Have Smartphones Destroyed a Generation? (2017)
Have Smartphones Destroyed a Generation? (2017)
Vulnerabilities and threats in mobile applications, 2019
In 2018, mobile apps were downloaded onto user devices over 205 billion times. Data by Marketing Land indicates that 57 percent of total digital media time is spent on smartphones and tablets. More often than not, our daily lives depend on apps for instant messaging, online banking, business functions, and mobile account management. According to Juniper Research, the number of people using mobile banking apps is approaching two billion—around 40 percent of the world’s adult population. (...)
Chinese Surveillance Complex Advancing in Latin America
In February, 2019, in a story that went almost unnoticed in Washington, the small South American nation of #Uruguay began installing the first of 2,100 surveillance cameras, donated by the People’s Republic of China to improve control of its borders with neighboring Argentina and Brazil.
The move highlights the significant deepening of the Uruguay-PRC relationship over the last decade, including their establishment of a “Strategic Partnership” in October 2016, and the signing of a memorandum of understanding in August 2018 for Uruguay to join China’s Belt and Road initiative (despite being about as far from the PRC as is geographically possible).
Beyond Uruguay, the development also highlights a little-discussed but important dimension of China’s advance: its expanding global sales of surveillance and control technologies. Although the press and U.S. political leadership have given significant attention to the risks of employing Chinese telecommunications companies such as Huawei the equally serious but newer issue of expanding sales of Chinese surveillance systems has been less discussed.
The installation of Chinese surveillance systems, acquired through PRC government donations or commercial contracts, is a growing phenomenon in Latin America and elsewhere.
Such systems began to appear in the region more than a decade ago, including in 2007, when then mayor of Mexico City (now Mexican Foreign Minister) Miguel Ebrard returned from a trip to the PRC with a deal to install thousands of Chinese cameras to combat crime in the Mexican capital. More recent examples include ECU-911 in Ecuador, a China-built national system of surveillance and communication initially agreed to by the administration of anti-U.S. populist president Rafael Correa. The system, which has expanded to currently include 4,300 cameras and a command center manned by thousands of Ecuadorans, has been built almost completely from Chinese equipment, designed for a range of otherwise noble purposes from emergency response and combatting crime, to monitoring volcanoes. Bolivia boasts a similar Chinese built system, albeit more limited in scope, BOL-110, in addition to hundreds of surveillance cameras donated by the PRC to at least four of Bolivia’s principal cities.
In Panama, which abandoned Taiwan to establish relations with the PRC in 2017, the government of Juan Carlos Varela has agreed to allow Huawei to install a system of cameras in the crime-ridden city of Colon and the associated free trade zone. Not by coincidence, in July 2019, Hikivision, China’s largest producer of surveillance cameras, announced plans to set up a major distribution center in Colon to support sales of its products throughout the Americas.
In northern Argentina, near where the Chinese are developing a lithium mining operation and constructing the hemisphere’s largest array of photovoltaic cells for electricity generation, the Chinese company ZTE is installing another “911” style emergency response system with 1,200 cameras.
In Venezuela, although not a surveillance system per se, the Chinese company ZTE has helped the regime of Nicholas Maduro implement a “fatherland identity card” linking different kinds of data on individuals through an identity card which allows the state to confer privileges (such as rationing food) as a tool for social control.
As with sectors such as computers and telecommunications, the PRC arguably wishes to support the global export of such systems by its companies to advance technologies it recognizes as strategic for the Chinese nation, per its own official policy documents such as Made In China 2025.
The risks arising from spreading use of Chinese surveillance equipment and architectures are multiple and significant, involving: (1) the sensitivity of the data collected on specific persons and activities, particularly when processed through technologies such as facial recognition, integrated with other data, and analyzed through artificial intelligence (AI) and other sophisticated algorithms, (2) the potential ability to surreptitiously obtain access to that data, not only through the collection devices, but at any number of points as it is communicated, stored, and analyzed, and (3) the long-term potential for such systems to contribute to the sustainment of authoritarian regimes (such as those in Venezuela, Bolivia, Cuba, and formerly Ecuador) whose corrupt elites provide strategic access and commercial benefits to the Chinese state.
The risk posed by such Chinese architectures is underestimated by simply focusing on the cameras and sensors themselves.
Facial and other recognition technologies, and the ability to integrate data from different sensors and other sources such as smartphones enables those with access to the technology to follow the movement of individual human beings and events, with frightening implications. It includes the ability to potentially track key political and business elites, dissidents, or other persons of interest, flagging possible meetings between two or more, and the associated implications involving political or business meetings and the events that they may produce. Flows of goods or other activities around government buildings, factories, or other sites of interest may provide other types of information for political or commercial advantage, from winning bids to blackmailing compromised persons.
While some may take assurance that the cameras and other components are safely guarded by benevolent governments or companies, the dispersed nature of the architectures, passing information, instructions, and analysis across great distances, means that the greatest risk is not physical access to the cameras, but the diversion of information throughout the process, particularly by those who built the components, databases and communication systems, and by those who wrote the algorithms (increasingly Chinese across the board).
With respect to the political impact of such systems, while democratic governments may install them for noble purposes such as crimefighting and emergency response, and with limitations that respect individual privacy, authoritarian regimes who contract the Chinese for such technologies are not so limited, and have every incentive to use the technology to combat dissent and sustain themselves in power.
The PRC, which continues to perfect it against its own population in places like Xinjiang (against the Uighur Muslims there), not only benefits commercially from selling the technology, but also benefits when allied dictatorships provide a testing ground for product development, and by using it to combat the opposition, keeping friends like Maduro in power, continuing to deliver the goods and access to Beijing.
As with the debate over Huawei, whether or not Chinese companies are currently exploiting the surveillance and control systems they are deploying across Latin America to benefit the Chinese state, Chinese law (under which they operate) requires them to do so, if the PRC government so demands.
The PRC record of systematic espionage, forced technology transfer, and other bad behavior should leave no one in Latin America comfortable that the PRC will not, at some point in the future, exploit such an enormous opportunity.
Nubia Red Magic 3 : premier smartphone gaming armé d’un… ventirad !
Et pas mal d’autres réjouissances au programme.
The future of software development: modular, intelligent, and rickety
The future of software development: freelance, AI-assisted, and ricketyNearly four thousand years elapsed between when Egyptian astronomers invented the concept of zero and a British mathematician tacked together the first computer. But once the thing was made, we were off to the races. It was only 130 more years to electronic computers, 40 to the internet, and only nine to smartphones. Now advances in computer science pop off as if discharged from a ticker tape machine.But not everything that earns press sees success — or has an impact. Most inventions die following their hype cycle, in what research firm Gartner calls the trough of disillusionment. In this article, I’ll share three signals amidst all the noise that I think indicate trends that will survive to become the biggest forces in (...)
What will you check before handing over your smartphone?
Retrospective on data we have on handsetsSuppose you are handing away your mobile to a friend to use from now on. What all will you check before handing it over? How about if you are exchanging it with your mom or dad?(Ok, we are ruling out the factory reset option, why? Because we want this blog post to proceed, and more importantly, let’s assume we want to hand over the convenience of pre-installed apps to our friend as well.)Let’s do a quick scan and figure out what all a person can know from the present state of our smart phone.Let’s go through your apps and folders~Starting with the image gallery. Ah, good old times, old friends, fun videos, cool trips, you time travel a bit.Once the nostalgia fades away, you check if these pics are synced to the cloud already, if not, you back up them on (...)
3 Women Changing The Way the World Thinks About Product Design
These entrepreneurs are nailing category design.By Christopher Lochhead, podcaster, best selling author, and 3X Silicon Valley CMOMost of us can’t go a single hour without reaching for our iPhones.But nobody even knew why they needed an iPhone until Steve Jobs told them. And he did it by creating a brand-new category: a touch-enabled “smartphone” that can connects to the internet and doubles as a media player.Rather than simply solving the problem of, “What should a phone be capable of?” Jobs redesigned the problem by showing us, then conditioning us, to equate smartphones with his product. He owned this niche. Today, it’s still the standard against which all other smartphones are measured — with over 1 billion iPhones sold and counting.To build lasting brands and products, legendary companies (...)
An Inspiring Story of Mobile-First Approach as a Winning Game Plan
A 2018 study in Ireland found that local consumers checked their phones 55 times per day on average (Mobile Consumer Survey, Deloitte). Photo credit: Shutterstock“There are no experts of tomorrow, only of yesterday,” says Jack Ma, founder of Alibaba and China’s wealthiest person.When Kenny Kline and a friend founded their marketing agency in 2014, the entrepreneurs brought laptops to coffee shops and routinely burned the midnight oil in a cramped New York apartment.Digital marketing is notoriously competitive, and the bootstrapped duo’s prospects looked middling, at best.A Mobile-First Game PlanFueled by late-night lattes, JAKK Media’s founders stuck with their convictions: The future belongs to marketers who could communicate and entertain via iPhones, Samsung devices, and small screens. (...)
How to boost your business with Actions on Google
In the last article, I summed up the most important reasons why Google Assistant is soon going to change the game for good. Now let me take you a step deeper into the rabbit hole, and explain what it takes to integrate with it, and what business opportunities it opens for you.Assistant is everywhere — use it to reach your customersThere are already over 1 billion Assistant-enabled devices — including smartphones, smart speakers, headphones, TVs, smartwatches, smart home appliances, and more! Every day brings news of new ones being released. Integrating with Google assistant means your business will be there to assist your customers whenever and wherever they need it.Ordering products, finding stores, scheduling appointments, giving instructions, accessing content — it is only a fraction of (...)
Foldable devices are the future!
But not before we solve the issues with their screens.A new touch #technology for Foldables and Dual-screen devices.I had this idea about HoverSense to improve touchscreen technology back when I purchased the 1st iPad. In fact, I started developing initial concepts in early 2014, right after I left Cisco and before I joined Microsoft.The original goal was to help visually impaired people and even blind people to use touch devices in a better way (there are more than 300 million blind people around the world).But then, after receiving feedback from a few of my friends, peers and colleagues, I realized that I’ve got something even more unique here, something that can come handy when we eventually start seeing foldable devices, something that can change the way we all use touchscreens and (...)
#iot Development and Edge Computing: Why Do We Need It?
Are you wondering how IoT development services and edge computing could be beneficial in your life or business? Learn more about how IoT services work in this guide.It started with smartphones. Now, everyday devices such as cars, lights, TVs, phones, etc. are being made smart via connecting them through networks and the internet.What is the Internet of Things?IoT (Internet of Things) is the connection of computer technology infused with modern devices. This gives the devices the ability to connect to the internet, send and receive data.The Growth of Edge and Fog Computing in IoTAs IoT has continued to develop within the tech industry, edge and fog computing can be used interchangeably.With the opportunities and challenges on the unstructured data front in mind it’s important to look at (...)
How #blockchain Can Democratize AI Development
Data Access for AI: An Under-Explored Use for BlockchainThere is a vast amount of computing power around the world that is not used efficiently. There are an estimated 4 billion personal computers in the world and 90% of them have free capacities at any given moment. This is to say nothing of the idle capacities of other personal devices, like smartphones and tablets. In effect, this excess computing power is wasted.Lots of startups are trying to use blockchain technology to take advantage of this inefficiency to meet different economic needs. The blockchain is exciting in this context because it provides an infrastructure for distributed computing power, while at the same time providing an incentive for individuals to link their idle devices to the network.Many of the startups I’ve (...)
A Straightforward Guide to Keep Your Smartphone Data Safe
Photo: polymanu / Adobe StockIt is obvious that #smartphones have become quite important to people. It is rare to find a person without a handy smartphone nowadays, and the number continues to grow.As ownership grows, so does people’s dependence on these devices, making them valuable to others. Your device has personal data, passwords, credit card numbers, and much more. Some of you may even have cryptocurrency wallets inside your phones.All of this data can be stolen at any time if you do not take proper safety precautions pointed out here.Smart Internet UsePhoto: adiruch na chiangmai / Adobe StockAn important step to take is to learn how to use the internet safely. There are a lot of things you can do to try to be safe online, like making sure you do not open emails from addresses you do (...)
Facebook’s Data Deals Are Under Criminal Investigation
Federal prosecutors are conducting a criminal investigation into data deals Facebook struck with some of the world’s largest technology companies, intensifying scrutiny of the social media giant’s business practices as it seeks to rebound from a year of scandal and setbacks. A grand jury in New York has subpoenaed records from at least two prominent makers of smartphones and other devices, according to two people who were familiar with the requests and who insisted on anonymity to discuss (...)
Premier bench du smartphone gaming #xiaomi Black Shark 2
Un bon gros gamer sur Snapdragon 855...
How to get into #android Development, Step by Step Approach
Start #learning Android Development, with easy step by step approach.android wallpaperAre you an android enthusiast?Do you like android apps and cool libraries or GitHub repositories that help make android development fun and amazing?Are you passionate about android development and want to learn how to get into this, with a step by step approach?Or,Are you looking to expand your programming knowledge and want to try android development?If yes, then you’re at the perfect place.Let’s start with absolute basic questions.What is Android?Android is a mobile operating system developed by Google. It is based on a modified version of the Linux kernel and other open source software, and is designed primarily for touchscreen mobile devices such as smartphones and tablets.But, why learn android?There (...)
9 Digital Identity Trends That Will Make or Break Businesses in 2019
1. Payment Fraud MultipliedIn 2019, retail sales via smartphones in the United States will grow at a compound annual growth rate of 18% and will affect more than $1 trillion trillion in revenue at some point in the customer’s journey, according to Forrester research.Credit card numbers and related identity information are priced at couple of dollars on the black web, due to ongoing data breaches.2. Enterprises leaning towards SaaSAccording to research conducted by an analyst from Gartner, 2019 will be the year of the SaaS market, growing by 17.8%, with a total value of $85.1 billion.With SaaS as the largest share of the cloud market, Craig Roth, Gartner’s VP of research department, said this was partly because companies wanted to move their content platforms to SaaS. All signs are (...)
AI Trends to Look for in 2019 and Beyond
AI Trends to Leverage in 2019 and BeyondPhoto: THANANIT / Adobe StockArtificial intelligence has grabbed our attention and inspired us to take notice, but many people don’t see the potential of this technology. AI has the power to change the way we view the world and complete our most basic tasks. It can make us safe and let us know when danger is around the corner, but it can do much more than that.AI can work with us and make our lives much easier if we let it. AI can now learn from its mistakes and change its behavior accordingly, and some of the most advanced AI is indistinguishable from human intelligence.Virtual AssistantsMost people with smartphones already know how useful virtual assistants can be. They can let us look up information on the web or remind us of appointments and (...)
Top Mobile App Development Companies in #india and US
Are you a small business, entrepreneur, ISV who want to make a BIG in the Mobile-First World? Definitely! No one wants to lose billions of potential customers who spend maximum time on their smartphones.But, But, But: finding the right mobile app development company is a herculean task! There are millions of application development firms all across the globe, and you should choose the best company catering to your business needs.First of all, let me tell you about myself. I am a software & technology consultant with 12+ years of experience in providing tips to budding enterprises on how they can save their time & money in their next software development project.In this blog, I will make your task easy to find the top mobile app development company in India, US & UK so that (...)
Do We Write Differently on a Screen? | The New Yorker
But, before that, I published my first short novel, “Tongues of Flame.” I continued to write fiction by hand and then type it up. But, at least, once it was typed, you could edit on a screen. What a difference that was! What an invitation to obsession! Hitherto, there was a limit to how many corrections you could make by hand. There was only so much space on the paper. It was discouraging—typing something out time after time, to make more and more corrections. You learned to be satisfied with what you had. Now you could go on changing things forever. I learned how important it was to keep a copy of what I had written first, so as to remember what I had meant in the beginning. Sometimes it turned out to be better than the endlessly edited version.
We had personal computers at this point, but I still wrote fiction by hand. The mental space feels different when you work with paper. It is quieter. A momentum builds up, a spell between page and hand and eye. I like to use a nice pen and see the page slowly fill. But, for newspaper articles and translations, I now worked straight onto the computer. Which was more frenetic, nervy. The writing was definitely different. But more playful, too. You could move things around. You could experiment so easily. I am glad the computer wasn’t available when I started writing. I might have been overwhelmed by the possibilities. But once you know what you’re doing, the facility of the computer is wonderful.
Then e-mail arrived and changed everything. First, you would only hook the computer up through your landline phone a couple of times a day, as if there were a special moment to send and receive mail. Then came the permanent connection. Finally, the wireless, and, of course, the Internet. In the space of perhaps ten years, you passed from waiting literally months for a decision on something that you’d written, or simply for a reaction from a friend or an agent, to expecting a reaction immediately. Whereas in the past you checked your in-box once a day, now you checked every five minutes.
And now you could write an article for The Guardian or the New York Times as easily as you could write it for L’Arena di Verona. Write it and expect a response in hours. In minutes. You write the first chapter of a book and send it at once to four or five friends. Hoping they’d read it at once. It’s impossible to exaggerate how exciting this was, at first, and how harmful to the spirit. You, everybody, are suddenly incredibly needy of immediate feedback. A few more years and you were publishing regularly online for The New York Review of Books. And, hours after publication, you could know how many people were reading the piece. Is it a success? Shall I follow up with something similar?
While you sit at your computer now, the world seethes behind the letters as they appear on the screen. You can toggle to a football match, a parliamentary debate, a tsunami. A beep tells you that an e-mail has arrived. WhatsApp flashes on the screen. Interruption is constant but also desired. Or at least you’re conflicted about it. You realize that the people reading what you have written will also be interrupted. They are also sitting at screens, with smartphones in their pockets. They won’t be able to deal with long sentences, extended metaphors. They won’t be drawn into the enchantment of the text. So should you change the way you write accordingly? Have you already changed, unwittingly?
Or should you step back? Time to leave your computer and phone in one room, perhaps, and go and work silently on paper in another. To turn off the Wi-Fi for eight hours. Just as you once learned not to drink everything in the hotel minibar, not to eat too much at free buffets, now you have to cut down on communication. You have learned how compulsive you are, how fragile your identity, how important it is to cultivate a little distance. And your only hope is that others have learned the same lesson. Otherwise, your profession, as least as you thought of it, is finished.
Tim Parks, a novelist and essayist, is the author of “The Novel: A Survival Skill” and “Where I’m Reading From: The Changing World of Books.”
The Urgency for Speed in 2019: New #research Finds 45 Percent of Customers Won’t Buy From a Slow…
The Urgency for Speed in 2019:New Research Finds 45% of Customers Won’t Buy From a Slow SiteBy Sarah Gooding, Communications and PR Manager at UnbounceWe’ve all experienced a slow web page. We’ve felt the frustration that builds for every second that little icon continues to spin.We all know the feeling: We want that page open, and we want it open NOW.As consumers, we expect to be able to browse the web, buy products, and find the answers to our questions quickly — and instantaneously would be even better. Unfortunately, this expectation is often unmet. In 2019 the average size of a webpage has ballooned, and with it, the length of time consumers have to wait for a page to open. Things are even slower on smartphones. The average web page has doubled in size over the past 3 years, so consumers (...)
Augmented Reality: Market Potential and Practical Applications
The present generation of smartphones and other devices do a fine job of immersing us in digital experiences. Augmented reality takes a route different by magnifying our physical surroundings by enriching them digital data snippets.Sounds curious, isn’t it? Well, the first augmented reality system took birth in 1992. Louis Rosenburg from the USAF Armstrong’s Research Lab developed what Virtual Fixtures which placed information atop physical objects. The idea was to improve worker efficiency by supplying information readily. The same concept was replicated at Boeing factories where aeroplane engineers used AR to visualize wire layouts on physical boards using computer-generated images.A Boeing employee using AR for creating wire layouts on physical boards.Ever since then, the scope and (...)
About the Guardian Project
While smartphones have been heralded as the coming of the next generation of communication and collaboration, they are a step backwards when it comes to personal security, anonymity and privacy.
Guardian Project creates easy to use secure apps, open-source software libraries, and customized mobile devices that can be used around the world by any person looking to protect their communications and personal data from unjust intrusion, interception and monitoring.
Whether your are an average citizen looking to affirm your rights or an activist, journalist or humanitarian organization looking to safeguard your work in this age of perilous global communication, we can help address the threats you face. Visit our introductory how-to site, watch on online mobile security training we held recently, or view our full list of apps to get started.
Exciting Tech #predictions We Can Expect to Take Place in 2019
Every year, the gadgets around us are evolving. These tech gadgets have become an essential part of our lives. From smartphones to televisions, we depend on these gadgets even for basic things like communicating, information, entertainment and so much more. 2018 was an amazing year for smartphones — we got to see different technologies come to life. Even laptops saw a considerable improvement in the last year. Most of the gadgets like televisions, cameras, fitness bands and smartwatches saw a great deal of improvement. 2019 has just started and there are a lot of expectations from this year already.We are going to see the launch of foldable & 5G smartphones, 8K TVs, roll-able TVs, better desktops and so much more. While most tech enthusiasts are gearing up for the CES 2019 which will (...)
The Importance of Community in #crypto
By Alex LibertasWhat is Community?Throughout history, communities have played an intrinsic part in how humans come together to share ideas, collaborate and align themselves with each other to incorporate a common identity.Community can be defined as:“The condition of sharing or having certain attitudes and interests in common.”Since the dawn of time it has been embedded in our DNA to naturally form tribes, factions or groups in order to work together with like-minded people and produce better results than if we were to operate alone.Fast forward to 2019 and communities are as prevalent as ever in today’s society but with one major difference — the majority of our social groups have now been digitised and the largest communities we form are now online.The invention of smartphones has now (...)