by Scott Martin, Luis Aguilar, Jenton Lee
In an information based ecosphere actors can create, retrieve, and analyze vast amounts of data with increasing efficiency. Just as individuals struggle to maintain control of personal information and communications, organizations face pressure to protect their Trade Secrets and Intellectual Property. IBM has developed a new business tool–IBM Security Intelligence with Big Data–to identify disgruntled employees who present a greater risk of leaking sensitive corporate information. This tool collects and compares employee corporate communication and public statements (such as comments on social networks) and conducts a sentiment analysis identifying individuals who are presenting divergent point-of-views internally and externally.
Download assignment 1 in docx or pdf. We will talk about assignment 1 briefly at the beginning of class on Thursday.
by Victor Starostenko, Kate Hsiao, Peter Nguyen
Last January, the New Zealand government took down Megaupload, a file-sharing site founded by Kim Dotcom, since the site was found guilty of disseminating copyrighted materials and committing racketeering. A year after the closing, Dotcom launches a new version of the site called Mega, which now encrypts files on users’ computer before they are uploaded, so files on Mega will not be able to be read by anyone, including government officials when conducting investigations.
Watch people racing Pennyfarthing bicycles in 2010. Crash at the very end of the 1:33 clip illustrates their precariousness and what it looks like when someone makes a “header.”
On those who consciously resist adopting a widespread technology – an article in the New York Times on The Facebook Resisters. On one of today’s in class topics – the transition of a technology from increasingly widespread diffusion to near ubiquity.