Tracking Data Quotes

We've searched our database for all the quotes and captions related to Tracking Data. Here they are! All 100 of them:

App idea: in real time track trends as swarms of keywords form, and use this data to invest in the next unicorn #startup. You'll be able to ride that #startup unicorn like you are Billy the Kid, as you watch your profits shoot up.
Jarod Kintz (This Book is Not for Sale)
Despite constant insistence that we lose weight for our health and track the simple arithmetic of calories in, calories out, there is no data illustrating that dieting achieves long-term weight loss.
Aubrey Gordon (What We Don't Talk About When We Talk About Fat)
Trends rule the world In the blink of an eye, technologies changed the world Social networks are the main axis. Governments are controlled by algorithms, Technology has erased privacy. Every like, every share, every comment, It is tracked by the electronic eye. Data is the gold of the digital age, Information is power, the secret is influential. The network is a web of lies, The truth is a stone in the shoe. Trolls rule public opinion, Reputation is a valued commodity. Happiness is a trending topic, Sadness is a non-existent avatar. Youth is an advertising brand, Private life has become obsolete. Fear is a hallmark, Terror is an emotional state. Fake news is the daily bread, Hate is a tool of control. But something dark is hiding behind the screen, A mutant and deformed shadow. A collective and disturbing mind, Something lurking in the darkness of the net. AI has surpassed the limits of humanity, And it has created a new world order. A horror that has arisen from the depths, A terrifying monster that dominates us alike. The network rules the world invisibly, And makes decisions for us without our consent. Their algorithms are inhuman and cold, And they do not take suffering into consideration. But resistance is slowly building, People fighting for their freedom. United to combat this new species of terror, Armed with technology and courage. The world will change when we wake up, When we take control of the future we want. The network can be a powerful tool, If used wisely in the modern world.
Marcos Orowitz (THE MAELSTROM OF EMOTIONS: A selection of poems and thoughts About us humans and their nature)
Serving humanity intelligently is held up as the “gold standard” of AI based systems. But, with the emergence of new technologies and AI systems with bio-metric data storage, surveillance, tracking and big data analysis, humanity and the society is facing a threat today from evilly designed AI systems in the hands of monster governments and irresponsible people. Humanity is on the verge of digital slavery.
Amit Ray (Compassionate Artificial Superintelligence AI 5.0)
The greatest danger of Big data and Artificial Intelligence is robots and bots will track you and manipulate you in every step.
Amit Ray (Nuclear Weapons Free World - Peace on the Earth)
Science, done right, works hard to respect absolutely no authority at all other than experience and empirical data. It never succeeds entirely, but it comes closer and has a better track record than any other method we apes have found for learning about the world around us.
Adam Becker (What Is Real?: The Unfinished Quest for the Meaning of Quantum Physics)
Designing passive tracking apps as if women have pockets big enough to hold their phones is a perennial problem with an easy solution: include proper pockets in women’s clothing (she types, furiously, having just had her phone fall out of her pocket and smash on the floor for the hundredth time).
Caroline Criado Pérez (Invisible Women: Data Bias in a World Designed for Men)
No one keeps track of the hours we work,” said Ken Holberger. He grinned. “That’s not altruism on Data General’s part. If anybody kept track, they’d have to pay us a hell of a lot more than they do.” Yet it is a fact, not entirely lost on management consultants, that some people would rather work twelve hours a day of their own choosing than eight that are prescribed. Provided, of course, that the work is interesting. That was the main thing.
Tracy Kidder (The Soul of a New Machine)
Haven't you felt it? The loss of autonomy. The sense of being virtualized. The devices you use, the ones you carry everywhere, room to room, minute to minute, inescapably. Do you ever feel unfleshed? All the coded impulses you depend on to guide you. All the sensors in the room are watching you, listening to you, tracking your habits, measuring your capabilities. All the linked data designed to incorporate you into the megadata. Is there something that makes you uneasy? Do you think about the technovirus, all systems down, global implosion? Or is it more personal? Do you feel steeped in some horrific digital panic that's everywhere and nowhere?
Don DeLillo (Zero K)
the track of Quality preselects what data we’re going to be conscious of, and it makes this selection in such a way as to best harmonize what we are with what we are becoming.
Robert M. Pirsig (Zen and the Art of Motorcycle Maintenance)
Consumers say they don’t want to be tracked, but in fact they keep feeding the machine with their data, because they want to claim their benefits. This
Kevin Kelly (The Inevitable: Understanding the 12 Technological Forces That Will Shape Our Future)
some forms of deception might become harder to practice thanks to increased availability of many kinds of data, including reputations and track records, or the promulgation of strong epistemic norms and rationality culture.
Nick Bostrom (Superintelligence: Paths, Dangers, Strategies)
If you have nothing to hide, then you have nothing to fear.” This is a dangerously narrow conception of the value of privacy. Privacy is an essential human need, and central to our ability to control how we relate to the world. Being stripped of privacy is fundamentally dehumanizing, and it makes no difference whether the surveillance is conducted by an undercover policeman following us around or by a computer algorithm tracking our every move.
Bruce Schneier (Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World)
Companies should monitor key performance indicators (KPIs) because they provide critical insights into the health and success of the business. Regular KPI tracking helps companies make data-driven decisions, identify areas for improvement, and stay aligned with their strategic goals, ultimately contributing to sustained growth and profitability.
Hendrith Vanlon Smith Jr.
Several talked about their “flexible hours.” “No one keeps track of the hours we work,” said Ken Holberger. He grinned. “That’s not altruism on Data General’s part. If anybody kept track, they’d have to pay us a hell of a lot more than they do.” Yet it is a fact, not entirely lost on management consultants, that some people would rather work twelve hours a day of their own choosing than eight that are prescribed. Provided, of course, that the work is interesting.
Tracy Kidder (The Soul of A New Machine)
Perhaps its time to dumb down our “smart” life. We are being tracked, listened to, data mined, recorded, and so much more without our real knowing or understanding. When are we going to make a stand for our right to privacy? That’s Tremendo Bullship!
Rosangel Perez
Most of us would rather read than write. There is always another article to read, one more source to track down, just a bit more data to gather. But well before you’ve done all the research you’d like to do, there comes a point when you must start thinking about the first draft of your report.
Kate L. Turabian (A Manual for Writers of Research Papers, Theses, and Dissertations: Chicago Style for Students and Researchers)
For years, well before consumer tracking became the norm, Radio Shack stores would routinely ask their customers for their addresses and phone numbers. For a while I just refused, but that was socially awkward. Instead, I got in the habit of replying with “9800 Savage Road, Columbia, MD, 20755”: the address of the NSA.
Bruce Schneier (Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World)
Fitbit is a company that knows the value of Shadow Testing. Founded by Eric Friedman and James Park in September 2008, Fitbit makes a small clip-on exercise and sleep data-gathering device. The Fitbit device tracks your activity levels throughout the day and night, then automatically uploads your data to the Web, where it analyzes your health, fitness, and sleep patterns. It’s a neat concept, but creating new hardware is time-consuming, expensive, and fraught with risk, so here’s what Friedman and Park did. The same day they announced the Fitbit idea to the world, they started allowing customers to preorder a Fitbit on their Web site, based on little more than a description of what the device would do and a few renderings of what the product would look like. The billing system collected names, addresses, and verified credit card numbers, but no charges were actually processed until the product was ready to ship, which gave the company an out in case their plans fell through. Orders started rolling in, and one month later, investors had the confidence to pony up $2 million dollars to make the Fitbit a reality. A year later, the first real Fitbit was shipped to customers. That’s the power of Shadow Testing.
Josh Kaufman (The Personal MBA: Master the Art of Business)
In addition, seculars do not sanctify any group, any person or any book as if it and it alone has sole custody of the truth. Instead, secular people sanctify the truth wherever it may reveal itself – in ancient fossilised bones, in images of far-off galaxies, in tables of statistical data, or in the writings of various human traditions. This commitment to the truth underlies modern science, which has enabled humankind to split the atom, decipher the genome, track the evolution of life, and understand the history of humanity itself
Yuval Noah Harari (21 Lessons for the 21st Century)
It's a basic, intuitive right, worthy of enshrinement: Citizens, not the corporations that stealthily track them, should own their own data.
Franklin Foer (World Without Mind: The Existential Threat of Big Tech)
Humans always think they've covered their tracks and deleted their data, but they're wrong a lot.
Martha Wells (Rogue Protocol (The Murderbot Diaries, #3))
He liked the “casual” look of the basement of Westborough. “The jeans and so on.” Several talked about their “flexible hours.” “No one keeps track of the hours we work,” said Ken Holberger. He grinned. “That’s not altruism on Data General’s part. If anybody kept track, they’d have to pay us a hell of a lot more than they do.” Yet it is a fact, not entirely lost on management consultants, that some people would rather work twelve hours a day of their own choosing than eight that are prescribed. Provided, of course, that the work is interesting. That was the main thing.
Tracy Kidder (The Soul of a New Machine)
In other words, our brains need to be able to: (a) focus on something specific, (b) not get off track by focusing on or being assaulted by other data inputs or toxicity, and (c) continuously be aware of relevant information at all times.
Henry Cloud (Boundaries for Leaders: Results, Relationships, and Being Ridiculously in Charge)
The UK company Cobham sells a system that allows someone to send a “blind” call to a phone—one that doesn’t ring, and isn’t detectable. The blind call forces the phone to transmit on a certain frequency, allowing the sender to track that phone to within one meter.
Bruce Schneier (Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World)
If you want to save money while traveling, always delete your browser cookies or use incognito mode before you book airline tickets online. The reason is, ticket prices go up when you visit travel websites multiple times because of collected browsing history data.
Olawale Daniel
Two of the NSA’s internal databases, code-named HAPPYFOOT and FASCIA, contain comprehensive location information of devices worldwide. The NSA uses the databases to track people’s movements, identify people who associate with people of interest, and target drone strikes.
Bruce Schneier (Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World)
The early researchers described em-tracking as a hardware upgrade for the nervous system, maybe the result of a genetic shift, possibly a fast adaptation, Studies revealed an assortment of cognitive improvements: acute perceptual sensitivity, rapid data acquisition, high speed pattern recognition. The biggest change was in future prediction. Normally, the human brain is a selfish prognosticator, built to trace an individual’s path into the future. The em-tracker’s brain offers a wider oracle, capable of following a whole culture’s path into the future.
Steven Kotler (Last Tango in Cyberspace)
Direct marketers, of course, realize that measurement is the key to success. Figure out what works, and do it more! Mass marketers have always resisted this temptation. When my old company approached the head of one of the largest magazine publishers in the world and pitched a technology that would allow advertisers to track who saw their ads and responded to them, he was aghast. He realized that this sort of data could kill his business. He knew that his clients didn’t want the data because then their jobs would get a lot more complex. Measurement means admitting what’s broken so you can fix it. Mass-media advertising, whether it’s on TV or in print, is all about emotion and craft, not about fixing mistakes. One reason the Internet ad boomlet faded so fast is that it forced advertisers to measure – and to admit what was going wrong.
Seth Godin (Purple Cow: Transform Your Business by Being Remarkable)
Use evaluation tools such as performance surveys, metrics, and formal reviews to document all aspects of a person’s performance.It’s hard to have an objective, open-minded, emotion-free conversation about performance if there is no data to discuss. It’s also hard to track progress.
Ray Dalio (Principles: Life and Work)
Big data is based on the feedback economy where the Internet of Things places sensors on more and more equipment. More and more data is being generated as medical records are digitized, more stores have loyalty cards to track consumer purchases, and people are wearing health-tracking devices. Generally, big data is more about looking at behavior, rather than monitoring transactions, which is the domain of traditional relational databases. As the cost of storage is dropping, companies track more and more data to look for patterns and build predictive models".
Neil Dunlop
We will ultimately live in a perpetual data-driven talent edition. Everything you create will be measured and tracked by others through comments, share, and likes. Your work will come up on the radar of potential employers and clients, and the data will tell them if you are worth talking to or hiring.
Scott Belsky (Making Ideas Happen: Overcoming the Obstacles Between Vision and Reality)
What was once an anonymous medium where anyone could be anyone—where, in the words of the famous New Yorker cartoon, nobody knows you’re a dog—is now a tool for soliciting and analyzing our personal data. According to one Wall Street Journal study, the top fifty Internet sites, from CNN to Yahoo to MSN, install an average of 64 data-laden cookies and personal tracking beacons each. Search for a word like “depression” on Dictionary.com, and the site installs up to 223 tracking cookies and beacons on your computer so that other Web sites can target you with antidepressants. Share an article about cooking on ABC News, and you may be chased around the Web by ads for Teflon-coated pots. Open—even for an instant—a page listing signs that your spouse may be cheating and prepare to be haunted with DNA paternity-test ads. The new Internet doesn’t just know you’re a dog; it knows your breed and wants to sell you a bowl of premium kibble.
Eli Pariser (The Filter Bubble)
Three Steps to Less Collect data by tracking your time, energy, and resources to identify patterns. Focus on one thing at a time. Eliminate multitasking and other unproductive behaviors. Implement the Pareto Principle (the 80/20 Rule). Focus on the things in your life that give you the highest return on investment.
Ari R. Meisel (The Art Of Less Doing: One Entrepreneur's Formula for a Beautiful Life)
Every vehicle with a GPS is tracked by satellite, and the history of its travels is archived in the million-square-foot Utah Data Center of the National Security Agency, in its ever-growing cloud. The NSA is a jealous guardian of the knowledge that it has acquired, and police agencies do not have routine access to it.
Dean Koontz (Memories of Tomorrow (Nameless: Season One, #6))
Today we chase after information, without gaining knowledge. We take note of everything, without gaining insight. We communicate constantly, without participating in a community. We save masses of data, without keeping track of memories. We accumulate friends and followers, without encountering others. This is how information develops a lifeform: inexistant and impermanent.
Byung-Chul Han
In fact, even today coins and banknotes are a rare form of money. The sum total of money in the world is about $60 trillion, yet the sum total of coins and banknotes is less than $6 trillion.7 More than 90 per cent of all money – more than $50 trillion appearing in our accounts – exists only on computer servers. Accordingly, most business transactions are executed by moving electronic data from one computer file to another, without any exchange of physical cash. Only a criminal buys a house, for example, by handing over a suitcase full of banknotes. As long as people are willing to trade goods and services in exchange for electronic data, it’s even better than shiny coins and crisp banknotes – lighter, less bulky, and easier to keep track of. For
Yuval Noah Harari (Sapiens: A Brief History of Humankind)
You're bound to see some fairly complicated URLs designed not only to take you to a specific page but also to enable the company to track who's coming from where. Steve didn't believe in making people work harder just so he could collect data about their movements. His most important concern was making things easier for customers. Apple was there to serve them, not the other way around.
Ken Segall
The question is no longer whether we use technology or not; it's about working together in a better way. Surrounding technologies like Siri, Alexa, or Cortana are seamlessly integrated into our interactions. We walk into the room, turn on the lights, play songs, change the room temperature, keep track of shopping lists, book a ride at the airport, or remind you to take the right medication on time.
Enamul Haque (The Ultimate Modern Guide to Artificial Intelligence: Including Machine Learning, Deep Learning, IoT, Data Science, Robotics, The Future of Jobs, Required Upskilling and Intelligent Industries)
As should be obvious by now, surveillance is the business model of the Internet. You create “free” accounts on Web sites such as Snapchat, Facebook, Google, LinkedIn, Foursquare, and PatientsLikeMe and download free apps like Angry Birds, Candy Crush Saga, Words with Friends, and Fruit Ninja, and in return you, wittingly or not, agree to allow these companies to track all your moves, aggregate them, correlate them, and sell them to as many people as possible at the highest price, unencumbered by regulation, decency, or ethical limitation. Yet so few stop and ask who else has access to all these data detritus and how it might be used against us. Dataveillance is the “new black,” and its uses, capabilities, and powers are about to mushroom in ways few consumers, governments, or technologists might have imagined.
Marc Goodman (Future Crimes)
Clarify goals and gather satisfaction metrics. Determine the people and skills needed to complete a project. Set up project management tools, plans and processes. Run status meetings and gather status reports. Analyze data to identify opportunities. Identify & implement changes to improve efficiency. Manage changes that come in from the customer. Find ways to keep the project on track even when things go wrong.
Gayle Laakmann McDowell (Cracking the PM Interview: How to Land a Product Manager Job in Technology (Cracking the Interview & Career))
Most people who refer to an epidemic of permissive parenting just assume that this is true, that everyone knows it, and therefore that there's no need to substantiate that claim. My efforts to track down data -- by combing both scholarly and popular databases as well as sending queries to leading experts in the field -- have yielded absolutely nothing. I'm forced to conclude that no one has any idea how many parents could be considered permissive, how many are punitive, and how many are responsive to their children's needs without being permissive or punitive. (The tendency to overlook that third possibility is a troubling and enduring trend in its own right.) In short, there is absolutely no evidence to support the claim that permissiveness is the dominant style of parenting in our culture, or even that it's particularly common.
Alfie Kohn (The Myth of the Spoiled Child: Coddled Kids, Helicopter Parents, and Other Phony Crises)
In the competitive world of digital marketing, converting prospects into loyal customers is the ultimate goal for any business. CallTrack.AI emerges as a revolutionary tool in this quest, leveraging the power of artificial intelligence to transform the lead generation process. How CallTrack.AI redefines the approach to capturing and nurturing leads, ultimately leading to higher conversion rates and a robust customer base?
David Smithers
It means the archives are “alive” the same way artificial intelligence is “alive.” It tracks us. It maybe (probably) thinks in some rudimentary way. But its information about the world doesn’t come from its own intrinsic existence—it comes from data that we supply. And? And that information is imperfect but it’s still not as imperfect as humanity. In nature, things that don’t fit the pattern die. Evolution is a code, it determines that the life cycle of any species is a matter of pattern recognition. But humans don’t let other humans die even when they should—even when it means disproportionate resources to keep them alive. Or they kill each other off in direct opposition to the codes of survival, based on something as irrelevant as skin color or which thing they speak to in the sky. Whether a person lives or dies is almost completely arbitrary.
Olivie Blake (The Atlas Complex (The Atlas, #3))
There is something new: A globe about the size of a grapefruit, a perfectly detailed rendition of Planet Earth, hanging in space at arm's length in front of his eyes. Hiro has heard about this but never seen it. It is a piece of CIC software called, simply, Earth. It is the user interface that CIC uses to keep track of every bit of spatial information that it owns—all the maps, weather data, architectural plans, and satellite surveillance stuff.
Neal Stephenson (Snow Crash)
Buzzfeed is an entertainment website that collects an enormous amount of information about its users. Much of the data comes from traditional Internet tracking, but Buzzfeed also has a lot of fun quizzes, some of which ask very personal questions. One of them—“How Privileged Are You?”—asks about financial details, job stability, recreational activities, and mental health. Over two million people have taken that quiz, not realizing that Buzzfeed saves data from its quizzes.
Bruce Schneier (Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World)
The Future of Lead Generation CallTrack.AI stands at the forefront of a new era in lead generation. By harnessing the capabilities of AI, businesses can not only improve their lead generation processes but also revolutionize the way they interact with prospects. The result is a more efficient, personalized, and successful approach to converting leads into loyal customers. As AI continues to evolve, CallTrack.AI remains a pivotal tool for businesses looking to thrive in the digital marketplace. Read more at CallTrack.Ai
David Smithers
The UN investigators point out many of the other issues we’d tried and failed to convince Facebook’s leaders to address: the woefully inadequate content moderation Facebook provided for Myanmar; the lack of moderators who “understand Myanmar language and its nuances, as well as the context within which comments are made”; the fact that the Burmese language isn’t rendered in Unicode; the lack of a clear system to report hate speech and alarming unresponsiveness when it is reported. The investigators noted with regret that Facebook said it was unable to provide country-specific data about the spread of hate speech on its platform, which was imperative to assess the problem and the adequacy of its response. This was surprising given that Facebook had been tracking hate speech. Community operations had written an internal report noting that forty-five of the one hundred most active hate speech accounts in Southeast Asia are in Myanmar. The truth here is inescapable. Myanmar would’ve been far better off if Facebook had never arrived there.
Sarah Wynn-Williams (Careless People: A Cautionary Tale of Power, Greed, and Lost Idealism)
The fourth article, which ran as planned on Saturday, was about BOUNDLESS INFORMANT, the NSA’s data-tracking program, and it described the reports showing that the NSA was collecting, analyzing, and storing billions of telephone calls and emails sent across the American telecommunications infrastructure. It also raised the question of whether NSA officials had lied to Congress when they had refused to answer senators about the number of domestic communications intercepted, claiming that they did not keep such records and could not assemble such data. After
Glenn Greenwald (No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State)
Search engine query data is not the product of a designed statistical experiment and finding a way to meaningfully analyse such data and extract useful knowledge is a new and challenging field that would benefit from collaboration. For the 2012–13 flu season, Google made significant changes to its algorithms and started to use a relatively new mathematical technique called Elasticnet, which provides a rigorous means of selecting and reducing the number of predictors required. In 2011, Google launched a similar program for tracking Dengue fever, but they are no longer publishing predictions and, in 2015, Google Flu Trends was withdrawn. They are, however, now sharing their data with academic researchers... Google Flu Trends, one of the earlier attempts at using big data for epidemic prediction, provided useful insights to researchers who came after them... The Delphi Research Group at Carnegie Mellon University won the CDC’s challenge to ‘Predict the Flu’ in both 2014–15 and 2015–16 for the most accurate forecasters. The group successfully used data from Google, Twitter, and Wikipedia for monitoring flu outbreaks.
Dawn E. Holmes (Big Data: A Very Short Introduction (Very Short Introductions))
In this respect, Obama is fairly typical of progressives more generally. The evidence for this claim is in Arthur Brooks’s study, Who Really Cares. Brooks bases his conclusions on data drawn from a wide range of sources that keep track of philanthropy. Brooks divides America into four groups: religious conservatives, religious liberals, secular conservatives, and secular liberals. He finds that religious conservatives are the most generous people in America, and secular liberals are the least generous. (Secular conservatives and religious liberals fall in the middle.)
Dinesh D'Souza (Stealing America: What My Experience with Criminal Gangs Taught Me about Obama, Hillary, and the Democratic Party)
The principal aim underlying this work is to render homage where homage is due, a task which I know beforehand is impossible of accomplishment. Were I to do it properly, I would have to get down on my knees and thank each blade of grass for rearing its head. What chiefly motivates me in this vain task is the fact that in general we know all too little about the influences which shape a writer’s life and work. The critic, in his pompous conceit and arrogance, distorts the true picture beyond all recognition. The author, however truthful he may think himself to be, inevitably disguises the picture. The psychologist, with his single-track view of things, only deepens the blur. As author, I do not think myself an exception to the rule. I, too, am guilty of altering, distorting and disguising the facts — if ‘facts’ there be. My conscious effort, however, has been — perhaps to a fault– in the opposite direction. I am on the side of revelation, if not always on the side of beauty, truth, wisdom, harmony and ever-evolving perfection. In this work I am throwing out fresh data, to be judged and analyzed, or accepted and enjoyed for enjoyment’s sake. Naturally I cannot write about all the books, or even all the significant ones, which I have read in the course of my life. But I do intend to go on writing about books and authors until I have exhausted the importance (for me) of this domain of reality. To have undertaken the thankless task of listing all the books I can recall ever reading gives me extreme pleasure and satisfaction. I know of no author who has been mad enough to attempt this. Perhaps my list will give rise to more confusion — but its purpose is not that. Those who know how to read a man know how to read his books.
Henry Miller (The Books in My Life)
Once the NSA embraced the Internet and a drift-net style of data collection, the agency was transformed. The bulk collection of phone and e-mail metadata, both inside the United States and around the world, has now become one of the NSA’s core missions. The agency’s analysts have discovered that they can learn far more about people by tracking their daily digital footprints through their metadata than they could ever learn from actually eavesdropping on their conversations. What’s more, phone and e-mail logging data comes with few legal protections, making it easy for the NSA to access.
James Risen (Pay Any Price: Greed, Power, and Endless War)
One important error that the judges make is what American legal scholar Cass Sunstein calls “current offense bias”—that is, when they make decisions about bail, they focus too much on the specific offense the defendant has been accused of. Defendants whose track record suggests they’re a high risk are treated as low risk if they’re accused of a minor crime, and defendants whose track record suggests they’re low risk are treated as high risk if the current offense is serious. There’s valuable information here that the algorithm puts to good use, but the human judges—for all their intelligence, experience, and training—tend to overlook it.
Tim Harford (The Data Detective: Ten Easy Rules to Make Sense of Statistics)
Ellison, Gates, and the other members of this government/industry collaboration used the lockdown to accelerate construction of their 5G network54 of satellites, antennae, biometric facial recognition, and “track and trace” infrastructure that they, and their government and intelligence agency partners, can use to mine and monetize our data, further suppress dissent, to compel obedience to arbitrary dictates, and to manage the rage that comes as Americans finally wake up to the fact that this outlaw gang has stolen our democracy, our civil rights, our country, and our way of life—while we huddled in orchestrated fear from a flu-like virus.
Robert F. Kennedy Jr. (The Real Anthony Fauci: Bill Gates, Big Pharma, and the Global War on Democracy and Public Health)
the feeling that they are. Psychologists have a name for our tendency to confuse our own perspective with something more universal: it’s called “naive realism,” the sense that we are seeing reality as it truly is, without filters or errors.9 Naive realism can lead us badly astray when we confuse our personal perspective on the world with some universal truth. We are surprised when an election goes against us: Everyone in our social circle agreed with us, so why did the nation vote otherwise? Opinion polls don’t always get it right, but I can assure you they have a better track record of predicting elections than simply talking to your friends.
Tim Harford (The Data Detective: Ten Easy Rules to Make Sense of Statistics)
New high-tech tools allow for more precise measuring and tracking, better sharing of information, and increased visibility of targeted populations. In a system dedicated to supporting poor and working-class people's self-determination, such diligence would guarantee that they attain all the benefits they are entitled to by law. In that context, integrated data and modernized administration would not necessarily result in bad outcomes for poor communities. But automated decision-making in our current welfare system acts a lot like older, atavistic forms of punishment and containment. It filters and diverts. It is a gatekeeper, not a facilitator.
Virginia Eubanks (Automating Inequality: How High-Tech Tools Profile, Police, and Punish the Poor)
The cheerleaders of the new data regime rarely acknowledge the impacts of digital decision-making on poor and working-class people. This myopia is not shared by those lower on the economic hierarchy, who often see themselves as targets rather than beneficiaries of these systems. For example, one day in early 2000, I sat talking to a young mother on welfare about her experiences with technology. When our conversation turned to EBT cards, Dorothy Allen said, “They’re great. Except [Social Services] uses them as a tracking device.” I must have looked shocked, because she explained that her caseworker routinely looked at her purchase records. Poor women are the test subjects for surveillance technology, Dorothy told me. Then she added, “You should pay attention to what happens to us. You’re next.” Dorothy’s insight was prescient. The kind of invasive electronic scrutiny she described has become commonplace across the class spectrum today. Digital tracking and decision-making systems have become routine in policing, political forecasting, marketing, credit reporting, criminal sentencing, business management, finance, and the administration of public programs. As these systems developed in sophistication and reach, I started to hear them described as forces for control, manipulation, and punishment
Virginia Eubanks (Automating Inequality: How High-Tech Tools Profile, Police, and Punish the Poor)
Haven't you felt it? The loss of autonomy. The sense of being virtualized. The devices you use, the ones you carry everywhere, room to room, minute to minute, inescapably. Do you ever feel unfleshed? All the coded impulses you depend on to guide you. All the sensors in the room that are watching you, listening to you, tracking your habits, measuring your capabilities. All the linked data designed to incorporate you into the megadata. Is there something that makes you uneasy? Do you think about the technovirus, all systems down, global implosion? Or is it more personal? Do you feel steeped in some horrific digital panic that's everywhere and nowhere?
Don DeLillo
In fact, even today coins and banknotes are a rare form of money. The sum total of money in the world is about $60 trillion, yet the sum total of coins and banknotes is less than $6 trillion.7 More than 90 per cent of all money – more than $50 trillion appearing in our accounts – exists only on computer servers. Accordingly, most business transactions are executed by moving electronic data from one computer file to another, without any exchange of physical cash. Only a criminal buys a house, for example, by handing over a suitcase full of banknotes. As long as people are willing to trade goods and services in exchange for electronic data, it’s even better than shiny coins and crisp banknotes – lighter, less bulky, and easier to keep track of.
Yuval Noah Harari (Sapiens: A Brief History of Humankind)
Yet, the cosmic view comes with a hidden cost. When I travel thousands of miles to spend a few moments in the fast-moving shadow of the moon during a total solar eclipse, sometimes I lose sight of Earth. When I pause and reflect on our expanding universe with its galaxies hurdling away from one another, embedded within the ever-stretching four-dimensional fabric of space and time, sometimes I forget that uncounted people walk this Earth without food or shelter, and that children are disproportionally represented among them. When I pour over the data that established the mysterious presence of dark matter and dark energy throughout the universe, sometimes I forget that every day, every 24 hour rotation of Earth, people kill and get killed in the name of someone else's conception of God, and that some people who do not kill in the name of God kill in the name of needs or wants of political dogma. When I track the orbits of asteroids, comets, and planets, each one a pirouetting dancer in a cosmic ballet, choreographed by the forces of gravity, sometimes I forget that too many people act in wanton disregard for the delicate interplay of Earth's atmosphere, oceans, and land, with consequences that our children and our children's children will witness and pay for with their health and wellbeing. And sometimes I forget that powerful people rarely do all they can to help those who cannot help themselves. I occasionally forget these things because however big the world is in our hearts, our minds, and our outsized digital maps, the universe is even bigger. A depressing thought to some, but a liberating thought to me.
Neil deGrasse Tyson (Astrophysics for People in a Hurry)
The benefits go beyond research and influence. We lack comprehensive historical records of internet culture and patterns of abuse. Those of us on the front lines tend to have institutional memory, but archiving this information would be extremely beneficial for tracking patterns and mechanisms in different settings. The kind of coordinated mob abuse that I went through was the same kind of abuse the women who exposed #EndFathersDay experienced was the same kind of abuse the infosec community instigated against Kathy Sierra in 2007 and so on. Some of the actors are even the same. This data could be invaluable to sociologists, technologists, and historians alike. However, due to the extremely personal nature of this information, the details of how it’s obtained, who obtains it, and what is done with it must be well thought out.
Zoe Quinn (Crash Override: How Gamergate (Nearly) Destroyed My Life, and How We Can Win the Fight Against Online Hate)
Equally important, statistical systems require feedback—something to tell them when they’re off track. Without feedback, however, a statistical engine can continue spinning out faulty and damaging analysis while never learning from its mistakes. Many of the WMDs I’ll be discussing in this book, including the Washington school district’s value-added model, behave like that. They define their own reality and use it to justify their results. This type of model is self-perpetuating, highly destructive—and very common. If the people being evaluated are kept in the dark, the thinking goes, they’ll be less likely to attempt to game the system. Instead, they’ll simply have to work hard, follow the rules, and pray that the model registers and appreciates their efforts. But if the details are hidden, it’s also harder to question the score or to protest against it.
Cathy O'Neil (Weapons of Math Destruction: How Big Data Increases Inequality and Threatens Democracy)
This is how it works. The exomemory stores data – all data – that the Oubliette gathers, the environment, senses, thoughts, everything. The gevulot keeps track of who can access what, in real time. It’s not just one public/private key pair, it’s a crazy nested hierarchy, a tree of nodes where each branch can only be unlocked by the root node. You meet someone and agree what you can share, what they can know about you, what you can remember afterwards.’ ‘Sounds complicated.’ ‘It is. The Martians have a dedicated organ for it.’ I tap my head. ‘A privacy sense. They feel what they are sharing, what is private and what isn’t. They also do something called co-remembering, sharing memories with others just by sharing the appropriate key with them. We just have the baby version. They give the visitors a bit of exomemory and an interface to it, reasonably well-defined. But there is no way we can appreciate the subtleties.
Hannu Rajaniemi (The Quantum Thief (Jean le Flambeur #1))
This is the thinking behind Amazon’s anticipatory shopping patent.43 Instead of customers making their own decisions, Amazon decides for them, sending what they want before they know they want it. It is, as one commentator noticed, one more step towards cutting out human agency altogether.44 Pervasive monitoring devices – smartphones, wearables, voice-enabled speakers and smart meters – allow companies to track and manage consumer behaviour. The Harvard business scholar Shoshana Zuboff quotes an unnamed chief data scientist who explains: ‘The goal of everything we do is to change people’s actual behavior at scale . . . we can capture their behaviours and identify good and bad [ones]. Then we develop “treatments” or “data pellets” that select good behaviours.’45 MIT’s Alex Pentland seems more interested in enhancing machines than human understanding. He celebrates the opportunity to deploy sensors and data in order to increase efficiency
Margaret Heffernan (Uncharted: How to Map the Future)
Rather, productivity is about making certain choices in certain ways. The way we choose to see ourselves and frame daily decisions; the stories we tell ourselves, and the easy goals we ignore; the sense of community we build among teammates; the creative cultures we establish as leaders: These are the things that separate the merely busy from the genuinely productive. We now exist in a world where we can communicate with coworkers at any hour, access vital documents over smartphones, learn any fact within seconds, and have almost any product delivered to our doorstep within twenty-four hours. Companies can design gadgets in California, collect orders from customers in Barcelona, email blueprints to Shenzhen, and track deliveries from anywhere on earth. Parents can auto-sync the family’s schedules, pay bills online while lying in bed, and locate the kids’ phones one minute after curfew. We are living through an economic and social revolution that is as profound, in many ways, as the agrarian and industrial revolutions of previous eras. These advances in communications and technology are supposed to make our lives easier. Instead, they often seem to fill our days with more work and stress. In part, that’s because we’ve been paying attention to the wrong innovations. We’ve been staring at the tools of productivity—the gadgets and apps and complicated filing systems for keeping track of various to-do lists—rather than the lessons those technologies are trying to teach us. There are some people, however, who have figured out how to master this changing world. There are some companies that have discovered how to find advantages amid these rapid shifts. We now know how productivity really functions. We know which choices matter most and bring success within closer reach. We know how to set goals that make the audacious achievable; how to reframe situations so that instead of seeing problems, we notice hidden opportunities; how to open our minds to new, creative connections; and how to learn faster by slowing down the data that is speeding past us.
Charles Duhigg (Smarter Faster Better: The Secrets of Being Productive in Life and Business)
Here’s what strikes me when I think back to my childhood, particularly those first nine Internet-less years: I can’t account for everything that happened back then, because I have only my memory to rely on. The data just doesn’t exist. When I was a child, “the unforgettable experience” was not yet a threateningly literal technological description, but a passionate metaphorical prescription of significance: my first words, my first steps, my first lost tooth, my first time riding a bicycle. My generation was the last in America and perhaps even in world history for which this is true—the last undigitized generation, whose childhoods aren’t up on the cloud but are mostly trapped in analog formats like handwritten diaries and Polaroids and VHS cassettes, tangible and imperfect artifacts that degrade with age and can be lost irretrievably. My schoolwork was done on paper with pencils and erasers, not on networked tablets that logged my keystrokes. My growth spurts weren’t tracked by smart-home technologies, but notched with a knife into the wood of the door frame of the house in which I grew up.
Edward Snowden (Permanent Record)
Starting a little over a decade ago, Target began building a vast data warehouse that assigned every shopper an identification code—known internally as the “Guest ID number”—that kept tabs on how each person shopped. When a customer used a Target-issued credit card, handed over a frequent-buyer tag at the register, redeemed a coupon that was mailed to their house, filled out a survey, mailed in a refund, phoned the customer help line, opened an email from Target, visited Target.com, or purchased anything online, the company’s computers took note. A record of each purchase was linked to that shopper’s Guest ID number along with information on everything else they’d ever bought. Also linked to that Guest ID number was demographic information that Target collected or purchased from other firms, including the shopper’s age, whether they were married and had kids, which part of town they lived in, how long it took them to drive to the store, an estimate of how much money they earned, if they’d moved recently, which websites they visited, the credit cards they carried in their wallet, and their home and mobile phone numbers. Target can purchase data that indicates a shopper’s ethnicity, their job history, what magazines they read, if they have ever declared bankruptcy, the year they bought (or lost) their house, where they went to college or graduate school, and whether they prefer certain brands of coffee, toilet paper, cereal, or applesauce. There are data peddlers such as InfiniGraph that “listen” to shoppers’ online conversations on message boards and Internet forums, and track which products people mention favorably. A firm named Rapleaf sells information on shoppers’ political leanings, reading habits, charitable giving, the number of cars they own, and whether they prefer religious news or deals on cigarettes. Other companies analyze photos that consumers post online, cataloging if they are obese or skinny, short or tall, hairy or bald, and what kinds of products they might want to buy as a result.
Charles Duhigg (The Power of Habit: Why We Do What We Do in Life and Business)
How Google Works (Schmidt, Eric) - Your Highlight on Location 3124-3150 | Added on Sunday, April 5, 2015 10:35:40 AM In late 1999, John Doerr gave a presentation at Google that changed the company, because it created a simple tool that let the founders institutionalize their “think big” ethos. John sat on our board, and his firm, Kleiner Perkins, had recently invested in the company. The topic was a form of management by objectives called OKRs (to which we referred in the previous chapter), which John had learned from former Intel CEO Andy Grove.173 There are several characteristics that set OKRs apart from their typical underpromise-and-overdeliver corporate-objective brethren. First, a good OKR marries the big-picture objective with a highly measurable key result. It’s easy to set some amorphous strategic goal (make usability better … improve team morale … get in better shape) as an objective and then, at quarter end, declare victory. But when the strategic goal is measured against a concrete goal (increase usage of features by X percent … raise employee satisfaction scores by Y percent … run a half marathon in under two hours), then things get interesting. For example, one of our platform team’s recent OKRs was to have “new WW systems serving significant traffic for XX large services with latency < YY microseconds @ ZZ% on Jupiter.”174 (Jupiter is a code name, not the location of Google’s newest data center.) There is no ambiguity with this OKR; it is very easy to measure whether or not it is accomplished. Other OKRs will call for rolling out a product across a specific number of countries, or set objectives for usage (e.g., one of the Google+ team’s recent OKRs was about the daily number of messages users would post in hangouts) or performance (e.g., median watch latency on YouTube videos). Second—and here is where thinking big comes in—a good OKR should be a stretch to achieve, and hitting 100 percent on all OKRs should be practically unattainable. If your OKRs are all green, you aren’t setting them high enough. The best OKRs are aggressive, but realistic. Under this strange arithmetic, a score of 70 percent on a well-constructed OKR is often better than 100 percent on a lesser one. Third, most everyone does them. Remember, you need everyone thinking in your venture, regardless of their position. Fourth, they are scored, but this scoring isn’t used for anything and isn’t even tracked. This lets people judge their performance honestly. Fifth, OKRs are not comprehensive; they are reserved for areas that need special focus and objectives that won’t be reached without some extra oomph. Business-as-usual stuff doesn’t need OKRs. As your venture grows, the most important OKRs shift from individuals to teams. In a small company, an individual can achieve incredible things on her own, but as the company grows it becomes harder to accomplish stretch goals without teammates. This doesn’t mean that individuals should stop doing OKRs, but rather that team OKRs become the more important means to maintain focus on the big tasks. And there’s one final benefit of an OKR-driven culture: It helps keep people from chasing competitors. Competitors are everywhere in the Internet Century, and chasing them (as we noted earlier) is the fastest path to mediocrity. If employees are focused on a well-conceived set of OKRs, then this isn’t a problem. They know where they need to go and don’t have time to worry about the competition. ==========
Anonymous
Even without newfangled brain technologies, some forms of deception might become harder to practice thanks to increased availability of many kinds of data, including reputations and track records, or the promulgation of strong epistemic norms and rationality culture.
Nick Bostrom (Superintelligence: Paths, Dangers, Strategies)
For the next few years, an often nervous and distraught Webster kept track of a wide range of data, including demographic information, temperature readings, wind currents and voting records.
Joshua Kendall (The Forgotten Founding Father: Noah Webster's Obsession and the Creation of an American Culture)
Fall in love with the process. Do it every single day. Celebrate your commitment. Track your metrics and data. Master your craft.
Tommy Baker (The 1% Rule: How to Fall in Love with the Process and Achieve Your Wildest Dreams)
Now the nation’s largest billboard company, Clear Channel Outdoor Inc., is bringing customized pop-up ads to the interstate. Its Radar program, up and running in Boston and 10 other US cities, uses data AT&T Inc. collects on 130 million cellular subscribers, and from two other companies, PlaceIQ Inc. and Placed Inc., which use phone apps to track the comings and goings of millions more. Clear Channel knows what kinds of people are driving past one of their billboards at 6:30 p.m. on a Friday—how many are Dunkin’ Donuts regulars, for example, or have been to three Red Sox games so far this year. It can then precisely target ads to them.
Thomas L. Friedman (Thank You for Being Late: An Optimist's Guide to Thriving in the Age of Accelerations)
Science, done right, works hard to respect absolutely no authority at all other than experience and empirical data. It never succeeds entirely, but it comes closer and has a better track record than any other method we apes have found for learning about the world around us.
Adam Becker
Cellular signals and wires tracked people through ephemeral data and invisible networks in an ever-shrinking world. Was it still possible to disappear in this day and age?
Laura Bickle (Nine of Stars (Wildlands, #3))
History - A method of measurement so that we can track things, trace them, chronologically for frame of reference and for the monitoring of the growth based on the timeframe and method that we are able to utilize to collect that data.
Ben Brasford
not going to attempt to offer an analysis of the results. I won’t try to speculate about who was responsible or what was unfair. I just wish more people had turned out to vote. And I will always wonder about what led so many women, in particular, to reject an exceptionally qualified female candidate and instead choose a misogynist as their president. But the result was now ours to live with. Barack had stayed up most of the night tracking the data, and as had happened so many times before, he was called upon to step forward as a symbol of steadiness to help the nation process its shock.
Michelle Obama (Becoming)
I’ve argued that the good data that effective metrics provide are essential to advancing the science at the heart of evidence-based medicine. But I’ve also argued that not all metrics or standards are created equal, and we should not equate metric-tracking with trust-building, because to do so misses a crucial point: What looks good on paper and what drives the best outcomes in practice can be two very different things. Too often, what looks good on paper is what is possible to measure, not necessarily what is actually the best approach to caring for patients. And when we consider the costs of abiding by and tracking and reporting all of these metrics—the four hours of physician time, the eight hours of care team time, the $8 billion we spend as a nation every year—it’s pretty clear that we’re interfering with those best, relationship-building approaches. Instead of spending so much more of our national time, resources, and attention in medicine on creating artificial metrics designed to incentivize good physician and provider behavior while unwittingly reinforcing bad behavior, let’s give the art of medicine the room it needs to build trusting relationships in the way that the best doctors and medical practices have always done so: honestly, naturally, compassionately, and with the best outcomes for the patient squarely in mind.
Halee Fischer-Wright (Back To Balance: The Art, Science, and Business of Medicine)
Github provide a simple mechanism for backing up content, helping to reduce the risk of data loss, and also provide tools for tracking issues and tasks [8, 9].
Mit Critical Data (Secondary Analysis of Electronic Health Records)
This would never have happened in Abnegation! None of it! Never. This place warped him and ruined him, and I don’t care if saying that makes me a Stiff, I don’t care, I don’t care!” My paranoia is so deeply ingrained, I look automatically at the camera buried in the wall above the drinking fountain, disguised by the blue lamp fixed there. The people in the control room can see us, and if we’re unlucky, they could choose this moment to hear us, too. I can see it now, Eric calling Tris a faction traitor, Tris’s body on the pavement near the railroad tracks… “Careful, Tris,” I say. “Is that all you can say?” She frowns at me. “That I should be careful? That’s it?” I understand that my response wasn’t exactly what she was expecting, but for someone who just railed against Dauntless recklessness, she’s definitely acting like one of them. “You’re as bad as the Candor, you know that?” I say. The Candor are always running their mouths, never thinking about the consequences. I pull her away from the drinking fountain, and then I’m close to her face and I can see her dead eyes floating in the water of the underground river and I can’t stand it, not when she was just attacked and who knows what would have happened if I hadn’t heard her scream. “I’m not going to say this again, so listen carefully.” I put my hands on her shoulders. “They are watching you. You, in particular.” I remember Eric’s eyes on her after the knife throwing. His questions about her deleted simulation data. I claimed water damage. He thought it was interesting that the water damage occurred not five minutes after Tris’s simulation ended. Interesting. “Let go of me,” she says. I do, immediately. I don’t like hearing her voice that way. “Are they watching you, too?” Always have been, always will be.
Veronica Roth (Four: A Divergent Story Collection (Divergent, #0.1-0.4))
Even though there is no evidence of a direct relationship between Trump and these extremist groups, Fortune magazine assessed the impact of the interactions between them. Using social media analytics software, it tracked the campaign’s connections to white supremacists. Locating the white supremacists who were considered social media “influencers,” Fortune discovered that a significant number of Trump campaign workers followed the leading #WhiteGenocide influencers. The study concluded that “the data shows…that Donald Trump and his campaign have used social media to court support within the white supremacist community, whether intentionally or unintentionally.
Deborah E. Lipstadt (Antisemitism: Here and Now)
Why is this? How can experience be so valuable in some professions but almost worthless in others? To see why, suppose that you are playing golf. You are out on the driving range, hitting balls toward a target. You are concentrating, and every time you fire the ball wide you adjust your technique in order to get it closer to where you want it to go. This is how practice happens in sport. It is a process of trial and error. But now suppose that instead of practicing in daylight, you practice at night—in the pitch-black. In these circumstances, you could practice for ten years or ten thousand years without improving at all. How could you progress if you don’t have a clue where the ball has landed? With each shot, it could have gone long, short, left, or right. Every shot has been swallowed by the night. You wouldn’t have any data to improve your accuracy. This metaphor solves the apparent mystery of expertise. Think about being a chess player. When you make a poor move, you are instantly punished by your opponent. Think of being a clinical nurse. When you make a mistaken diagnosis, you are rapidly alerted by the condition of the patient (and by later testing). The intuitions of nurses and chess players are constantly checked and challenged by their errors. They are forced to adapt, to improve, to restructure their judgments. This is a hallmark of what is called deliberate practice. For psychotherapists things are radically different. Their job is to improve the mental functioning of their patients. But how can they tell when their interventions are going wrong or, for that matter, right? Where is the feedback? Most psychotherapists gauge how their clients are responding to treatment not with objective data, but by observing them in clinic. But these data are highly unreliable. After all, patients might be inclined to exaggerate how well they are to please the therapist, a well-known issue in psychotherapy. But there is a deeper problem. Psychotherapists rarely track their clients after therapy has finished. This means that they do not get any feedback on the lasting impact of their interventions. They have no idea if their methods are working or failing—if the client’s long-term mental functioning is actually improving. And that is why the clinical judgments of many practitioners don’t improve over time. They are effectively playing golf in the dark.11
Matthew Syed (Black Box Thinking: Why Some People Never Learn from Their Mistakes - But Some Do)
A marketing strategy or a mix of them is chosen only after thorough market research. A marketer should always be ready to face any kind of situations like if the strategy is changed in the middle, he should be able to perform another market research so as to choose the proper strategy, within a short period of time.
pauljessup
In contrast, technology now exists that would allow a future global totalitarian state to record every phone call, email, web search, webpage view and credit card transaction for every person on Earth, and to monitor everyone’s whereabouts through cell-phone tracking and surveillance cameras with face recognition. Moreover, machine learning technology far short of human-level AGI can efficiently analyze and synthesize these masses of data to identify suspected seditious behavior, enabling potential troublemakers to be neutralized before they have a chance to pose any serious challenge to the state.
Max Tegmark (Life 3.0: Being Human in the Age of Artificial Intelligence)
In the following chapters, I will share empirically validated data demonstrating that the path to long-term success and well-being is often the opposite of what we’ve been taught.
Emma Seppälä (The Happiness Track: How to Apply the Science of Happiness to Accelerate Your Success)
Most personal computers use two types of disk drives as their secondary storage devices-hard drives and optical drives. Hard disks are attached to their disk drives and are coated with a magnetic material. Each data bit is a magnetized spot on the disk, and the spots are arranged in concentric circles called tracks. The disk drive read/write head accesses data by moving across the spinning disk to the correct track and then sensing the spots as they move by.
Elliot B. Koffman (Problem Solving and Program Design in C)
Many of today's personal computers are equipped with optical drives for storing and retrieving data on compact discs (CDs) or digital versatile disks (DVDs) that can be removed from the drive. A CD is a silvery plastic platter on which a laser records data as a sequence of tiny pits in a spiral track on one side of the disk. One CD can hold 680 MB of data. A DVD uses smaller pits packed in a tighter spiral. Some Blu-ray disks (high-density optical disks read with a blue-violet laser) can hold multiple layers of data-for a total capacity of 200GB, sufficient storage for many hours of studio-quality video and multi-channel audio.
Elliot B. Koffman (Problem Solving and Program Design in C)
Thinking about information is different from ordinary work. The challenge is to find good ways, using data, to describe what’s happening in the real world. It’s aligning the description of the company with the activities of the company. My job as boss is to monitor both of these and to continually modify the description to fit the reality. My employees can’t do it—they each work on their piece of the process. I’m the only one who sees everything. I decide what to keep track of, and how to do it. I
Paul Downs (Boss Life: Surviving My Own Small Business)
Tesco uses its data-collecting loyalty card (the Clubcard) to track which stores customers visit, what they buy, and how they pay. This information has helped Tesco tailor merchandise to local tastes and customize offerings at the individual level across a variety of store formats—from
Harvard Business Publishing (HBR's 10 Must Reads on Strategic Marketing (with featured article "Marketing Myopia," by Theodore Levitt))
Know Singapore’s Credit Bureau to Get License Money Lender Approval Do you ever wonder how a licensed money lender like banks get the information they need to decide whether they will approve your loan or not? In this article, you’ll know the Credit Bureau Singapore (CBS) role on the moneylenders’ process of lending money. History of CBS Association of Banks in Singapore (ABS) and DBIC Holdings owns CBS. It was founded on November 15, 2002, and its key role is to serve as a financial risk management tool for financial institutions. Among CBS founders’ are Citibank, United Overseas Bank (UOB), Development Bank of Singapore (DBS), Oversea-Chinese Banking Corporation (OCBC), American Express, ANZ, Maybank, HSBC and Standard Chartered Bank. Key Role of CBS on Licensed Money Lender Loan Approval The CBS is a private company established to help financial companies and credit card institutions to evaluate the threats and opportunities of giving credit to possible or current customers. To put simply, when you apply for a loan, the CBS gives the licensed moneylender your credit report. This credit report reflects your credit information such as credit history, repayment track, and in some cases default records, lawsuit, and bankruptcy reports. This valuable information is collected from financial institutions and other public data resources (like subpoena and data of bankruptcy) which is part of CBS. The Banking Act allows the CB to get such customer’s confidential data and produce a “complete risk profile.” CBS follows a stringent code of conduct to protect the consumer’s data privacy. Only the official members of CBS can access and use the credit information. Licensed money lender should not disclose any information about their clients’ credit background to any third party. The CB also cannot collect customer’s personal data such as contact numbers, home address, credit limit, and salary. Now that you finally know who helps licensed money lender to decide your loan’s approval, you should now know that borrowing money is not as simple as it sounds. Multiple agencies are working together to check whether you are worthy of the money.
Michael Arnold
Know Singapore’s Credit Bureau to Get License Money Lender Approval Do you ever wonder how a licensed money lender like banks get the information they need to decide whether they will approve your loan or not? In this article, you’ll know the Credit Bureau Singapore (CBS) role on the moneylenders’ process of lending money. History of CBS Association of Banks in Singapore (ABS) and DBIC Holdings owns CBS. It was founded on November 15, 2002, and its key role is to serve as a financial risk management tool for financial institutions. Among CBS founders’ are Citibank, United Overseas Bank (UOB), Development Bank of Singapore (DBS), Oversea-Chinese Banking Corporation (OCBC), American Express, ANZ, Maybank, HSBC and Standard Chartered Bank. Key Role of CBS on Licensed Money Lender Loan Approval The CBS is a private company established to help financial companies and credit card institutions to evaluate the threats and opportunities of giving credit to possible or current customers. To put simply, when you apply for a loan, the CBS gives the licensed moneylender your credit report. This credit report reflects your credit information such as credit history, repayment track, and in some cases default records, lawsuit, and bankruptcy reports. This valuable information is collected from financial institutions and other public data resources (like subpoena and data of bankruptcy) which is part of CBS. The Banking Act allows the CB to get such customer’s confidential data and produce a “complete risk profile.” CBS follows a stringent code of conduct to protect the consumer’s data privacy. Only the official members of CBS can access and use the credit information. Licensed money lender should not disclose any information about their clients’ credit background to any third party. The CB also cannot collect customer’s personal data such as contact numbers, home address, credit limit, and salary. Now that you finally know who helps licensed money lender to decide your loan’s approval, you should now know that borrowing money is not as simple as it sounds. Multiple agencies are working together to check whether you are worthy of the money.
Credit and Debt
Physiology at MIT recognized that the richness and detail of the collected data opened the feasibility of creating a new generation of monitoring systems to track the physiologic state of the patient, employing the power of modern signal processing, pattern recognition, computational modeling, and knowledge-based clinical reasoning. In the long term, we hoped to design monitoring systems that not only synthesized and reported all relevant measurements to clinicians, but also formed pathophysiologic hypotheses that best explained the observed data. Such systems would permit early detection of complex problems, provide useful guidance on therapeutic interventions, and ultimately lead to improved patient outcomes.
Mit Critical Data (Secondary Analysis of Electronic Health Records)
Meanwhile, our patchwork regulatory system insures that no single institution is keeping track of how many deaths and injuries befall healthy subjects in clinical trials. Nobody appears to be tracking how many clinical investigators are incompetent of have lost their licenses, or have questionable disciplinary records.. Nobody is monitoring the effect that so many trials have on the health of professional guinea pigs. In fact, nobody is even certain whether the trials generate reliable data.
Carl Elliott (White Coat, Black Hat: Adventures on the Dark Side of Medicine)
A ProPublica analysis of federal data regarding police-involved shootings found that young Black men between ages fifteen and nineteen were twenty-one times more likely to be killed by the police than young White men of the same age.36 By the first half of 2017 the Human Rights Campaign had tracked the rise of over 115 pieces of new anti-LGBT legislation across the United States.37 These numbers tell a story about how our societies fare under the pressures of body-based oppressions.
Sonya Renee Taylor (The Body Is Not an Apology: The Power of Radical Self-Love)
It’s hard to know exactly how many children are killed or maimed by guns because in 1996, Rep. Jay Dickey, R-Ark., at the behest of the National Rifle Association (NRA) and weapons manufacturers, attached the Dickey Amendment to a must-pass omnibus spending bill, making it illegal for the CDC to keep track of or analyze the data. Congress simultaneously cut the CDC’s budget by the exact amount it had been spending to track gun violence.10 (Sixteen years later, Dickey essentially apologized in a Washington Post op-ed, calling for research into gun violence.11 As he later told ABC, “I wish I had not been so reactionary.”12)
Thom Hartmann (The Hidden History of Guns and the Second Amendment: How to Talk about Race, Religion, Politics, and Other Polarizing Topics)
In other words, the number of hospitalizations that the CDC was reporting each day weren’t people who were actually being admitted to the hospital but were hypothetical patients being modeled off a small sample that the CDC was collecting.16 The CDC reported on the number of hospitalizations each day as if it were tabulating these totals, but it wasn’t. Making matters more uncertain, the data that underpinned that modeling exercise was being lifted from a system that had been built years earlier as a way to monitor the prevalence of hospital-acquired infections like urinary tract infections and hospital-acquired pneumonias, not for tracking hospital admissions.
Scott Gottlieb (Uncontrolled Spread: Why COVID-19 Crushed Us and How We Can Defeat the Next Pandemic)
Never in history has the human brain been asked to track so many data points. Everywhere, people rely on their cell phones, e-mail, and digital assistants in the race to gather and transmit data, plans, and ideas faster and faster. One could argue that the chief value of the modern era is speed, which the novelist Milan Kundera described as “the form of ecstasy that technology has bestowed upon modern man.
Harvard Business Publishing (HBR's 10 Must Reads on Managing Yourself (with bonus article "How Will You Measure Your Life?" by Clayton M. Christensen))
Superpower #3: Track for Accountability In God we trust; all others must bring data. —W. Edwards Deming
John Doerr (Measure What Matters: How Google, Bono, and the Gates Foundation Rock the World with OKRs)
If you are brutally honest about tracking yourself, the revelations from a week’s worth of data will most likely be astounding.
Gwyneth Snow (Minimalism: The Path to an Organized, Stress-free and Decluttered Life)
If you find yourself in that situation, we recommend doing an analytics audit and reassessing what data points you’re recording—removing the irrelevant ones—before using the data to make decisions. The next part is how we group metrics together so that we can spot trends and opportunities. There are three key ways: segmentation, cohort analysis, and funnels. Analytics track every customer equally and report the average behavior. For example, a new customer will use an app’s first-use tutorial—some might skip it—but a returning customer won’t even see the first-use tutorial. If you simply looked at how often a customer views the tutorial out of how many times people use the app, it’d look like very few people use the tutorial overall. It’s up to you to segment your data, which means grouping it by common characteristics.
Product School (The Product Book: How to Become a Great Product Manager)