Swipe to Unlock: The Primer on Technology and Business Strategy
Rate it:
Open Preview
28%
Flag icon
(Fun fact: this is how the Roman Empire ran its censuses![530]
28%
Flag icon
MapReduce
28%
Flag icon
The popular big data tool
28%
Flag icon
Hadoop
28%
Flag icon
MapReduce...
This highlight has been truncated due to consecutive passage length restrictions.
28%
Flag icon
The idea is that you store all your data on a bunch of normal-sized servers — no supercomputers needed! — and then run the Hadoop software to crunch the numbers. The beauty of this approach is that the computers don’t need to be physically connected, and to add more data you just need ...
This highlight has been truncated due to consecutive passage length restrictions.
28%
Flag icon
Hadoop.
28%
Flag icon
Hadoop
28%
Flag icon
data science.[539]
29%
Flag icon
Amazon changes product prices 2.5 million times a day,[540]
29%
Flag icon
With all this data,
29%
Flag icon
Amazon analyzes customer’s shopping patterns, competitors’ prices, profit margins, inventory, and a dizzying array of other factors every 10 minutes to choose new prices for its products.[547] This way they can ensure their prices are always competitive and squeeze out ever more profit.[548]
29%
Flag icon
Amazon can even use the words you highlight on the Kindle to predict what you’re going to buy.[551]
29%
Flag icon
“Anticipatory Shipping Model.”[553]
29%
Flag icon
they can ship that item to a warehouse near you, so that when you ultimately buy it, they’ll get to you quickly and cheaply.[554]
29%
Flag icon
Big data lets companies create targeted ads and recommendations, which can be very profitable. Google and Facebook rely on targeted ads for most of their revenue,[558]
29%
Flag icon
In 2013, thieves stole 40 million Target customers’ credit card numbers and 70 million customers’ personal information, including names, emails, and mailing addresses. Those 70 million customers were at high risk of identity theft.[563] And it’s not just Target: all of Yahoo’s 3 billion accounts were hacked in 2013, letting thieves steal birthdates and phone numbers,[564] and in 2017 hackers got access to 143 million Americans’ social security numbers when they hacked the credit reporting agency Equifax.[565]
30%
Flag icon
reverse engineer
30%
Flag icon
“reidentifying”
30%
Flag icon
For instance, an MIT study found that just knowing the dates and locations of four credit card purchases was enough to determine the identities of 90% of people tested.[567]
30%
Flag icon
Like many things about technology, there’s no black-or-white answer.
30%
Flag icon
While big data makes companies and products more effective, it can create problems for privacy. But whether or not you like it, big data will only keep getting bigger.
31%
Flag icon
This has, strangely, led to scammers having excellent customer support, even sometimes having call centers and online chats with sales representatives.[589] Some even hire designers to make their websites look attractive.[590] They know that they need to build up a reputation of “trust” with their victims[591] — even though trust is a strange word to associate with someone who is extorting you and threatening to ruin your livelihood.
31%
Flag icon
Google’s ChromeOS, which powers Chromebooks, has become especially popular for the security-conscious because it is literally just a web browser; there are no conventional installable apps (which are a major entry point for malware). Plus, each Chrome tab runs in a “sandbox,” meaning that the contents of a webpage can’t touch any other parts of the computer.[600]
31%
Flag icon
But Chromebooks still have security holes like malware-loaded add-ons, and scams like
31%
Flag icon
phi...
This highlight has been truncated due to consecutive passage length restrictions.
31%
Flag icon
will never go aw...
This highlight has been truncated due to consecutive passage length restrictions.
31%
Flag icon
Silk Road,[602]
31%
Flag icon
Deep and dark web
31%
Flag icon
The “normal” internet that we browse every day doesn’t work like that. Instead, Silk Road and other illegal marketplaces have had to turn to a pair of related concepts, the “deep web” and “dark web.”[608]
31%
Flag icon
Dark websites have long, strange URLs that end in .onion,
31%
Flag icon
In fact, you can’t even figure out where dark websites’ servers are, making them very difficult to take down.
31%
Flag icon
However, programming errors can
31%
Flag icon
leak the servers’ IP addresses — which, incidentally, is exactly what led to ...
This highlight has been truncated due to consecutive passage length restrictions.
31%
Flag icon
Tor
32%
Flag icon
Normally, when your computer connects to a website, your computer broadcasts its identity and which website it wants to visit, which makes it easy to track what websites everyone is visiting.[618]
32%
Flag icon
This is how Tor works:
32%
Flag icon
it wraps your communication in several layers of encryption and bounces it around many intermediate “relay” computers, each of which only knows the previous and next computers in the chain.[619]
32%
Flag icon
The Hidden Wiki.
AsIf Fisa
Google for darkweb
32%
Flag icon
Whac-A-Mole.[630]
32%
Flag icon
Silk Road 2
32%
Flag icon
AlphaBay
32%
Flag icon
OpenBazaar,
32%
Flag icon
OpenBazaar is fully decentralized:
32%
Flag icon
every transaction happens directly between buyers and sellers. It’s like going to a flea market instead of a supermarket. Flea markets are decentralized: shoppers and merchants exchange money directly. Supermarkets, on the other hand, are centralized: merchants sell their stuff to supermarkets, who then distribute items to shoppers. If you destroy the supermarket, no one can buy or sell anything. But the only way to take down a flea market is to take down every single vendor.
32%
Flag icon
If the Silk Road was like a supermarket, OpenBazaar is l...
This highlight has been truncated due to consecutive passage length restrictions.
32%
Flag icon
OpenBazaar
33%
Flag icon
The founders of OpenBazaar say they won’t police what’s sold on the site[636] — in fact, given the distributed model, they probably couldn’t police it anyway.[637] It’s a radical idea, but a dangerous one.
33%
Flag icon
Legitimate uses for the dark web
33%
Flag icon
2014 Facebook made its website accessible over the dark web,