the data in housing is probably the strongest. The country is building more apartment buildings than at any time in decades,
American Community Survey data, crunched by City Observatory, reveals that the number of college-educated young adults (ages 25 to 34) living within three miles of city centers has risen 37 percent since the millennium.
Delaware, 66 percent of jobs were located in the core city in 1940. By 1970, its share had fallen below one in four.
Over a period of 25 years, between 1955 and 1980, more than 50 corporations left New york city, including IBM, Gulf Oil, Texaco, Union carbide, General Telephone, Xerox, Pepsico and U s. Tobacco.
Corporate giants like Motorola, Coca-cola and Yahoo have made well-publicized moves toward downtown Chicago, Atlanta and San francisco (respectively) to attract
But in large, the boom in core city employment hasn materialized. The result of this mismatch between urban living
is a design element in everything from Android phones to car steering wheels. Because the technology is currently relatively primitive in the mass market,
it mainly used for more day-to-day purposes like simulating the feel of a tactile keyboard on a smartphone
or simulating the shaking of an explosion in a specialized video game controller. Check out Youtube Video Article by Neal Ungerleider Article Source:
#Tesla motors#Destination Charging#:#Fast-growing Network Beyond Superchargers One of the most commonly cited arguments against electric cars is range anxiety.
The Destination Charging network Youl find these charging locations on Tesla website listed as Charging Partners.
and even mobile phone stores. In the U s.,Wall Connectors are showing up at well-known names like Costco, Hyatt, Four Seasons, Ritz-Carlton, Best western, and Westin.
the company sells the contraption on its website for $650. And the installation of a 240-volt circuit isn expensive probably no more than $3, 000 and as little as $500.
Besides the aging simulation exercise, they viewed a Powerpoint presentation defining dementia and were trained, in the hall Dementia Experience Center, to perform hand massage in nursing homes. hat did
I do with my phone? It in the refrigerator, said one instructor, explaining memory loss. ave you seen someone like that?
And a government dementia database allows families to register relatives and receive iron-on identification numbers.
he would rather flip open his laptop in his room to watch the lecture, streamed live over the campus network.
But it also raises questions that go to the core of a college mission: Is it possible to learn as much
when your professor is a mass of pixels whom you never meet? How much of a student education and growth academic and personal depends on face-to-face contact with instructors and fellow students?
and watch through a computer. Across the country, online education is exploding: 4. 6 million students took a college-level online course during fall 2008, up 17 percent from a year earlier, according to the Sloan Survey of Online learning.
She said an advantage of the Internet is that students can stop the lecture and rewind when they do not understand something.
and students join a virtual classroom once a week using a conferencing software called Wiziq. i, everyone, welcome to Week 9. Hello!
her laptop open on the dining room table. As Dr. Joos lectured, a chat box scrolled with studentscomments and questions.
then automatically relays the information to a forest station through mobile phone technology. he heat sensors are programmed to detect temperatures which are over 45 degrees Celsius,
That immediately triggered a call to his mobile phone. his is how the system is expected to work,
#Wave and Paymobile Phone Payment system Launched in the UK Orange and Samsung have teamed-up with Barclaycard to provide mobile phone payments with the new uick Tappayment technology.
Like the abolition of the £1 note or the introduction of the £2 coin, yesterday was a historic day for British money.
Courtesy of Barclaycard, Orange and Samsung, consumers across the UK can now pay for goods and services with nothing more than a mobile phone.
Yougov research, commissioned by digital payments provider Intelligent Environments, says 42 per cent of smartphone users want to use their phones as mobile wallets.
Owners of the Apple iphone are keenest, but significant proportions of Blackberry and Google phone users want to take advantage of it too.
That not because technology built into mobile phones is the way that everything, from cameras to translators, seems to be going.
It down to the fact that this new mobile-based method is quick simpler and crucially, more secure than anything wee got available at the moment.
Barclaycard has quietly been rolling out so-called ontactlesspayment systems across the UK for several years
Now that means there are devices in shops up and down the country that require users, for transactions up to £15,
With a mobile phone data connection, however, all transactions can be authorised and completed instantly. In due course, transactions over £15 will be permitted
if a pin is entered on the mobile phone. That, too, is more secure than the traditional keypad.
however, is that for now only one phone, one payment provider and one network operator provides this whizzy technology.
Even though the ear-field communicationstechnology is built into a wide and growing number of phones already,
Using an app on the mobile phone, customers can top up their wave and pay account from a connected credit
even if rumours that NFC payments are to be built into the forthcoming iphone turn out to be untrue,
Google is working with Mastercard and a host of other manufacturers have similar plans. Indeed, as with almost all significant new technology, the appeal is mainly in the simplicity of NFC.
who appears in television commercials and online games as well as on cereal boxes. Regulators are asking food makers
including television and print ads, Web sites, online games that act as camouflaged advertisements, social media, product placements in movies, the use of movie characters in cross-promotions and fast-food children meals.
The inclusion of digital media such as product-based games, represents one of the government strongest efforts so far to address the extension of children advertising into the online world,
Ronald Mcdonald and the movie and television characters used to promote food. It also raises the question of
Jeffrey Chester, executive director for the Center for Digital Democracy, a group that focuses on Internet marketing to children, said the F. T. C. proposal had broader implications. he youth obesity issue has placed all
vast amounts of new data are being generated about the complicated path that food takes from field to supermarket shelf.
who in some stores can wave a smartphone above an apple or orange and learn instantly where it was grown,
consumers could tap into through their computers or cellphones. The ne step forward, one step backtraceability requirement for processed food and produce is designed to make it easier for the Food
and manage the data. Some are experimenting with radio frequency identification and other sophisticated methods, including etching identification codes on produce with lasers
or micro-percussion markers that make tiny indents. hey each believe they have the holy grail product tracking solutions sitting in their laptop,
said David Acheson, former assistant commissioner for food protection at the FDA. omebody is probably going to make a bundle of money out of this.
Paul Chang, who leads the traceability initiative at IBM, said the company is basically taking the tracking system it uses for the pharmaceutical industry
instrumented data, he said. Segments of the food industry have been required since 2005 to be able to trace ne step forward, one step back,
Shoppers can scan the sticker with a smartphone or go to the Harvestmark website and enter the number from the sticker to learn the path the food has taken
and other information the farmer chooses to share, such as the harvest date. here been a very rapid sea change in consumer behavior,
said Elliott Grant, the chief marketing officer for Harvestmark. ith very high-profile food recalls, cellphones and iphones,
does not own a television, use e-mail or have Internet service. Harvestmark provides him with a laptop computer
and preprinted bar code stickers for his melons. And during harvesting, he takes the laptop to a bank
or some other place with Internet service to upload the data to Harvestmark. One day he was surprised to get a letter from an unhappy customer who had tracked down his address from the Harvestmark sticker.
Using the code, Bauman traced the melon and discovered it had been picked in August but purchased by the customer in October. e called him back
and said wee really sorry, Bauman said. hen I complained to the chain and said my name is on this product that out there for two months.
This system gives the end user the customer the option to be more aware of their products
#It is the department s prototype##smart car,##outfitted with the latest gadgets in public safety. It has infrared two monitors mounted on the trunk that record any numbers it sees##such as license plates and addresses.
It has surveillance cameras and air sensors capable of sending real-time information to police headquarters. The NYPD says it is the cruiser of the very near future.
The 13-page report describes initiatives ranging from the high-tech (500 officers have received Samsung Rugby smartphones equipped to deliver real-time crime data) to the bureaucratic (new guidelines for recruiting
then check the results against a database that contains the plate numbers of cars that are stolen,
The data is stored for an indefinite period, though that will likely change, Mr. del Pozo said.##
adding that future smart cars might include fingerprint scanners and facial recognition sensors. Besides getting officers to crime scenes, Mr. del Pozo said,
is to create an online public database for accessing accident reports. In terms of personnel, the department will begin closely tracking the experience
and microprocessors that monitors the body s internal changes and alters the flow of blood as needed.
Via Smithsonian Share Thissubscribedel. icio. usfacebookredditstumbleupontechnorati swfobject. embedswf (http://www. youtube. com/v/7rs1z9xigua& rel=0&
showinfo=0, vvq-115090-youtube-1, 425,355, 9, vvqexpressinstall, vvqflashvars, vvqparams, vvqattributes) 5
#Edible batteries could power smart medicine pills A flexible biodegradable battery just may be what the doctor ordered.
when creating a web site for ecommerce could easily require a million dollar investment. Now you can create a web site for almost nothing
Smartphone apps can be built for less than $10k, so who needs an investor? Startup incubators and accelerators are popping up everywhere.
Social media is a boon for entrepreneurs and startups. With the key social media platforms today, an entrepreneur can tune a product
build a brand, and grow the business with very low cost and a high interactivity never before possible.
The next Web Via Forbes Share Thissubscribedel. icio. usfacebookredditstumbleupontechnorat e
#Scientists create robotic muscle that is 1, 000 times more powerful than human muscles A robotic muscle 1,
as researchers at the US Department of energy s (DOE) Lawrence Berkeley National Laboratory have found, the Lab s website#reported.
Via RT Share Thissubscribedel. icio. usfacebookredditstumbleupontechnorati swfobject. embedswf (http://www. youtube. com/v/BWUOHOCN UG& rel=0&
showinfo=0, vvq-114963-youtube-1, 425,355, 9, vvqexpressinstall, vvqflashvars, vvqparams, vvqattributes
#3d printed eye cells could one day cure blindness Researchers have printed actually viable retina cells using an inkjet printer.
The ability to print up new, living versions of the damaged parts of your body is becoming more viable as a medical procedure,
using an inkjet printer, of all things. The printer was able to first print a layer of retinal ganglion cells and then a layer of glial cells on top of them,
all while keeping the tiny structures vital. In doing so, the Cambridge research team was able to prove that eyes
#The cyborg future of telemarketing While a human is picking up the phone, and a human is dialing the phone,
it may not be a conversation between two humans. In the future humans will interact with each other, and machines,
His phone rings. It s a telemarketer for a home security service.####This is Richard, how are you today?##
My company, the Home security Company, is giving away a free wireless home security system and in-home installation.##
#Because while a human is picking up the phone, and a human is dialing the phone,
this is not,#strictly speaking, a conversation between two humans. Instead, a call-center worker in Utah or the Philippines is pressing buttons on a computer, playing through a marketing pitch without actually speaking.
Some people who market these services sometimes call this##voice conversion##technology. Another company says it s##agent-assisted automation technology.##
##At its best, computer system and operator merge like a character from the movie#Avatar#and his or her steed.
Let s look at one company that provides this product, Avatar Technologies, which advertises itself as##Outsourcing Without the Accent.##
The Avatar interface looks like this: While the man on the couch might was just sitting there talking,
the Avatar agent would have been sitting in the Filipino city of#Jaro Iloilo, staring at an interface.
The keyboard has hotkeys that can play different sound clips that were recorded by a perfect English speaker.
Here are two samples Avatar provides on its website,##Dale Harris##from the US and##Samantha##from Australia:
Avatar is not alone in selling these services, though they are the newest company in the field,
I found three other companies that sell cyborg call-center software or services like this, all of which are based in Utah.#
On the Internet, no one may know you re a dog, but on the phone? It just#seems#wrong.
What good could spring from a bunch of conversations in which one member is ventriloquizing through a machine?
they expressed skepticism that the system found in the#Time#recordings could be a computer.
I strongly suspect that Avatar created West, but I can t prove it. Multiple attempts to contact people at different levels within the company have gone unheeded.
For example, the data that they can capture with these systems is far less noisy than
Then I checked my Twitter account and favorited several tweets. I retweeted a couple, too.
In an email, Ugarte ticked off the reasons for using voice technology. 1. Accent##some of our agents though can speak English really well have problems with their accents
and maintains several other prominent social media presences. He likes to post photos from his childhood on Facebook,
along with portraits of himself in drag. I asked him, over email, to tell me what the experience of working at a soundboard call center is like.
How do people feel about it?####Based on feedbacks and observations, working on a Non-Voice company such as Perfect pitch is fun not to mention that there is less stress on the part of the reps,
Avatar recruits people by having#resume parties#at clubs(##Applicants get to party at Flow Super club after submitting their resume onsite with our Human Resource department.##
###and#supporting a#local beauty queen contest linked to an indigenous ritual#(#Avatar Technologies, a proud sponsor of Miss Iloilo Dinagyang 2014##.
##Their Youtube channel shows them#holding an#American Idol-style competition to celebrate their one-year anniversary.
It opens with these words flashing on the screen:####Level Up. Step up. Stand out. Work with the pros
We sold software to manage the paperwork about chemicals used at factories, which are known as#material-safety data sheets.
Our script ran on a series of linked Word documents, and we were told to stick to reading
what was on the screen. My manager, whose name was asked Jim that we call him Jimbo,
and the southern paper-mill plant managers that I managed to get on the phone were swayed not by my lispy, northwestern English.#
when they hear a voice on the phone, it matches up exactly with a person in the world,
##The software can improve the experience people are already having.####Often, when we look around our world at the technologies we have,
CNN Via The Atlantic#Share Thissubscribedel. icio. usfacebookredditstumbleupontechnorati swfobject. embedswf (http://www. youtube. com/v/BZUXVYUZFVI&
showinfo=0, vvq-114947-youtube-1, 425,355, 9, vvqexpressinstall, vvqflashvars, vvqparams, vvqattributes) a
#Hawaii s solar boom is so successful it s been blocked from further expansion Rooftop solar on a house in Hawaii.
The couple looked forward to joining neighbors who had added panels, to cutting their $250 monthly power bills
##Their plans shifted the day after the PV panels went up in early October. The Walkers learned from a neighbor about a major change in the local utility s solar policy.
It led to those 18 panels sitting dormant nearly three months later. Hawaiian Electric Co,
whether grid upgrades are necessary. If they are residents adding solar must foot the bill.
The new HECO policy was included deep in the text of emails the Walkers solar contractor had sent,
They re now paying $300 per month on a loan for the panels, plus the $250 electric bill.##
#The NSA s $10 million secret deal to get RSA to use backdoored encryption algorithm RSA had been paid by the NSA to set the backdoored algorithm as the default method of random number generation.
A secret $10 million deal between the NSA and the security firm RSA has resulted in RSA incorporating a flawed algorithm for generating random numbers into its products,
Earlier this year documents released by NSA whistleblower Edward Snowden showed that the NSA was promoting deliberately weakened or vulnerable cryptography,
In the spotlight was flawed a algorithm known as Dual ec drbg, or the Dual Elliptic Curve Deterministic Random Bit Generator.
Read Martijn Grooten s post###How the NSA cheated cryptography###for more information about it.
The deliberately crippled Dual ec drbg algorithm was being used as the default pseudo-random number generator a crucial component in RSA s BSAFE toolkit.
##What wasn known t until#Reuters#reported it was that RSA had been paid by the NSA to set the backdoored algorithm as the default method of random number generation.
or default, method for number generation in the BSAFE software, according to two sources familiar with the contract.
in its#report,#CNET#quotes cryptography veteran Bruce Schneier, who is unimpressed clearly:####Now we know that RSA was bribed,
and power of state##and commercial##surveillance. 2013 was an extraordinary year for those of us who are interested in privacy and data protection.
We, the searchable In Mid-january,#Facebook introduced Graph Search, a way for the average user to tap into the social network s web of interconnected human intelligence.
Instead, Facebook automated the process of querying its users relationships with one another, their tastes and everything else with a##public##setting.
In April Facebook#introduced##partner categories, ###letting advertisers target users not only on the basis of their##likes##on the site,
but also by correlating that with data about what they buy through other web services.####OK, now I m convinced Facebook is#trying#to be creepy,
##my colleague Derrick Harris#wrote. Limited glimpses Publicly posted information is one thing, but what about private posts and communications?
Most people were aware that law enforcement agencies and governments ordered web companies to give up data on individuals of interest,
but the scale of this trend has always been difficult to nail down. On this front, Google has led always the way,
and the January 2013 edition of its semiannual Transparency Report showed the numbers of such requests had increased 70 percent between 2009 and 2012.
Twitter, too, gave users#an indication of how often the feds knocked on its door. Facebook said at the time that it had#no plans#to release such information to the public
and Microsoft initially#hummed its way through calls for a Skype transparency report before#giving in#to pressure from privacy groups.
However, while Google covered itself with more glory than most on this aspect of transparency,
it found itself increasingly under fire in Europe over other privacy-related issues. The company was fined by a German privacy regulator#for the 2010 siphoning of people s passwords and communications by Google s Street view cars.
And it continued to get into#all sorts#of#trouble#over its#unified privacy policy. In the eyes of Europe s data protection authorities
the unification of Google s disparate services represented an attempt to do new and serious things with people s information without true permission,
connecting previously unconnected pockets of data without making this obvious to users or giving them a meaningful way to say no.
A lot of people were unhappy about Google search and Maps##and Google+##knowing about their Youtube commenting habits.
However, although European privacy laws are significantly stronger than those in the U s a February survey showed that#Americans are nearly as keen as Europeans on protecting their online privacy.
The Ovum study also demonstrated an overwhelming lack of trust in internet companies honesty about data protection;
which is interesting, because those companies clearly assumed the public had a very high tolerance for privacy invasion.
In May, Microsoft said its Xbox One console would have an#always-on microphone, constantly listening to whatever people say near it.
Google said Glass would gain the same functionality, which also became a feature of the#Moto X#smartphone.
Apps#got in on the act. All listening, all the time. Glass wasn t the only wearable computer with eavesdropping potential.
At our 2013 Structure Data conference, the CIA s tech chief, Gus Hunt, said the new breed offitness trackers#were both light on security
and heavy enough on sensor data to betray the user s gender, rough height and weight, and more.##
##What s really most intriguing is that you can be guaranteed 100 percent to be identified by simply your gait how you walk.
Now this could be a really good thing. Just as disturbingly, a study demonstrated how easy it was to#identify someone from just a handful of time and location-based data points.
Britain s#Guardian newspaper#ran a story alleging that the U s. carrier Verizon was handing over call records to the National security agency, America s signals intelligence operation.
Many don t recognize that our digital data##from cell phones, connected devices and our social media profiles##combined with powerful computing
and analytics can create detailed histories of our lives, our habits and our actions.####The next story was even more explosive.
It alleged that the NSA had#direct access to the servers#of the big U s. tech firms, such as Google, Microsoft and Apple.
This didn t just affect Americans##now all these companies users and customers, anywhere in the world, were clearly at risk of being spied upon by the U s. authorities.
Within days, European data protection regulators and activists were#demanding to know#what was happening with EU citizens data held on
and transmitted through American web services. As well they might. While Snowden had ignited a#debate in the U s.#about the constitutional protections that U s. citizens were supposed to be enjoying in their home country,
that, for us as citizens who use digital communications, #everything was not as it had seemed. Since the end of WORLD WAR II, mass communications have been subject to surveillance by a network of friendly, English-speaking intelligence agencies.
With the advent of the web, that data-gathering activity took on new dimensions. And now we knew about it.#
Slow clarity Early surveys#showed most Americans#weren bothered t that#about the NSA recording their cellphone metadata.
involving malware and hacking into desktop and#mobile devices. It can also involve knocking on the door of Google or Facebook.
Even without the firepower that can be brought to a targeted investigation mass surveillance results in a searchable map of millions of people s links, who they know,
but many would argue that indiscriminately recording all this data and making it easily searchable constitutes a severe and widespread invasion of privacy.
A U s. federal judge has taken this view#in relation to the Verizon metadata. There are at least a few recorded cases of NSA employees using their power tostalk crushes
and other users who value their privacy. It s fair to assume any unencrypted communications are open to monitoring.
but the trust system that governs web security has#integral flaws that need addressing. As the closures of#Lavabit and the Silent Mail service#showed,
firms that make encryption easier by managing the user s keys also make the user less secure by becoming a target for the authorities.#
Google, Microsoft, Apple and others appeared utterly complicit with the NSA, as though they were happily inviting them into their data centers for a look around,
Knowing that, many of the big web companies were scarcely encrypting the data they held in storage, let alone the connections between their data centers.
the likes of Facebook and#Apple#are now a whole lot more keen about#transparency when it comes to government data requests, perhaps in order torescue their public image.
The big U s. tech firms have banded also finally together##seven months after the Snowden revelations##to#demand a change in U s. intelligence tactics.
Fallout The post-Snowden months have seen a rash of interest in privacy-protecting#plug-ins,#search engines#and#anonymous surfing appliances,
Early warnings from IBM and Cisco indicate that some big U s. tech firms are already seeing a#significant drop-off#in orders
and Germany s big telcos to consider the merits of keeping local-to-local internet traffic#within their borders.
This has led to fears of a##balkanization##of the web, with unpleasant censorship potential. However, the web s globally interconnected nature makes this a tall order at best.
What does look set to happen is a legal and technical reinforcement of online privacy. The United nations is#working on a resolution#affirming that human rights apply online as well as offline,
and on the technical side the web may soon beencrypted by default. But what of the tech firms
whose services have been hijacked so successfully by the NSA and its partners? Facebook is still quietly doing
what it can to#stop users from protecting their privacy. And Google, which delighted privacy advocates in July by releasing an Android feature called#App Ops#that made it possible to turn off specific tracking functionalities in individual apps,
pulled that feature in a later Android update, claiming it had been included by accident. The online ad industry is also doing its best to ensure everyone remains trackable.
At the end of September, Stanford privacy advocate Jonathan Mayer#quit the working group#that has been steering the abortive#Do Not Track standard
a browser feature that s supposed to dissuade websites from tracking internet use with cookies.
Rather than doing what it says on the tin, Do Not Track now mostly comes turned off by default.
The ad industry, which lives off tracking people, won the day. Of course, we now know those same cookies can be hijacked by the NSA. And all over the world,
whereby#smart trashcans scoop up identifying information#from passing smartphone users, and retail chain Tesco started#scanning customers faces#as they stand in line to pay.
but they are colored all now by the knowledge that collected data may at some point be targeted by intelligence agencies and other authorities.
Sure, many suspected and some knew that the internet is a giant monitoring system, but anyone paying the slightest bit of attention must now realize that everything they do online
##and increasingly offline too##is enabled open to tech surveillance. Anyone carrying a mobile device should now understand that they are being tracked constantly.
Now we must address the fundamental questions of our time. Is it possible as#some suggest, to accept technological trends such as##big data##while also giving people the option of privacy?
Can we create popular internet business models that don t make the user a well-described product?
Are we heading into a world of data-driven authoritarianism? These are questions we are only now asking with seriousness and urgency.
Overtext Web Module V3.0 Alpha
Copyright Semantic-Knowledge, 1994-2011