Social and Ethical Concerns of Smart Voice-Enabled Wireless Speakers


The following article explores the technological convergence of Intelligent Personal Assistant (IPA). More specifically, it analyzes the emerging technology of Smart Voice-Enabled Wireless Speakers and how the IPA technology transitioned from smartphones to built-in, dedicated home devices. The trend is changing the way in which machine learning and artificial intelligence are used, and the article explores the new and evolving technology in the context of its overall social impact. [Read more…]

The Social Effects of Mobile Technology

The purpose of the mobile technology is to make our life easier, and there is no dispute that there are numerous benefits as well as challenges that came with the dramatic uptake in use of mobile smartphones. In this article, I concentrate on some of the top social and cultural benefits and difficulties that came with the ascent of mobile technology. [Read more…]

How to move WordPress images to Amazon S3 – Free Solution!

Web administrators transitioning the existing WordPress sites (and image resources) to Amazon S3 have couple of paid plugins to choose from to ease the move to S3. However, most of the WordPress plugins come at a pretty hefty prices, some as high as couple of hundred dollars. The following guide outlines the step by step option that is completely free of charge. [Read more…]

How to anonymize traffic programmatically by using PHP/Curl and Tor network

Tor is a free software that prevents people from learning your location or browsing habits by letting you communicate anonymously on the Internet. Over the years, I have seen TOR installed in a variety of different environments, and I think it’s important to mention that outside of using Tor Browser for anonymous web browsing, there are various other ways of using TOR. In the following article, I outline one of these TOR options. [Read more…]

Data Variety and Data Security

Nowadays, it is the volume, velocity, veracity and variety of Big Data that are the primary factors and true amplifiers of the security issues experienced in the large-scale cloud infrastructures. The upsurge in security issues in Big Data installations is predominantly driven by an overall increase in volume and velocity of the data. However, dealing with the diversity of data sources (variety of data) is quickly becoming yet another of the pressing security concerns and the existence of enormous amounts of data is no longer the single factor creating the new security challenges. Data variety is one of the newest security challenges of Big Data infrastructures. 

[Read more…]