19 Oct 2017
by Admin
Comments are closed

Silicon Valley Veteran Says Tech Giants ‘More Powerful Than AT&T Ever Was’

LAGUNA BEACH, Calif., Oct 18 (Reuters) – Two of the technology industry’s top startup investors took to the stage at a conference on Wednesday to decry the power that companies such as Facebook Inc had amassed and call for a redistribution of wealth.

Bill Maris, who founded Alphabet Inc’s venture capital arm and now runs venture fund Section 32, and Sam Altman, president of startup accelerator Y Combinator, said widespread discontent over income inequality helped elect U.S. President Donald Trump and had put wealthy technology companies in the crosshairs.

“I do know that the tech backlash is going to be strong,” said Altman. “We have more and more concentrated power and wealth.”

The market capitalization of the so-called Big Five technology companies – Alphabet, Apple Inc, Amazon Inc, Microsoft Corp and Facebook – has doubled in the last three years to more than $3 trillion. Silicon Valley broadly has amassed significant wealth during the latest tech boom.

Altman and Maris spoke on the final day of The Wall Street Journal DLive technology conference in Southern California.

Facebook’s role in facilitating what U.S. intelligence agencies have identified as Russian interference in last year’s U.S. presidential election is an example of the immense power the social media company has amassed, the investors said.

“The companies that used to be fun and disruptive and interesting and benevolent are now disrupting our elections,” Maris said.

Altman said people “are understandably uncomfortable with that.”

Altman, who unequivocally rebuffed rumors that he would run for governor of California next year, said he expects more demands from both the public and policy makers on data privacy, limiting what personal information Facebook and others can collect.

Maris said regulators would have good cause to break up the big technology companies.

“These companies are more powerful than AT&T ever was,” he said.

Facebook said last month it had discovered an operation likely based in Russia that spent $100,000 on political ads and created 470 fake accounts and pages that spread polarizing views on political and social issues.

Altman and Maris offered few details of how to accomplish a redistribution of wealth. Maris proposed shorter term limits for elected officials and simplifying the tax code. Altman has advocated basic income, a poverty-fighting proposal in which all residents would receive a regular, unconditional sum of money from the government.

(Reporting by Heather Somerville; editing by Jonathan Weber and David Gregorio)

16 Oct 2017
by Admin
Comments are closed

How A New Technology Could Help Find The Next Harvey Weinstein

NEW YORK ― There’s a reason women keep quiet about men like Harvey Weinstein, Bill Cosby and Donald Trump for decades before numerous sexual assault accusations suddenly spill out at once. In game theory, it’s called the “first-mover disadvantage”: the idea that a first accuser faces the greatest risk of retaliation or skepticism, especially if no one else follows.

“Information escrows” ― systems that hold onto an encrypted, confidential sexual assault or harassment report until at least one other person has accused the same individual of assault ― could help solve this problem, according to Yale economist Ian Ayres. Just as dating apps like Tinder allow people to privately express interest until it’s returned, technology can keep people’s sexual assault reports private until there’s a “match,” so no one has to make the first move alone.

“Survivors are reluctant to be the first one to file a claim against a particular perpetrator ― the evidence of this is just all around us,” Ayres told HuffPost. “But if you learned that this happened to other people, you’d feel much more confidence that it’s appropriate to bring a claim. And there are good reasons to believe that many offenders are repeat offenders.”

In 2015, Ayres helped to develop a new sexual assault reporting app, Callisto, which is already in use on college campuses and could soon spread elsewhere. Callisto connects people who have reported problems with the same individual and enables them to submit their reports together to campus authorities.

According to Callisto’s data, 15 percent of reports in the system have found a match so far, and students who use the app take less than half the time ― about four months ― to report sexual assault than the average college accuser.

“We’ve had survivors explicitly say, ‘I would not have reported if it weren’t for Callisto,’” Jess Ladd, CEO of Callisto, told HuffPost.

In the wake of the assault allegations against Weinstein, Ladd is now being bombarded with requests to expand the app beyond college campuses.  

“I’m getting email message after text after Facebook message from friends and colleagues saying, ‘Look, blank industry really needs Callisto right now’ ― whatever industry they’re in,” Ladd said. “We’re actively considering that and are in the process of figuring out which industry would make the most sense to go into first ― tech? Hollywood?”

There are good reasons to believe that many offenders are repeat offenders.
Yale economist Ian Ayres

Of course, apps like Callisto have drawbacks and limitations. If a man rapes only one woman, for instance, an information escrow will do nothing to help her expose him. Ayres said another concern is that the technology could cannibalize formal reports to the police.

Ultimately, however, sexual assaults are already so massively underreported that Callisto is likely to do much more good than harm, Ayres argues. “The main effect is that it encourages women survivors that would not have placed a formal report,” he said. “They’re motivated now to go forward and use Callisto.

Information escrows would be especially useful to women in workplaces with especially skewed power dynamics, like Congress and the military. A 2016 Human Rights Watch study found that servicewomen are 12 times more likely to be retaliated against after reporting a sex crime than to see their assailant convicted. And Capitol Hill has a notoriously weak internal sexual abuse reporting system, which, combined with political pressure and job uncertainty, keeps staffers quiet. If a group of women could come forward at once against a commander or congressman, they would be more difficult to punish or ignore.

Women have long relied upon underground “whisper networks” in these industries in the absence of any reliable aboveground means of redress. While they can be useful in helping women protect each other from men who are known to be serial predators, they can do little to stop the harassment overall.

Molly Redden, a senior reporter at The Guardian, said she has used whisper networks both to give and receive warnings about certain men in the media. She says an editor once approached her from behind at a work party, put his hands on her shoulders, kissed the back of her head and said, “Don’t worry, it’s just me.” The incident made her “skin crawl,” but reporting him up the chain didn’t seem like an option, since his behavior was already an open secret.

“I’d received warnings about him from other women in the office, and so I’d steeled myself for much worse,” she said. “Plus, this person had zero compunction about being sexist in front of the other editors. I got the message: They knew, they saw, they didn’t care.”

Redden said that while she’s relieved these whisper networks exist, she’s concerned that they may ultimately deter women from taking action.

“I worry that, by whispering about these people, I’m signaling to their next target that she or he ought to keep silent, too,” she said. “That maybe they’ll think, ‘His behavior is not gonna come as news to anyone, so why should I be the one who makes a big stink? Why should I take it so seriously?’”

I worry that, by whispering about these people, I’m signaling to their next target that she or he ought to keep silent, too.
Molly Redden, The Guardian

Apps like Callisto are a useful supplement to underground warning systems because their end goal is the reporting and investigation of a crime. And information escrows could potentially be used in other ways to prevent sexual harassment and legally nebulous romantic behavior in the workplace ― particularly in industries with baked-in power imbalances.

“Right now, most workplaces have a one-bite rule: If you and I are co-employees, you can ask me out once, and if I say no, you can’t ask me out a second time,” Ayres said. “If we could have a rule that employees never got to ask each other out initially, that they could only put expressions of interest into escrow that would only be forwarded if they were matched, there would never be the uncomfortable conversation with the coworker or boss.”

But there are some challenges to expanding the technology beyond college campuses. Callisto’s efficacy, for instance, relies on having a closed network of trust so that any random internet troll can’t come in and file baseless reports. While it’s simple to verify that a user is a student at a particular university, it’s harder to contain and authenticate members across a sprawling industry. “How do you make sure somebody’s a part of Hollywood?” Ladd wonders.

The likely move is to start with groups like the Screen Actors Guild that have long email lists of registered members, in order to authenticate who’s part of the trust network and allowed to make entries.

Sexual Health Innovations would also need help from donors to enter a new market. To use the app, schools currently pay a $5,000-$10,000 setup fee and a $13,000-$40,000 annual fee, depending on school size. Ladd said the nonprofit would need to raise around $5 million to expand to Hollywood or the tech industry.

Callisto has already partnered with the Upright Citizens Brigade, a bicoastal improv and comedy training center, to raise money for the platform, and it’s now seeking other potential sources of funding.

“It’s possible to expand if there’s enough philanthropic support to do so,” Ladd said. “We have the data to show that it’s working.”

13 Oct 2017
by Admin
Comments are closed

What To Do If You Think An Online Account Has Been Hacked

By David Nield

Being hacked can feel like a personal attack: You go to log into Facebook, or Gmail, or iCloud — and your password doesn’t work, leaving you unable to protect your most important online accounts. This worst-case scenario might bring on feelings of nausea and helplessness. Fortunately, you can take action in the face of digital vandalism. If you find yourself locked out of your accounts, major internet services have prepared a few routes for getting back in. As well as restoring your access, these companies help you limit the damage that a hacker can do.

How do you know that someone else really has taken control of one of your accounts? Not being able to log in is a big clue — but if your password doesn’t work, don’t immediately assume you’ve been hacked. First, make sure the culprit is really a bad actor: For example, if you can’t get into your Facebook or Twitter account on your computer, try logging in on another device to see if you’ve really lost your access. Also make sure to double-check the password you’re typing before you start to suspect the worst.

Another warning sign can come in the form of email. Many services will send you messages about suspicious activity, such as when somebody logs into your account from an unfamiliar computer (or an unfamiliar country), or when somebody changes your username or password. Make sure to check your inbox for emails like these. Also keep an eye out for messages from friends: If “you” have started sending them spam, they can alert you that your account was compromised.

Once you realize you’ve been hacked, it’s time to roll up your sleeves and take back your account.

Raise the alarm

The good news is that you have help: Google, Apple, Microsoft and other tech giants don’t want impostors to take over your online identities either, so they’ll try their best to restore your access. For example, in some cases where you can’t open your account, it’s because the company sensed suspicious activity and automatically locked everyone out.

So when you suspect a hack, your first step is to tell the company. A quick web search, such as “Report Gmail hack,” should reveal the right place to explain your problem. Before you start entering information, make sure that the page you visit is the official recovery page. Check the URL to make sure the page is hosted on the correct web domain, such as or, for the service you’re trying to access. We’ve also rounded up the recovery links for a few of the big players: For Google, report hacks here, for Apple here, and for Microsoft here.

Once you report your issue, follow the instructions the app or service gives you — these will be tailored specifically for your account. Different programs employ different recovery methods, so you might have to confirm your phone number or backup email address, or answer personal questions — such as a few queries about your Facebook friends — to prove you are the real account owner.

If you’re lucky, you can get back in pretty fast. That’s partially because today’s apps collect so much data about us that they can identify individuals through tidbits such as date of birth, phone number, location and more. However, getting back into your account isn’t the last step you need to take.

Change your passwords

Once you can log in once more — or if you could already access your account but have noticed suspicious activity — change your password to boot out any unwelcome visitors. The new code should be completely new; don’t recycle a past password or reuse the same string of letters and numbers that open another account. If you have been using that old password to access multiple accounts (which you really should not do!), change the password on your other accounts as well.

Most online services let you see all the devices where you’re logged in. Hunt around the security settings until you find this page. Then, log out of all other sessions except the one you’re currently using. For example, you can visit this Facebook page and this Google page to log out of sessions you don’t recognize.

While you’re poking around your account, review the other settings to make sure nothing has been changed. Look at your personal details, review any third-party apps connected to your account, and check your security questions and answers and your backup email addresses and/or phone numbers. If you think your hacker had a chance to scan your security questions and backup accounts, try to change these on the compromised account and on any other account that relies on the same information. This will prevent the bad actor from using your personal details to breach other accounts in the future.

Speaking of other accounts, were your credit cards, bank accounts, or other financial programs connected to the compromised service? In this case, review your statements. If your hacker spent any of your money, you should try to claim back the cash as soon as possible — contact your bank directly and ask how to do this. While you’re checking for financial malfeasance, also review your account to see if the hacker added any unfamiliar payment methods or shipping addresses.

Run security checks

Having recovered from a hacking attempt, you’ll want to protect against any future ones. So activate the security features designed to prevent attacks — for more details, you can follow our guide to protecting your online accounts. One of the most helpful measures is turning on two-step verification, where logging in requires a code sent to your phone, on top of the standard username and password. And specific services offer their own security features: Facebook, for example, lets you add a list of trusted friends who can verify your identity if you get hacked again. Turn on this option via the Security page in Settings.

Next, try to find out how the hacker managed to access your account so you can prevent future incursions. This won’t always be possible; however, it can’t hurt to run a thorough virus and malware scan of your hard drive (in case that’s how the attacker got in). Before you start, update both your operating system and your antivirus package of choice. After you run the review, get a second opinion from a standalone scanner like Kaspersky Virus Scanner for macOS or Microsoft Safety Scanner for Windows.

If the breach affected a service that includes email, such as your Google account, check the email account for sent messages or for new filters. For example, clever hackers can set up filters that forward all incoming mail to an address you don’t recognize. Delete such filters to prevent people from worming their way back into your account in the future. This is particularly important because you can reset many other accounts’ passwords, and receive notifications about suspicious activity, over email. You don’t want an eavesdropper to nab those recovery messages.

In fact, even if only one account becomes compromised, you should consider all your main services breached. Carry out a thorough security audit on all of them, working through all the steps we’ve mentioned above. For more details on strengthening the security of individual services, check out our previous guides to locking down your Google, Apple, Microsoft and Facebook accounts.

This article originally appeared on Popular Science.

12 Oct 2017
by Admin
Comments are closed

Sheryl Sandberg: Russian Targeting On Facebook ‘Should Not Have Happened’

Facebook Chief Operating Officer Sheryl Sandberg acknowledged on Thursday that “things happened on our platform in [the 2016 election] that should not have happened,” and Americans deserve an apology for that.

“We’re angry, we’re upset, and what we really owe the American people is determination,” Sandberg said in an interview with Axios’ Mike Allen in Washington concerning the discovery that Russian-backed groups ran ads on Facebook aimed at influencing the election.

“As early as we heard any rumors we started investigating,” she said. Expressing support for public release of the ads, she said: “We don’t want this kind of foreign interference, we’re all going to have to fully cooperate” with investigations into the meddling.

“We know that we have a responsibility to do everything we kind to prevent this kind of abuse on our platform,” she said.

Allen noted that Facebook removed the ads because they came from fake accounts. He asked Sandberg about Facebook’s policy that had they come from real accounts, they would have remained on the platform.

Sandberg replied using the example of Twitter’s removal of a recent ad in which by Rep. Marsha Blackburn’s (R-Tenn.), who is running for the Senate in 2018, discussed the sale of baby body parts. Facebook, Sandberg said, would have run the ad.

“The question is should divisive political or issue ads be run? Our answer is yes,” she said. But she also added: “We don’t allow hate, we don’t allow violence. We don’t allow bullying.”

The scope of Facebook’s tacit involvement in last year’s election continues to broaden. It told Congress last month that it had sold 3,000 ads to groups linked to the Internet Research Agency, a Kremlin-run organization.

The company now plans to manually moderate the ads submitted to Facebook.

The House intelligence committee met with Sandberg in a closed-door session on Wednesday. Members said they plan to release copies of the Russia-backed Facebook ads that were turned over to Congress in the coming weeks.

Facebook also plans to release the targeting for those ads, Sandbeg said. “We’re going to be fully transparent.”

“I think there’s a lot of interest in the committee on the progress of Facebook’s internal investigation, when they discovered what they discovered, how exhaustive their review has been, what more forensics need to be done,” Rep. Adam Schiff (D-Calif.) said Wednesday.

Ads on Google and Twitter have also been linked to Russia. Sandberg told Allen Facebook is working with other companies so that “when anyone identifies a threat, we can get them off of all of our platforms.”

11 Oct 2017
by Admin
Comments are closed

Adults Must Teach Kids To Use, Not Be Used By, Social Media

I was an archetypical progressive educator, respecting the autonomy of students and empowering them to follow their passions and not just the curriculum pacing guide. But in terms of classroom management, I was “Old School,” insisting that students “work smart and work steady” from “bell to bell.” One tradition that I passed down was my parents’ and grandparents’ admonition to “pay close attention, I’m only going to show you once.”

As with my adult mentors, my directions were accompanied with a grin. We weren’t demanding obedience but teaching the younger generation to “keep your head in the game,” to “work smart,” and to “learn how to learn.”

Perhaps the greatest failing of Baby Boomers is that we reneged on that responsibility and didn’t teach kids the habits, the mindsets, and the ethics required to learn how to learn from their cell phones. We abdicated our responsibility to teach media and digital literacy. Schools are finally being forced to confront one of our most challenging but most crucial question: How can we control digital technologies and not be controlled by them?

Jane Meredith Adams writes in Edsource about “one school’s attempt to revive the art of the face-to-face conversation. No earbuds. No head phones. No music. No photos. No bent necks. No phones.” Korematsu Middle School in the East Bay of San Fransisco had tried the normative process of restricting phoness to lunchtime and passing periods, but it became clear to the principal. “we would never do that again.”

The middle school learned the lesson that our society is still trying to duck, the “rise of cell phones and social media has created a generation that spends less time with friends and more time alone in their rooms on their phones.” As a growing body of cognitive research explains, “teenagers who spend more time online than they do with their friends are the most likely to report being lonely and feeling left out.”

To take just one example, Jean Twenge wrote in The Atlantic that research has shown, “the presence of a cell phone — even if it’s face down on the desk or in a bag, on silent — limited a person’s thinking and memory.” Other research finds, “Eighth-graders who spend 10 or more hours a week on social media are 56 percent more likely to say they’re unhappy than those who devote less time to social media.”

More than 5,000 schools have shown the documentary “Screenagers: Growing Up in the Digital Age.” The producer of “Screenagers,” who is a doctor, is prompting the conversation with children that we should have started long ago. And we as a society are reluctantly starting to probe into the role of social media plays in the dissemination of “alt facts” and our bitter conflicts over identity politics.

As our entire culture takes on the characteristics of Attention Deficit Disorder, it would be tempting to abandon the goal of teaching our kids to, “pay close attention.” As all of our attention spans grow shorter, it would be nice if we could toss our concentration skills on the ash heap of history. As the world speeds up, however, we must preserve at least some of our old-fashioned study skills.

Reading, for instance, is changing and we cannot hold back the tide. But the essence of literacy must be preserved – at least until we can lay a foundation for an equally profound replacement. The same applies to cultural and artistic literacy. We adults cannot predetermine what the attention spans of subsequent generations will be. Nor should we try. We should take our stand by umpiring a structured discussion on the principles that we seek to preserve. It is not up to teachers to preordain which of our favored values survive, but we must protect the integrity of the schooling process.

Finally, “Pay close attention; I’m only going to show you once,” must not be seen as an artifact of a teacher-centered world that is obsolete in a world made “flat” by technology. We must remember the key words within the spiritual context of “The Death of a Salesman.” “Attention must be paid.” We all have a moral core, and we all want attention to be paid to our humanity. The hearts of teens today are as hungry as those of preceding generations. We must appeal to their emotional centers. I doubt there is another power on earth that could pry their fingers off of their text messaging contraptions.

06 Oct 2017
by Admin
Comments are closed

AOL Instant Messenger To Sign Off Forever After 20 Years

AOL Instant Messenger has g2g ― forever.

The online messaging app, often referred to as just AIM, will be discontinued on Dec. 15, as Michael Albers, vice president of communications product at Oath, announced Friday.

“AIM tapped into new digital technologies and ignited a cultural shift, but the way in which we communicate with each other has profoundly changed,” Albers wrote. “As a result we’ve made the decision that we will be discontinuing AIM effective December 15, 2017.” (AOL is now part of Oath, which owns HuffPost.)

AIM was originally introduced as part of a chat app built into the AOL desktop. It launched on its own in 1997, and remained dominant even when competitors like Yahoo Messenger and MSN Messenger came along. But by 2011, Facebook and Google’s email chat, known as Google Chat or “Gchat” for short, had gained a significant edge.

“If you were a 90’s kid, chances are there was a point in time when AOL Instant Messenger (AIM) was a huge part of your life,” Albers wrote. “You likely remember the CD, your first screenname, your carefully curated away messages, and how you organized your buddy lists.”

“In the late 1990’s, the world had never seen anything like it,” he added. “And it captivated all of us.” 

Twitter users almost immediately began sharing their most cherished AIM memories. Others expressed shock that the application is actually still around.

Tweet us your favorite AIM memories using #InMemorAIM (shout out to HuffPost’s Carolina Moreno for that one).

03 Oct 2017
by Admin
Comments are closed

Yahoo Says All 3 Billion User Accounts Affected By 2013 Hack

(Reuters) – Yahoo, now part of Verizon Communications Inc, said on Tuesday that an investigation showed all 3 billion of its user accounts were affected in a 2013 data theft, tripling its earlier estimate of the largest breach in history.

However, the company said the investigation indicated that the stolen information did not include passwords in clear text, payment card data, or bank account information.

Yahoo said last December that data from more than 1 billion user accounts was compromised in August 2013.

Verizon in February lowered its original offer by $350 million for Yahoo assets in the wake of two massive cyber attacks at the internet company.

The closing of the deal, which was first announced in July, had been delayed as the companies assessed the fallout from two data breaches that Yahoo disclosed last year. The company paid $4.48 billion for Yahoo’s core business.

A Yahoo official emphasized Tuesday that the 3 billion figure includes many accounts that were opened but never or only briefly used.

The company said it was sending email notifications to additional affected user accounts.

(Reporting by Munsif Vengattil and David Shepardson; Editing by Anil D’Silva)

30 Sep 2017
by Admin
Comments are closed

We Should Make AI And Blockchain Boost Global Trade

By Daniel Feffer and Marcos Troyjo

Globalization has been at a crossroads for a while. The dynamics of freer circulation of goods, capital and people has lost steam. Trade protectionism is on the rise. Multilateral institutions such as the International Monetary Fund, the World Bank, and the World Trade Organization (WTO) seem to provide slow and often insufficient responses to contemporary challenges. There are indeed various forces of “deglobalization” ranging around the world today.

At the same time, sophisticated technologies inaugurate a new era of threats and opportunities that holds the world in awe. The dawn of the Fourth Industrial Revolution heralds the transformation of professions and the likely end of many jobs as we knew them. Studies show robotics and automation, not cheap labor sources in Mexico or China, are mostly to blame for many deindustrialized sectors and towns in the U.S., Europe or South America.

It is quite paradoxical, but if on the one hand technology in communications, social networks, co-working and transportation brings us ever closer, it is also one of the indirect causes of nationalistic industrial policies and protectionist trade measures.

As a consequence, WTO statistics show that since the aftermath of the Great Recession, defensive trade measures ― in one word, protectionism ― is definitely on the rise. Since the end of World War II, trade expanded formidably and at a much larger proportion than global GDP. And especially after the end of the Cold War and the inclusion of China into global markets, trade became the top driver of prosperity. But that changed from 2008 until now. We have moved from a long period of deep globalization to the current stage where deglobalization trends may unfortunately prevail.

It wouldn’t be unfair to assume the risk of deglobalization and the emergence of industry 4.0 as perhaps the two most important dynamics unfolding in the world today. And there are certainly many actions beyond the realm of trade that must be taken in order to make both globalization and the Fourth Industrial Revolution work. Retraining ― and therefore the “reskilling” of the labor force ― is definitely one of them. But by scanning the technological horizon out there, we feel there are innovations that may actually propel trade and globalization forward, in a way that is both inclusive and smart.

That is why we decided to propose an ITTI ― Intelligent Tech & Trade Initiative (, which was launched at the World Trade Organization during its 2017 Public Forum in Geneva.

ITTI will bring together technology and business leaders, negotiators and scholars in debating and devising ways on how blockchain (the trust ledger) and AI (augmented intelligence) can positively impact global trade.

The ITTI WTO launch is one of the first steps in a venture that gathers representatives from institutions and companies as different as ICC (International Chamber of Commerce), IBM, Gearbulk and UNCTAD in assessing how global trade can be enhanced by the expanded use of blockchain and cognitive technology platforms. We see the creation of ITTI as an essential move to drive trade beyond existing roadblocks.

As incipently applied as they are today, both blockchain and AI carry the potential to boost commercial exchanges. Instrumentally, they enable more proactive supply chains by predicting customer behavior, calculating fast and cheap shipping routes and foreseeing customer cancelations. Ultimately, an artificially intelligent supply chain is a proactive supply chain, one that is both agile and able to alleviate the impact of inevitable disruptions. They also enhance compliance software that saves time, help draft smarter contracts or expand the access to trade financing.

But these technologies can also be very inclusive. They can help both SMEs (small and medium sized enterprises) and Less Developed Countries (LDCs) seize a bigger piece of the global trade pie. They allow for de-intermediation, increased trust and agile market access. This will help bridge the gap between large MNCs (multi-national corporations) and SMEs, as well as between post-industrial economies and LDCs.

Both SMEs and LDCs lack access to trade networks or formal credit structures. Through blockchain, SMEs can better access credit and link into a broader investor ecosystem, enabling them to set up new trading networks and obtain funding by sharing financial data in a security-rich and transparent public arena. This will result in better transactions and trade agreements for both SMEs and LDCs.

AI can also play a major role in leveling the playing field in trade negotiations. Traditionally, countries have a tough time preparing for trade talks. Delegations, especially representing emerging economies, are not fully equipped to face tough and detailed minutiae. New technologies however can help delegations gather and structure information as well as predict different negotiation scenarios. They can achieve that by using AI tools that give them access and interaction to cloud-based resources.

Additionally, we might be able to use AI more and more in predicting and modeling trade negotiation outcomes. Protectionism often results from subjective, ill-informed analytical dynamics. Not only do they originate from incorrect premises, but they generally do not take into account the negative effects it generates for workers and consumers both domestically and across the world. Up until now, measuring the impact of protectionism ― or, on the contrary, the potential of free trade ― has relied on projection models that have not explored the full potential of new technologies.

By building and applying AI tools to project, predict and weigh the pros and cons of more or less trade agreements, countries will be able to better balance costs and benefits arising from industrial and trade policy decisions. 

Many blockchain and AI applications to trade will have to be adapted from other uses in finance, logistics, or the legal world. And most will definitely have to be built from scratch. That is why we conceived ITTI as a multimedia project that will examine how cutting-edge technologies can bring about new functional and conceptual approaches allowing for international trade transactions and negotiations to advance.

Its ultimate objective is to stir the debate involving the technology community, trade negotiators, business leaders and scholars on how to better pursue a constructive trade agenda. Mindful of both national and multilateral specificities, ITTI therefore aims at countering deglobalization forces now operating in international trade.

It is only by fostering the interaction among these key stakeholders that tech-intensive solutions will be crafted and developed. ITTI will do so by promoting research papers, organizing conferences and producing TV documentaries and interviews series on the future of technology and trade.

We’ve got to make sure this new era that dawns upon us is inclusive of companies big and small, countries rich or emerging, so all can benefit from its endless potential. By bringing technology and trade closer together, we wil not only be lifting flows of exports and imports, but improving the very essence of international cooperation.

Daniel Feffer is president of ICCBrazil, president and founder of ITTI

Marcos Troyjo is director of ITTI and codirector of BRICLab at Columbia University

27 Sep 2017
by Admin
Comments are closed

Save Money On Halloween Costumes By Using These 7 Apps

There’s nothing scarier than paying a ridiculous amount of money for a one-time Halloween costume, right? Yet, every Halloween we end up dishing out more for a last-minute wig or cape than we intended to spend on our entire costume. Thus the cycle continues. 

Fortunately for you (and your wallet), the “digital hand-me-down” market of upcycled fashion is all the rage thanks to free apps like Poshmark and Mercari. They have thousands of everyday vendors who are selling useful Halloween items, from wigs to lightsabers and more, at heavily discounted prices.

The best part? Since you’re not costume shopping from a big-box store, it’s practically guaranteed your look will be unlike anyone else’s. Mercari has over 30,000 items in their costume inventory right now, ranging from full costumes to any and all accessories. 

Before you start overspending on your kid’s costume, consider these 7 apps to save big on your Halloween attire, and be sure to sign up for our Full Carts, Can’t Lose email to stay on top of the best sales each week.

HuffPost may receive a share from purchases made via links on this page.

26 Sep 2017
by Admin
Comments are closed

Taking Privacy Seriously: Leaving Google Behind

Recently, I made the decision to become a little more secure on the internet. I don’t have much to hide except maybe bank account info, but I was struck by a Glenn Greenwald quote from a TED Talk he gave about privacy.

Over the last 16 months, as I’ve debated this issue around the world, every single time somebody has said to me, “I don’t really worry about invasions of privacy because I don’t have anything to hide.” I always say the same thing to them. I get out a pen, I write down my email address. I say, “Here’s my email address. What I want you to do when you get home is email me the passwords to all of your email accounts, not just the nice, respectable work one in your name, but all of them, because I want to be able to just troll through what it is you’re doing online, read what I want to read and publish whatever I find interesting. After all, if you’re not a bad person, if you’re doing nothing wrong, you should have nothing to hide.” Not a single person has taken me up on that offer.

I find myself tired of knowing Google is going through the content of my emails and examining my searches to sell me things.  I also know our new government (not that our old was too much better) is tracking the activities of anyone who is anti-fascist. I don’t trust them to follow the laws that would otherwise keep me secure from illegal search.

So I set out to become more private and that meant leaving Google products and using encrypted, more secure alternatives.

So what I have I found? Well, I have spent the last weeks and months testing products and making decisions on what I would do.

Here is what I found.

The first, maybe the easiest step was changing my browser away from Google’s Chrome browser. I decided to go with Firefox’s nightly builds because they seem to run faster and feel a bit more Chrome like, so the switch wouldn’t be so shocking. With Firefox account syncing options, it wasn’t hard to get my bookmarks synced across a few devices with ease.

I also installed some plugins, thanks to recommendations from, a site you should frequent for tips on internet privacy. I am now running Ublock Origin to block ads and trackers along with Privacy Badger and HTTPS Everywhere.

Alternatively, I run Tor Browser, a Firefox fork if I want an even greater layer of privacy.

Who doesn’t use Google to find things? Sure, we all know that weird friend who uses Yahoo still, or that one guy who still owns a Zune who uses Bing, but Google has it all.

I started with the always popular DuckDuckGo, but I found I didn’t get very good search results and it seemed to load really slow for me. Thankfully, thanks to PrivacyTools, I discovered StartPage.

StartPage anonymizes your searches through Google, so you still get the quality Google results without them seeing you, and without the ads. It easily integrates right into Firefox on desktop and mobile.

When it came to choosing a VPN, I went through many trials. I asked for recommendations and started with the most popular, Private Internet Access, but I didn’t like that they were based in the US, but also found their speeds not all that great. Next I tried NordVPN. The speeds were actually great on my iPhone, but they don’t offer a native Linux app and setting up their different servers was kind of pain.

Finally, I settled on one that was recommended a few times, Mullvad. The price is good ($5/mo), and the speeds are wonderful. I use OpenVPN on my phone, but for my laptop running Linux Mint, and for my media server at home, an old Mac, they offer a native app which makes connecting easy.

I also have a free VPN account with ProtonVPN, and another with RiseUp. These secondary options, which give me okay speeds, allow me backups if something goes wrong with Mullvad.


While this wasn’t really part of this move, I wanted to recommend some texting, video, and voice calling apps that are amazing. I am loving Wire, a chat app that has both desktop and mobile clients. Also, the very popular Signal app.

For file sharing, I have installed OnionShare.

This was the last big piece of the puzzle. I have been on Gmail since they launched the first wave of invites. It’s a wonderful web based interface and a good mobile app. Replacing it wasn’t going to be easy. However, I do own my own domain, and figured it was time to use it.

It came down to two providers for me. ProtonMail, makers of ProtonVPN, and Tutanota. Both offer a great service and allow custom domains on their paid accounts. Proton has a much nicer web and mobile interface, but Tutanota has been showing off its beta platform and it’s looking very promising.

Here, it really came down to price for me. ProtonMail is $5/mo or $48 a year, while Tutanota is $12 a year.

Given that Tutanota is open source, and they have a pipeline of amazing products in development, I pulled the trigger and moved my email there.

So what’s left?

Well, first, here is what I am still using from Google:

Gmail: While I have switched, I have nearly a decade of stuff on Gmail and accounts that still point here and important people who have this email address. I will slowly begin to migrate them away and likely end up at the point where I just forward all my mail away from here.

Google Photos: They offer free backup of all my iPhone photos. I have more than 10,000 photos here and don’t have a solid replacement in place yet.

YouTube: I mean, I can’t escape this one.

Google+: Yeah, it’s still a thing. I use it to share articles I have written. It also improves search results for my work.

Google Maps: Anyone have recommendations on a good replacement for this?

I also still use Facebook and Twitter which are privacy nightmares of their own.

I am also still looking for a good Google Docs replacement. I am testing out Dropbox Paper, and I use LibreOffice on Linux, but I’d like something I can use online more. The hunt continues.

What are you using? What recommendations do you have as I continue to improve my privacy journey?

Share in the comments.

Want to help support Dan’s work? Consider donating BitCoin, or signing up through Patreon.

© 2017