industryterm:software program

  • The Shadow Workforce of Facebook’s Content Moderation
    http://nymag.com/intelligencer/2019/02/the-shadow-workforce-of-facebooks-content-moderation.html

    As in Omelas, however, the joyousness of Facebook’s hundreds of thousands of advertisers depends wholly on the misery of a small number of other people: its content moderators. For his article, Newton spoke with several current and former employees of Cognizant, a “professional services vendor” contracted by Facebook to moderate its platform, removing the content that violates Facebook’s terms of service. In practice, this can mean spending your days scrolling through post after post of graphic porn, hate speech, and videos of death and violence. “People develop severe anxiety while still in training,” Newton writes, “and continue to struggle with trauma symptoms long after they leave,” but are given minimal support and job stability — each employee gets nine “wellness time” minutes per day, to be used if they feel traumatized and need to stop moderating. Meanwhile, “the conspiracy videos and memes that they see each day gradually lead them to embrace fringe views.” For their trouble, they are paid $28,800 a year, around 12 percent of the average salaried Facebook employee’s total compensation of $240,000.
    Get unlimited access to Intelligencer and everything else New York.
    Learn More »

    The moderators sign nondisclosure agreements that prevent them from talking about what they’d done for Facebook — or even, apparently, that they’d worked for Facebook at all. This theoretically protects private Facebook user data from leaking out. But it also has the effect of hiding the 1,500 content moderators from the outside world, preventing them from even describing the difficulty of their jobs, let alone agitating for better working conditions. Even full-time Facebook employees are apparently unaware of the extent to which Facebook contracts out its content moderation, and the conditions under which that moderation is taking place, despite its importance. “Why do we contract out work that’s obviously vital to the health of this company and the products we build?” one employee asked on an internal company message board.

    Rather than address its various mounting content issues with dedicated staff hires, the company farmed out moderation work to contractors, needing to maintain a cost structure that relied on low labor costs, and believing that eventually an “engineering solution” could be developed to keep the platform clean and safe. This bargain has worked out well for Facebook, which by 2016 was raking in an incredible $600,000 per full-time employee in net profit. It has worked out rather less well for the rest of us — particularly the contactor moderators with PTSD-like symptoms. (Facebook’s profit margins have been thinning over the last two years, naturally, as it expands its “security” team, which includes moderators.)

    The idea that you can keep your labor costs low by relying on software automation, creating the eye-popping profit margins that venture capitalists approvingly call “software margins,” is a foundational belief of 21st-century Silicon Valley. Albergotti quotes the mantra COO Sheryl Sandberg brought to Facebook from Google: “People don’t scale.” And it’s true that there are some tasks — like selling and placing digital ads — that are more efficiently and profitably done by software programs. But there aren’t that many tasks that programs can do as well as human beings, and not many programs that can be automated without the help and work of humans. Which means that any company bragging about automated solutions is likely hiding a much larger shadow workforce supporting those solutions, like the one Facebook employs through Cognizant.

    Such arrangements are endlessly common in Silicon Valley. Magically convenient services and devices are often subsidized not just by money-burning investors but also by exploitative labor arrangements. Amazon purchases arrive quickly in part because the company’s warehouse workers are relentlessly tracked and don’t take bathroom breaks; Uber rides are cheap in part because the median hourly wage of an Uber driver is $10. Obviously, being a paid Uber driver is no closer to being a chained-up child than riding in an Uber is to being in paradise, but you can begin to understand the bargain being struck by the citizens of Omelas in Le Guin’s story.

    The truth is that “software margins” (or what investors hope will eventually be software margins) are rarely achieved solely through automation and innovation. Most Silicon Valley titans, especially the software giants that have arisen over the last two decades, have become adept at externalizing their costs. Users contribute content for free. Contractors work for cheap. The burden of moderating content has for the last ten years been borne by someone — in some cases under-compensated contractors, in some cases users moderating content themselves for free, in some cases the victims of abuse or harassment, and, in some cases, the public sphere as as whole. Just rarely Facebook. If Facebook’s shadow-workforce practices — which have been widely reported by journalists and studied by academics well before the Verge’s story this week, and which are no different than content-moderation practices on many social networks — are being singled out now, it may be because the platform’s conveniences no longer seem worth the full social cost.

    #Digital_Labor #Facebook #Modération #Externalisation

  • Why software development should help you in life… and #politics?
    https://hackernoon.com/why-software-development-should-help-you-in-life-and-politics-9c298801ae

    As software developers I consider we have the opportunity to interact practically with a large audience and build a know-how on complex systems. Maybe more than most people actually do, and this knowledge can be used in your daily life…What exactly is software development about ?First, I must confess that it is often hard to explain what software and software development is to people without prior knowledge. You can find a lot of definitions like “a collection of instructions that tell a computer how to work”, “the art of creating a program which can perform a required task” or “the collective processes involved in creating programs”. I think we need something more “practical”, so I would say that software programs are tools used by people to exchange and manipulate meaningful information, i.e. (...)

    #software-development-help #agile #decentralization #software-development

  • (Your password iochow99)

    It seems that, iochow99, is your password. You may not know me and you are probably wondering why you are getting this e mail, right?

    actually, I setup a malware on the adult vids (porno) web-site and guess what, you visited this site to have fun (you know what I mean). While you were watching videos, your internet browser started out functioning as a RDP (Remote Desktop) having a keylogger which gave me accessibility to your screen and web cam. after that, my software program obtained all of your contacts from your Messenger, FB, as well as email.

    What did I do?

    I created a double-screen video. 1st part shows the video you were watching (you’ve got a good taste haha . . .), and 2nd part shows the recording of your web cam.

    exactly what should you do?

    Well, in my opinion, $1000 is a fair price for our little secret. You’ll make the payment by Bitcoin (if you do not know this, search “how to buy bitcoin” in Google).

    BTC Address:

    1Bb446YF8AZK3nKchPJQ3T5KwPGRHRARJ5

    (It is cAsE sensitive, so copy and paste it)

    Important:
    You have one day in order to make the payment. (I’ve a unique pixel in this e mail, and at this moment I know that you have read through this email message). If I do not get the BitCoins, I will certainly send out your video recording to all of your contacts including relatives, coworkers, and so on. Having said that, if I receive the payment, I’ll destroy the video immidiately. If you need evidence, reply with “Yes!” and I will certainly send out your video recording to your 6 contacts. It is a non-negotiable offer, that being said don’t waste my personal time and yours by responding to this message.

    • (Part num your Hacked phone. +XX XXXXX7766)

      It seems that, +XX XXXXX7766, is your phone. You may not know me and you are probably wondering why you are getting this e mail, right?

      actually, I setup a malware on the adult vids (porno) web-site and guess what, you visited this site to have fun (you know what I mean). While you were watching videos, your internet browser started out functioning as a RDP (Remote Desktop) having a keylogger which gave me accessibility to your screen and web cam. after that, my software program obtained all of your contacts from your Messenger, FB, as well as email.

      What did I do?

      I backuped phone. All photo, video and contacts.
      I created a double-screen video. 1st part shows the video you were watching (you’ve got a good taste haha . . .), and 2nd part shows the recording of your web cam.

      exactly what should you do?

      Well, in my opinion, $1000 is a fair price for our little secret. You’ll make the payment by Bitcoin (if you do not know this, search “how to buy bitcoin” in Google).

      BTC Address:

      1GYNGXLEUGkkQjHo19dHDnGE87WrAiGLLB

      (It is cAsE sensitive, so copy and paste it)

      Important:
      You have 48 hour in order to make the payment. (I’ve a unique pixel in this e mail, and at this moment I know that you have read through this email message). If I do not get the BitCoins, I will certainly send out your video recording to all of your contacts including relatives, coworkers, and so on. Having said that, if I receive the payment, I’ll destroy the video immidiately. If you need evidence, reply with “Yes!” and I will certainly send out your video recording to your 6 contacts. It is a non-negotiable offer, that being said don’t waste my personal time and yours by responding to this message.

      Variante. De toute évidence, une base de données commerciale a été volée. Les 4 chiffres transmis correspondent à un vrai numéro que le destinataire possède...

    • LEP : [xxx@xxx.com] 19-08-2018 03:58:09 You can easily get off

      Ticкet Detаils: LEP-334-34033
      Email: xxx@xxx.com
      Camera ready,Notification: 19-08-2018 03:58:09
      Status: Waiting for Reply 53xuAaTy6A2d12wInNmOkG6ReW9Yy07Bu1_Priority: Normal

      **********************************************************************

      Hi,

      If you were more attentive while playing with yourself, I wouldn’t write dis message. I don’t think that playing with yourself is extremely awful, but when all colleagues, relatives and friends get video record of it- it is obviously for you.

      I placed virus on a web-site for adults (with porn) which was visited by you. When the object click on a play button, device begins recording the screen and all cameras on your device starts working.

      Moreover, soft makes a dedicated desktop supplied with keylogger function from the system , so I was able to save all contacts from ur e-mail, messengers and other social networks. I’ve chosen this e-mail cuz It’s your working address, so you will read it.

      In my opinion 730 usd is pretty enough for this little false. I made a split screen vid(records from screen (u have interesting tastes ) and camera ohh... its funny AF)

      So its your choice, if u want me to delete this сompromising evidence use my Bitсоin wAllet aDdrеss- 1KLV9CDNtfy1XV1CEABDdShQMYWKhUuUNH
      You have one day after opening my message, I put the special tracking pixel in it, so when you will open it I will know.If ya want me to show u the proofs, reply on this letter and I will send my creation to five contacts that I’ve got from ur device.

      P.S.. You are able to complain to cops, but I don’t think that they can help, the investigation will last for 5 month- I’m from Estonia - so I dgf LOL

      Je n’ai toujours pas reçu la dite vidéo. Ça me stresse...

    • LKO : [xxx@xxx.com] 19-08-2018 06:53:42 Your life can be destroyed

      Tiсkеt Detаils: LKO-529-93365
      Email: xxx@xxx.com
      Camera ready,Notification: 19-08-2018 06:53:42
      Status: Waiting for Reply 99xuFady0A0f96wZnEmMkV1PrO5Ty05Iu8_Priority: Normal

      =-=—=-=-=—=-=-=-=-=-=-=-=—=-=-=—=-=-=-=-=-=—=-=-=—=-=-=-=-=-=-=-=—=-=-=-=-=-=-=-=-=

      Hello,

      If u were more scrutiny while caress yourself, I wouldn\’t worry you. I don\’t think that playing with yourself is extremely awful, but when all your friends, relatives, сolleagues receive video record of it- it is certainly for u.

      I adjusted malisious soft on a porn site which you have visited. When the object click on a play button, device starts recording the screen and all cameras on ur device begins working.

      Moreover, my virus makes a remote desktop supplied with key logger function from the device , so I was able to get all contacts from ya e-mail, messengers and other social networks. I\’m writing on dis e-mail cuz It\’s your corporate address, so you will read it.

      I suppose that 870 usd is pretty enough for this little false. I made a split screen vid(records from screen (u have interesting tastes ) and camera ohh... its funny AF)

      So its your choice, if u want me to delete this сompromising evidence use my BitcOin wAllеt aDdrеss- 1PcCBv4wvErq7TSTq44wnPM3xDZ9uE8QHH
      You have one day after opening my message, I put the special tracking pixel in it, so when you will open it I will know.If ya want me to share proofs with ya, reply on this letter and I will send my creation to five contacts that I\’ve got from ur contacts.

      P.S.. U are able to complain to police, but I don\’t think that they can help, the inquisition will last for several months- I\’m from Ukraine - so I dgf lmao

      Les adresses BTC changent d’un mail à l’autre...

    • Deux adresses mails spécifiques, un n° de téléphone particulier. Ces 3 éléments ont un point commun particulier : je les utilise pour mes accès aux services Microsoft. Ça me donne l’impression que c’est Microsoft qui se serait fait piquer sa base de comptes « live.com »... pas plus de preuves que ça... et aucune référence sur Internet à ce sujet évidemment.

  • Revealed : 50 million Facebook profiles harvested for Cambridge Analytica in major data breach
    https://www.theguardian.com/news/2018/mar/17/cambridge-analytica-facebook-influence-us-election

    Whistleblower describes how firm linked to former Trump adviser Steve Bannon compiled user data to target American voters The data analytics firm that worked with Donald Trump’s election team and the winning Brexit campaign harvested millions of Facebook profiles of US voters, in one of the tech giant’s biggest ever data breaches, and used them to build a powerful software program to predict and influence choices at the ballot box. A whistleblower has revealed to the Observer how Cambridge (...)

    #CambridgeAnalytica #Facebook #algorithme #élections #manipulation #électeurs #marketing

  • Revealed: 50 million Facebook profiles harvested for Cambridge Analytica in major data breach | News | The Guardian
    https://www.theguardian.com/news/2018/mar/17/cambridge-analytica-facebook-influence-us-election?CMP=twt_gu

    The data analytics firm that worked with #Donald_Trump’s election team and the winning #Brexit campaign harvested millions of F#acebook profiles of US #voters, in the tech giant’s biggest ever data breach, and used them to build a powerful software program to predict and influence choices at the ballot box.

    A #whistleblower has revealed to the Observer how #Cambridge_Analytica – a company owned by the hedge fund billionaire Robert Mercer, and headed at the time by Trump’s key adviser Steve Bannon – used personal information taken without authorisation in early 2014 to build a system that could profile individual US voters, in order to #target them with personalised political advertisements.

    Christopher Wylie, who worked with an academic at Cambridge University to obtain the data, told the Observer: “We exploited Facebook to harvest millions of people’s profiles. And built models to exploit what we knew about them and target their inner demons. That was the basis that the entire company was built on.”

    Documents seen by the Observer, and confirmed by a Facebook statement, show that by late 2015 the company had found out that information had been harvested on an unprecedented scale. However, at the time it failed to alert users and took only limited steps to recover and secure the private information of more than 50 million individuals.

  • California Appeals Court Urged to Allow Defense Review of DNA Matching Software

    In this case, a defendant was linked to a series of rapes by a DNA matching software program called TrueAllele. (...). However, prosecutors and the manufacturers of TrueAllele’s software argue that the source code is a trade secret, and therefore should not be disclosed to anyone.

    “At least two other programs have been found to have serious errors that could lead to false convictions.”

    https://www.eff.org/press/releases/eff-asks-court-can-prosecutors-hide-behind-trade-secret-privilege-convict-you

    #oss #justice

  • Why is Kim Kardashian hanging out with Émile Durkheim on Twitter?: Learning social media analysis as a sociologist – This Is Not a Sociology Blog
    https://christopherharpertill.wordpress.com/2016/10/22/why-is-kim-kardashian-hanging-out-with-emile-durkhe

    Are you interested in doing research with social media data? If so, you might be interested in a workshop I have organised (as a BSA Digital Sociology Group event) which will be a basic introduction to using the software programme NodeXL for social scientists. This will be at Leeds Beckett on 9th January 2017 and you can register through the BSA website (£15 BSA members, £20 non-members). The workshop will be led by the excellent Wasim Ahmed who is a PhD researcher in the Information School and a Research Associate at the Management School at The University of Sheffield and also a social media analysis consultant. The session will give you a grounding in using NodeXL to analyse Twitter (and potentially other networks) and suggest some ways it is of particular use to social scientists.

    #réseaux #complexité_visuelle #medias_sociaux

  • Exclusive: Yahoo secretly scanned customer emails for U.S. intelligence - sources
    http://www.reuters.com/article/us-yahoo-nsa-exclusive-idUSKCN1241YT

    Yahoo Inc last year secretly built a custom software program to search all of its customers’ incoming emails for specific information provided by U.S. intelligence officials, according to people familiar with the matter.

    The company complied with a classified U.S. government directive, scanning hundreds of millions of Yahoo Mail accounts at the behest of the National Security Agency or FBI, said two former employees and a third person apprised of the events.

    Some surveillance experts said this represents the first case to surface of a U.S. Internet company agreeing to a spy agency’s demand by searching all arriving messages, as opposed to examining stored messages or scanning a small number of accounts in real time.

  • Microsoft draws flak for pushing Windows 10 on PC users
    http://www.seattletimes.com/business/microsoft/microsoft-draws-flak-for-pushing-windows-10-on-pc-users

    With about a month left for many PC users to upgrade to Windows 10 at no charge, Microsoft is being criticized for its aggressive — some say too aggressive — campaign to get people to install the new operating system. A few days after Microsoft released Windows 10 to the public last year, Teri Goldstein’s computer started trying to download and install the new operating system. The update, which she says she didn’t authorize, failed. Instead, the computer she uses to run her Sausalito, (...)

    #Microsoft #Windows #procès #domination

    • Paul Thurrott, another longtime Microsoft follower, criticized a recent pop-up asking users if they were ready to get Windows 10. In the prompt, the X in the upper-right corner — long known to Windows users as a way to exit a software program or abort a process — is interpreted by the update tool as an agreement to go ahead with Windows 10.

      “The violation of trust here is almost indescribable,” Thurrott wrote.

  • “But there’s a dark side to being a Null, and you coders out there are way ahead of me on this. For those of you unwise in the ways of programming, the problem is that “null” is one of those famously “reserved” text strings in many programming languages. Making matters worse is that software programs frequently use “null” specifically to ensure that a data field is not empty, so it’s often rejected as input in a web form.”

    http://www.wired.com/2015/11/null

    #programming #software_quality

  • The Mystery of the Vanishing Pay Raise
    http://www.nytimes.com/2015/11/01/sunday-review/the-mystery-of-the-vanishing-pay-raise.html

    ... the labor market is a lot softer than a 5.1 percent jobless rate would indicate. For one thing, the percentage of Americans who are working has fallen considerably since the recession began. This disappearance of several million workers — as labor force dropouts they are not factored into the jobless rate — has meant continued labor market weakness, which goes far to explain why wage increases remain so elusive. End of story, many economists say.

    [...]

    Jared Bernstein, a former chief economist for Vice President Joseph R. Biden Jr., put it another way: “There’s this pervasive norm” among employers “that labor costs must be held down at all costs because maximizing profits is the be-all and end-all.”

    He added that the “atomization” of the American workplace — with the use of more temps, subcontractors, part-timers and on-call workers — had reduced companies’ costs and workers’ bargaining power.

    As a result of all these trends, the share of corporate income going to workers has sunk to its lowest level since 1951. The Economic Policy Institute found that the decline in labor’s share of corporate income since 2000 costs workers $535 billion annually, or $3,770 per worker.

    “The labor share has declined more than you would think in light of the tightening of the labor market,” said Lawrence Katz, a Harvard labor economist. “It suggests we’re seeing a decline in worker bargaining power.”

    Another important trend depressing pay is that more than ever, companies are paying top dollar to star performers — whether marketing wizards or software programmers — while skimping on paying the many workers without special skills.

  • Robert Reich: In the New Economy, Workers Take on All the Risk | Alternet
    http://www.alternet.org/economy/robert-reich-new-economy-workers-take-all-risk

    Whether we’re software programmers, journalists, Uber drivers, stenographers, child care workers, TaskRabbits, beauticians, plumbers, Airbnb’rs, adjunct professors, or contract nurses – increasingly, we’re on our own.

    And what we’re paid, here and now, depends on what we’re worth here and now – in a spot-auction market that’s rapidly substituting for the old labor market where people held jobs that paid regular salaries and wages.

  • Varoufakis reveals cloak and dagger ’Plan B’ for Greece, awaits treason charges - Telegraph
    http://www.telegraph.co.uk/finance/economics/11764018/Varoufakis-reveals-cloak-and-dagger-Plan-B-for-Greece-awaits-treason-ch

    A secret cell at the Greek finance ministry hacked into the government computers and drew up elaborate plans for a system of parallel payments that could be switched from euros to the drachma at the “flick of a button” .

    The revelations have caused a political storm in Greece and confirm just how close the country came to drastic measures before premier Alexis Tsipras gave in to demands from Europe’s creditor powers, acknowledging that his own cabinet would not support such a dangerous confrontation.

    Yanis Varoufakis, the former finance minister, told a group of investors in London that a five-man team under his control had been working for months on a contingency plan to create euro liquidity if the European Central Bank cut off emergency funding to the Greek financial system, as it in fact did after talks broke down and Syriza called a referendum.

  • Spying on Americans before 9/11: NSA Built Back Door In All Windows Software by 1999 | Global Research
    http://www.globalresearch.ca/spying-on-americans-before-911-nsa-built-back-door-in-all-windows-software-by-1999/5338215

    Government Built Spy-Access Into Most Popular Consumer Program Before 9/11

    In researching the stunning pervasiveness of spying by the government (it’s much more wide spread than you’ve heard even now), we ran across the fact that the FBI wants software programmers to install a backdoor in all software.

    Digging a little further, we found a 1999 article by leading European computer publication Heise which noted that the NSA had already built a backdoor into all Windows software: