Discover how mastering email communication can boost business efficiency, avoid common pitfalls, and ensure secure, respectful online interactions.
Turkey Revenge
The turkeys are pissed this Thanksgiving they are seeking revenge.
Germs Infest 60% of Americas Phones
60% of Americans sleep with their phones, harboring germs. Cleaning regularly with UV sanitizer or alcohol wipes can help keep your phone and bed germ-free.
Smartphone Sanitizing: A Practical Guide
Securely erase personal data from your old smartphone before recycling. Protect your identity from hackers—easy steps to follow.
Why Soft Skills Matter in Today’s Job Market
Boost your career with essential soft skills like communication, teamwork, and emotional intelligence. Learn why they’re crucial for workplace success.
Chatbots Taking Over Politics
Mercifully, the 2016 U.S. election cycle is coming to an end. Most people are talking about how terrible all the candidates are. We don’t care anymore both candidates suck. The political conversation online is even worse. Political conversation online is more hateful because most of the politics on social media outlets like Facebook or Twitter are chatbots.
Researchers say that most election tweets come from political chatbots. Chatbots are computer programs that simulate human conversation or chat through artificial intelligence. Political chatbots engage with other users about politics, especially on Twitter (TWTR) and Facebook (FB).
Chatbots are rooting for Trump.
Recode reports that chatbots for both sides are pushing their candidates hard. According to a paper released by Oxford University’s Project on Computational Propaganda, Republican bots are out tweaking Democratic chatbots on the Web.
The researchers found that most bots root for Trump to win the election. During the third presidential “debate,” Twitter bots sharing pro-Trump-related content outnumbered pro-Clinton bots by 7 to 1. Between the first and second debates, bots generated more than 33% of pro-Trump tweets, compared with 20% for pro-Clinton tweets.
Twitter bot
The Oxford team found that a Twitter bot is automated account software that acts independently. Bots can retweet, like, and reply to tweets. They can also follow accounts and tweet themselves.
The researchers found that Twitter accounts with extremely high levels of automation, meaning they tweeted over 200 times during the data collection period (Oct. 19-22) with a debate-related hashtag or candidate mention, accounted for nearly 25% of Twitter traffic surrounding the last debate.
The problem with the outpouring of automated engagement on Twitter is that campaigns often measure success (and decide where and how to invest in further outreach) by counting these retweets, likes, replies, and mentions.
Chatbots can give issues unwarranted clout.
The article states that it is hard to tell how many retweets and likes are from real supporters. A proliferation of chatbots can give candidates and issues unwarranted clout. Throughout the race, Trump has discounted the value of polls. They’re rigged, he says. Instead, his campaign implores Americans to reference how viral he is on social media and the size of his rallies.
The third debate came on the heels of the leaked tape of Trump bragging about sexually assaulting women, which went viral. The article speculated that Trump’s uptick in automated Twitter fandom during the debate may have been intended to counteract the lingering outrage against the candidate on social media.
Increasingly, journalists use Twitter to report stories and prove public interest. They believe it’s an excellent way to bring audience voices into a political discussion, though more voices don’t always make for a better conversation. The author warns that much of the engagement numbers aren’t from real people, which is also a sobering reminder that virality is no demonstration of genuineness.
Automated fake profiles that look real
Donald Trump likes to boast that he’s more popular than Hillary Clinton on social media. After all, he has 12.9 million Twitter followers, while Clinton lags behind with a mere 10.1 million. But it’s hard to say how much those numbers mean if many of them represent robots. Sam Woolley, a researcher at the University of Washington who studies the political use of social media bots, told Revelist “… that well over half of his [Trump] followers are automated, fake profiles made to look like real people.”
Mr. Howard told CNN, “The takeaway is that we should be skeptical about social media … Politicians use bots to influence debate, it’s often a form of a negative campaign because in many cases these bots can be very vicious.”
Rb-
Filippo Menczer, a computer scientist at Indiana University’s School of Informatics and Computing, said botnets have been deployed in many countries to squelch dissent. “We’ve seen examples in other countries – in Russia, Iran, and Mexico – of bots used to destroy social movements. They would impede conversations. All of a sudden, you would see hundreds of thousands of junk tweets flooding your feed.”
Notice the Trump – Russia tie.
This is one of the risks of automating work with bots, which I wrote about here. The pro-Trump bots keep counting on themselves to skew their total numbers up and bury the discussion points from actual voters under the avalanche of bot chat.
Watch out—it won’t be long before chatbots are granted rights under dubious SCOTUS rulings like Citizen United.
Related articles
- How Twitter Bots Are Shaping the Election (theatlantic.com)
Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedIn, Facebook, and Twitter. Email the Bach Seat here.
More Motown Jobs
Good news – more jobs! Metro Detroit employment has finally recovered from the 2007 depression recession. The second quarter of 2016 set a new high in employment in Southeast Michigan dating back nearly a decade to 2007 to the beginning of the recession, reports the Workforce Intelligence Network for Southeast Michigan.
MiTechNews reports that 35,000 jobs were added from April through June, pushing the total number of jobs held in the region to 2.62 million. Nearly 20,000 previously unemployed people gained jobs in the region in the second quarter of 2016, along with more than 15,000 new workers (for a total of 35,000 new jobs), bringing the unemployment rate down to 4.5 percent, a low not experienced in Southeast Michigan since 2001.
Related articles
- A time-lapse map shows how wrong Donald Trump is about US unemployment (businessinsider.com)
Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedIn, Facebook, and Twitter. Email the Bach Seat here.
Linux Turns 25
Linus Torvalds released the first Linux operating system kernel on Oct. 5, 1991. On Oct. 6, 1991, Torvalds began arguing with volunteer developers who would go on to make Linux an open-source powerhouse and eventually a household name. Today the Linux community is upwards of 86 million users strong.
As part of celebrations to mark Linux’s 25th birthday the Linux Foundation has published its annual Linux Kernel Development Report (PDF reg required). According to the Register, the report concludes that Linux is in great shape, “There may be no other examples of such a large, common resource being supported by such a large group of independent actors in such a collaborative way.”
The independent actors have a lot to collaborate on. The report notes that the first versions of the Linux kernel comprised about 10,000 lines of code. Now it’s nearing 22 million and growing at a rate of 4,600 lines a day.
While Linux may have started out as a hobby OS, that changed in the early 2000s. At the turn of the century, Wall Street banks demanded Linux support for their enterprise application servers says Tech News World.
“That was a moment that broke down resistance to Linux in the big IT vendors like BEA, IBM, and Oracle (ORCL). That hole in the dam was the start of a flood,” said Cloud Foundry CEO Sam Ramji. “Today Linux is the home of operating system innovation.”
Aporeto Virtualization Expert Stefano Stabellini, who has been a Linux user and open source advocate since the 1990s explained the transition. “… back when I started with Linux in the ’90s … [companies] did not understand it. They thought that open source was unsustainable, and Linux was niche and hobbyist.” He says that now everything has changed. Every company has an open source strategy now. “Microsoft (MSFT) was the biggest foe and now is a strong ally. Linux is the most widely adopted operating system of all times.”
Dice points out that the most active contributors to the growth of Linux have included (in descending order) Intel (INTC), Red Hat, Linaro, Samsung (005930), SUSE, IBM (IBM), and various corporate consultants. Google (GOOG), AMD (AMD), and Texas Instruments (TXN) also ranked in the top 15.
rb-
So my first pass at Linux was Red Hat Linux 5.0. when Novell bought into Linux. Yeap I was a Novell CNE 5 way back in the day.
The last couple of projects I have been involved with have used Linux and not Windows, CMS, IVR, PAFW’s, and storage.
Related articles
- Babies Named Linux? (nancy.cc)
Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedIn, Facebook, and Twitter. Email the Bach Seat here.
2016’s Most Dangerous Online Celebrities
The 10th annual McAfee Top 100 Most Dangerous Celebrities to Search for Online Study, published by Intel Security, was recently released. The yearly report uncovers which celebrities are the most dangerous to search for on Intertube. These dangerous celeb results can expose fans to viruses, malware, and identity theft while searching for the latest information on today’s pop culture stars. Intel (INTC) used its McAfee site rating software to find the number of risky sites generated by searches on Google, Bing, and even beleaguered Yahoo.
“Consumers today remain fascinated with celebrity culture and go online to find the latest pop culture news,” said Gary Davis, chief consumer security evangelist at Intel Security. “With this craving for real-time information, many search and click without considering potential security risks. Cyber-criminals know this and take advantage of this behavior by attempting to lead them to unsafe sites loaded with malware.”
Most Dangerous Online Celebrities
This year’s most dangerous celebrity online is Amy Schumer. The comic joins recent most dangerous celebrity online alumni Jimmy Kimmel, Jay Leno, and Emma Watson. According to Intel Security, a search for the “Trainwreck” actress has a 16.1% likelihood of returning results that direct fans to sites with viruses and malware.
Justin Biber is the second most dangerous online celebrity. As for the “Sorry” singer, there’s a 15% chance that Beliebers could connect with a malicious website.
The rest of this year’s Top 10 list included:
3. Carson Daly 13.4%
4. Will Smith 13.4%
5. Rihanna 13.3%
6. Miley Cyrus 12.7%
7. Chis Hardwick 12.6%
8. Daniel Tosh 11.6%
9. Selena Gomez 11.1%
10. Kesha 1
1.1%
Intel says there are two big truths: cyber-criminals try to exploit celebrity fandom for abuse. The first is that consumers want convenience. As people rely less on cable and, instead, search for the content they want online, they’ll find many third-party sources for their favorite music or videos.
But unofficial sources are often dangerous. Links can send users to unsafe sites, where sneaky tactics for stealing data and usernames are awaiting. The popular torrent file format for downloading files allows cyber-criminals to sneak viruses onto devices.
Social media-obsessed culture
The second truth attackers are exploiting is the desire for gossip – now. In today’s social media-obsessed culture, fans want real-time information about their favorite celebrities. It isn’t uncommon for a celebrity to share a photo, post, or comment around the world in a matter of seconds. Those posts often spark a wave of searches. With all that traffic, cyber-criminals can trick fans into visiting a faux-gossip website infested with malware to steal passwords, credit card information, and more. This method is particularly effective on social media channels, like Facebook, Twitter, and WhatsApp, where the standards for trust are low.
How to protect yourself
In addition to recommending anti-virus software, Intel, whose products include McAfee software, urges consumers to be skeptical when surfing the web. But don’t worry. No one is asking you to give up your celebrity infatuation; here are a few things you can do to make sure you’re entertained safely:
Watch media from sources. Are you looking for the latest episode of Amy Schumer’s TV show, Inside Amy Schumer? Stick to the official source at comedycentral.com or well-known and trusted video streaming services like Hulu to ensure you aren’t clicking on anything malicious.- Be wary of searching for file downloads. Of all the celebrity-related searches we conducted, “torrent” was the riskiest by far. According to Intel, a search for ‘Amy Schumer Torrent’ results in a 33 % chance of connecting to a malicious website. Cybercriminals can use torrents to embed malware within authentic files, making it tricky to detect safe downloads from unsafe sources. It’s best to avoid using torrents, especially when so many legitimate streaming options are available.
Keep your personal information private. Cybercriminals are always looking for ways to steal your personal information. If you receive a request to enter information like your credit card, email, home address, or social media log-in, Intel says you should not give it out thoughtlessly. Please research and ensure it’s not a phishing or scam attempt that could lead to identity theft.- Use security protection while browsing. Many software products can scan web pages you’re browsing, alerting you to malicious websites and potential threats. This can keep you safe as you study the latest gossip.
rb-
The stars are new, but the game is the same. In addition to applying some critical thinking to your web browsing, the same advice from 2015, 2014, 2013, 2012, etc. stands……
Maybe I will get more hits after putting these pop names in here.
Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedIn, Facebook, and Twitter. Email the Bach Seat here.
AT&T Tries Broadband over Powerline
It’s alive. It’s alive! BPL has risen from dead. Longtime readers of the Bach Seat, know the history of Broadband over Powerline. I covered it many years ago here, here, and here. Imagine my surprise when there were a number of articles popping up all over the interwebs touting mega-telecom AT&T’s (T) try at BPL 10 years after everybody else gave up on the technology.
ComputerWorld described this latest incarnation of BPL from AT&T as a low-cost, high-speed wireless internet technology. This time Broadband over Powerline relies on plastic antennas positioned along medium-voltage power lines and not through the conductive materials inside the power lines. FierceTelecom says that AT&T will attach the plastic antennas to the power lines and serve as a mesh network to distribute signals to homes and businesses. The Project AirGig low-cost plastic antennas and devices will regenerate millimeter wave (mmWave) signals. Millimeter-wave technology relies on electromagnetic waves that are longer than x-rays but shorter than radio waves (they are found in the 10 mm to 1 mm range and are also known as extremely high-frequency waves according to New Atlas. The EHF waves can be used for 4G LTE and 5G multi-gigabit mobile and fixed deployments.
John Donovan, chief strategy officer and group president of AT&T technology and operations, told FierceTelecom that Project AirGig delivers last-mile access without any new FTTH technology and is flexible enough to be configured with small cells or distributed antenna systems.
To test the technology, AT&T is looking for a place somewhere in the next year with a favorable regulatory environment, since the carrier would need to partner with an existing electric utility. John Donovan, chief strategy officer for AT&T said the trial could be in an area where existing broadband is expensive, even in the U.S.
The AirGig project relies on over 100 patents, according to an AT&T statement. There is no direct electrical connection to the power lines, although network components could receive their needed power through inductive wireless electricity from the near by power lines, AT&T Chief Technology Officer Andre Fuetsch explained to Computerworld.
AT&T said the testing will decide what frequency AirGig will use for commercial deployment, which could occur sometime around 2020 after the carrier rolls out 5G wireless. The frequency AT&T uses will affect the range of the signal and the speed, as well as whether it is over a licensed or unlicensed band. This decision is important if AT&T plans to use BPL as another weapon in its fight with Google Fiber. Earlier versions of Broadband over Powerline were incapable of delivering the Google (GOOG) promised Gigabit of Internet access.
“It’s a transformative technology that delivers low-cost and multi-gigabit speeds using power lines,” AT&T’s Donovan said, “There’s no need for enhancements for new towers, and it’s over existing infrastructure.”
AirGig has already been tested in outdoor locations on-campus settings. “We’ve had it up and running 4k video and cameras on campuses for quite some time,” Mr. Donovan said.
Besides using the AirGig technology as an alternative broadband service delivery option, for urban, rural, and under-served markets AT&T wants to convince the electrical utility industry to apply AirGig technology to their unique needs. ComputerWorld says utility companies would be able to use the technology to help spot problems on their power lines from something like a downed tree or cracks in the cable sheath.
rb-
New Atlas points out that earlier this year, a millimeter-wave technology system set a new world record for wireless data transmission by sending data at 6 Gbps. The technology is also showing up in other applications, including heart-rate monitors, car-safety systems, and luggage scanners.
AirGig could be profitable for AT&T. If they can make a deal with an electrical company, they can avoid expensive make ready. Which Google Fiber is struggling mightily with. By using power lines, AirGig avoids the cost of digging trenches to lay fiber optic cable.
Still, questions remain about how this version of Broadband over Powerline will do in the real world.
- What impact will heavy rain, snow or ice have on the signal?
- What if a tree branch falls on a power line or the lines are swinging in the wind?
- Since mmWave transmissions need a direct line-of-sight between antennae, what happens when critters like birds or squirrels decide to perch on the antennae? Will that lead to an outage?
The ham radio lobby will likely be up in arms again when they find AT&T still likes the idea of BPL in the 30-300 GHz bands. The ARRL was a key player in killing BPL 1.0.
Related articles
- Millimeter Wave Technology Market Worth 4,632.8 Million USD by 2022 (prnewswire.com)
Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedIn, Facebook, and Twitter. Email the Bach Seat here.
