the launch of HealthCare.gov—White House press secretary Jay Carney was going through what one senior Obama aide calls “probably the most painful press briefing we’ve ever seen.” Pressed repeatedly on when the site would be fixed, the best he could say was that “they are making improvements every day.”

“They” were, in fact, not making improvements, except by chance, much as you or I might reboot or otherwise play with a laptop to see if some shot in the dark somehow fixes a snafu. Yet barely six weeks later, HealthCare.gov was working well and on its way to working even better.

This is the story of a team of unknown—except in elite technology circles—coders and troubleshooters who dropped what they were doing in various enterprises across the country and came together in mid-October to save the website. In about a tenth of the time that a crew of usual-suspect, Washington contractors had spent over $300 million building a site that didn’t work, this ad hoc team rescued it and, arguably, Obama’s chance at a health-reform legacy.”

This appears in the March 10, 2014 issue of TIME.

Thanks to  Time Magazine