How prepared are African businesses to tap AI benefits?

The world is becoming a consumers’ market where future trends are now determined by an impatient customer with a smart phone. The modern shopper wants the best for less right now. They also demand that brands speak to and about their unique individuality. These conversations are taking place online in real time, feeding research, design and development teams with enough data to make accurate predictions of what will sell in the future. How this information is collected and collated is being made possible by technology. What does Artificial Intelligence mean…

Read More

Facebook handed over 150 companies intrusive access to your data

Facebook gave over 150 companies almost unfetted intrusive access to users’ data than previously admitted, exempting them from its usual privacy rules, according to the New York Times. It has emerged that companies like Amazon, Apple, Microsoft, Netflix, Spotify, and Yandex had special arrangements to retain access to users’ data (and data on their friends), despite platform changes in 2014 that restricted the practice. For example: — Netflix and Spotify were able to read users’ private messages — Microsoft had access to the names of virtually all users’ friends, without consent…

Read More

Google reportedly paid millions of dollars in secret data deal with Mastercard to track retail sales

Facebook

For the past year, select Google advertisers have had access to a potent new tool to track whether the ads they ran online led to a sale at a physical store in the U.S. That insight came thanks in part to a stockpile of Mastercard transactions that Google paid for. The revelation comes amid heightened concern about how much consumer data is consumed by tech companies like Google. Earlier this year, Facebook was criticized when data on as many as 87 million people was improperly shared with Cambridge Analytica, raising…

Read More

Facebook reportedly gave Apple, Samsung unfettered access to user data potentially violating a 2011 FTC consent degree

Facebook gave Apple, Samsung, BlackBerry and other device makers detailed access to user data and may have potentially violated a 2011 FTC consent degree according to the New York Times. The social network struck partnerships with at least 60 device makers so that they could offer messaging, “Like” buttons and other features without the need for an app. However, an NYT reporter found that the BlackBerry Hub, for one, was able to glean private data from 556 of his friends, including their religious and political leanings and events they planned…

Read More

UN CSTD: Next generation tech-preneurship will be led by Teenpreneurs, Bekele

Start-ups need to stridently move from talking the blue-print to tangibles in the tech space and that next generation tech-preneurship will be led by #Teenpreneurs, who have it in their DNA . The 21st Commission on Science and Technology for Development  UNCSTD was held at the United Nations HQ, Palais des Nations, Geneva, from Monday, 14 May to Friday, 18 May 2018. Among the distinguished speakers sat in a high level panel included Sophia Bekele Founder & CEO of DotConnectAfrica who discussed the impact of rapid technological change on the…

Read More

LinkedIn loses legal right to block startup from public profile data

A Judge on Monday ruled that an analytics company has the right to scrape data from LinkedIn . HiQ, the data gatherer, has been processing publicly available data from LinkedIn and using it to train AI models, until May when LinkedIn demanded it stop.  U.S. District Judge Edward Chen in San Francisco granted a preliminary injunction request brought by hiQ Labs, and ordered LinkedIn to remove within 24 hours any technology preventing hiQ from accessing public profiles in a test of how much control a social media site can wield…

Read More

Are Data Brokers Actually Secure?

Are you an internet privacy fanatic? Do you block browser tracking cookies? Do you use Duck Duck Go for anonymous web searches? It doesn’t matter now. Your internet service provider (ISP) or your browser extensions can collect and sell your web-browsing history even if you take the above precautions. And anyone who obtains that data, whether the data is anonymized or not, will likely be able to figure out your real name and see exactly what you do online. Back in March the well-publicised repeal of Obama’s broadband privacy regulations…

Read More

WikiLeaks announces tech firm cooperation

wikileaks

The anti-secrecy platform WikiLeaks has said it would work with tech firms to fix security flaws before publishing them. Customers’ trust in firms like Google and Apple has already been eroded by the Snowden leaks. Google, Apple, Microsoft, Samsung and other major tech companies have been faced with new dilemmas by the latest WikiLeaks release. The “Vault 7” dump of CIA files has exposed a number of security breaches in their software, which US intelligence has exploited and kept secret so that it can continue to hack into smartphones, computers,…

Read More

Use of Ad-Blocking Software Rises by 30% Worldwide

ad blocker

People are increasingly using the technology on their mobile devices and computers to block intrusive advertisements while surfing the web. Facebook has tried to ban it. Google has attempted to outsmart it. But no matter what these tech giants do, people’s use of software to block digital advertising — often the lifeblood of companies’ online business models — keeps gaining traction worldwide. According to New York Times, roughly 11 percent of internet users globally relied on ad blockers to avoid some form of digital advertising last year when surfing the…

Read More

Big data can drive the future of cyber security

Data

Data science experts and big data enthusiasts are excited and prepared for a future that’s becoming increasingly connected to the web. Some techniques used to harness this raw information, such as data mining, help give us an insight into the future of cybersecurity and what areas may pique interest moving forward. A major benefit that big data provides in the realm of cybersecurity is the ability to monitor and track systems, usually contained within the cloud, for irregularities and potential breaches. Cloud Security Information and Event Management (CSIEM) allows users…

Read More