Understanding Block Chain Technology – How It Will Change the Future


In November 2008, an anonymous author using the pseudonym Satoshi Nakamoto issued the white paper “Bitcoin: A Peer-to-Peer Electronic Cash System,” which outlined “a system for electronic transactions without relying on trust.” This system, known as blockchain, became the basis for the world’s first widely accepted cryptocurrency, bitcoin. It’s also a foundational technology that has the possibility to impact society as dramatically as the invention of the Internet itself.
 
Don Tapscott, author of “Blockchain Revolution: How the Technology Behind Bitcoin is Changing Money, Business, and the World,” claimed in an interview with McKinsey & Company that blockchain is “an immutable, unhackable distributed database… a platform for truth… a platform for trust.” An unapologetic, enthusiastic supporter of blockchain, he adds, “I’ve never seen a technology that I thought had a greater potential for humanity.”
 
Is the hype around blockchain justified? Let’s take a look.

The Dangers of Digital Transactions

Mutual trust is the basis for business transactions. Yet as society has grown more complex, our ability to trust another party — especially if they’re unknown and halfway around the world — has decreased. As a result, organizations develop elaborate systems of policies, procedures, and processes to overcome the natural distrust arising from the uncertainties of distance, anonymity, human error, and intentional fraud.
 
At the heart of this distrust is the possibility of a “double spend,” or one party using the same asset twice, particularly when the assets being exchanged are digital. When exchanging physical assets, the transaction can only occur at one time in one place (unless forgery is involved). In contrast, a digital transaction is not a physical transfer of data, but the copying of data from one party to another. If there are two digital copies of something for which there should be only one, problems arise. For example, only one deed of the ownership of a house should be applicable at a time; if there are two seemingly identical copies, two or more parties could claim ownership of the same asset.
 
Unfortunately, the systems and intermediaries required to ensure, document, and record business transactions have not kept pace with the technological changes of a digital world, according to Harvard Business Review.
 
Consider a typical stock transaction. While the trade — one party agreeing to buy and another party agreeing to sell — can be executed in microseconds, often without human input, the actual transfer of ownership (the settlement process) can take up to a week to complete. Since a buyer can’t easily or quickly verify that a seller has the securities the buyer has purchased, nor can a seller be confident that a buyer has the funds to pay for that purchase, third-party intermediaries are required as guarantors to ensure that each party to a trade performs as contracted. Unfortunately, these intermediaries often add another layer of complexity, increase costs, and extend the time it takes to complete the transaction.
 
Our existing systems are also vulnerable to intentional attempts to steal data and the assets they represent. International Data Corporation reports that businesses spent more than $73 billion for cybersecurity in 2016 and are projected to exceed $100 billion by 2020. These numbers don’t include security expenses for non-businesses or governments, the cost of wasted time and duplicated efforts due to data breaches, or the expense of any remedies to those affected.
 
Blockchain technology presents a remedy for these issues that could significantly alter the way we do business in the future.

How Blockchain Technology Works

Understanding blockchain requires an understanding of “ledgers” and how they’re used. A ledger is a database that contains a list of all completed and cleared transactions involving a particular cryptocurrency, as well as the current balance of each account that holds that cryptocurrency. Unlike accounting systems that initially record transactions in a journal and then post them to individual accounts in the ledger, blockchain requires validation of each transaction before entering it into the ledger. This validation ensures that each transaction meets the defined protocols.
 
Read more. . .

How to Handle Sexual Harassment as an Employer


 
The #MeToo movement exploded into America’s consciousness in the Fall of 2017, shaking executive offices and boardrooms across the country. Initially promoted in 2006 by women of color who had suffered sexual abuse, the movement became mainstream on social media after actress Alyssa Milano’s tweet, “If all the women who have been sexually harassed or assaulted wrote ‘Me too.’ as a status, we might give people a sense of the magnitude of the problem.” The massive response to her tweet was unexpected and became the basis for a national movement.
 
Encouraged by movie stars recounting their experiences, millions of women (and some men) have written or spoken about their mistreatment by powerful men and women. For many, the extent of sexual harassment and abuse in our male-dominated society was a revelation as it became clear that no sphere — schools, sports organizations, government agencies, churches, or workplaces — has been immune to the powerful exploiting the powerless for generations.
 
The consequences of sexual misconduct are swift in today’s climate. As TIME magazine reports, “Nearly every day, CEOs have been fired, moguls toppled, icons disgraced. In some cases, criminal charges have been brought.” Time’s Up, an advocacy group formed in 2018, focuses solely on sexual harassment and women’s issues in the workplace. One of their aims is to bring about additional federal and state legislation to punish companies that tolerate harassment.
 
While many companies have had sexual harassment policies in place for decades, this new atmosphere places managers under even stronger pressure to uphold these policies and provide employees with a safe, supportive working environment. If you’re a manager wondering how the #MeToo movement affects your responsibilities, here is what you need to know.

How Extensive Is the Problem?

WIRED magazine reports that the extent of harassment in the workplace is unknown due to the increased use of non-disclosure agreements (NDAs) in settlement negotiations. Confidentiality provisions can hide the acts of serial abuse by powerful, wealthy men such as current President Donald Trump, former President Bill Clinton, and Roger Ailes for years. As former Fox News host Gretchen Carlson, who sued Ailes to escape the NDA she signed with Fox in 2013, told WIRED, these agreements “both silence the victim and fool our culture into thinking we’ve come so far when we have not.”
 
Women have silently endured sexual harassment in the workplace for generations. In previous generations, they rarely reported or spoke of these instances for fear they might lose their jobs or chances for promotion. A 2016 study by the Equal Employment Opportunity Commission (EEOC) found that three-quarters of working women had experienced unwanted sexual attention or sexual coercion (including physical touching) on the job, but less than 10% filed a formal complaint.
 
Read more . . .

Fake News

8 Ways to Determine If a News Story Is Reliable

Fake News

During a 2017 interview on the Christian Trinity Broadcasting Network, President Donald Trump claimed his use of the word “fake” to describe the media was “one of the greatest of all terms [he’d] come up with.”

While he was mistaken about his creation of the phrase “fake news,” Trump’s frequent use of the epithet to describe news media has no doubt popularized the label — and may have even led to the phrase’s inclusion in the Dictionary.com database.

It may seem at times like fake news is an epidemic unique to our current political climate, but it’s actually been around for centuries. Let’s take a closer look at what it is, how it spreads, and what you can do to detect it.

What Is Fake News?

As its name suggests, fake news is false or counterfeit information reported in a newspaper, news periodical, or newscast.

Fake news differs from satire, farce, or hyperbole in that it’s a deliberate attempt to spread misinformation and manipulate public opinion for political, financial, or social gain. Inaccurate content is packaged to appear as fact, thus duping the audience into believing it’s true.

A story doesn’t have to be totally made-up to mislead; it’s enough to present subtle misrepresentations, critical omissions, or out-of-context information. Examples of recent misleading or false information include claims that:

  • President Barak Obama was born outside the U.S.
  • Senator Ted Cruz was bribed to pass legislation that put America’s public lands in the hands of the Koch brothers for mining and other business pursuits.
  • The Affordable Care Act established a “death panel” to determine healthcare benefits for the sick and elderly.
  • Pope Francis endorsed Donald Trump for President. (A later report revealed that the Pope supported Hillary Clinton.)
  • Millions of illegal voters voted in the 2016 presidential election.

All of the above have been labeled false by fact-checking organizations like PolitiFact, FactCheck, OpenSecrets, and Snopes, yet there are still those who believe these stories to be true.

Why does fake news spread so rapidly? As Craig Silverman of Neiman Reports writes in the Columbia Journalism Review: “[T]he forces of untruth have more money, more people, and… much better expertise. They know how to birth and spread a lie better than we know how to debunk one. They are more creative about it, and, by the very nature of what they’re doing, they aren’t constrained by ethics or professional standards. Advantage, liars.”

Click to Read More . . .

10 Ways to Protect Your Privacy Online

Who knows the Evil that lurks in the hearts of men?
In May 2017, more than 230,000 computers around the world were taken hostage by the WannaCry malware worm. Known as ransomware, the unknown developers surreptitiously gained control of computers running the Microsoft Windows operating system, encrypted the users’ data, and demanded a payment of $300 in untraceable bitcoins to unlock the system and access information.
 
Cyber-attacks occur across borders and range from simple email “phishing” efforts to sophisticated software programs that quickly expand the attacks and hide the identity of the perpetrators. Motives of cyber criminals range from vanity (proving one’s technical expertise) to illegal profit. Some attacks are politically motivated while others are rarely publicized, state-sponsored sabotage. The attacks affect individuals, businesses, and governments.
 
According to a report by the Ponemon Institute, a successful hacker earns $14,711 for each attack and has 8.26 successful attacks per year. Sophisticated hacking tools are readily available on the Internet, especially the Dark Web. The criminals and the curious are stepping up their efforts to invade your privacy and steal your money. What actions can you take to harden the target and protect your assets?
 
What actions can you take to harden the target and protect your assets?

Understand the Enemy

Malicious software can wreak havoc on your computer or operate covertly in the background. Malware (The Creeper Worm) was first detected on the ARPANET, the forerunner of the Internet, in the early 1970s. Since that time, spurred by the growth of personal computers and connected communication networks, many different types of malware have appeared, including:
 
Trojans: The most common malware is based on the Greek strategy to invade Troy: the Trojan Horse. In this case, users are tricked into allowing an outsider unlimited access to their computers by clicking on an unsafe Internet link, opening an email attachment, or completing a form. By themselves, Trojans are delivery vehicles, providing a “backdoor” into a computer or network. As a consequence, they open the door for malicious software to steal data, compromise operating systems, or spy on users. Trojans do not replicate themselves and spread to other devices like a virus or a worm.
Viruses: Just as a biological virus is transmitted to unsuspecting hosts, a computer virus replicates itself and infects new computers, then modifies operating programs to malfunction. Some have called viruses “diseases of machinery,” a term first coined in the 1972 futuristic film “Westworld.” One of the early viruses – Love Letter – delivered by an email with the subject line “I Love You” and an attachment “L0VE-LETTER-FOR-YOU.TXT” – attacked 55 million computers worldwide and caused an estimated $10 billion in damage, according to Wired magazine.
 
Read more . . .