The New Digital Age: Reshaping the Future of People, Nations and Business


The New Digital Age: Reshaping the Future of People, Nations and Business by Eric Schmidt and Jared Cohen, Knopf, 2013
Scientific American: “Schmidt, executive chairman of Google, and Cohen, director of Google Ideas and a foreign policy wonk who has advised Hillary Clinton, deliver their vision of the future in this ambitious, fascinating account. For gadget geeks, the book is filled with tantalizing examples of futuristic goods and services: robotic plumbers; automated haircuts; computers that read body language; and 3-D holographs of weddings projected into the living rooms of relatives who couldn’t attend. Not surprisingly, the authors are bullish on how connectivity—access to the Internet that will soon be nearly universal—will transform education, terrorism, journalism, government, privacy and war. The result, they argue, though not perfect, will be “more egalitarian, more transparent and more interesting than we can even imagine.”

David Brooks on Big Data


David Brooks in NYT: “Over the past few centuries, there have been many efforts to come up with methods to help predict human behavior — what Leon Wieseltier of The New Republic calls mathematizing the subjective. The current one is the effort to understand the world by using big data.

Other efforts to predict behavior were based on models of human nature. The people using big data don’t presume to peer deeply into people’s souls. They don’t try to explain why people are doing things. They just want to observe what they are doing. The theory of big data is to have no theory, at least about human nature. You just gather huge amounts of information, observe the patterns and estimate probabilities about how people will act in the future….

One of my take-aways is that big data is really good at telling you what to pay attention to. It can tell you what sort of student is likely to fall behind. But then to actually intervene to help that student, you have to get back in the world of causality, back into the world of responsibility, back in the world of advising someone to do x because it will cause y.”

Big Data, Big Brains


“This report on Big Data is the first MeriTalk Beacon, a new series of reports designed to shed light and provide direction on far reaching issues in government and technology. Since Beacons are designed to tackle broad concepts, each Beacon report relies on insight from a small number of big thinkers in the topic area. Less data. More insight. Real knowledge…Mankind created 150 exabytes (billion gigabytes) of data in 2005, and 1,800 exabytes in 20112; growth that only continues to accelerate. Every minute, users: Upload 48 hours of video to YouTube; Send 204 million emails; Spend $207,000 via the web; Create 571 new websites. Within the Federal government; U.S. drone aircraft sent back 24 years worth of video footage in just 2009. Every 24 hours, NASA’s Curiosity rover can send nearly three gigabytes of data, collecting in mere days the equivalent of all human knowledge through the death of Augustus Caesar – from Mars.”

Quarter of time online is spent on social networking


Experian: “Insights from Experian, the global information services company, reveals that if the time spent on the Internet was distilled into an hour then a quarter of it would be spent on social networking and forums across UK, US and Australia. In the UK 13 minutes out of every hour online is spent on social networking and forums, nine minutes on entertainment sites and six minutes shopping.”
Social Networking table

Data for the Boston Marathon Investigation Will Be Crowdsourced


WIRED: “The investigation of Monday’s deadly twin bombings in Boston will rely to an extraordinary extent on crowdsourced surveillance, provided by Marathon spectators’ cellphone photos, Vine videos, and Instagram feeds….There are limits to the crowdsourcing. The data used in the investigation will be crowdsourced. The investigation will not be. A crowdsourced investigation runs a high risk of becoming a witchhunt, as we saw in the Newton shooting spree.”

Should Local Government Be Run Like Silicon Valley?


The April issue of Governing magazine features Jen Pahlka of Code for America: “One of the things I love about Silicon Valley is the experimentation and willingness to play around,” says Pahlka. “That is wonderful, but sometimes becomes trivialization. As a society we can’t afford to have some of our brightest minds working on trivial things like, you know, Facebook apps.”…Pahlka’s vision for the group was essentially that by taking start-up values to government, “this thing that works” (Silicon Valley) would “fix this thing that doesn’t” (government). She quickly concluded that idea was wrong….What was broken, though, was the relationship between government and the citizenry. “That’s a problem on both sides,” Pahlka says.

Big Data Challenge to Transform Health Care Delivery


BPC Press Release: “Today, the Bipartisan Policy Center (BPC), Heritage Provider Network (HPN), and The Advisory Board Company launched the Care Transformation Prize Series, a national contest to address the most daunting data problems U.S. health care organizations face as they implement new delivery system and payment reforms.
The goal of this big data challenge is to help health care organizations more effectively use data to drive improvements in health care cost and quality. The series was announced at a BPC-hosted event today that featured a forward-thinking discussion on the strategies that providers, health plans, and states are using to harness data to help Americans lower their health care costs and improve care.”

Boston blasts show two sides of social media


Zach Miners in ComputerWorld: “Twitter users reacted fast to the explosions that ripped through the Boston Marathon Monday, but the incident also revealed how social media can only be so reliable in such situations. Twitter spread news of the blasts quickly and was a useful communications tool for public authorities such as the Boston police and the marathon organizers. But information on social media sites can also be questionable or just plain inaccurate, noted Greg Sterling, senior analyst with Opus Research…
The Boston Police Department’s Twitter log showed a positive side of social media. It was updated minute by minute in the aftermath of the bombings, often with instructions about which areas to avoid, or information about where the most police officers might be stationed.
There was also misinformation, however. A report was circulated quickly on Twitter that police had shut down cellphone service in Boston to prevent detonation of further blasts, though it ultimately turned out to be inaccurate, according to network operators.
Others had nefarious intentions. At one point, a Twitter account with the handle @_BostonMarathon was promising to donate US$1 to victims of the blast for every one of its tweets that was retweeted. Users soon called it out as a fake, noting the real Twitter account for the Boston Marathon was @BostonMarathon.”
See also: Google’s Person Finder

New OECD paper on Machine-to-Machine Communications


Machine-to-Machine Communications – Connecting Billions of Devices: “This document examines the future of machine-to-machine communication (M2M), with a particular focus on mobile wireless networks. M2M devices are defined, in this paper, as those that are actively communicating using wired and wireless networks, are not computers in the traditional sense and are using the Internet in some form or another. While, at the global level, there are currently around five billion devices connected to mobile networks, this may by some estimates increase to 50 billion by the end of the decade. The report provides examples of some of the uses to which M2M is being put today and its potential to enhance economic and social development. It concludes that to achieve these benefits, however, changes to telecommunication policy and regulatory frameworks may be required. Some of the main areas that will need to be evaluated, and implications of M2M assessed, include: opening access to mobile wholesale markets for firms not providing public telecommunication services; numbering policy; frequency policy; privacy and security; and access to public sector information.”

Big Data can help keep the peace


NextGov story: “Some of the same social media analyses that have helped Google and the Centers for Disease Control and Prevention spot warning signs of a flu outbreak could be used to detect the rumblings of violent conflict before it begins, scholars said in a paper released this week.
Kenyan officials used essentially this system to track hate speech on Facebook, blogs and Twitter in advance of that nation’s 2013 presidential election, which brought Uhuru Kenyatta to power.
Similar efforts to track Syrian social media have been able to identify ceasefire violations within 15 minutes of when they occur, according to the paper on New Technology and the Prevention of Violence and Conflict prepared by the United States Agency for International Development, the United Nations Development Programme and the International Peace Institute and presented at the United States Institute of Peace Friday.”