Are Apple and Google Protecting Us or the Criminals?


Technopreneurph

Are Apple and Google Protecting Us or the Criminals? image bigstock Silhouette Of A Hacker Isloate 44548606 600x600

Late last year, Tom Webster and I did a podcast with our six marketing predictions for 2014. Two trends I mentioned were 1) the “malignant complexity” of the web that would lead to an increase in security breaches and 2) the opportunities this would create to actually market data security as a product feature.

In an online world under attack from hackers, terrorists, and just plain old bad guys wanting to wreak havoc, the idea of hack-proof Internet data safety will have to be a product feature trumpeted by new devices, software and service providers.

My prediction is coming true … but with some unexpected consequences.

The bad guys benefit

Keeping people away from your data is not just a feature, it has also become a marketing pitch, as I forecast.

Last week, Apple announced that its new operating system for iPhones would have a new encryption system. In…

View original post 630 more words

Advertisements

The Next Step for (Artificial) Intelligent Virtual Assistants


Gigaom

When we talk about the future of artificial intelligence (AI), the discussion often focuses on the advancements and capabilities of the technology, or even the risks and opportunities inherent in the potential cultural implications. What we frequently overlook, however, is the future of AI as a business.

[company]IBM[/company] Watson’s recent acquisition and deployment of [company]Cognea[/company] signals an important shift in the AI and intelligent virtual assistant (IVA) market, and offers an indication of both of the potentials of AI as a business and the areas where the market still needs development.

The AI business is about to be transformed by consolidation. Consolidation carries real risks, but it is generally a sign of technological maturation. And it’s about time, as AI is no longer simply a side project, or an R&D euphemism. AI is finally center stage.

IBM, for all its investment in the Watson platform, was still missing, among other…

View original post 945 more words

The Anonymous App Used by the Police to Fight Bullies and Porn


Gigaom

In an open-floor office in the Philippines, an army of people stare at computers full of Whispers. There are 130 people to be exact, each skimming twenty posts at a time on their PC screens. They click and click and click, flagging Whispers here and there to be deleted or elevated to the company’s San Francisco team.

This is how content moderation works for the world of anonymous apps, and it all happens under the roof of one outsourcing firm called TaskUs. It’s labor intensive and it’s a massive, expensive endeavor. Whisper has used a TaskUs team in the Philippines for two years, since the company’s earliest beginnings, but now it’s not the only anonymous app doing so.

Gigaom has learned that Yik Yak, the lesser known anonymous app beloved by teens, began using TaskUs a few weeks ago and that Secretunder fire to explain how it will deal with…

View original post 983 more words