zondag 23 februari 2014

Latest Blog: An Abney And Associates Technology News - Google acquires Spider.io to fight ad fraud

Google claimed it’s ratcheting up the fight against fraud in online advertising, disclosing Friday that it has bought Spider.io, a London company specializing in ad fraud detection technology.

Google has been investing in ad fraud prevention for years, said Neal Mohan, Google’s Display Advertising VP in a blog post on Friday. The company last year turned down millions of applications from sites looking to join its network because of suspected fraudulent activity, he said.

Now, Google will immediately include Spider.io’s fraud detection technology in its video and display ads products to complement existing efforts, said Mohan.

Spider.io helps preventing display advertisers from being defrauded by networks of hijacked PCs, tablets and phones that generate billions of fake ad views, according to its website.

Currently there are two types of display advertising fraud being committed using hijacked Internet-enabled devices, according to Spider.io.

The first involves the attacker running fully automated browsers on the hijacked devices without the knowledge of the device owners. Those browsers visit ad-laden websites of the attacker’s choosing and simulate mouse movements and ad clicks, Spider.io said.

The second type involves hijacking the browsing sessions of the device owners. That typically takes one of four forms, Spider.io said. The device owner’s clicks could for instance be redirected to websites of the attacker’s choosing, and the device owner may also be shown unexpected pop-up windows. Web pages may also be hidden in pop-under windows under the owners’ active browser windows, and ads could be illegitimately injected into webpages ordinarily visited by the device owners.

The company’s technology prevents hijacked PCs, tablets and phones from being used to defraud online advertisers by identifying the type of automated agent responsible for each individual ad request in real time, according to its website.

Google said it hopes its anti-fraud efforts will eventually improve the metrics that advertisers and publishers use to determine the value of digital media and give all parties a clearer picture of what campaigns and media are truly delivering strong results.


Details of the deal were not disclosed in the blog post. Google did not immediately reply to a request for comment.

dinsdag 17 september 2013

Today in Small Business: Frauds and Cyber-attacks, Abney and Associates AA Code 85258081704



Management

o The Better Business Bureau and the Federal Trade Commission have put together a list of a few popular small-business scams to watch for, including charity pitches: while many charity requests are legitimate, “every year small-business people become victims of fraudulent or deceptive charitable solicitation schemes. Make sure to always check out the charity at give.org.”
o A Home Depot wedding proposal video goes viral.

The Economy

Lawrence H. Summers withdraws from consideration for chairman of the Federal Reserve.
Here’s what might really happen if Congress plays chicken with the debt ceiling.
On the fifth anniversary of the collapse of Lehman Brothers, President Obama warns his opponents not to oppose raising the nation’s debt limit, not threaten to close down the government in a budget fight, and not to push to delay the health care law or starve it of federal money.
Gretchen Morgenson thinks little has been done to protect us from another financial collapse: “For all the new regulations governing derivatives, mortgages and bank holding companies, a crucial vulnerability remains. It’s found in our vast and opaque securities-financing system, known as the repurchase obligation or repo market. Now $4.6 trillion in size, it is where almost every financial crisis since the 1980s has begun. Little has been done, however, to reduce its risks.”

Around the Country

On the Jersey Shore, dozens of businesses were destroyed by the recent fire — including a much beloved family business — and many of them did not have fire insurance.

Finance

PayPal pledges to overhaul its approach to crowd funding.

Technology

Oxford researchers say 45 percent of America’s occupations will be automated within the next 20 years.
A record number of cyber-attacks are targeting small business.
Want your very own Nsa.org e-mail address? It’s only $100.

dinsdag 4 juni 2013

Google Chairman Bankrolls Tech Shop Exclusively for Democrats: Latest Abney and Associates Technology News

I’ve written previously about how embedded Google, Inc. is with the Democratic Party and the Obamasphere in particular.
I was told by many that it was the stuff of tin-foil hats to believe that Google was in the tank for Democrats. They’re just working with clients after all! Why, Romney and Republicans could’ve just as easily worked with them! This isn’t partisan!
Well, now, this is just in from Bloomberg/Businessweek: Google Chairman Eric Schmidt, one of Obama’s biggest boosters, is bankrolling a new for-profit endeavor being run by former Obama tech staffers that will be working exclusively for Democrats, as well as some corporate clients, in future.


“During the 2012 campaign, Barack Obama’s reelection team had an underappreciated asset: Google’s (GOOG) executive chairman, Eric Schmidt. He helped recruit talent, choose technology, and coach the campaign manager, Jim Messina, on the finer points of leading a large organization. “On election night he was in our boiler room in Chicago,” says David Plouffe, then a senior White House adviser. Schmidt had a particular affinity for a group of engineers and statisticians tucked away beneath a disco ball in a darkened corner of the office known as “the Cave.” The data analytics team, led by 30-year-old Dan Wagner, is credited with producing Obama’s surprising 5 million-vote margin of victory.

Schmidt thought enough of the team that when the campaign ended, he put up several million dollars to keep its core together as a new consulting firm, Civis Analytics, run by Wagner and staffed by two dozen of his former employees. They share ownership with Schmidt, its sole investor.


The plan is to bring the same Big Data expertise that guided the most expensive presidential campaign in history to companies and nonprofits. “The model of innovation in technology are these very young teams that have a brand-new idea, like each other, and work incredibly hard,” says Schmidt. “Venture capitalists are competing all over for these people. When you find them, you figure out what they want to do and you back them.” Or, as Wagner puts it, “The Cave is incorporating.”

woensdag 29 mei 2013

Information Technology Abney and Associates News: The Impact of Technology on the Developing Child

Source Link


Reminiscing about the good old days when we were growing up is a memory trip well worth taking when trying to understand the issues facing the children of today. A mere 20 years ago, children used to play outside all day, riding bikes, playing sports and building forts. Masters of imaginary games, children of the past created their own form of play that didn't require costly equipment or parental supervision. Children of the past moved... a lot, and their sensory world was nature based and simple. In the past, family time was often spent doing chores, and children had expectations to meet on a daily basis. The dining room table was a central place where families came together to eat and talk about their day, and after dinner became the center for baking, crafts and homework.


Today's families are different. Technology's impact on the 21st century family is fracturing its very foundation, and causing a disintegration of core values that long ago were the fabric that held families together. Juggling school, work, home, and community lives, parents now rely heavily on communication, information, and transportation technology to make their lives faster and more efficient. Entertainment technology (TV, Internet, video games, iPads, cell phones) has advanced so rapidly, that families have scarcely noticed the significant impact and changes to their family structure and lifestyles. A 2010 Kaiser Foundation study showed that elementary aged children use on average 7.5 hours per day of entertainment technology, 75 percent of these children have TV's in their bedrooms, and 50 percent of North American homes have the TV on all day. Gone is dining room table conversation, replaced by the "big screen" and take out.


Children now rely on technology for the majority of their play, grossly limiting challenges to their creativity and imaginations, as well as limiting necessary challenges to their bodies to achieve optimal sensory and motor development. Sedentary bodies bombarded with chaotic sensory stimulation are resulting in delays in attaining child developmental milestones, with subsequent negative impact on basic foundation skills for achieving literacy. Hard-wired for high speed, today's young are entering school struggling with self regulation and attention skills necessary for learning, eventually becoming significant behavior management problems for teachers in the classroom.






So what is the impact of technology on the developing child? Children's developing sensory, motor, and attachment systems have biologically not evolved to accommodate this sedentary, yet frenzied and chaotic nature of today's technology. The impact of rapidly advancing technology on the developing child has seen an increase of physical, psychological and behavior disorders that the health and education systems are just beginning to detect, much less understand. Child obesity and diabetes are now national epidemics in both Canada and the U.S., causally related to technology overuse. Diagnoses of ADHD, autism, coordination disorder, developmental delays, unintelligible speech, learning difficulties, sensory processing disorder, anxiety, depression, and sleep disorders are associated with technology overuse, and are increasing at an alarming rate. An urgent closer look at the critical factors for meeting developmental milestones, and the subsequent impact of technology on those factors, would assist parents, teachers and health professionals to better understand the complexities of this issue, and help create effective strategies to reduce technology use.


Four critical factors necessary to achieve healthy child development are movement, touch, human connection, and exposure to nature. These types of sensory inputs ensure normal development of posture, bilateral coordination, optimal arousal states and self-regulation necessary for achieving foundation skills for eventual school entry. Young children require 2-3 hours per day of active rough and tumble play to achieve adequate sensory stimulation to their vestibular, proprioceptive and tactile systems. Tactile stimulation received through touching, hugging and play is critical for the development of praxis, or planned movement patterns. Touch also activates the parasympathetic system lowering cortisol, adrenalin and anxiety. Nature and "green space" has not only a calming influence on children, but also is attention restorative and promotes learning.


Further analysis of the impact of technology on the developing child indicates that while the vestibular, proprioceptive, tactile and attachment systems are under stimulated, the visual and auditory sensory systems are in "overload." This sensory imbalance creates huge problems in overall neurological development, as the brain's anatomy, chemistry and pathways become permanently altered and impaired. Young children who are exposed to violence through TV and video games are in a high state of adrenalin and stress, as the body does not know that what they are watching is not real. Children who overuse technology report persistent body sensations of overall "shaking", increased breathing and heart rate, and a general state of "unease." This can best be described as a persistent hypervigalent sensory system, still "on alert" for the oncoming assault. While the long term effects of this chronic state of stress in the developing child are unknown, we do know that chronic stress in adults results in a weakened immune system and a variety of serious diseases and disorders.





It's important to come together as parents, teachers and therapists to help society "wake up" and see the devastating effects technology is having not only on our child's physical, psychological and behavioral health, but also on their ability to learn and sustain personal and family relationships. While technology is a train that will continually move forward, knowledge regarding its detrimental effects, and action taken toward balancing the use of technology with critical factors for development, will work toward sustaining our children. While no one can argue the benefits of advanced technology in today's world, connection to these devices may have resulted in a disconnection from what society should value most, children. Rather than hugging, playing, rough housing, and conversing with children, parents are increasingly resorting to providing their children with more TV, video games, and the latest iPads and cell phone devices, creating a deep and irreversible chasm between parent and child.

donderdag 23 mei 2013

Abney and Associates News Review: Secure Your Computer In Seven Steps


While handheld devices such as smartphones and tablets provide new ways for us to leverage technology, computers are often still the primary tool we use for our professional and personal lives. As a result, your computer, whether at work or at home, still remains a primary target for cyber criminals. By following these simple steps, you can help secure your computer and protect it against most known attacks.

1. STARTING SECURE
The first step to a secure computer is starting with a computer you can trust. If you purchased a new computer directly from a well-known vendor, then you should be able trust it and the pre-installed software. If you have purchased a used computer, then do not trust it. The used computer may have been accidentally (or intentionally) infected by the previous owner. Trying to secure a computer that is already infected does no good. The first step you should take after acquiring a used computer is reformat the hard drive and reinstall the operating system (be sure to ask someone you trust for help if you are not sure how to do this).

2. UPDATING
The next step is updating your computer. Cyber attackers are always identifying new weaknesses in computers and their applications. When computer and software vendors learn about these new vulnerabilities, they develop and release fixes, called updates or patches, to fix the problem. When you purchase a new computer or reinstall the operating system, your computer is most likely already out of date. As such, the first step you want to take is connect to the Internet and update your computer’s operating system. Be sure that when you do connect to the Internet, your new computer is protected behind a firewall or home Wi-Fi access point. In addition, most computer operating systems, including Windows and OS X (and even many applications), have an automatic updating feature builtin. Enable automated updating to check for updates at least once a day; this helps ensure your computer will remain updated and secure. If a vendor releases a patch that you have to manually install, be sure to install it as soon as possible.

3. SECURITY SOFTWARE
Once your computer is updated you want to ensure you have security software installed and enabled. The two most common types of security software are anti-virus and firewalls. Anti-virus helps identify infected files you may have downloaded or shared with others and stops these malicious files from harming your computer. Firewalls act like a virtual policeman; they determine who can and cannot talk to your computer. Many security vendors now offer entire security software suites that include firewall, anti-virus and other software options. You may want to consider purchasing an entire security package.

4. ACCOUNTS
Every person that has authorized access to your computer should have their own separate account protected by a unique, strong password. Never share accounts. If this is a personal computer for home use, create a separate account for each member of your own family, especially children. This way you can apply different controls to each user (such as parental controls for your children) and track who did what. In addition, grant each user the minimum privileges they need to use the computer. Never give someone administrative access unless they absolutely need it, including yourself. Only use administrative privileges when you need them, such as to install software or changing a system configuration.

5. SECURITY ON THE GO
If your computer is portable, such as a laptop, you may want to consider full disk encryption (FDE). Encryption helps ensure that the data on your computer is protected even if you lose it. You may also want to ensure the computer screen is password locked, so people cannot access the system when you are away from it. Finally, some laptops now support remote location and/or wiping to help you locate a missing laptop or permanently erase sensitive data if it cannot be recovered.

6. USING THE COMPUTER
No amount of technology can protect your computer against every threat. While everything we have covered so far will help secure your computer, the last element we have to secure is you, the computer user. Know and understand that bad guys are always trying to trick you. If you receive a message that seems odd or suspicious, don’t click on any links or attachments. If someone calls you telling your computer is infected and you need to install software, this is most likely a scam. In many ways you are the best defense for your computer, not technology.

7. BACKUPS
Finally, even if you take all the steps we have covered, there is always a chance your computer can get hacked, have a hard drive failure or some other catastrophe. Your last defense is backups. We highly recommend you regularly backup any important information (documents, pictures, videos, etc) to either an external hard drive or use a backup Cloud service, or perhaps even both.


dinsdag 21 mei 2013

Abney and Associates News Technology Articles: Hacken Boston met stevige Dunnhumby consument-Data



Bedrijven met veel Data om te spelen met sponsoren Hack  gebeurtenissen te boren in verse analytische Talent.
"Kalmte bewaren en doorgaan met testen." De Harvard-student T-shirt slogan leek te vatten de stemming in de ijskoude kamer gevuld met gegevens crunchers. Het was gewoon een druilerige zaterdag in de buurt van MIT van Kendall Square in Cambridge, Massachusetts, waar vooral jonge mannen naar hun laptops staarde, observeren predictieve modellen parseren van gegevens die supermarkt aankopen van dingen zoals DVD's en melk. Het was gewoon een ander hackathon.

Maar dit keer het werd gesponsord door een consument-data firma hoop te bevorderen van innovaties in data-analyse, en misschien krijgen een sprong op de concurrentie als het gaat om potentiƫle werknemers gegevens-wetenschap oogsten. Meer en meer bedrijven met veel data om te spelen met sponsoren houwer gebeurtenissen te boren in verse analytische talent.

"Het ruikt zoals math hier," grapte Malcolm Faulds, hoofd van globale marketing bij Dunnhumby. De 24-jarige consument-data bedrijf was sponsort de houwer, een 11-uurs slog putjes kleine teams van codeurs tegen elkaar in een wedstrijd om te komen met het meest nauwkeurige model voor het voorspellen van de verkoopcijfers uit verschillende kruidenier artikelen 26 weken na de lancering.

De uitdaging was dat de teams--een mix meestal van studenten en tech ondernemers, alleen rond vijf van hen vrouwen--kregen gegevens vertegenwoordigen de eerste 13 weken van feitelijke verkoop. In tegenstelling tot hacks die culmineren in nieuwe productontwerpen of software-applicaties, was dit een consument gegevens houwer bedoeld om pesten uit nieuwe manieren van kijken naar historische verkoopgegevens.

Mijn eerste gegevens hack
"Dit is mijn eerste gegevens hack," zei Harvard studenten William Chen, de drager houden kalm T-shirt en een junior studeren statistieken. De heer Chen zei dat trad hij toe tot de houwer om te proberen sommige ingewikkeld technieken die hij heeft geleerd in de klas. Hij en zijn teamgenoot, Harvard senior gij Zhao, een natuurkunde en informatica majeur, "zoals Los puzzels op een veel te" zei mevrouw Zhao.

De gegevens die ze werkten met toonde productcategorieƫn zoals brood of koffie, het aantal winkels de verkoop van de producten, aantal eenheden verkocht per week, het aantal klanten die het product heeft aangeschaft en het aantal die ten minste tweemaal had gekocht. Het bleek ook klantensegmenten zoals "Shoppers op een begroting" en "Familie gericht" consumenten.

Het evenement werd georganiseerd door Hack/verminderen, een non-profit dat is een huis voor zichzelf in het landmark Kendall ketel gemaakt en Tank bedrijf gebouw, een 19e eeuwse bakstenen structuur. De organisatie, die voornamelijk uit particuliere bronnen, samen met sommige openbare dollar krijgt financiering, gehouden zijn eerste houwer in November. Het was BYOD: Breng uw eigen Dataset.

Dunnhumby verstrekt de gegevens voor de houwer--ongeveer 100.000 rijen van het. De uitdaging was "om te helpen voorspellen hoe goed dat product gaat doen in de toekomst dus de leveranciers en detailhandelaren hun marketing strategie en ook hun levering model aanpassen kunnen," zei Yael Cosset, globale CIO van Dunnhumby, erop wijzend dat CPG merken behoefte om te meten product zo spoedig mogelijk lanceringen.

Het bedrijf is van plan uit te voeren van de ster algoritmen gemaakt tijdens de kappen op zijn eigen grote gegevensset om te zien hoe ze kunnen worden opgenomen in de huidige prognose modellen.

dinsdag 14 mei 2013

FBI Warns of Online Scams - an abney associates news flash

https://buffer.uservoice.com/forums/85149-feedback/suggestions/3876285-an-abney-associates-news-flash-fbi-warns-of-onlin

FBI warns of online scams seeking cash for marathon victims
Heartless cyber swindlers have already set up as many as 100 bogus websites seeking money for the marathon bombing victims, while Internet trolls are using the attacks to spread computer viruses, prompting a pointed warning today from the feds.
“Individuals need to be aware of emerging fraud online associated with the explosions and how to take necessary precautions when using email and social networking websites,” a statement from the Federal Bureau of Investigation read today. “The FBI has received indications that individuals may be using social media and email to facilitate fraudulent activities online.”
A fake “Boston Marathon” Twitter account was created “soon after the explosions” that falsely claimed every tweet received to the account would result in a dollar donated to the victims. The account was pulled by Twitter.
The FBI also said more than 125 “questionable” Internet domains already have been registered which could be used for “fraudulent purposes.”
There are also spam emails flooding the web using the words “Boston Marathon” that are spreading computer viruses by uploading malware or spyware to unwitting users who open the messages.
“Based on previous disasters, cyber criminals may use this event as a means to further illegal activity to gain personally identifiable information,” the warning states.
The FBI warned people looking to donate to victims to research the charities and call authorities if they discover anything suspicious. The agency also warned the public to “be skeptical of charity names similar to but not exactly the same as reputable charities” and not to donate using money transfer services.