Headphones

The right music can make your productivity sing. Or hum. Or crescendo.

When you’re in need of motivation, relaxation, or inspiration, do you turn to music? Music can energize us, calm us, make us happy or sad, it can cause us to jump about or to tense up in nervous expectation. Yet when it comes to music at work, all of that stimulation doesn’t always translate into better performance. It turns out that there’s quite a bit of nuance in selecting the right music for the work you’re doing.

One report on the value of music found that 59% of respondents felt that music added to their experience at work, while other surveys have found that music improves people’s job satisfaction and/or performance. But while music may indeed make us feel better and more productive, the research examining actual performance while listening to music isn’t so clear. 

Individual differences in music preferences and personality

The sheer variety of music available today means we are each capable of selecting songs that more precisely match our goals or emotions. This has allowed researchers to begin teasing apart what characteristics of music correlate to what aspects of personality.  

It turns out there is a lot you can tell about someone by simply looking through their music collection. Take sensation seeking, a personality trait where people overlook risk in the pursuit of new and intense experiences. Turns out this trait has close ties to rock music. Then there’s the evidence that extroverts prefer music with exaggerated bass, such as dance and rap. 

Research into how personality relates to music preferences split music along four dimensions: reflective and complex (jazz, blues, classical), intense and rebellious (rock, heavy metal), upbeat and conventional (country, pop), and energetic and rhythmic (rap, electronic). The researchers then correlated these with personality dimensions, and found that openness to experience—a personality construct defined by curiosity, a rich imagination, and aesthetic sensitivity—correlated most strongly with the reflective and intense musical dimensions. Meanwhile, extraversion and agreeableness were correlated to the upbeat and energetic dimensions. 

A study of how musical preferences are linked to cognitive styles went in another direction by dividing people into two categories—empathizers are those who focus on emotions while systemizers are those who focus more on patterns and rules. The empathizers were found to prefer music with low arousal (gentle, warm, and sensual attributes), negative valence (depressing and sad), and emotional depth; the systemizers, on the other hand, preferred music with high arousal (strong, tense, and thrilling), and aspects of positive valence (animated) and cerebral depth (complexity). 

Considering the variability in personality and musical preferences, the first point that should be made is that for us to get a benefit from the music we listen to, we should listen to something we enjoy. A study of music’s link to spatial reasoning found that listening to Mozart increased participants’ scores on a spatial task, giving rise to something called the “Mozart effect,” in which listening to just 10 minutes of a Mozart sonata boosted performance on reasoning tasks. However, it was later found that the Mozart effect is not actually linked to Mozart—the same mental boost could be created simply by playing music people liked listening to. 

All of which tells us that selecting music that you enjoy is the first step in using music to boost productivity. Now let’s look at how the actual selection of your music works.  

Music and cognitive performance

When performing more cognitively-demanding tasks, research suggests that less is more. That’s because as tasks grow in complexity, more of the brain’s mental capacity is needed to meet those demands. Which raises an important point: as good as music feels when you’re listening to it, it is nonetheless a distraction, diverting a portion of your cognitive powers whether you’re actively listening to it or not. 

This was demonstrated in a study into how background music impacts work. The researchers looked at people doing five different tasks with varying types of noise, and found that “Performance was lessened across all cognitive tasks in the presence of background sound (music or noise) compared to silence.” In a related study, people performed worse on a memory task when they had music going in the background—regardless of whether they liked or disliked the music. 

It’s also important to remember that this balance between effort and music exists only when both are taking place simultaneously. Given music’s ability to raise our mood and to motivate us, improvements in performance can be found when music is used before a task. Canadian undergraduates performed better on an IQ test after listening to an up-tempo piece of music composed by Mozart in comparison to a slow piece by Albinoni. 

If your job requires you to think carefully, to focus on something complex, then your music should be turned off or virtually unnoticeable. If music is a must, make it instrumental. People are highly attuned to language, which can make music with lyrics a big distraction. Speech is one of the most distracting aspects of open offices: it is more distracting when it can be understood compared to unintelligible speech; and hearing half of a conversation (like one side of a cell phone call) is more distracting than hearing the whole thing.  

The impact of music on creativity

Where does creativity come into the picture? Creativity is often more fleeting and less focused, involving less rigid thinking and more open-ended contemplation. In fact, creativity can often come as a consequence of being distracted rather than being focused. 

Creativity, unlike focused thinking, can often be improved by dividing or distracting our attention. In 2001 a neuroscientist, Marcus Raichle, identified the brain’s default mode network (DMN), a group of brain regions that become active when we turn our attention away from the world around us, and instead tune into our imagination. This network is responsible for mind wandering—the moments in which our mind is filled with random thoughts as we sit back for the ride. Certain aspects of music have been shown to promote activity in the DMN.  

The role of music largely depends on which type of creativity you’re aiming for. If you’re in a hurry and need to force your inspiration, your music should be sparse, even white or ambient noise. If you’re in need of a flash of insight, the type of a-ha moment that comes when you’re distracted—in the shower, walking through the park—then pump up the volume and lose yourself for a while.  

Learn to pair the right music to the task

The key to selecting music while you’re working depends heavily on the amount of mental effort required by the work you’re doing. The more mentally demanding the work, the less you want complex, active music demanding cognitive resources. As uplifting and inspiring as music can be, it requires mental resources, making it a distraction—although in the case of creative inspiration, a helpful distraction. 

Yet when it comes time to buckle down and get challenging work done, less noise works best. And as your task grows in complexity, your music should sink further into simplicity. By following this simple principle, we might be able to achieve a little more in our intellectual and creative pursuits. 

Email traffic

Email traffic reaches astronomical levels [VIDEO]

These days, email is a fact of life. But at the rate it’s growing, it’s practically becoming a fact of nature. In this video enFact, we look at just how big email has become around the world by comparing emails to miles, then calculating just how many trips from Pluto to the Sun and back all of our email messages represent.

No wonder we’re spending hours and hours a day in our inboxes!

Read the original version of this enFact here.

Entefy’s enFacts are illuminating nuggets of information about the intersection of communications, artificial intelligence, security and cyber privacy, and the Internet of Things. Have an idea for an enFact? We would love to hear from you. 

Lock

Fighting fire with fire: The future of cybersecurity is artificial intelligence

It’s been a banner year for cyber criminals. International cybersecurity disasters such as the WannaCry and Goldeneye ransomware attacks impacted thousands of people around the globe and illustrated just how tenuous a grasp most organizations hold on their security. Then there’s the Equifax debacle, which impacted about 1 in 3 Americans. And if the CIA can’t protect its own data from ending up on Wikileaks, what chance do the rest of us stand against ever-more-sophisticated hackers?   

In theory, artificial intelligence can provide new forms of protection against nefarious actors. But the challenge is that those same nefarious actors will also have access to AI technologies. As every day passes, AI becomes more powerful in the hands of both white hat and black hat hackers. And with more and more data being collected and stored globally, the stakes become much higher with every passing moment. 

Security is becoming an increasingly urgent concern, particularly as experts warn against the gaps in the “wildly insecure” Internet of Things. Smart home features, assisted driving systems, and convenient wearables are all perks of living in the 21st century. Yet these same advantages expose us to digital security violations and cybercrime. Our best hope of defending against AI-powered cyberattacks is to leverage the power of AI in cybersecurity. Fighting fire with fire.

The dangers of AI-powered cyberattacks

Before we dive into how AI helps combat cyberattacks, we first need to understand the challenges. Hackers have been spreading viruses and breaking into databases since networked computing emerged decades ago. Security analysts are always working hard to keep up with new threats. But the sheer amount of data that’s now generated makes it impossible for them to track every anomaly and red flag on their own. After all, humans create 2.5 exabytes of data each day – the equivalent of 250,000 Libraries of Congress. 

“IT security teams are struggling to see what is happening in and around their IT infrastructures,” wrote one business expert. “They struggle to understand where all corporate data lives and who has access to it, not to mention what users are doing with that access.” With hundreds of millions of new security logs created each week, security teams cannot possibly process that data without technological assistance, suggesting new applications for AI

As AI has become a growing presence in people’s daily lives – think voice-activated assistants and car autopilots, for instance – our understanding of the opportunities and dangers has matured. 

“The rise of brain-computer interfaces, in particular, will create a dream target for human and AI-enabled hackers. And brain-computer interfaces are not so futuristic — they’re already being used in medical devices and gaming, for example,” one computer science professor wrote about near-future cybersecurity threats. “If successful, attacks on brain-computer interfaces would compromise not only critical information such as social security numbers or bank account numbers but also our deepest dreams, preferences, and secrets.”

Rather than worrying about a malevolent AI rising from the pages of a sci-fi novel to conquer us all, our fears are coming back down to earth. But that doesn’t mean they’re any less scary. In fact, we should be more concerned about malicious or incompetent humans misusing AI and causing unprecedented security challenges. 

At least, that was President Barack Obama’s view of AI. He worried more about hostile actors using AI to commit cyberattacks that harm millions of people than about an autonomous system taking it upon itself to wipe out humanity. 

“There could be an algorithm that said, ‘Go penetrate the nuclear codes and figure out how to launch some missiles,’” Obama told Wired. “If that’s its only job, if it’s self-teaching and it’s just a really effective algorithm, then you’ve got problems.” 

With that in mind, it’s no wonder that the Defense Advanced Research Projects Agency (DARPA), an arm of the Department of Defense, invited high-level hackers to develop proactive AI hacking systems that could detect and repair system vulnerabilities before the bad guys could find them. 

The cybersecurity risks associated with AI are real, and they’re less sci-fi than early hysteria made them out to be. Companies are struggling to recruit qualified cybersecurity professionals due to both a lack of supply and a lack of knowledge, according to an ISACA cybersecurity survey. Even if they can get candidates in the door, hiring managers may not know exactly which skills are needed to defend against attacks. Not only do cybersecurity workers need to understand existing threats, they must also be able to adapt to the ever-shifting, complicated nature of the field. 

Given the growing amount of data, rising number of cyber threats, and the rapid pace of technological change, it’s clear that humans can’t battle cyberattacks alone. We need AI to defend our data against AI – or more specifically, against the humans who would wield AI for less-than-virtuous purposes. 

Artificial intelligence (and humans) to the rescue  

Now that we’ve covered the worst-case scenario side of things, let’s look on the bright side. AI is one of the most powerful tools humans have ever invented, and researchers are already leveraging AI-powered programs to combat cyber threats. In addition to DARPA incentivizing white hat hackers to build autonomous threat-detection systems, experts are using machine learning to beat criminals at their own game. 

Right now, one of the major threats to our virtual and digital well-being is hackers manipulating computer systems through misleading patterns. As a senior editor at MIT Technology Review wrote recently, computer programs “are vulnerable, in part, because they lack actual intelligence.” Without the instinct to reject suspicious-sounding commands, programs may download malware or make incorrect route calculations for self-driving cars. Security experts are experimenting with using machine learning to spot fake patterns and signals so programs will learn to ignore those and avoid cyberattacks. 

Others are taking a hybrid human-AI approach to cyberattacks, developing programs that analyze millions of security logs, flag any suspicious activity, and refer the potential hacks to human analysts. The experts then conduct their own analyses to determine if there’s been a breach. They document the outcomes of these investigations, and the AI system integrates this data into its understanding of what constitutes a threat. In this way, it learns from its mistakes and successes, which leads to a higher accuracy rate and reduced vulnerability.  

AI can dramatically decrease the amount of time it takes to discover security breaches, with some organizations striving to lower alert times from months to minutes. As cyberattacks increase in number and sophistication, time will be increasingly important to mitigating the data and financial fallouts from these attacks. Although many data breaches are caused by system breakdowns or human errors, research indicates that criminal cybersecurity attacks are on the rise. Detecting a hack within the hour after it happens is vastly preferable to finding out months later, when millions of pieces of data have been exposed. 

Becoming our own cybersecurity heroes 

Unfortunately, the cybersecurity war has no end in sight. As new technologies emerge, black hat hackers will find clever new ways to steal high-value data, and white hat security experts will leverage those same technologies to combat the assaults. Companies will likely need to create cybersecurity ecosystems that combine multiple forms of AI to protect their data, and their customers’ data, through fast detection and crisis mitigation protocols. 

There are ways for you and I to protect ourselves as well. Researchers are using AI to create password-generation tools that make it more difficult for attackers to crack, and it’s important that we all monitor such trends and take responsibility for our personal password maintenance. But keep in mind, too, that the more personal information you share online, the more AI-savvy hackers have to work with. 

Some experts predict that hackers will be able to use phishing and machine learning to generate scam emails that sound eerily similar to your own communication style, accurately guess your responses to security questions, or send fraudulent text messages to get you to reveal private information. To stay protected, always check that emails are coming from secured, trusted senders and avoid providing information over unsecured connections. Monitor your accounts for suspicious activity, and trust your instincts when a message or transaction feels off. Hackers are highly motivated and often quite skilled at what they do. But that doesn’t mean victimization is a foregone conclusion.  

As is the case with so many facets of AI, the future of cybersecurity requires both artificial intelligence capabilities and proper human judgment. Humans will need to provide context to the output of AI systems, train both machines and themselves to better determine when there’s a true threat, and find new ways to beat criminals to system vulnerabilities. The battle goes on, but we can use AI to ensure that the bad guys don’t win. 

Shoes

Habits—not hacks—are the secret to success

Personal productivity is a key aspect to professional success. When it comes to ideas for increasing your productivity, there’s no lack of advice. “7 Life Hacks to Accomplish Anything!” “154 Tips for Busy People.” “223 Best Hacks for Work.” The tips and hacks are seemingly endless. But notice how these lists seem to say that there are ever-changing best practices when it comes to professional productivity. As if tomorrow, someone might invent a new and better way to achieve success. 

The problem with improving your productivity using mere hacks isn’t the suggestions themselves. It’s that the suggestions tend to be only narrowly useful. “Do your hardest task first” sounds reasonable, but what if your personal biorhythms make you more productive and creative later in the day? The better habit is to simply know your body clock.

Then there’s the implication that a person can selectively cobble together a set of hacks that will somehow instantly transform them into a super-productive, hyper-successful professional. Success isn’t that simple. 

But it doesn’t have to be all that complicated, either. The true secrets to success aren’t secrets at all. In fact, you probably hear them all the time. A growing body of research shows that the most effective productivity “hacks” are actually the accumulated wisdom of humankind over the past 7,000 years or so. The same habits that have elevated individuals and societies since humans moved from small tribal hunter-gatherer groupings to the much more complex challenges of agricultural and urban living.

The future of productivity is the past

They’re often called the “seven virtues,” a set of habits that show up in virtually every complex civilization, sometimes under different terms, and sometimes in slightly different groupings. Aldous Huxley drew attention to these cross-cultural overlaps in The Perennial Philosophy. What are the seven virtues and what do they represent?

  • Prudence, encompassing common sense, reason, wisdom, good judgment, foresight, diligence, and discretion.
  • Justice, representing due process, honesty, integrity, law, right, and truth.
  • Temperance, or restraint, self-control, frugality, moderation, and humility.
  • Courage, comprising bravery, firmness, fortitude, grit, and determination.
  • Trust, or broadly, acceptance, belief, confidence, loyalty, and conviction.
  • Hope, which is aspiration, confidence, optimism, and a forward-looking perspective. 
  • Love, and the habits of commitment, affection, appreciation, friendship, and respect.

Those are some seriously old-fashioned-sounding words. We can perhaps bring them up-to-date by expressing them in the language of productivity advice: 

  • Work hard
  • Use common sense
  • Be fair
  • Demonstrate grit and determination
  • Trust and be trusted
  • Be hopeful
  • Maintain self-control
  • Invest in relationships

That is a reasonably brief list of life and career habits that is pertinent to a broad range of circumstances. But is there evidence that these productivity habits actually work? Put simply: yes.

Over the centuries and across cultures, a lot has been written about these behaviors, though often limited to philosophical, religious, cultural, or anthropological perspectives. Empirical research into their practical implications is relatively recent. 

One such research project is the World Values Survey, which allows us to measure the differences between national cultures and link those differences to national outcomes. There are many other sources of data on behaviors and virtues and their linkage to life outcomes such as the U.S. Census Bureau’s American Community Survey, longitudinal studies such as The Lewis Terman Study, and national databanks from countries like Sweden and Iceland that maintain integrated databases on issues like health, income, sociology, and crime. 

The big picture is that these and other research projects support the idea that some of the best productivity advice is actually rather timeless.

What the data says about productivity

There is some real insight into productivity to be found by looking at…poverty. One finding that has been independently documented multiple times is a triple-package of personal behaviors that shield a person from poverty. Fewer than 2-4% of people who meet the following criteria end up in poverty:

  • Graduate high school, related directly to the habits of Courage, Prudence, Temperance, and Hope.
  • Get married, stay married, and don’t have children before marriage, related directly to Courage, Prudence, Temperance, Hope, Love, and Trust.
  • Stay employed, regardless of job quality, directly related to Courage, Prudence, Justice, and Temperance.

Looking at each of the “seven virtues” individually, here’s how the research plays out. Let’s start with Trust. Multiple studies have found a strong association between countries with high levels of trust and high levels of prosperity. The causal mechanisms are still being researched and debated, but it appears that cultures that foster trust reduce social and economic friction, thereby improving efficiency and increasing rates of innovation. 

Similarly, countries with strong Justice institutions, reflecting rule-of-law and due process, also have a strong correlation with higher levels of national and individual prosperity. The degree of self-control (Temperance) a person exhibits in childhood is a predictor of beneficial future life outcomes. Grit and time-discounting (Courage) are well-documented precursors of achievement. Hope is also strongly associated with positive life outcomes and is, in fact, an integral part of the placebo effect. Finally, Love (defined broadly as personal and social relationships) has also been demonstrated to be closely affiliated with positive life outcomes.  

In an era of rapid technological change, it is refreshing to see that wisdom dating back thousands of years retains such relevance in the equally-ages-old pursuit of productivity and prosperity. 

Information overload

Information overload, fake news, and invisible gorillas. Teach your brain new habits. [VIDEO]

Feel like you have a limited attention span these days? You’re not alone. Throughout the day we’re bombarded by new information in one form or another. And it’s difficult to moderate how much information we consume when there’s always something new and intriguing calling out for a click. 

When your attention is a limited resource, the challenge is knowing how to spend it wisely. In this video, we’ll take a look at the many forms of information overload at work in the world, then present ideas for how to tame all that complexity.

You can check out slides about this topic here

Person wearing a mask

39 ways your private data is in jeopardy, and 8 guides to fighting back

Feel like you’re being watched? It’s probably because you are. 

Entefy is developing cyber security technologies that protect users’ private data, so we’re naturally very interested in what we call “data trackers,” digital surveillance systems designed to go unnoticed as they capture your sensitive personal data. 

Not all data trackers are secret or even nefarious. Some surveillance is disclosed through Terms of Service or other user agreements. After all, it’s become a rule that if you didn’t pay for the app, you’re the product—your usage will be collected and monetized, usually through targeted advertising. 

Data trackers come in all shapes and sizes. They can take the form of security vulnerabilities—like the example below of hackers stealing smartwatch data to deduce ATM PIN codes from the motion of the victim’s hands. Others we simply accept as facts of 21st century life or fair payment for free services we can’t live without. Still others are just plain disturbing, like toys designed to record children while they play.

Below we’ve assembled a list of 39 different data trackers that Entefy has researched over the past year. The point of this article is education: to provide you with information about data collection activities that can easily go unnoticed. Informed digital consumers can become secure digital consumers. But at the end of the day, it’s difficult to read about all of these data trackers and not end up feeling just a little bit icky about the sheer number of companies profiting from your personal data.

The items below were first covered in the following Entefy articles:

Secret and not-so-secret data trackers and cyber security threats

  1. Think you’re safe from privacy violations at work? You’ll probably want to know that one report estimates 15% of the Fortune 500 make use of secret tracking devices hidden in lights and ID badges. One surveillance vendor reports that 350 different companies are using its products to monitor “conference room usage, employee whereabouts, and ‘latency’—how long someone goes without speaking to another co-worker.”
  2. The CEO of iRobot, the maker of the popular Roomba automated vacuum cleaner, caused a stir after apparently suggesting the company was seeking deals to sell data about the layout of users’ homes to third parties. The company later clarified that it didn’t have any plans to sell the data without users’ consent. The situation shines a spotlight on the ongoing tension between personal privacy and the monetary value of certain types of consumer data. 
  3. Achieving the elite heights of pro sports apparently doesn’t make you immune to privacy threats. The NBA and its players’ union are in conflict over how much data can be collected and shared using wearables like fitness trackers. The player’s union is seeking control over what data is collected and how it gets used. Exactly the same legal issues and ethical considerations that are being raised as more and more employers deploy wearables to their employees. 
  4. Your car is watching. Computer systems in many newer cars create records of pretty much everything you do on the road, from logging telephone calls to recording how fast you drive. The challenge for consumers is figuring out what’s being collected, and where it goes afterward. The legal situation in the U.S. is murky, with no one law covering data collection by automobiles.
  5. Be careful what you say in front of Barbie. A study from University of Washington researchers demonstrates how the Internet of Toys is raising new privacy questions. In interviews with parents and children about the use of Internet-connected toys, the researchers found that children were unaware that their toys were recording their voices, and that parents worried about privacy pretty much any time the toys were out of the toy boxes. 
  6. A lighthearted Facebook meme may unintentionally telegraph answers to your banking security questions. The post, called “10 Concerts I’ve Been To, One is a Lie,” asks users to share information about concerts they’ve attended. The problem is that “Name the first concert you attended” is a common security question used by banks and other financial institutions for online authentication. Phishing aside, the meme can also “telegraph information about a user’s age, musical tastes and even religious affiliation — all of which would be desirable to marketers hoping to target ads.” 
  7. Usage-based insurance (UBI) is the term for insurance products that are priced according to specific usage factors. UBI auto insurance, for example, is priced on factors like how often a driver uses their car, how fast they take corners, and their average speed. University researchers were able to demonstrate that it’s possible to reveal personal data by pointing an AI algorithm at usage-based insurance data stored in the cloud. One researcher commented, ‘An attacker only needs one part of the information provided to a UBI company to discover a driver’s whereabouts, home, work, or who they met with.’
  8. An audit by the Internet security nonprofit Online Trust Alliance found that 6 of the 13 “Free File Alliance” tax websites approved by the IRS provide inadequate security and privacy protection. The report states, “Criminals are increasingly penetrating IRS systems, targeting e-file service providers and harming consumers through bank account take-overs, identity theft, ransomware and compromising completed returns to redirect tax refunds.” As if April 15 wasn’t stressful enough.
  9. The Lumen Privacy Monitor will tell you which apps are collecting your data. 7 in 10 smartphone apps share your data with third-party services. To help users become aware of which apps are collecting data from them, researchers developed an app that lets users “see their information collected in real time and the identity of the entities receiving the information.”
  10. Get your Facebook data back. Do you ever wonder how Facebook gains so much insight about its users? The free browser extension Data Selfie sheds light on Facebook’s machine learning algorithms and “tracks all the digital breadcrumbs you would leave behind when using Facebook (hint: it’s a lot of breadcrumbs) and creates your personality profile.”
  11. It’s possible to hack a phone through sound waves. Accelerometers measure rest and acceleration in smart devices and are commonly found in smartphones, fitness trackers, and automobiles. Although helpful for navigation and orientation, there’s been a recent discovery that accelerometers are susceptible to vulnerabilities. “Researchers describe how they added fake steps to a Fitbit fitness monitor and played a ‘malicious’ music file from the speaker of a smartphone to control the phone’s accelerometer. That allowed them to interfere with software that relies on the smartphone, like an app used to pilot a radio-controlled toy car.”
  12. ESPN collected first-party data on about 106 million of its users. ESPN collects information such as a person’s favorite teams, leagues, and players, as well as displays strategic advertisements based on these preferences. If a Warriors fan visits the website after a win, advertisements for special merchandise will appear when that person checks the website. For the ESPN visitors that do not volunteer their preferences, the network can figure out sport preferences by tracking their behavior online.
  13. Smart TVs are known to track personal data, and Vizio got caught. Earlier this year, Vizio paid $2.2 million to settle charges for monitoring viewing habits of more than 11 million TVs without consent. “The main problem was that Vizio TVs had tracking features turned on by default, instead of an opt-in setting like many other manufacturers use…but the situation is now a relatively good one for Vizio TV owners: the company is specifically prohibited from tracking your viewing habits without explicit permission.”
  14. Google can track when someone clicks an ad and buys something from a physical store. If you see an online advertisement for a product, then go to a store and buy it with a credit card, Google can track your behavior and report the data to marketers so that they can see how effective their advertisements are. “How does Google know if you bought something at Subway or Aldo? It works with the credit and debit card companies to match up in-store purchases with your online identity. The company has partnerships with companies that account for 70% of credit and debit card purchases in the U.S.”
  15. There are “microdots” on printed documents that encode the serial number for the original printer. Research that printers might be spying on us has been around for a while. A recently leaked document has brought it to the forefront of the news again. After a quick analysis of documents related to a National Security Agency leak case, experts “seemed to reveal the exact date and time that the pages in question were printed: 06:20 on 9 May, 2017 – at least, this is likely to be the time on the printer’s internal clock at that moment. The dots also encode a serial number for the printer.”
  16. Not all virtual private networks (VPNs) are created equal. VPNs create an encrypted connection between your browser and another private server, and protect users from things like malware. But it can be hard to tell how secure every VPN is and what it’s doing with your data. To optimize security on your VPN, “avoid free services, and…look into setting up your own. Otherwise, make sure a paid VPN has a privacy policy you’re okay with…And on a larger scale, remember that the best solution is still policies that would tackle the problem at the source: ISPs’ ability to sell your data.”
  17. Twitter’s new privacy policy with invasive defaults doesn’t “sound good.” Twitter has updated its privacy policy in order to provide users with a more personalized experience, which includes very specific tailored ads. Twitter “will now record and store non-EU users’ off-Twitter web browsing history for up to 30 days, up from 10 days in the previous policy.” This policy is on an opt-out basis. You can “click ‘Review settings’ to opt out of Twitter’s new mechanisms for user tracking.” Wondering why EU users are exempt from this privacy policy? Read on.
  18. Amazon Echo Look is collecting a full picture of you and your home. The cloud-connected camera wants to give consumers feedback on their outfits by using advice from fashion experts and machine learning algorithms. “The lookbook is a digital collection of ‘what you wore and when.’” But what’s important here is that “you’re potentially giving the tech giant a lot more data than just the type of chinos you sport. The pictures can reveal socioeconomic status, whether you’re married, religious affiliation (hello cross above your bed), and potentially a lot more.”
  19. Evernote attempted to update its privacy policies to make it clear that its employees could read your notes, without the option to opt out. But users protested and the company reversed the changes: ‘We announced a change to our privacy policy that made it seem like we didn’t care about the privacy of our customers or their notes. This was not our intent, and our customers let us know that we messed up, in no uncertain terms. We heard them, and we’re taking immediate action to fix it.’ 
  20. A Canadian consumer data privacy advocacy group found that many popular fitness tracking devices transmit your data in ways that make the devices vulnerable to interception or tampering. And the devices can potentially be used to track your movements and profile you: “We discovered severe security vulnerabilities, incredibly sensitive geolocation transmissions that serve no apparent benefit to the end user, and that were not available to users for access and correction, and unclear policies leaving the door open for the sale of users’ fitness data to third parties without express consent of the users.”
  21. study published in the Journal of American Medicine looked at a large collection of diabetes apps on Android and concluded: “Most of the 211 apps (81%) did not have privacy policies. Of the 41 apps (19%) with privacy policies, not all of the provisions actually protected privacy (e.g., 80.5% collected user data and 48.8% shared data). Only 4 policies said they would ask users for permission to share data… Patients might mistakenly believe that health information entered into an app is private (particularly if the app has a privacy policy), but that generally is not the case.”
  22. If you’re worried about protecting your activity on Facebook, it’s worth recalling that the social network makes it easy for its advertisers and partners to track you freely: “Most people forget that when they download an app or sign into a website with Facebook, they are giving those companies a look into their Facebook profile. Your profile can often include your email address and phone number as well as your work history and current location.”
  23. Meitu, a popular photo-editing app that requires a long list of permissions, has other potential security vulnerabilities: “[Security experts] found numerous serious privacy flaws and avenues for potential leaks of personal data. One eagle-eyed researcher found the Android version of the app asked users for dozens of intrusive permissions, and sends the data to multiple servers in China—including a user’s calendar, contacts, SMS messages, external storage, and IMEI number.”
  24. WhatsApp was in the news after a disputed report about a security vulnerability; what emerged from the discussion was awareness that the app’s privacy policies are not clearly defined: “One of the biggest concerns around WhatsApp from a privacy perspective is its opacity, as frequently noted in the Electronic Frontier Foundation’s assessments of which tech providers ‘have your back.’ Whilst [WhatsApp] owner Facebook does have a transparency report, released twice a year, it doesn’t drill down into how many data requests relate to WhatsApp, let alone what kinds of information it can hand over.”
  25. Your ambient conversations aren’t believed to be recorded, but Alexa and Google Home listen to everything you say in order to activate each system. You can restore privacy by using the physical mute button on each device. “If you only use Chrome in ‘Incognito Mode,’ put tape over your laptop camera, and worry about snoops sniffing your packets, a web-connected microphone in your home seems risky.”
  26. Uber is collecting location information for up to 5 minutes after rides end. Unless you opt out, Uber collects a rider’s location even after closing the app. The company stated that its intention is to improve pickups and drop-offs and measure safety issues like how often riders cross the street after their ride. The company recently announced that it intends to quit user tracking.
  27. Some types of wearable devices record the movements of users’ hands. These devices can be hacked in real time to reveal ATM PIN numbers and other key-based security codes. Researchers stated that “Adversaries can obtain sensor readings of wearables via sniffing Bluetooth communications or installing malwares on the devices, and further infer the user’s PIN sequence.”
  28. The conversations kids have with these cute toys through an app are being sent to a third-party server in the U.S. without asking for permission first. The app uses a popular voice recognition technology; the problem is that parents aren’t clearly notified that kids’ voices are recorded and sent to a third-party that states in its Terms of Service the data can be used for advertising or further shared with other third-parties.
  29. Android apps that are downloaded outside of Google Play are not always secure. Hackers create lookalike apps that, when downloaded, can take over a device, spread ransomware, and steal data. One malware campaign known as “Gooligan” infected more than 1.3 million Google accounts globally, primarily in Asia. You can check to see whether your account was compromised by visiting this site. 
  30. Headphones can be hacked into and used as listening devices. Researchers in Israel have “created a piece of code designed to prove it’s possible to hijack a user’s headphones and turn them into a covert listening device…[The malicious code] captures vibrations in the air and converts them to electromagnetic signals able to capture audio.”
  31. Even when Shazam is turned off on a Mac, the microphone remains active. The stated purpose was to create a better user experience, but it leaves the app vulnerable to hacking. After users complained, the company stated that it intended to reverse the decision and issue a patch for Mac users.
  32. Ultrasonic cross-device tracking uses high frequency audio signals—that you can’t hear—to track your online and offline behavior and assemble a profile of what ads you’ve encountered, what websites you’ve visited, and where you’ve been. Most users are unaware that when they grant an apps permission to access their smartphone’s mics, “apps that use ultrasonic tracking could access their microphone…all the time, even while they’re running in the background.”
  33. Individuals can install software that informs them when someone opens their emails without you being notified. The software has legitimate uses, like ensuring important emails reach their intended recipients. But by operating in secret, the technology is ripe for abuse. Like one case of a fan stalking the rapper Jay-Z
  34. Phone metadata created by calls and texts can reveal private information about you, like the status of your health. Stanford researchers built a smartphone app that collected phone call and text message metadata like the frequency, time of day, and duration of communications. They were then able to determine very specific information about individuals from that metadata, like that one study participant had a heart condition and another owned a particular model of assault rifle.
  35. If you download popular free apps on your Android or iPhone, it’s respectively 73% and 47% likely that your personal information has been shared with third parties. “The average Android app sent sensitive data to 3.1 third-party domains, and the average iOS app connected to 2.6 third-party domains.” Many of these connections are disclosed to the user, while many were not. 
  36. Your browser settings and battery levels are “fingerprinting” that is personally identifiable and trackable across devices. User tracking has evolved to be far more sophisticated than cookies, those small files that contain information about you. Advanced tracking systems can infer from usage patterns that, for example, a smartphone and a laptop are used by the same individual.
  37. Frequent Locations on your iPhone records your every move unless you turn it off. “Apple says that the data is stored only on your device and nowhere else unless you opt into to share it with the company to improve the Maps feature. In that case, the company says it stores user private data anonymously.”
  38. Hackers can follow you in real-time while you’re using a traffic app. In a published paper, researchers at UC Santa Barbara studied how Sybil attacks—a type of security threat when a node in a network claims multiple identities—could cause mayhem. They concluded, “Our experiments show that a single Sybil device with limited resources can cause havoc on Waze, reporting false congestion and accidents and automatically rerouting user traffic.” 
  39. In another case of spying toys, major toy companies breached the U.S. Children’s Online Privacy Protection Act and collected data about children for third parties. “The companies used technology that allowed third-party vendors to collect and use personal information from children under the age of 13 without parental approval.”

Security guides for protecting your digital identity

In our article, “Now is not the time to take a nap in your security blanket,” we shared resources that describe steps you can take to increase your digital security profile—everything from setting up VPNs to one simple action the FBI recommends for preventing unauthorized use of your laptop camera. 

  1. This guide to setting up a Virtual Private Network “in 10 minutes for free” describes the steps you can take to install the secure Opera browser, evaluate VPN providers and products, and start using the Electronic Frontier Foundation’s HTTPS Everywhere browser plug-in.
  2. The consumer privacy nonprofit Fight for the Future created an interactive guide to protecting smartphones, laptops, and desktops. This resource is designed to be accessible to computer users of any knowledge level.
  3. Following the revelations about C.I.A. hacking, the New York Times produced a guide to protecting iPhone and Android smartphones as well as smart TVs, routers, and personal computers. 
  4. Consumer Reports magazine produced a guide with 66 actionable tips for protecting your privacy, covering steps to prevent personal data collection, select better passwords, and even protect your data after death. They published a 10-minute digital privacy tune-up as well.
  5. Quick tip from the FBI: cover your laptop’s webcam camera.
  6. Famed hacker Kevin Mitnick shared his tips on how to secure your smartphone and laptop.
  7. Here is a roundup of 10 low-tech ways to guard your online privacy, covering tips like plugging your headphone jack to thwart hackers from hijacking your smartphone’s mic.
  8. Understand more about what encrypting your Internet activity from your ISP does and doesn’t do.

The digital world is complex and constantly evolving. Spend some time determining your comfort level with automated data collection, then evaluate the apps and services you use against your personal standards. There are millions of apps available on the major mobile platforms, so be sure to look for high-quality apps that don’t depend on advertising data collection. Stay informed, stay (digitally) safe. 

Touchscreen table

IF hyper.talented THEN apply.to.Entefy

“Choose a job you love, and you will never have to work a day in your life.” —Confucius 

This is an ethos that deeply resonates with us, the powerful idea that the work we do can be simultaneously challenging and fulfilling. After all, when what you’re doing is solving big, hairy, global challenges—with the potential to quite literally make people’s lives better—the separation of “work” and “life” seems tired and outdated. 

From the beginning, Entefy has recruited a global team of amazingly talented people who don’t shy away from a major challenge. We’re a growing tribe of impact-minded professionals who are inspired by Entefy’s mission to create technology that saves people time so they can live and work better. And by people we mean every person everywhere.

Now is a great time to explore opportunities with us. 2017 has already been a big year for the company. We concluded our Series A financing round and were issued a significant patent by USPTO. Then another one. And the momentum in product and core innovation continues to build. 

Entefy is a company that’s all about people. Making people’s digital lives easier and more convenient through first-of-its-kind AI-powered technology. And, internally, creating an environment where our team members work alongside people that feel like family. That’s not just rhetoric. You can hear what it’s like to work here firsthand from the Entefyers themselves in our video playlist, “Entefyers on Entefy.” 

We’ve come far, but there’s a lot of work—challenging, rewarding work—still to be done. That’s why we’re again scouring the globe for new team members to fill multiple open roles. 

Think you’re ready for the challenge of a lifetime? Entefy is hiring.

Data old school style

3,500-year-old data indexing [VIDEO]

Data indexing is central to modern information management. That’s the job of recording dates, storage locations, types of information, and so on. Without indexing, computers can’t locate and recall information quickly. 

The history of information management dates back to a time when clay tablets were hi-tech. The ancient Hittites were great innovators when it came to managing the information about their extensive empire. In this video enFact, we look at a 3,500-year-old method for indexing data.

Read more about ancient data indexes here

Entefy’s enFacts are illuminating nuggets of information about the intersection of communications, artificial intelligence, security and cyber privacy, and the Internet of Things. Have an idea for an enFact? We would love to hear from you. 

AI and entertainment

Here’s how AI turbocharges intrapreneurship

The past two decades have belonged to entrepreneurs. As innovative technologies reshaped our lives, ambitious founders became the icons of the age. Now it’s the intrapreneurs’ time to shine as well. 

If you’re unfamiliar with the term, intrapreneurship is similar to entrepreneurship except that it occurs inside an existing company. Wired described intrapreneurship as a new source of happiness at work, saying: “Whereas entrepreneurship is the act of spearheading a new business or venture, intrapreneurship is the act of spearheading new programs, products, services, innovations, and policies within your organization.” Intrapreneurship programs are win-wins for businesses and employees. They allow companies to leverage their best and brightest thinkers, and they offer talented workers autonomy over their careers. 

As artificial intelligence transforms workplaces and employees’ roles within their organizations, it could also give rise to a more entrepreneurially-minded workforce. That’s not to say that we’re all going to quit our jobs to launch AI-powered startups. But with AI taking over low-level tasks and giving employees the luxury of more time in their days, we will likely see a move toward increased intrapreneurship. 

Leave the grunt work to AI 

Once upon a time, email and digital messages were a novel experience. Now they can be a nuisance. The average U.S. adult sends and receives 224 messages a day. The more often they message, the less productive–and less happy–they are by the end of the workday. No surprise there. How can you feel fulfilled by your work when you spend more than 20 hours a week in your inbox

Imagine if instead of getting caught in low-value email threads, employees were able to reclaim that time and invest it in new ideas. Rather than plodding through their inboxes, they could be researching customer pain points, analyzing anomalies in market trends, and brainstorming improvements to the sales funnel. More importantly, imagine that they could then use their findings to develop innovative solutions that break new ground for their companies. 

AI is making that possible. New tech platforms are capable of parsing and responding to emails and scheduling requests, unshackling employees from their inboxes for the first time in decades. AI is becoming a key tool in data-entry and report-generation, further relieving workers of the least cognitively rewarding tasks. One World Bank productivity expert stated, “All over the world, including in the United States and Europe, jobs are shifting from routine tasks, which are prone to automation, towards interactive tasks, which require advanced cognitive and behavioral skills.” 

The age of intrapreneurship 

AI systems will be the defining technologies of the coming decades, and they’re bringing with them a raft of new workplace trends. Intrapreneurship may well be one of them. Many people turn to entrepreneurship when they feel dissatisfied or unfulfilled in their current work. But the demands of launching a business can exacerbate their stresses, especially given the uncertainty inherent in the entrepreneurship process. Other people may feel entrepreneurial yearnings but resist pursuing them due to financial or familial obligations. Millennials are a fine example of this. Despite expectations that they would be “the most entrepreneurial generation,” this demographic is burdened by heavy student loan debt that makes it difficult to sacrifice a sure paycheck for the dream of self-employment

But that’s where employers have an opportunity. By giving workers freedom to explore and iterate on their ideas, they can produce groundbreaking new products and services while keeping their best people engaged. AI is already leveling the playing field between small businesses and Fortune 500s in terms of resource-efficiency and data-gathering. The next frontier in business competition is sustained innovation, and intrapreneurs will become invaluable sources of great ideas as AI frees them to do better, deeper work for their companies.

Instituting intrapreneurship 

People are happiest when they feel their lives have meaning, and there’s no better way to foster a sense of purpose than to let workers take ownership of their ideas – and the company’s future. 

The purpose of such programs is not to give employees free reign to use company resources on whatever catches their fancy on a given day. Leaders can ensure the success of an intrapreneurship policy by creating a clear structure and criteria for evaluating and approving employee projects. The process for turning employees into intrapreneurs starts with letting employees know which managers to approach with their ideas and how to self-evaluate their pitches to increase their chances of approval. The better everyone understands the business’ current needs and priorities, the more relevant employee initiatives can be. 

This is another aspect of managers’ roles as talent spotters. Managers should watch for employees who show particularly entrepreneurial tendencies. Tell-tale signs include self-motivation, directness in communication, adaptability, and a high degree of commitment to their work. By nurturing talented innovators and encouraging them to share their ideas, managers can set the tone for the types of programs they want to cultivate. 

Becoming an intrapreneur 

Intrapreneurship is a great way for employees to gain control of their day-to-day work experiences. Instead of reacting to assignments handed down from their bosses, they can pursue projects that inspire and motivate them. They can maximize the chances of gaining support for their ideas by keeping two principles in mind: 

1.     Go deep, not broad. The first thing to know about intrapreneurship is that employees should focus on specific challenges their company already faces. So be hyper-focused when pitching your manager. Explain the issue you’ve identified, how you plan to solve it, the impact your project will have, and the types of resources you need to get it done. Although intrapreneurship endeavors can be great opportunities for cultivating new skills, make sure you have enough baseline know-how to see the project through. Alternatively, you can showcase your leadership instincts by assembling an informal team of colleagues who possess the complementary skills the solution requires. 

2.     Earn buy-in before you present your idea. If you already have a track record of self-directed success, your bosses may give you some leeway. But if you’re new to intrapreneurship and want to make a good impression, find a champion for your idea. Figure out who stands to benefit most from your solution, and get their feedback before running it through the official channels. Having internal support before you’ve even pitched the concept will give you credibility with key decision-makers.   

We can all be intrapreneurs now

The most successful intrapreneurs – and the companies they work for – will use artificial intelligence to not only automate repetitive tasks but to drive progress as well. As employees become more familiar with AI platforms, they should look for ways to further leverage those capabilities within the organization, always thinking about new and better innovation. 

Founding a business isn’t an option for everyone. But professionals throughout the workforce can nurture their entrepreneurial instincts and develop fulfilling, self-led careers through the opportunities AI makes possible. And some of the most interesting applications of AI may well come from a new class of intrapreneurs.  

Manager

Here’s how to become a super-manager in the age of AI

We’re endlessly curious about how artificial intelligence will transform our working lives and reshape the way we think about our careers. That’s why our team at Entefy has examined what the AI-powered office of the future will look like and the types of learning skills that will be at a premium in the coming decades. 

Now we’re taking a deeper look at what AI means for managers. The superstar managers of the AI era will be much more than scheduling ninjas or efficient task managers. They’ll serve as bridges between AI systems and their team members, guiding them toward more innovative and collaborative pursuits. Finally rid of repetitive and cognitively uninteresting tasks, managers will be free to unleash the full breadth of their creative skills and leadership acumen.  

The role of AI in management

Before looking at the evolving role of managers, let’s consider the changes AI is already driving in companies throughout the country. At present, managers spend 54% of their time on administrative tasks like scheduling and logistics coordination. As artificial intelligence systems become increasingly capable of fielding appointment requests, responding to emails, and generating quarterly and annual reports, managers will be able to redirect their attention to richer, more challenging priorities. 

Because today’s managers are still directly involved in administrative duties, they spend 10% of their time on strategy and innovation and only 7% on developing their in-house talent and engaging stakeholders. AI can improve that ratio, enabling managers to double the time they spend collaborating on new initiatives and investing in personnel and community development.   

Managers should anticipate big changes ahead as AI becomes integrated into their workflows. Not only will they serve as leaders and facilitators, as they do today, they’ll find their analytical and decision-making skills called into sharper focus. Judgement work, which requires a keen understanding of data and of its human impact, will become paramount. New skills will be needed and existing skills sharpened, like digital aptitude, creative thinking, data analysis, and strategic development.  

Our research suggests that super managers in the age of AI will inhabit 3 distinct roles simultaneously: the empathetic mentor, the data-driven decision-maker, and the creative innovator. 

Managers as empathetic mentors 

Freed from the mundanity of scheduling and logistics, managers will be able to devote time to helping their employees improve their skills. We know that AI will change the way many different departments work, so team members will need to adapt through tech trainings and rethinking their contributions to the company. Leaders will need to hone their “outcentric” management skills to advance their team’s development, meaning that they’ll need to nurture employees’ abilities to ensure everyone actively contributes. In a sense, managers will become skills assessment experts, identifying workers’ strengths and molding them into more well-rounded team members.  

Managers will also become both students and teachers of AI systems. In a recent survey of 4,000 workers across the U.S., U.K., and Germany, the majority felt underprepared to fully leverage AI’s benefits. They expressed optimism that technology will make their workplaces more collaborative and will strengthen relationships among team members. But they’ll need their managers’ guidance on how to maximize the tools that are rapidly becoming available to them.  

While not all managers will hold explicitly technical roles, they’ll still need to learn how to approach AI technologies like machine learning as a non-technical leader. Then they’ll have to train their colleagues on how to use those tools. At the very least, they’ll need to connect the dots between what AI platforms can do and how those functions correspond to the team’s goals. As workers transition to using AI assistants for data entry and scheduling, managers may need to engage in some handholding as employees adapt to their new workflows. 

While we know that AI-powered companies can become rich environments for learning and innovation, change isn’t always easy. Managers will be responsible for easing the path for their employees by helping them develop new professional goals in light of AI and strategizing how they can use AI to do their jobs more effectively.

Managers as data-driven decision-makers

Equipped with deep insights and forecasts generated by AI, managers will be better prepared to make smart decisions on behalf of their companies. Across departments, they’ll have more and better information to help their teams excel. Tools such as predictive analytics will aid them in deciding which initiatives are most likely to resonate among customers to minimize costs and maximize ROI. Machine learning will analyze expected outcomes based on company data, lowering the risk of poor investments. 

However, human judgement will still be critically important in executive decision-making. An AI program might recommend particular cost-savings measures or produce a recommendation in favor of a new business initiative. However, a human manager will need to decide whether the process of achieving those aims aligns with the company’s mission and values. As a 2016 Deloitte study titled “Talent for survival: Essential skills for humans working in the machine age” asserts, it’s not all about technical analysis. Numbers are important, but they don’t always tell the full story. Managers can bring empathy and context to the picture to decide the best course for the company’s long-term goals, which aligns with Deloitte’s prediction that problem-solving, social skills, creativity, and emotional intelligence will serve as vital complements to increased technical skills. 

Managers may also evolve into explainers, a new category of jobs created by AI. Explainers will monitor the effects AI algorithms have on the business’s goals and communicate those to the company’s leadership. They’ll also determine which strategies will benefit from AI assistance and which require more traditional approaches. 

Managers as creative innovators

The word creativity often brings to mind painters or writers. But in the AI era, managers across organizations—and not only those in traditionally creative departments—will be called upon to create unique solutions and products. Creativity is no longer solely for the creatives.

In this sense, creativity in leadership roles represents the ability to distill complex ideas, identify novel patterns, and devise innovative solutions. Managers must look at business challenges in different ways and from new perspectives. 

Managers may soon be required to synthesize new ideas, analyze the potential impacts on their companies, and then lead production and promotion campaigns to ensure that those are realized. We’ll see such dynamics play out in all different departments as managers turn their attention away from administration and toward increased innovation. For instance, with AI’s assistance, managers can overhaul outdated workflows, implement more dynamic project management strategies, and use customer data to brainstorm truly disruptive ideas. Predictive tools will allow them to better understand the market to determine which concepts are viable and which new endeavors are likely to bear fruit. The World Economic Forum puts it plainly: “Creativity and critical thinking skills are increasingly important in an automated workforce.”

AI will help managers do their jobs better even as it makes the work itself more fulfilling. The coming changes herald an era in which managers have the bandwidth to focus on complex, high-profile tasks like employee development and innovative brainstorming. The automation of low-level tasks and the powerful insights generated by predictive analytics and other AI-powered systems will give them more time and more data than they’ve ever had before. Which sounds like a recipe for high-quality performance.