We are failing Americans without college degrees. Research shows that up to 30 million workers without four-year degrees are drastically underpaid, and have the skills to earn 70 percent more than what they’re currently making. What accounts for this failure of the labor market? One problem is that traditional resumes don’t show or verify the full range of a worker’s skills—including those gained in the military and volunteer work, not to mention family businesses and caretaking. But there’s a promising digital fix that could help: learning and employment records. LERs are digital profiles that allow individuals to document their knowledge and skills, no matter how they were acquired—and have the potential to transform hiring while fueling innovation. What is an LER, and how can it be used to record everything you’ve ever learned? How can this technology be designed and implemented to create more jobs with good wages? And what will it take to design and implement LERs that make the labor market fairer to all workers instead of reinforcing existing social, educational, and digital divides?
Workcred senior director of research Isabel Cardenas-Navia, co-author of a new essay on LERs, and Issues in Science and Technology editor-in-chief Lisa Margonelli visit Zócalo to talk about reconstructing credentialing around a system that recognizes—and even encourages—non-traditional learning and diverse career paths.
Governments are turning off the internet to silence dissenters at an ‘exponential’ rate—and threatening civil society, says the chief operating officer of Google’s Jigsaw project.
Deliberate internet shutdowns enacted by governments around the world are increasing in frequency and sophistication, according to a recent report. The study, published by Google’s Jigsaw project with the digital rights nonprofit Access Now and the censorship measurement company Censored Planet, says internet shutdowns are growing “exponentially”: out of nearly 850 shutdowns documented over the last 10 years, 768 have happened since 2016. ∞ India’s government has shut off the Internet more than any other—109 times in 2020 alone—and data shows that shutdowns are most common around elections and times of potential civil unrest, leading to claims that it has become a tactic to suppress dissent. But while they are becoming more prevalent, shutdowns are also getting more subtle, using tactics like throttling a URL to dramatically slow its function, blocking particular internet addresses, and restricting the use of mobile data.
MIT Technology Review sat down with Dan Keyserling, the chief operating officer of Jigsaw, to discuss the growing phenomenon. . . .
Axed plan’s 10Mbps standard could have banned public networks in 98% of Ohio
After coming close to imposing a near-total ban on municipal broadband networks, Ohio’s Republican-controlled legislature has reportedly dropped the proposed law in final negotiations over the state budget. The final budget agreement “axed a proposal to limit local governments from offering broadband services,” The Columbus Dispatch wrote. With a June 30 deadline looming, Ohio’s House and Senate approved the budget and sent it to Gov. Mike DeWine for final approval on Monday night.
As we wrote earlier this month, the Ohio Senate approved a version of the budget containing an amendment that would have forced existing municipal broadband services to shut down and prevented the formation of new public networks. The proposed law was reportedly “inserted without prior public discussion,” and no state senator publicly sponsored the amendment. It was approved in a party-line vote as Democrats opposed the restrictions in municipal broadband. The House version did not contain the amendment, and it was dropped during negotiations between the House and Senate.
“Real grassroots movement”
Lawmakers apparently relented to public pressure from supporters of municipal broadband and cities and towns that operate the networks. People and businesses from Fairlawn, where the city-run FairlawnGig network offers fiber Internet, played a significant role in the protests. FairlawnGig itself asked users to put pressure on lawmakers, and the subscribers did so in great numbers. . . . . full story here at Ars Technica
ZipRecruiter, CareerBuilder, LinkedIn—most of the world’s biggest job search sites use AI to match people with job openings. But the algorithms don’t always play fair.
excerpt: For example, while men are more likely to apply for jobs that require work experience beyond their qualifications, women tend to only go for jobs in which their qualifications match the position’s requirements. The algorithm interprets this variation in behavior and adjusts its recommendations in a way that inadvertently disadvantages women.
“You might be recommending, for example, more senior jobs to one group of people than another, even if they’re qualified at the same level,” Jersin says. “Those people might not get exposed to the same opportunities. And that’s really the impact that we’re talking about here.”
Men also include more skills on their résumés at a lower degree of proficiency than women, and they often engage more aggressively with recruiters on the platform.
To address such issues, Jersin and his team at LinkedIn built a new Ai designed to produce more representative results and deployed it in 2018. It was essentially a separate algorithm designed to counteract recommendations skewed toward a particular group. The new AI ensures that before referring the matches curated by the original engine, the recommendation system includes a representative distribution of users across gender.
Kan says Monster, which lists 5 to 6 million jobs at any given time, also incorporates behavioral data into its recommendations but doesn’t correct for bias in the same way that LinkedIn does. Instead, the marketing team focuses on getting users from diverse backgrounds signed up for the service, and the company then relies on employers to report back and tell Monster whether or not it passed on a representative set of candidates. . . . full story here
With all the ongoing ransomware and cyber-attacks, connected IoT devices need an extra layer of security. New legislation in both Europe and the US are mandating such strengthened security. But what tools are available for embedded IoT engineers to meet these new requirements?
To learn more about providing enhanced protection of connected devices, Design News reached out to Haydn Povey, CEO of Secure Thingz and General Manager for the division Embedded Security Solutions at IAR Systems. What follows is a portion of that discussion.
“The requirements of new legislation for security in IoT devices are impacting us now. With the advent of EN 303 645 and the US IoT, Cyber Security Act signed into law last year, there is now mounting pressure on the Consumer IoT market to meet security standards. However, this is not just limited to Consumer IoT, with regulationsevolving quickly in other markets, such as the IEC 62443 requirement for Industrial IoT (Industry 4.0) and similar requirements in medical and automotive.” . . . full story here
Directive comes as ransomware is exposing the fragility of critical supply chains
The Justice Department has created a task force to centrally track and coordinate all federal cases involving ransomware or related types of cybercrime, such as botnets, money laundering, and bulletproof hosting.
“To ensure we can make necessary connections across national and global cases and investigations… we must enhance and centralize our internal tracking of investigations and prosecutions of ransomware groups and the infrastructure and networks that allow the threats to persist,” Deputy Attorney General Lisa Monaco told US attorneys throughout the country on Thursday. She issued the directive in a memo that was first reported by Reuters. Investigators in field offices around the country would be expected to share information as well. The new directive applies not just to cases or investigations involving ransomware but a host of related scourges, including:
The rise of connected medical devices demands a more proactive approach to cybersecurity.
Connected medical devices have become essential for modern healthcare. Their prevalence has improved healthcare immensely but also brought an increased threat of cyber attacks. Last year saw a 55% increase in cybersecurity attacks on healthcare providers in the United States alone. With patient data, health records, and critical infrastructure at risk—and connected devices only set to become more widespread and complex—the industry needs to reconsider its approach to cybersecurity protection. . . . .
As many healthcare organizations rush to adopt connected solutions, however, many are having to reflect on the cybersecurity implications of connectivity. With HCOs encountering a near 50% increase in cyberattacks by the end of 2020, the need to better address vulnerabilities in digital health systems is more pressing than ever. Cyberattacks aren’t just becoming more frequent, however; they’re also becoming more sophisticated. Recent years have seen a range of new threats come to the fore: 18 zero-day vulnerabilities—codenamed Ripple 20 —were identified recently by Cybersecurity business JSOF, while a range of vulnerabilities in IPNet Software, named URGENT/11, poses a particular threat to the healthcare industry according to FDA. . . . . full story here
5-21-21: Amazon and others are indefinitely suspending police use of face recognition products, but proposed legislation could make bans bigger or more permanent.
On May 17, Amazon announced it would extend its moratorium indefinitely, joining competitors IBM and Microsoft in self-regulated purgatory. The move is a nod at the political power of the groups fighting to curb the technology—and recognition that new legislative battle grounds are starting to emerge. Many believe that substantial federal legislation is likely to come soon.
“People are exhausted” – The past year has been pivotal for face recognition, with revelations of the technology’s role in false arrests, and bans on it put in place by almost two dozen cities and seven states across the US. But the momentum has been shifting for some time.
In 2018, AI researchers published a study comparing the accuracy of commercial facial recognition software from IBM, Microsoft, and Face++. Their work found that the technology identified lighter-skinned men much more accurately than darker-skinned women; IBM’s system scored the worst, with a 34.4% difference in error rate between the two groups. Also in 2018, the ACLU tested Amazon’s Rekognition and found that it misidentified 28 members of Congress as criminals—an error disproportionately affecting people of color. The organization wrote its own open letter to Amazon, demanding that the company ban government use of the technology, as did the Congressional Black Caucus—but Amazon made no changes. . . . full story here at MIT Technology Review
Engineers at Duke University have developed the world’s first fully recyclable printed electronics. Their recycling process recovers nearly 100% of the materials used—and preserves most of their performance capabilities for reuse. By demonstrating a crucial and relatively complex computer component—the transistor—created with three carbon-based inks, the researchers hope to inspire a new generation of recyclable electronics.
“Silicon-based computer components are probably never going away, and we don’t expect easily recyclable electronics like ours to replace the technology and devices that are already widely used,” said Aaron Franklin, the Addy Professor of Electrical and Computer Engineering at Duke. “But we hope that by creating new, fully recyclable, easily printed electronics and showing what they can do, that they might become widely used in future applications.”
Even though the ever-growing pile of discarded electronics is now on the decline, less than a quarter of it each year is recycled, according to a United Nations estimate. Part of the problem is that electronic devices are difficult to recycle. Large plants employ hundreds of workers who hack at bulky devices. But while scraps of copper, aluminum and steel can be recycled, the silicon chips at the heart of the devices cannot. . . . . full story
The largest Internet providers in the US funded a campaign that generated “8.5 million fake comments” to the Federal Communications Commission as part of the ISPs’ fight against net neutrality rules during the Trump administration, according to a report issued today [May 6, 2021] by New York State Attorney General Letitia James.
Nearly 18 million out of 22 million comments were fabricated, including both pro- and anti-net neutrality submissions, the report said. One 19-year-old submitted 7.7 million pro-net neutrality comments under fake, randomly generated names. But the astroturfing effort funded by the broadband industry stood out because it used real people’s names without their consent, with third-party firms hired by the industry faking consent records, the report said.
The NY AG’s office began its investigation in 2017 and said it faced stonewalling from then-FCC Chairman Ajit Pai, who refused requests for evidence. But after a years-long process of obtaining and analyzing “tens of thousands of internal emails, planning documents, bank records, invoices, and data comprising hundreds of millions of records,” the NY AG said it “found that millions of fake comments were submitted through a secret campaign, funded by the country’s largest broadband companies, to manufacture support for the repeal of existing net neutrality rules using lead generators.”
It was clear before Pai completed the repeal in December 2017 that millions of people—including dead people—were impersonated in net neutrality comments. Even industry-funded research found that 98.5 percent of genuine comments opposed Pai’s deregulatory plan. But today’s report reveals more details about how many comments were fake and how the broadband industry was involved. . . .full story at Ars Technica here