๐Ÿฆ… [ perspective ix ]
1.87K subscribers
1.04K photos
253 videos
16 files
480 links
The Best of New Media, Tech & Business.
It's not for everyone. It's for you.


๐Ÿ’Œ โ”‚ Pulse โ€” Our Sunday Newsletter: prs.pctvix.co/3bXXJlI
โ˜•๏ธ โ”‚ Support: prs.pctvix.co/2tfjXbH
๐Ÿ“ โ”‚ Manchester, UK
๐Ÿ—ž โ”‚ @iXNews
๐ŸŽ™ โ”‚ @iXRadio
๐Ÿ“ฐ โ”‚ @iXDaily
๐Ÿ‘จโ€๐Ÿ’ป โ”‚ Admin: @iXContactBot
Download Telegram
๐ŸฅŠ Winning the info-war

Yesterday, Facebook caused a stir by defending the fact that it hasnโ€™t banned InfoWars from its platform.

People were rightfully annoyed by this. Infowars is a site that blatantly lies to its audience for financial and political gain. It said the Sandy Hook massacre was a hoax, it said Democrats in the US were planning to start a new civil war on Independence Day this yearโ€ฆ itโ€™s the very definition of fake news.

Facebook is right that some of what Infowars does is opinion and analysis based fundamentally in truth, but given its propensity for conspiracy theories, itโ€™s indisputably a repeated and regular โ€˜fake newsโ€™ offender.

Actions speak louder than all the contrite TV and billboard ads in the world. If Facebook is genuine about wanting to fight fake news, it needs to bite the bullet and tell sites like Infowars it doesnโ€™t want their advertising dollars.

Read more in today's Big Revolution: prs.pctvix.co/2uwwI1d

Martin Bryant,
๐Ÿš€ @PerspectiveIX
๐Ÿ“ฐ #iXDailyBrief

STAT
โšก๏ธ PC sales are growing for the first time in six years. The PC market grew in the second quarter of 2018, with an increase of 2.7-1.4 percent. (Source: Gartner, IDC)


INSIGHT
๐Ÿค– Robot cognition requires machines that both think and feel: prs.pctvix.co/2Ne5Fzo


OTHER NEWS
๐Ÿ‘จโ€๐Ÿ‘ฉโ€๐Ÿ‘ฆโ€๐Ÿ‘ฆ #Pinterest's new group boards are the most social feature on the platform: prs.pctvix.co/2N9ZQDm

๐Ÿ’ป Appleโ€™s new MacBook Pros have the latest Intel processors and quieter keyboards: prs.pctvix.co/2NcifiB

โŒ Chrome now uses more RAM because of Spectre security fixes: t.me/iXNews/29228

๐Ÿ”ฆ #Twitter is testing Promoted Trend Spotlight ads: prs.pctvix.co/2NeI2af

#๏ธโƒฃ #Twitter released a hashtag-triggered emoji for the 2018 MLB all-star game: prs.pctvix.co/2Nfrvmn

โ€”

Have a great weekend!
Ben, @iXNews
โ€‹โ€‹๐Ÿ•ฐ Marketing Short-termism

Marketing for the long-term and the short-term is a constant balancing act. Pressure to show immediate results can lead marketers to focus on quick-hit sales conversation tactics, which can look good temporarily in marketing dashboards, but are far less effective in the long-run.

๐Ÿš€ @PerspectiveIX
๐Ÿ“– via Marketoonist: prs.pctvix.co/2L897hz
โ€‹โ€‹๐Ÿš€ Does Elon Musk need an intervention, or just a break?

As you may have seen, yesterday Elon Musk made a baseless allegation against a member of the team of divers that saved those Thai boys and their football coach. The storm of criticism that followed (eventually) led to Musk deleting his tweets.

It has gone beyond saying Musk is reckless and unprofessional; now itโ€™s like the man needs an intervention to stop him tweeting. His fans will say Iโ€™m being unkind, that he just cares so much about changing the world that heโ€™ll destroy anyone who gets in his way. His fans will ask why that is a bad thing. After all, the rest of us arenโ€™t changing the world like Musk is, right?

But being a genius doesnโ€™t give you a pass when you act like an idiot.

By recklessly throwing baseless accusations around, Musk establishing a pattern of outbursts that may worry investors in Tesla and SpaceX about his judgment.

Given these regrettable Twitter outbursts and other episodes are a relatively new phenomenon, maybe theyโ€™re a sign that the stress of simultaneously running a bunch of big-vision, high-stakes companies, with lots of expectations to live up to, is getting to Musk.

Maybe he needs to get some support from the people close to him. Maybe he needs to bring in a communications chief who heโ€™ll listen to before making public statements. Maybe we can help by not paying so much attention to him.

One thingโ€™s for sure; he should take a break from Twitter.

Read more in today's Big Revolution: prs.pctvix.co/2NionGp

Martin Bryant,
๐Ÿš€ @PerspectiveIX
๐Ÿ˜ Facebook's latest diversity report is as underwhelming as ever

Surprise, surprise: Facebook is still overwhelmingly white and male!

๐Ÿš€ @PerspectiveIX
๐Ÿ“– via Mashable: prs.pctvix.co/2NionGp
๐Ÿ“† Happy World Emoji Day!

According to Facebook, ๐Ÿ‡ฆ๐Ÿ‡บ & ๐Ÿ‡จ๐Ÿ‡ฆ seem to be the most keen on birthday greetings!

๐Ÿš€ @PerspectiveIX

Which one is your favourite?
โ€‹โ€‹๐Ÿ˜ซ The most depressing job on the internet

Itโ€™s easy to get angry at social media companies when they make the wrong decision about allowing or banning a particular piece of content. But last nightโ€™s Channel 4 documentary in the UK made me spare a thought for the poor content moderators at Facebook.

They have to look at the absolute worst of the internet all day, every day. Violence, abuse, hatred in all its forms โ€“ if theyโ€™re going to clean it up, they have to see it all. I hope they have access to psychological support; they must either become emotionally numb or bottle up all sorts of torment for later.

They have very little room for their own judgment. Facebookโ€™s rules on what stays and what goes are very strict. Some content that a common sense reading would say should be banned, has to stay up on a technicality.

Unless an act of harm is being live-streamed, they canโ€™t report it to the authorities. Imagine having that on your conscience โ€“ seeing a vulnerable person suffering and not being able to make sure they get the help they need.

Content moderators have one of the toughest jobs on the internet - and probably the most depressing. So next time you report some inappropriate content, spare a thought for the poor human who has to review it. It probably isnโ€™t their fault if they make the wrong decision.

Read more in today's Big Revolution: prs.pctvix.co/2mnP6Wy

Martin Bryant,
๐Ÿš€ @PerspectiveIX
This media is not supported in your browser
VIEW IN TELEGRAM
๐Ÿ‘พ Nerds will love building their own game boy

Gamebuino META is a tiny handheld gameboy like system that allows you to program games as well as play unique video games.

๐Ÿš€ @PerspectiveIX
โ€‹โ€‹๐Ÿ— Planning for the worst

The New York Times quietly announced a positive new security measure yesterday. Its Lock & Key system will keep an eye on public dumps of stolen usernames and passwords, and if any match your New York Times login, theyโ€™ll let you know and make you change your password.
In other words, if youโ€™re using the same password across multiple services (not advisable), this makes you that little bit safer.
It doesnโ€™t sound like that much of a big deal on its own, but it made me think about how too much online security work is reactive, rather than preventative.
Just think about the recent story about fitness tracking company Polar. A flaw in the way theyโ€™d set up their service meant anyone could browse through the activity records of all Polar users, simply by adjusting the URL in their browser.
Thatโ€™s the kind of flaw that shouldnโ€™t make it past the earliest stages of development. How did no-one at Polar think about that potential problem? Software developers have lots of different priorities to juggle, but security should underpin them all. Itโ€™s in the best interests of users, and also the software publisherโ€™s legal budget.
Iโ€™m generally an optimist, but when it comes to planning or developing anything involving the public, I always assume the worst outcome. It probably wonโ€™t happen, but at least youโ€™ll be prepared if it does.

Read more in today's Big Revolution: prs.pctvix.co/2uuMGd9

Martin Bryant,
๐Ÿš€ @PerspectiveIX
โ€‹โ€‹๐Ÿ“ฃ Heavy Social Media Users Most Receptive to Influencers

According to GWI, the effectiveness of influencer marketing varies with how long people spend on social media.

The trend in the chart is clear to see: the heaviest #SocialMedia users are the most likely to be discovering new brands via celebrities endorsements, vlogs and expert bloggers.

๐Ÿš€ @PerspectiveIX
๐Ÿ“– via GWI: prs.pctvix.co/2LbD2GR
โ€‹โ€‹๐Ÿป Watching out for bear traps

BuzzFeed made a big splash with its story yesterday that Mark Zuckerberg called a valued customer to congratulate him on his success. Yes, he called Donald Trump after his 2016 election win. Indeed, Facebook apparently views the Trump campaign as one of its best customers.

The story highlights an important point; many people increasingly want companies to take a moral stance โ€“ to be more โ€˜humanโ€™ and less impartial. And when it comes to the Trump presidency, with all the stories of Russian collusion, the poor treatment of immigrant children and all the rest, well โ€“ itโ€™s hard not to take a stance. Youโ€™re either against Trump, or you wholeheartedly endorse him, in many peopleโ€™s eyes.

In real life though, Facebook is like any big corporation. It has to 'cosy upโ€™ to whoever is in office to make sure it is in the best position to make money for its shareholders. The big difference is, unlike 'Big Oilโ€™ or 'Big Health,โ€™ Facebook has the power to make or break a president by directly influencing the electorate.

If Facebook did take a clear anti-Trump stance, it would likely trigger a political storm of right-wingers calling for it to be broken up to limit its power. So, you can understand why Zuckerberg treads so carefully and appears so morally bankrupt.

His Holocaust denial misstep this week was an example of him focusing all his attention on treading so carefully that he missed where he was going and put his foot straight into a bear trap. Heโ€™ll have to hope that staying neutral on the Trump presidency doesnโ€™t turn out to be the biggest, most painful bear trap of all.

Read more in today's Big Revolution: prs.pctvix.co/2zWgioT

Martin Bryant,
๐Ÿš€ @PerspectiveIX
โ€‹โ€‹๐Ÿ’ธ The Price Tag Attached to Data Breaches

A recent poll showed that of major U.S. internet companies, Twitter is the least trusted when it comes to keeping data secure. Of course, no company has a fail-safe method of data protection and the consequences of a leak can be severe. As well as the negative effect on public image and reputation, the infographic below shows the average monetary cost of a data breach.

As reported by IBM Security and the Ponemon Institute, the costs are the highest in the U.S. with the average incident coming with a price tag of $7.91 million. Although one may assume that such leaks are always caused by criminal activity, 25 percent of the cases examined were actually due to human error.

๐Ÿš€ @PerspectiveIX
๐Ÿ“– via Statista: prs.pctvix.co/2JE25N2
๐ŸŒ— Walking on the Moon

49 years today (21 July 1969) ๐Ÿ‘จโ€๐Ÿš€ Buzz Aldrin & ๐Ÿ‘จโ€๐Ÿš€ Neil Armstrong made those historic first steps onto the Moon.

๐Ÿš€ @PerspectiveIX
This media is not supported in your browser
VIEW IN TELEGRAM
๐Ÿš— Skateboard + Car

Rinspeed presented a modular driverless concept car consisting of a giant skateboard, on top of which a passenger pod can be attached.

๐Ÿš€ @PerspectiveIX
The channel that gonna give you so much fresh and interesting facts about world around you! Join and you won't regret!

@statistics_facts
๐Ÿ“ง Email deserves better than this

For all we rely on email, its core technology hasnโ€™t changed much in decades.

Think about it โ€“ all the innovations in the field of email are features that could be baked into a standard that would make life easier for everyone.

Most recently thereโ€™s โ€˜snoozeโ€™ โ€“ the ability to archive a message and have it return to your inbox at a certain time when youโ€™re ready to deal with it โ€“ but other features like message priority and 'recallingโ€™ emails have existed in certain email software for years without being universally supported.

Itโ€™s tough to predict how your email will be handled when itโ€™s received. Think about the politician or PR person desperately trying to 'recallโ€™ a mistakenly sent email, perhaps not known that it will only be worthwhile if the person at the other end uses Microsoft Outlook and hasnโ€™t read the email yet.

And 'snoozeโ€™ is a common feature in modern email apps, but itโ€™s one that encourages you to stick to one app and never switch. Snooze an email in Gmail, and Gmail will send it back to your inbox at the time you requested. Snooze a Gmail email in Outlook, and Microsoftโ€™s servers handle it, likewise with the myriad email-focused startups. I once tried five email apps in a week and completely lost track of where all my snoozes were being tracked. Itโ€™s also why I have five different 'snoozeโ€™ labels in my Gmail.

All of this is to say; I wish we had an email standards body comparable to the W3C, which handles Web standards. From 1996 to 2002 there was an Internet Mail Consortium that could have fulfilled this role, but no such organisation exists today. As a result, email is a messy Wild West of confusing technologies. Sure, email is long in the tooth, and we all love to hate it, but it deserves better than that.

Read more in today's Big Revolution: prs.pctvix.co/2LiENSz

Martin Bryant,
๐Ÿš€ @PerspectiveIX
โ€‹โ€‹๐Ÿ’ธ Princely sums

#Fortnite is spearheading a broader trend that saw the battle royale genre rise to huge popularity this year. According to SuperDataโ€™s estimates, the genre will generate $12.6 billion in revenue this year, up from just $1.7 billion in 2017. An end to the Fortnite and battle royale craze is not in sight: with more and more game studios trying to capitalize on the hottest gaming trend, battle royale revenue is expected to climb to $20 billion next year.

๐Ÿš€ @PerspectiveIX
๐Ÿ“– via Statista: prs.pctvix.co/2uZVKpR
โ€‹โ€‹๐Ÿ” The key to good security?

Every form of security is a balance between convenience and effectiveness. It would be really convenient to have all your online passwords set as โ€˜123456,โ€™ but it wouldnโ€™t be very secure. Likewise if the airport let you just walk straight onto a plane without checking your bags.

At the other end of the scale when it comes to online security are physical keys. Google says it has eliminated the problem of people phishing its employees by forcing them all to use hardware security keys to log in.
Thatโ€™s a huge endorsement for the idea of nudging people away from convenience, and treating their online information as something worth keeping safe.

Hardware security keys from companies like Yubico eliminate the need for passwords on many online services. As long as the key is plugged into your computer, youโ€™ll be automatically logged in. Some models work with mobile devices too.

Personally Iโ€™ve shied away from using a hardware key for my own security because of the chance Iโ€™ll be caught without it just at the time I really need to log in. But then, I always have my house keys and my wallet with me, so why would this be any different?

As Wired found, locking down your Google account this way can cause some other minor inconveniences. But if you can trust yourself to look after a hardware key and always have it with you, Iโ€™d very much recommend looking into it.

Read more in today's Big Revolution: prs.pctvix.co/2LEnOtn

Martin Bryant,
๐Ÿš€ @PerspectiveIX
๐Ÿ˜‚ The Right Lane

| walk | run | text |

๐Ÿš€ @PerspectiveIX
๐Ÿ“– https://prs.pctvix.co/2K7cuC3
โ€‹โ€‹๐Ÿ’บ How to be a good armchair critic

A little knowledge can be a deceptive thing. If you see a problem in the world, and know about current technologies, you can believe you have an โ€˜obviousโ€™ solution. But it can often turn out to be much more complicated to deploy than youโ€™d ever assume.

Take Twitterโ€™s current problem with cryptocurrency scams. You might have seen these in the replies to tweets by popular figures in the world of tech. Scammers create an account and make it look like itโ€™s one of these popular figures. So, username โ€™@as9uqfahaj29sโ€™ might have Elon Muskโ€™s profile photo and display name.

This account then replies to one of Muskโ€™s tweets, making it look to the casual observer like heโ€™s simply creating a thread. The 'fake Muskโ€™ encourages his fans to send him cryptocurrency with the promise of getting more back via a 'giveaway.โ€™
To counter this, Twitter has now banned non-verified accounts from using the display name 'Elon Musk.โ€™ Presumably, similar measures have been taken to protect other oft-impersonated accounts.

The problem? At least one scammer has used a stolen verified account instead. They also used a non-standard letter 'n.โ€™

Thinking about this problem, I tweeted earlier: โ€œThere must be a way to beat this problem based on language patterns of what people post in replies to verified accounts.โ€

Then it struck me; I had a good enough idea on paper, but am I a software engineer at Twitter? Do I know how technically feasible it is for them to apply filters like that to tweets? Sure, their current solution is a bit of a hack, but it should at least reduce the frequency of these scams.

The best armchair critic is a well-informed armchair critic. If youโ€™re going to call out people for being wrong, remember to consider everything you know you donโ€™t know (the 'known unknowns,โ€™ as Donald Rumsfeld might say) first. Otherwise, your argument will fall apart at the first hurdle.

Read more in today's Big Revolution: prs.pctvix.co/2A6hkyP

Martin Bryant,
๐Ÿš€ @PerspectiveIX
๐Ÿš”๐Ÿš”๐Ÿš”

๐Ÿš€ @PerspectiveIX