lunes, 22 de julio de 2013

El valor de una red: Diferentes perspectivas y observaciones

Value of a Network: Different Perspectives and Observations

Many times, a new person joining a network (social or financial) has an impact on the members already part of the network. This kind of impacts contribute to the increase or decrease in the value of the network. These impacts in turn decides the growth or decay of the network. In this paper, we will look into some examples of such networks in current time. We will discuss many different perspectives of the network value and many laws proposed to quantify them. There have been many questions raised on the validity of these laws. hence, we will look into the issue of validity of these laws. At the end, we will discuss the different interpretation of these laws and try to put them in right perspective.
1. Introduction
When we buy some goods/service or get into a social community, we will implicitly become a part of a network. For example, buying a set-top-box(STB) connection make you a part of all the consumers having the same set-top-box connection. Even though the structure of the network and the properties of the elements (here people) is not clearly known, the group is assumed to be connected due to the common service/good or relation. The growth of such network many times depends on the value of the network when new members join them. We will look into some of the known networks and try to observe the special behavior of the networks as they grow.
Maruti Cars: Maruti is an Indian car manufacturing company. It was founded in 1981. At the time Hindustan Motors, Fiat (as Premier Automobiles Limited) like companies were present in Indian car market and selling cars. But, Maruti started becoming popular day by day. As more and more people bought Maruti cars, more and more service stations were started. These were not always started by Maruti, but sometimes were just authorized by them. As the number of Maruti cars increased, it created the opportunity to establish new service stations (due to more number of cars) and also made spares cheap due to mass production. As more number of service stations were available and spares became cheaper, people inclined towards buying more Maruti cars. Hence, whenever a person buys a Maruti car, he gets the value for the money he has as the car. But, he will also get a complementary benefit of cheap and highly accessible service. This benefit is shared between all the Maruti car owners. Hence,
Buying a Maruti Car = A Car Worth the Money Spent + Cheaper Spares + Accessible Service
The Cheaper Spares + Accessible Service part contributors to gain for all the Maruti car owners. According to the statistics of March-2011, Maruti holds 48.74% of the Indian car market share!
Migration of People to USA: America was discovered in 1492. Then it was a land of indigenous tribes. Hence, initially life was very difficult for the people coming and settling over there. As the number of adventurous and visionary people started coming to USA, the life started getting better. At some point of time, it started becoming an attraction for people looking for greater opportunities. So, people with skills to exploit the opportunities started moving to America. Due to the skilled people, there began a faster development and created more opportunities. Thus, as the number of skilled people entering USA increased, the value of the USA as a society increased. It can be given as,
New Skilled Person Entering USA = The Person Getting Opportunities Worth the Value Spent to Enter + More Opportunities + Better Lifestyle
The More Opportunities + Better Lifestyle will be the gain for all the Americans due to one person. We observe that one person entering USA increases the value of the society in USA.
Road Networks in City (More Vehicles on the Road): Assume there is a road network in a city which has no vehicles. When the first vehicle starts using it, it will have no problems like overtaking, honking, traffic jam, accidents, parking etc. But, as the number of vehicles using the same road network increases, the earlier drivers start feeling it more problematic. They will start facing all the problems mentioned above. Even the travel time increases. The cost of travel also increases due to slow driving. In other terms, whenever a new car joins the same road network, even though car owner gets the comfort of traveling a new car, he decreases the speed at which the traffic moves in the city (increases the the travel time). He also increases the cost of the travel due to the slow drive. We can represent it as,
New Vehicle Joining the City Traffic = Comfort Worth the Value of the Car to Owner +Slower Traffic + More Travel Cost
Slower Traffic + More Travel Cost is the reduction in the overall traffic system due to increase in the number of vehicles on the road.
From all the examples above, we can observe a very dominant behavior of the networks. When a new elements(person, car etc.,) is added to the network, the elements adds extra benefit or cost to all the other elements of the network. So, generically we can express this as,
New Element Joining the Network = Value Equal to Expenditure Made to Join Network + Some Benefit/Cost to all the Members of the Network
There are many such example around us which show this kind of behavior. The following are the
  • People forming villages.
  • People buying more Nokia phone in early 2000s.
  • People buying Hero Honda vehicles in mid 90s.
  • Internet.
  • Arrival of IT Companies in Bangalore.
  • Plantations.
  • Electricity Consumption.
  • Mobile Network Congestion.
In the examples seen, we have to observe that, when a new member enters a network, the network might get benefited in some aspects and might incur cost in some other aspects. So, whenever a new member joins the network, we have to look into all the aspects and take the aggregated value add to understand whether the network is getting benefited or incurring cost as a whole. If the aggregated value add is positive, network made benefitand when the aggregated value add is negative, network incurred cost.
If the network gets benefited , in aggregate, from the addition of new member, then there will be higher motivation for the people inside the network to welcome more people and also there will be higher motivation for new members to join. However, if there is absolute cost incurred by the network members and the new member when the new member joins the network, then there will be negative motivation for non members to joining the network.
2. Value of a Network
The aggregated value add is the way in which a network gets its overall value. When a new member enters the network, in case of existence of benefit, the value of the network increases and in case if the cost is incurred, the value of the network decreases. This growth of value of the network indicates a lot of future trends. Hence, many people have tried to quantify the value of the network in different aspects. The following are few interesting laws trying to quantify the value of the network.
a) Metcalfe’s Law
Robert Metcalfe is the co-inventor of Ethernet. He wanted to explain people why they should buy more and more Ethernet card. Hence, he proposed a law which asserted that the value of the Ethernet network is proportional to the square of the number of Ethernet cards connect in it. Hence, though the cost of adding new element to the network increases linearly, the value of the network due to the addition of new element increases quadratically.
The intuition for value of the network is derived from the possible number of connections in the network. If we consider a directed network with n nodes, then the maximum number of connection possible in that network is n(n-1) (if we do not consider the self loops). This is in the order of n2. Hence, it is looks intuitive that the value of the network increases quadratically. Figure 2 gives more insight about the claims of Metcalfe’s law (the image taken from wikipedia).
Example to explain the intuition behind the network value claims by Metcalfe’s law. The value of the network here is the "maximum number of connection possible". 
Example to explain the intuition behind the network value claims by Metcalfe’s law. The value of the network here is the “maximum number of connection possible”.
This makes network gain more value due to the addition new network element. This looks beneficial to grow the network because, for such a growth, there will always be an n, for which:
  1. The value of network becomes greater than cost, and
  2.   For any value greater than n, value of network increases faster than the cost incurred, and cost starts becoming negligible.
  3. The network starts increasing its value in almost quadratic terms.
The diagrammatic representation to show that the quadratic value will always cross the linear value for some value "n". Then the linear value starts becoming negligible. 
The diagrammatic representation to show that the quadratic value will always cross the linear value for some value “n”. Then the linear value starts becoming negligible.
The above figure shows this phenomenon in a graph. We can observe that once the number of elements in the network crosses  n, the value of the networks becomes positive (even if it is negative earlier due to the cost of adding new nodes). After this stage, as the network grows, the linearly growing overall cost starts becoming negligible compared to the quadratically growing value of the network.
The law was later formalized by George Gilder for all the networks in 1993. He claimed that this law is not only applicable to the device networks (like Ethernet), but is also applicable to networks with users in it (economic network, business network etc).
b) Reed’s 3rd Law
Metcalfe’s law became famous due to its intuitive quantification of the value of the network. In 2001, David P. Reed, an American computer scientist came up with a new law called Reed’s Law for quantifying the value of a network. He said that the Metcalfe’s law underestimates the value of the network. He claimed that the law is highly applicable for large scale networks like social networks (more on Reed’s law at:http://en.wikipedia.org/wiki/David_P._Reed , http://en.wikipedia.org/wiki/Reed’s_law ). The statement of Reed’s Law goes as follows:
As networks grow, value shifts: Content (whose value is proportional to size) yields to Transactions (whose value is proportional to the square of size), and eventually Affiliation (whose value is exponential in size)
In Reed’s law,
  • The meaning of the term content is the number of nodes.
  • The meaning of the term affiliation is the social and business relationship.
Reed’s law tells that when a network starts building, it will have value only because of its individual members, as there are not transactions between members and no affiliations too. But, later, the members of the network get into transactions. Because of the transactions, the value of the network becomes quadratic in nature(similar to Metcalfe’s Law). Due to the transactions, the members will come together and form different communities. The real value of the network becomes exponential due to formation of such of communities.
The intuitive proof of Reed’s Law goes like this. When members start transacting, in a nmember network, the maximum number of transaction each person can do is n-1. Hence, the total number of transactions in the network will be x (n-1), which is O(n2). Hence, Reed claims that the value of the network due to transactions is quadratic.
When the member start forming the communities, the maximum number of Group-Forming-Networks(GFC) people can form with other members is 2n – n – 1. A GFN is nothing but any community formed by the some members of the network. 2n is the cardinality of the power set of n members. We subtract n from with a naive assumption that there can not be single member communities. We subtract 1, as it represents the number of empty sets in the power set. 2n – n – 1 is in the order of O(2n). Hence, Reed claims that the value of the network due to the affiliations is exponential in nature.
c) Beckstrom’s Law
Beckstrom’s law was proposed by Rod Beckstrom in 2009. Beckstrom claims that this law can be used to evaluate any kind of network including electronic networks, social networks, supports networks and Internet. The laws states that:
The value of a network equals the net value added to each user’s transactions conducted through that network, summed over all users.
The Beckstrom’s law takes completely different look at the value getting added to the network. Instead of looking into structure and number of nodes as the input for calculating the value of the network, Beckstrom’s law looks at each transaction happening in the network (represented as an edge) as the input for calculating the value of the network. The law looks at the factor of “how valuable is the network for each user“. This is calculated by aggregating all the benefits a member gets due to the presence of the member in the network. This factor in aggregation over all the members is used to calculate the value of the complete network.
It is not that each transaction in the network adds value to the member. It is possible that due to presence of the network, the member might incur more cost. This cost is also taken care when the value of the transactions is calculated. Hence, if the member is incurring cost due to the presence of the network, the value of the network might reduce. This is a new way of looking at the value of network, which was not done by both Metcalfe’s law and Reed’s law.
To understand how value is derived from the network, let us look at an example. Assume that you wanted to buy an laptop. You visit the stores near by and understand that the minimum prize it is available for is Rs. 30000 and you decide to buy. Now, while browsing, you come across the same model of the laptop for Rs. 28000 on Flipkart. You also get to know that, they provide additional 3-years warranty free complimentary (which is worth Rs. 2000). Now, we know that by buy on-line, we will save Rs. 4000 in total. This is the value generated by us by the transaction. Similarly, the Flipkart will also gain in the transaction, say Rs.1000. Similarly, there might be many nodes in the network which will get value add. The value of the network will be the aggregate (sum) of all the gains.
Beckstrom’s law takes care of the temporal aspect of the network value. When a transaction adds value to the network, its value will not remain the same over time. As the time progresses, its values starts decaying. Hence, after some time, if there no transaction in the network then the network starts losing the value as time passes.
3. Review and Interpretation of Laws
Questioning the Validity of Metcalfe’s Law (Metcalfe’s Law is Wrong): There has been many criticism on the Metcalfe’s and Reed’s Laws. The first argument focuses on the the number of connections handled by each node in the network. The argument says that the Metcalfe’s and Reed’s Law can not be applied to quantify the value of networks involving people as the members. People have limit to the number of stable connections they can manage. Once the number of connections get saturated, the person can not get involved in any more connections. So, growth rate is not always quadratic and is restricted by the saturation of connection handling capability of people.
The other kind of argument talks about the nature of connection distribution in network. The claim is “the value of the network with  n member is of the order of n log(n)”. The basis for the claim lies in the assumption that the distribution of connections follows the Zipf’s law. Hence, the connection distribution for each member for all other members looks like 1, 11, … , 1n-1. It mean that if there is observation on the connection time of a member with other members, and if the maximum connection time is normalized to 1, then other connection times will look like 1, 1213, … , 1n-1So the value of the network contributed by one member is 1 + 12 + 1+ … + 1n-1.For infinitely big network this series converges to log(n). As there are n such member, the value of the network is n log(n).
Interpretations and Analysis of the Laws: As we saw these laws, and their criticisms, it was getting more and more evident that we are misunderstanding the laws in some conditions. We have intuitively understood that even though all these laws talk about the {value of the network}, the value is measured in different contexts for each of the laws. Hence, in this section, we will try to understand different context where these laws will be used and their different interpretations.
Interpretations of Metcalfe’s Law: Metcalfe’s law is used in the context, where we need to understand the value of the network in terms of number of connection. Here are some the observations.
  1. Metcalfe’s Law values the network in terms of the number of possible connections in the network. The number of possible connection is also an indication of number of possible transactions. Note that it is the upper bound of the network value. Hence, we should not misunderstand the the value of the network will always be at its maximum.
  2. Metcalfe’s Law is highly applicable to small network like LAN, where almost every machine is connected to every other machine. In such small networks, it may be possible that the maximum value is reached by such network.
  3. The law has the limitation when we try to apply this on network with people as the members. This is due to the saturation of the number of connections an individual member can handle. The law ignores the fact of probability of the connection between different members and hence ends up misleading for larger networks.
Interpretations of Reed’s Law: Reed’s law used in the context of understanding society value in the network. We interpret Reed’s law as below.
  1. Reed’s law talks about the value of the network being proportional to the exponent (2n) of the number of member. This means that, the value of the network found using the Reed’s law is the value in terms of the number of different groups that can be formed in the network.
  2.  The value of the network formed puts an upper bound on the actual value of the network. Even if the the value of the network may not be equal to the value proposed by Reed’s law, it can never cross it. Hence, Reed’s law defines the boundaries of the value of the network in its own context.
  3. The Reed’s law is applicable in the small networks which show the tendency of heterogeneous group formations. For example, in the a small apartment society, there will be different groups like sports club, music club, drama club, trekkers etc.,. There, the value of the network might be very near to the value proposed by Reed’s law. But, when the network size increases, then value of the network will not grow exponentially. The law ignores the fact of probability of the connection between different members and hence ends up missing this point.
Interpretations of Beckstrom’s Law: Beckstrom’s Law talks about the value of a network due to the transactions in the network.
  1.  The law rightly identifies the transactions between the members as the potential contributors to the network value.
  2. The law has a provision for network value to decay due to the increased cost in transactions. This makes sure that many other factors causing negative effect on the value of the networks are also considered.
  3.   The decay of the generated value over time tells that value of the network is temporal in nature. This is a new way of looking at the value of a network. Due to the temporal nature, the value of network starts decreasing when the number of transactions in the network stop. There will be threshold value of transaction value. If this transactions do not generate this threshold value, then the value of the network starts decreasing.
  4. This can not capture the value added only by the presence of a member in the network. For example, presence of a film start in a commercial good network might bring many other fans to the network. These fans may in turn add value to the network. But, the law does not work in that context.
We have to understand the contexts of the applicability of the laws to understand them better. Like Moor’s law, these laws are not immutable laws as well. They are laws which indicate tendencies but are not strict in nature.
4. Conclusion
It has been observed that many networks increase or decrease in their value due to the addition of new members. This phenomena can in turn be the reason for the growth or decay of a network. Due to this kind of importance, there have been many attempts to quantify the value of a network by many people. Metcalfe, Reed and Beckstrom came up with own laws to quantify the value of a network. They looked into different aspects of the networks and tried to quantify the value of the networks in those contexts. But, it has always been misunderstood that all of them proposed the value of for a network in the same context. Metcalfe and Reed have ignored some important factors like saturation of limit of connections for individual human beings while proposing the laws. These has become a reason for lot of controversies and criticisms. But, when we keep the contexts in the view, then these laws give us lot of important properties.
REFERENCES
  1. Hendlera, J and Golbeck, J. Metcalfe’s Law, Web 2.0, and the Semantic Web. Web Semantics: Science, Services and Agents on the World Wide Web.
  2. Reed, D.P. The Law of the Pack. Harvard Business Review. 2001
  3. Odlyzko, A. and Tilly, B. A refutation of Metcalfe’s Law and a better estimate for the value of networks and network interconnections. Manuscript, March. 2005
  4. Briscoe, B. Odlyzko, A. and Tilly, Metcalfe’s Law is Wrong. IEEE Spectrum. July 2006
  5. Beckstrom, R. A New Model for Network Valuation. 2009

domingo, 21 de julio de 2013

Dentro de Google y sus planes para nuestro futuro tecnológico

Inside Google HQ: What does the future hold for the company whose visionary plans include implanting a chip in our brains?

Ian Burrell's visit to the legendary "Googleplex" at Mountain View comes at an awkward time for the company



The power of computing, and the thrill of its apparently infinite possibilities, has also long been a source of fear.

Going into a San Francisco second-hand book shop, shortly before a visit to Google's headquarters in California, I happened upon a copy of Dick Tracy, an old novel based on Chester Gould's cartoon strip starring America's favourite detective.
For a 1970 publication, the plot seemed remarkably topical. Dick, and his sidekick Sam Catchem, find themselves battling a sinister character known as "Mr Computer" who wants to control the world. His strange powers enable him to remember everything he hears or sees and recall it instantly. This is a bad guy who can store data, analyse voice patterns and read private thoughts.
My visit to the legendary "Googleplex" at Mountain View comes at an awkward time for the company. Edward Snowden's revelations about the snooping of the US Government's National Security Agency (NSA) in its clandestine electronic-surveillance programme PRISM have provoked a crisis of trust in Silicon Valley. Larry Page, Google co-founder and CEO, rushed out a blog to deny claims in leaked NSA documents that it – in parallel with other American internet giants – had been co-operating with the spying programme since 2009. "Any suggestion that Google is disclosing information about our users' internet activity on such a scale is completely false," he said.
Trust is everything to Google. It stands on the verge of a technological breakthrough that can transform its relationship with us. Already, it is universally recognised as the world leader in searching for information. It handles around 90 per cent of internet searches in the UK: when we want to know something, most of us turn to Google. But it wants more – it wants to become our constant companion.
The rapid evolution of mobile technology has brought new opportunities to a business generating annual revenue in excess of $50bn (£33.7bn). It began, just 15 years ago, as a service that enabled you to type a request into a personal computer and be given links to associated websites. Things have rather moved on. Soon Google hopes to have the ubiquitous presence of a personal assistant that never stops working, capable of conversing naturally in any language. Ultimately, as Page and co-founder Sergey Brin have asserted, the goal is to insert a chip inside your head for the most effortless search engine imaginable. Some will find this prospect exciting. Others might want to call for Dick Tracy.
The first stage of this new level of intimacy is Google Glass, which I am invited to trial as part of a briefing on the company's future plans.
My first impression is that this revolutionary contraption is remarkably unobtrusive. It looks like a pair of glasses and, at 36 grams, weighs about the same as a typical pair of sunglasses due to its largely titanium frame. Despite the chunkiness of the right temple – made from plastic and where all the technology is stored – there is no sense of imbalance.
The awkwardness only starts when you start to interact. You turn the contraption on by tapping your finger on the right side of the frame, or surreptitiously throwing your head back. On a screen projected a few inches in front of your right eyeball is a digital clock and the magic words "OK glass", the uttering of which takes you to a range of task options: ask a question, take a picture, record a video, get directions to, send a message to, make a call to, make a video call to.
The idea of Google Glass is that you can walk down busy streets receiving helpful facts – without needing to take your mobile phone from your pocket. It could end the urban hazard of pedestrians staring at their mobiles instead of looking where they're going.
At the moment it's a work in progress, which is why the prototype is called the Explorer and the 10,000 American-based pioneers who are trialling the apparatus – mostly web developers and heavy social-media users – are dubbed "explorers".
Does it work? Yes and no. Answering questions is its central feature. It likes straightforward instruction such as "OK Glass... Google – what is the height of David Cameron?", returning within four seconds with an image of the Prime Minister and a computer voice telling me "David Cameron is six feet zero inches tall". But when I ask for the name of the wife of his predecessor, Gordon Brown, I'm offered details of "Golden Brown", a hit for The Stranglers in 1982.
The camera and video option is novel and discreet, except when you bark out the words: "OK Glass, take a picture!" Three seconds after giving the order, you have a shot (or film) which you can share with friends on the Google+ social network. One Explorer recently used Google Glass to snap a police arrest as it was taking place. The potential is enormous: a proud mum could film her son taking a penalty kick in a football match while dad, abroad but connected through the Google Hangout service, could watch the action live through his wife's Google Glass. The more you hand your life over to Google, the more you get out of this technology.
Google Glass is part of a wider ecosystem and is not currently intended as an alternative to a mobile phone but as a complement to it. Glass needs the mobile in your pocket to locate your position and connect to your contacts via 4G and Bluetooth. Rather than encouraging users to be constantly gibbering in public, the default position for this device is "off", I am told. The screen has been positioned above the eye line and at two o'clock on a clock face to ensure that the people f you are with know from your squint when you are consulting Glass.
But none of these caveats can conceal the scale of Google's ambition. It is staking its future on a vast store of information called the Knowledge Graph, which is growing at an exponential rate. When it launched in May 2012, Knowledge Graph was a pool of 3.5 billion facts on 500 million of the world's most searched subjects. In a little over a year the knowledge held on the Google servers has grown to 18 billion facts on around 570 million subjects.
This Knowledge Graph is the base for Google Now, the latest incarnation of Google which is personalising the search engine by giving you a series of bespoke "cards" as you log on. They tell you the local weather, the traffic you might face on the way to work, details of your meetings and restaurant bookings taken from your Google email account, your team's latest result and so on.
In Building 43 of the Googleplex, Ben Gomes talks with barely concealed excitement about a "new epoch". A Google fellow and the company's Vice President of Search he has been working on these technologies for 14 years. "[Knowledge Graph] is everything you have at some point asked a query about – plus everything that everyone else has thought of!" he exclaims. "It's a meld of all the world's interests and information needs."

The future, he says, is for this enormous resource to be "present everywhere". It's a long step from the British Council library in Bangalore, where Gomes used to go to obtain his reading matter. "You borrowed a book – if it was available – and then you read it and got the next book. I got two books and that was all the information that I had for a week," he says. "Today it would be unthinkable for that [information] not to be available in seconds."
Google's options have grown with recent advances in speech-recognition technology (it can now decipher 35 languages) and in natural-language processing, the "holy grail" that means the computer can understand what is being spoken (for example, knowing that "tall" refers to height) and hold a conversation. The "OK Google…" voice-prompted search tool (already installed on mobile apps) is to become standard on the Google Chrome engine.
Scott Huffman, Google's engineering director, says the company's intention is to "transform the ways people interact with Google". That means having conversations similar to those you would have with humans. No longer will we have to go to "settings" to recalibrate our devices – we will simply order them to make the desired changes. And those devices will not be in our pockets – but all around us in every room.
"If you look back 10 years there was a computer on my desk and today there's a computer in my pocket and it still has a screen and a keyboard," says Huffman.
"But fast forward a bit and… I think there is going to be a device in the ceiling with microphones, and it will be in my glasses or my wristwatch or my shirt. And like the Google Glass it won't have a keyboard… you just say 'OK Google, blah-blah-blah' and you get what you want."
Where will it end? Gomes agrees that a chip embedded in the brain is far from a sci-fi fantasy. "Already people are beginning to experiment with handicapped people for manoeuvring their wheelchairs," he says. "They are getting a few senses of direction with the wheelchair but getting from there to actual words is a long ways off. We have to do this in the brain a lot better to make that interaction possible. We have impatience for that to happen but the pieces of technology have to develop."
Any visitor to the Googleplex will testify that this is not a regular company. By lunch time, Googlers are out on the sand of the beach volleyball court. A statue of a dinosaur skeleton – a pointed juxtaposition of past and future – has been decorated with model pink flamingos, hanging from its bones. Around the central patio there are awnings in Google-style primary colours which add to the impression of a holiday resort.
It is anything of the sort, of course. In one of the site's 30 cafés, the piped sound of Australian group Men at Work accompanies Google staff as they help themselves to free meals. Yoshka's Café is named after the first dog to have a Google pass – staff are allowed to bring canines to work, to add a feeling of domesticity (and presumably to get them to stay later). Small plates are offered to encourage smaller portions and less waste. Fruit and water are placed at eye level but you have to bend down for sugary drinks. All of this is data driven. Ingredients in meals are marked on displays with traffic-light colours to convey healthy credentials. Coconut scores a green but vanilla, for some reason, is marked a dangerous red.
There are seven gyms in the Googleplex and I see a man walking on a gym treadmill while simultaneously working from a specially made desk with a large computer screen. He has headphones on and his laptop is also open, showing a screensaver of his baby. Nearby there is a Japanese meditation space – "Experience the joy and mindfulness of just eating, try monotasking for lunch today" – and a Nap Pod capsule where you can have a power sleep (30-minute limit "out of fairness to fellow Googlers").
Building 43 is decorated with a giant model of Virgin Galactic's Space Ship One, donated by Sir Richard Branson, and Building 2000 has a long, silver, swirling slide that allows you to bypass the stairs.
It's no wonder people want to work here. About 10,000 do. But the company gets two million applications a year, a demand reflected in the new Hollywood movie The Internship, which was partly filmed at the Googleplex.

In the Dick Tracy novel, Mr Computer (his initials were I.B.M.) came a cropper when the detective's deliberately eccentric behaviour caused his adversary's brain to malfunction. But what would we do without Google? Since my visit I've found myself engaging more and more with its services.
Back in London I get to have another go with Glass. This time the headset (the only one in the UK) is orange. There are six colours and Google is also working on a sunglasses design. I'm starting to get the hang of it, of swiping the frame from ear to eye to move through your timeline of previous searches, photo snaps and actions. I learn to say "Welcome to London" in Japanese. It's great fun.
But to get the best results, I'm told to speak up and in an American accent. Google seems to respond best when I'm hollering like John Wayne in 7th Cavalry uniform. Imagine that in your local restaurant. "OK Glass Google!" I yell self-consciously in broad Texan. "Will I need an umbrella tomorrow?"
Google Glass and I are now in full conversation. "Yes," she tells me. "The forecast for tomorrow in London is 24 degrees with a 50 per cent chance of rain."
As it turns out, tomorrow is a glorious day and I don't need a brolly at all, although those Google Glass shades would have been handy. This is a product that will continue to be honed. And there's something strangely reassuring in the fact that, for all its Knowledge Graphs and interactive spectacles, even the world's greatest search machine still can't predict the British weather.

Windows: A todo monopolio le llega su cambio tecnológico




In Case You Don't Appreciate How Fast The 'Windows Monopoly' Is Getting Destroyed...


Business Insider


Bill Gates' infamous video-taped
testimony in the Microsoft anti-trust trial.

In the late 1990s, a single technology company became so unfathomably rich and powerful--and so hellbent on dominating not just its own industry but a massive and rapidly growing new one--that the U.S. government dragged the company into court and threatened to break it up over anti-trust violations.
The case was settled, and the company, Microsoft, agreed to play nicer.
But it turned out that the world had nothing to worry about. As often happens in the technology industry, what has really destroyed Microsoft's choke hold on the global personal computing market over the past 15 years hasn't been a legal threat but a market shift.
Just when it looked like Microsoft's vision of the PC as the center of the tech world would lead to the creation of the world's first trillion-dollar company, the Internet came along.
And it washed over the PC industry like a tidal wave swallowing a pond.
In terms of market value, Microsoft's loss of power has long been visible: The stock is still trading at about half the level it hit at the peak of the tech boom 13 years ago. The effects on the actual PC industry fundamentals have taken longer to develop, but they are also now crystal clear.
Microsoft's "Windows monopoly" hasn't been so much destroyed as rendered irrelevant. Thanks to the explosion of Internet-based cloud computing and smartphones, tablets, and other mobile gadgets, the once all-powerful platform of the desktop operating system has now been reduced to little more than a device driver. As long as your gadget can connect to the Internet and run some apps, it doesn't matter what operating system you use.
Three charts really bring home the challenges that Microsoft and other PC-powered giants like Intel, Dell, and Hewlett-Packard face in adapting to this new Internet-driven world.
First, look at global device shipments. For the two decades through 2005, the personal computer was the only game in town, selling about 200 million units a year. But then smartphones and tablets came along. And now they dwarf the PC market.

BII

This shift in personal computing device adoption, meanwhile, has radically diminished the power of the Windows operating system platform. As recently as three years ago, Microsoft's Windows was still totally dominant--the platform that ran 70% of personal computing devices.
Now, thanks to the rise of Google's Android and Apple's iOS, Windows' global share has been cut in half, to about 30%. More remarkably, Android is now a bigger platform than Windows.

BII

Lastly, and most recently, this chart from analyst Horace Dediu of Asymco illustrates that the PC business is no longer just getting dwarfed by the explosion of smartphone and tablet sales... It has now actually begun to shrink.
Now that people have a choice of devices, it turns out that a full-blown personal computer is often not the most cost-effective, convenient, or simplest way to do what a user wants to do. Instead of being the center of the personal computing world, in other words, the PC is becoming a specialized office-productivity device.

The news for Microsoft is not all bad. The company has been quite successful at moving from a "unit-driven" sales model to a licensing model, in which companies pay a fee per user per year rather than buying a perpetual license with each new computer. And Microsoft's Office franchise is still extraordinarily profitable and dominant, in part because Google, Apple, and other more Internet-centric companies have made so little investment in their competitive products.
But only 15 years after the government went after Microsoft for anti-trust violations, the idea that the company ever had a "monopoly" on anything is hard to to even understand. And the outlook for Windows, and the traditional PC business in general, seems sure to get even worse going forward.

sábado, 20 de julio de 2013

Que sabe la NSA acerca de vos

What the N.S.A. Knows About You


Looking for an intuitive way to understand the kind of data the N.S.A. has been collecting on all of us? A team at MIT has developed a helpful graphic for GMail users.Immersion is a program that reads only the meta data from your email – precisely what the N.S.A. is collecting from telephone and internet records – and creates a visual web of interconnectedness between you and the people in your inbox.
Visualization of email network
This is a visualization of my email network as created by MIT's Immersion project. I have removed names out of respect for my friends and colleagues (who would want to be associated with me, anyhow?!) but I have indicated the major relationships to make a point. Over the six years I have been on GMail, the majority of my interactions have been with coworkers and my spouse. But other satellite relationships are evident as well, and it's not hard to imagine what information I could glean if I had access to all of my connections' networks as well.
What’s the big deal about collecting this information? If you’re of the mind to giveImmersion a try, you can get a sense of the kind of information it can reveal, particularly over time. According to The New Yorker‘s Jane Mayer, you don’t need to know the content of conversations to get the gist of what’s going on. Mayer’s post points out that you might make an appointment with a gynecologist, then an oncologist, and then you may make a series of calls to close family members and friends. What’s going on? It’s not hard to deduce that you’ve received a diagnosis of cancer. Likewise, journalists who count on anonymity to protect their sensitive sources can be outed easily with meta data. And lest you think you are carrying on an extramarital fling unnoticed, meta data can reveal that, too.
This type of intrusion is easy to minimize because meta data is not meaningful or even familiar to most people. Intuitively, we are more concerned with revealing the contentof our conversations. Yet if we are to fully understand the significance of this type of data mining, we must present the data in ways that hit home. Immersion is one such way. Check it out.
Kalliopi MonoyiosAbout the Author: Kalliopi Monoyios is the illustrator of several best-selling science books including Neil Shubin's The Universe Within, Shubin’s Your Inner Fish, and Jerry Coyne’s Why Evolution is True. Her illustration portfolio can be found at kalliopimonoyios.com. Follow her solo on Twitter at @eyeforscience. For tweets from the whole Symbiartic crew, Follow on Twitter @symbiartic.

viernes, 19 de julio de 2013

La National Security Agency americana introdujo Back Doors en todos los Windows desde 1999

NSA Built Back Door In All Windows Software by 1999



Washington Blog

Government Built Spy-Access Into Most Popular Consumer Program Before 9/11

In researching the stunning pervasiveness of spying by the government (it’s much more wide spreadthan you’ve heard even now), we ran across the fact that the FBI wants software programmers to install a backdoor in all software.
Digging a little further, we found a 1999 article by leading European computer publication Heise which noted that the NSA had already built a backdoor into all Windows software:
A careless mistake by Microsoft programmers has revealed that special access codes prepared by the US National Security Agency have been secretly built into Windows.The NSA access system is built into every version of the Windows operating system now in use, except early releases of Windows 95 (and its predecessors). The discovery comes close on the heels of the revelations earlier this year that another US software giant, Lotus, had built an NSA “help information” trapdoor into its Notes system, and that security functions on other software systems had been deliberately crippled.
The first discovery of the new NSA access system was made two years ago by British researcher Dr Nicko van Someren [an expert in computer security]. But it was only a few weeks ago when a second researcher rediscovered the access system. With it, he found the evidence linking it to NSA.
***
Two weeks ago, a US security company came up with conclusive evidence that the second key belongs to NSA. Like Dr van Someren, Andrew Fernandez, chief scientist with Cryptonym of Morrisville, North Carolina, had been probing the presence and significance of the two keys. Then he checked the latest Service Pack release for Windows NT4, Service Pack 5. He found that Microsoft’s developers had failed to remove or “strip” the debugging symbols used to test this software before they released it. Inside the code were the labels for the two keys. One was called “KEY”. The other was called “NSAKEY”.
Fernandes reported his re-discovery of the two CAPI keys, and their secret meaning, to “Advances in Cryptology, Crypto’99″ conference held in Santa Barbara. According to those present at the conference, Windows developers attending the conference did not deny that the “NSA” key was built into their software. But they refused to talk about what the key did, or why it had been put there without users’ knowledge.
A third key?!
But according to two witnesses attending the conference, even Microsoft’s top crypto programmers were astonished to learn that the version of ADVAPI.DLL shipping with Windows 2000 contains not two, but three keys. Brian LaMachia, head of CAPI development at Microsoft was “stunned” to learn of these discoveries, by outsiders. The latest discovery by Dr van Someren is based on advanced search methods which test and report on the “entropy” of programming code.
Within the Microsoft organisation, access to Windows source code is said to be highly compartmentalized, making it easy for modifications to be inserted without the knowledge of even the respective product managers.
Researchers are divided about whether the NSA key could be intended to let US government users of Windows run classified cryptosystems on their machines or whether it is intended to open up anyone’s and everyone’s Windows computer to intelligence gathering techniques deployed by NSA’s burgeoning corps of “information warriors”.
According to Fernandez of Cryptonym, the result of having the secret key inside your Windows operating system “is that it is tremendously easier for the NSA to load unauthorized security services on all copies of Microsoft Windows, and once these security services are loaded, they can effectively compromise your entire operating system“. The NSA key is contained inside all versions of Windows from Windows 95 OSR2 onwards.
***
“How is an IT manager to feel when they learn that in every copy of Windows sold, Microsoft has a ‘back door’ for NSA – making it orders of magnitude easier for the US government to access your computer?” he asked.




jueves, 18 de julio de 2013

Por que el mercadeo de celulares locales explota

Why Local-Mobile Marketing Is Exploding



Location-based mobile marketing promises the sky: high conversion rates, surgical targeting, and rich consumer profiles.
But does it deliver? According to many accounts, it does.
Not surprisingly, retailers, brands, and agencies are scrambling to hone their location-based approaches. These encompass everything from "geo-aware" and "geo-fenced" ad campaigns, to hyper-local efforts keyed to Wi-Fi hotspots, and algorithmic location-based targeting of audience segments like soccer moms, bargain hunters, coffee enthusiasts, etc.
In a new report from BI Intelligence on location-mobile marketing, we take a look at key stats on the location-based services marketplace that indicate it's supremacy in mobile marketing, explain how the most important techniques (such as geo-aware, geo-fenced, audience-based local-mobile campaigns) work, examine the cornerstones - such as data and audience building - to a successful location-based mobile strategy, look at who has the valuable location-based data, and analyze the six most effective local-mobile marketing tactics. 
Here's an overview of the location-mobile marketing explosion:

Twitter Delicious Facebook Digg Stumbleupon Favorites More

 
Design by Free WordPress Themes | Bloggerized by Lasantha - Premium Blogger Themes | Best Hostgator Coupon Code