The Megashifts in ‘Technology vs. Humanity’ | Gerd Leonhard

Megashifts, of Gerd Leonhard
Teaser: Riffing on a key theme from Futurist Gerd’s 2016 book on Technology vs Humanity

tl;dr → This is a promotional site for the book, still in the promotional cycle

Gerd Leonhard; Technology vs. Humanity: The Coming Clash Between Man and Machine; Fast Future Publishing; 2016-09-06; 184 pages; Amazon:0993295827; Kindle: $10, paper: $25+SHT; previously filled.

Framework

contra…
  • Leonhard’s teleological transformation framework themed on noun forms of verbs (“-tion”) in Technology versus Humanity
  • Kevin Kelly’s teleological transformation framework themed on gerunds
    The Inevitable: Understanding the 12 Technological Forces That Will Shape Our Future; required for PDV-91; separately noted..
  • Sheryl Connelly’s Metagrends,
    10 Trends That Could Change World; adtechevents; Sheryl Connelly (Ford Motor Company); On YouTube; 2013-11-13; 46:52 (Sheryl starts at 8:00); separately filled; separately noted.
  • Faith Popcorn’s Megatrends
    from back in the day; from back in the previous century.

Listicle

The “megatrends” “megashifts”

  1. Digitization
  2. Mobilization
  3. Screenification
  4. Disintermediation
  5. Transformation
  6. Intelligization
  7. Automation
  8. Virtualization
  9. Anticipation
  10. Robotization

Followup: Explaniing Key Themes, 2016-09-04.

Outreach

About

Related

Sites

Technology vs Humanity | Gerd Leonhard

Gerd Leonhard; Technology vs. Humanity: The Coming Clash Between Man and Machine; Fast Future Publishing; 2016-09-06; 184 pages; Amazon:0993295827; Kindle: $10, paper: $25+SHT.

Concepts

  • Fourteen Points, herein
  • Megashifts, separately filled.

Table of Contents

  • Introduction
  • Chapter 1: A Prologue to the Future
  • Chapter 2: Tech vs. Us
  • Chapter 3: The Megashifts
  • Chapter 4: Automating Society
  • Chapter 5: The Internet of Inhuman Things
  • Chapter 6: Magic to Manic to Toxic
  • Chapter 7: Digital Obesity: Our Latest Pandemic
  • Chapter 8: Precaution vs. Proaction
  • Chapter 9: Taking the Happenstance out of Happiness
  • Chapter 10: Digital Ethics
  • Chapter 11: Earth 2030: Heaven or Hell?
  • Chapter 12: Decision Time
  • Acknowledgements
  • Resources

Mentions

  • TVH → Technology versus Humanity

Promotions

Outreach

Listicle

Enumerated in the “Fourteen Points” style:
<quote>

  1. Embrace technology but don’t become it. Radical human augmentation via technological means will be a downgrade not an upgrade. Technology is exponential but humans are linear (and should remain so)
  2. Whatever can be digitized, automated and virtualized, will be – and anything that cannot be digitized or automated will become extremely valuable (i.e. our uniquely human qualities).
  3. Exponential technological change is #hellven (heaven and hell at the same time). Will we be tool-makers or tool-made?
  4. Technology does not have ethics but our society depends on them. Just because we can does not mean we should.
  5. Technology is not what we seek but how we seek: the tools should not become the purpose. Yet increasingly, technology is leading us to ‘forget ourselves’.
  6. Efficiency should never become more important than humanity, because not everything that can be automated, should be – and happiness cannot be automated.
  7. Humanity will change more in the next 20 years than the previous 300 years (yes, seriously). It’s time to decide what we want to be.
  8. To safeguard humanity’s future, we must invest as many resources in human happiness and the continued flourishing of humanity as we do in developing new tools and technologies. Exponential technologies need exponential humanity; every great algorithm needs a great androrithm!
  9. We are at the pivot point of exponential and combinatorial technological evolution: all around us, science fiction is becoming science fact – and the future will increasingly arrive gradually then suddenly. We need to proceed with a very wise combination of precaution and pro-action.
  10. The immediate future clearly is all about technology yet the bigger future lies in transcending it
  11. It is now clear that indeed, ‘software is eating the world’ (Marc Andreessen, 2011) but increasingly I am worried about the possibility that ‘software is cheating the world’
  12. Silicon Valley and China should not become ‘mission control for humanity‘. We need a global digital ethics counsel that transcends the agenda of investors and the military.
  13. Just as peace is not merely the absence of war, progress is not merely the presence of technology (in other words, technology is not the saviour of humanity – we are!)
  14. The future is not just something that will happen tomorrow, the future is something that has already happened today but just didn’t notice it!

</quote>

Technological Revolutions and Financial Capital: The Dynamics of Bubbles and Golden Ages | Carlota Perez

Carlota Perez; Technological Revolutions and Financial Capital: The Dynamics of Bubbles and Golden Ages; Edward Elgar; 2003-04-26; 224 pages; Amazon:1843763311; paper: $18+SHT.

Related

PoC||GTFO (Proof of Concept or Get The Fuck Out) | Manul Laphroaig

Manul Laphroaig; PoC||GTFO;; No Starch Press; 2017-08 (estimated); 768 pages; ISBN-13:978-1-59327-880-9

Biography

Pastor Manul Laphroaig curates PoC||GTFO with a fine gang of friends and neighbors. Many of his essays are featured in the book, including “Epistle to Hats of All Colors,” “Sermon on the Divinity of Languages,” and “Build Your Own Fucking Birdfeeder.”

Actualities

Photos are mock-ups.

Table of Contents

A CFP with POC

  • iPod Antiforensics” by Travis Goodspeed
  • ELFs are dorky, Elves are cool” by S. Bratus and J. Bangert
  • Epistle to Hats of All Colors” by Manul Laphroaig
  • Returning from ELF to Libc” by Rebecca .Bx Shapiro
  • GTFO or #FAIL” by FX of Phenoelit

Proceedings of the Society of PoC||GTFO

  • RNG in four lines of JavaScript” by Dan Kaminsky
  • Serena Butler’s TV Typewriter” by Travis Goodspeed
  • Making a Multi-Windows PE” by Ange Albertini
  • This ZIP is also a PDF” by Julia Wolf
  • Burning a Phone” by Josh Thomas
  • Sermon on the Divinity of Languages” by Manul Laphroaig

The Children’s Bible Coloring Book of PoC||GTFO

  • Build your own birdfeeder” by Manul Laphroaig
  • A PGP Matryoshka Doll” by Myron Aub
  • Code Execution on a Tamagotchi” by Natalie Silvanovich
  • Shellcode for MSP430” by Travis Goodspeed
  • Calling putchar() from ELF” by Rebecca .Bx Shapiro
  • POKE of Death for the TRS 80/M100” by Dave Weinstein
  • This OS is also a PDF” by Ange Albertini
  • A Vulnerability in Reduced Dakarand” by Joernchen
  • Juggernauty” by Ben Nagy

Address on the Smashing of Idols to Bits and Bytes

  • Greybeard’s Luck” by Manul Laphroaig
  • This PDF is JPEG.” by Ange Albertini
  • Netwatch for SMM” by Wise and Potter
  • Packet-in-Packet Mitigation Bypass” by Travis Goodspeed
  • An RDRAND Backdoor in Bochs” by Taylor Hornby
  • Kosher Firmware for the Nokia 2720” by Assaf Nativ
  • Tetranglix Boot Sector” by Haverinen, Shepherd, and Sethi
  • Defusing the Qualcomm Dragon” by Josh Thomas
  • Tales of Python’s Encoding” by Frederik Braun
  • Angecryption” by Albertini and Aumasson

Tract de la Société Secrète

  • Epistle on the Bountiful Seeds of 0Day” by Manul Laphroaig
  • This OS is a Boot Sector” by Shikhin Sethi
  • Prince of PoC” by Peter Ferrie
  • New Facedancer Framework” by Gil
  • Power Glitching Tamagotchi” by Natalie Silvanovich
  • A Plausibly Deniable Cryptosystem’ by Evan Sultanik
  • Hardening Pin Tumbler Locks” by Deviant Ollam
  • Intro to Chip Decapsulation” by Travis Goodspeed
  • Forget Not the Humble Timing Attack” by Colin O’Flynn
  • This Truecrypt is a PDF” by Ange Albertini
  • How to Manually Attach a File to a PDF” by Ange Albertini
  • Ode to ECB” by Ben Nagy

Address to the Inhabitants of Earth

  • A Sermon on Hacker Privilege” by Manul Laphroaig
  • ECB: Electronic Coloring Book” by Philippe Teuwen
  • An Easter Egg in PCI Express” by Jacob Torrey
  • A Flash PDF Polyglot” by Alex Inführ
  • This Multiprocessing OS is a Boot Sector” by Shikhin Sethi
  • A Breakout Board for Mini-PCIe” by Joe FitzPatrick
  • Prototyping a generic x86 backdoor in Bochs” by Matilda
  • Your Cisco blade is booting PoC||GTFO” by Mik
  • I am my own NOP Sled” by Brainsmoke
  • Abusing JSONP with Rosetta Flash” by Michele Spagnuolo
  • Sexy collision PoCs” by A. Albertini and M. Eichlseder
  • Ancestral Voices” by Ben Nagy

Old Timey Exploitation

  • On Giving Thanks” by Manul Laphroaig
  • Gekko the Dolphin” by Fiora
  • This TAR archive is a PDF!” By Ange Albertini
  • X86 Alchemy and Smuggling” by Micah Elizabeth Scott
  • Detecting MIPS Emulation” by Craig Heffner
  • More Cryptographic Coloring Books” by Philippe Teuwen
  • PCB Reverse Engineering” by Joe Grand
  • Davinci Seal” by Ryan O’Neill
  • Observable Metrics” by Don A. Bailey

PoC||GTFO, Calisthenics and Orthodontia

  • The Magic Number: 0xAA55” by Morgan Reece
  • Coastermelt” by Micah Elizabeth Scott
  • The Lysenko Sermon” by Manul Laphroaig
  • When Scapy is too high-level” by Eric Davisson
  • Abusing file formats” by Ange Albertini
  • AES-NI Backdoors” by BSDaemon and Pirata
  • Innovations with Linux core files” by Ryan O’Neill
  • Bambaata speaks from the past” by Count Bambaata
  • Cyber Criminal’s Song” by Ben Nagy

Exploits Sit Lonely on the Shelf

  • Witches, Warlocks, and Wassenaar” by Manul Laphroaig
  • Compiler Bug Backdoors” by Bauer, Cuoq, and Regehr
  • A Protocol for Leibowitz by Goodspeed and Muur
  • Jiggling into a New Attack Vector” by Mickey Shkatov
  • Hypervisor Exploit, Five Years Old” by DJC and Bittman
  • Stegosploit” by Saumil Shah
  • On Error Resume Next” by Jeffball
  • Unbrick my Part” by Tommy Brixton
  • Backdoors up my Sleeve” by JP Aumasson
  • Naughty Signals” by Russell Handorf
  • Weird Crypto” by Philippe Teuwen

Authors

  • Ange Albertini
  • Myron Aub
  • JP Aumasson
  • Don A. Bailey
  • Count Bambaata
  • J. Bangert
  • Bauer
  • Bittman
  • Brainsmoke
  • Tommy Brixton
  • Frederik Braun
  • S. Bratus
  • BSDaemon
  • Cuoq
  • DJC
  • Eric Davisson
  • M. Eichlseder
  • Peter Ferrie
  • Fiora
  • Joe FitzPatrick
  • FX of Phenoelit
  • Gil
  • Travis Goodspeed
  • Joe Grand
  • Joernchen
  • Russell Handorf
  • Haverinen
  • Craig Heffner
  • Taylor Hornby
  • Alex Inführ
  • Jeffball
  • Dan Kaminsky
  • Manul Laphroaig
  • Matilda
  • Mik
  • Muur
  • Assaf Nativ
  • Ben Nagy
  • Colin O’Flynn
  • Ryan O’Neill
  • Deviant Ollam
  • Pirata
  • Potter
  • Morgan Reece
  • Regehr
  • Micah Elizabeth Scott
  • Saumil Shah
  • Rebecca .Bx Shapiro
  • Shikhin Sethi
  • Shepherd
  • Mickey Shkatov
  • Natalie Silvanovich
  • Michele Spagnuolo
  • Evan Sultanik
  • Philippe Teuwen
  • Josh Thomas
  • Jacob Torrey
  • Dave Weinstein
  • Wise
  • Julia Wolf

 

Screentime Is Making Kids Moody, Crazy and Lazy | Psychology Today

Screentime Is Making Kids Moody, Crazy and Lazy;; Victoria L. Dunckley; In Psychology Today; 2015-08-18.
Teaser: 6 Ways electronic screen time makes kids angry, depressed and unmotivated.

Book

Victoria L. Dunckley; Reset Your Child’s Brain: A Four-Week Plan to End Meltdowns, Raise Grades, and Boost Social Skills by Reversing the Effects of Electronic Screen-Time; New World Library; 2015-06-23; 284 pages; kindle: #10, paper: $9+SHT; promotional site.

From the publisher’s summary at Amazon:

<quote>Dr. Dunckley has found that everyday use of interactive screen devices — such as computers, video games, smartphones, and tablets — can easily overstimulate a child’s nervous system, triggering a variety of stubborn symptoms. In contrast, she’s discovered that a strict, extended electronic fast single-handedly improves mood, focus, sleep, and behavior, regardless of the child’s diagnosis. It also reduces the need for medication and renders other treatments more effective. </quote>

Listicle

Screen-time …

  1. disrupts sleep and desynchronizes the body clock.
  2. desensitizes the brain’s reward system.
  3. produces “light-at-night.”
  4. induces stress reactions.
  5. overloads the sensory system
    fractures attention
    depletes mental reserves.
  6. reduces physical activity levels
    reduces exposure to “green time.”

Referenced

In archaeological order…

Previously

In Psychology Today, archeological order…

Deep Learning | Goodfellow, Bengio, Courville

Ian Goodfellow, Yoshua Bengio, Aaron Courville; Deep Learning; MIT Press; (maybe) forthcoming; site.

Ancillary

Availability

No (not yet).

  • No booksellers have it; i.e. no Amazon.
  • MIT Press has licensed “HTML only” at the promotional site
  • the print copy is not (yet) available.

Promotions

Related

Table of Contents

Sherry Turkle promotes her 2015-10 book ‘Reclaiming Conversation: The Power of Talk in a Digital Age’ | Tech Republic

A conversation with MIT’s Sherry Turkle about conscious consumption of tech; In Tech Republic; 2016-04-11.
Teaser: Author and MIT professor Sherry Turkle discusses how tech devices change the nature of our conversations at work and in our personal lives.

Book

Sherry Turkle; Reclaiming Conversation: The Power of Talk in a Digital Age; Penguin Press; 2015-10-06; 448 pages; promotion.

Mentions

  • social media
  • screen time
  • talk time
  • Meetup
  • <quote>[Max] Weber’s work on how productivity is good for the bottom line, and how conversation increases productivity.</quote>

Who

Referenced

Pew Internet

In archaeological order…

The Huffington Post

In arbitrary order

Previously

In Tech Republic:

The Third Wave: An Entrepreneur’s Vision of the Future | Steve Case

Steve Case; The Third Wave: An Entrepreneur’s Vision of the Future; Simon & Schuster; 2016-04-05; kindle: $13, paper: $18+SHT.

<quote ref=”amazon“>The first wave saw AOL and other companies lay the foundation for consumers to connect to the Internet. The second wave saw companies like Google and Facebook build on top of the Internet to create search and social networking capabilities, while apps like Snapchat and Instagram leverage the smartphone revolution. Now, Case argues, we’re entering the Third Wave: a period in which entrepreneurs will vastly transform major “real world” sectors like health, education, transportation, energy, and food—and in the process change the way we live our daily lives. But success in the Third Wave will require a different skill set, and Case outlines the path forward.</quote>

Snide

Sure feels like the end of the bubble.  Here is a chronicle of generalized boosterism of the scale of George Gilder’s Telecosm

Whatever happened to that?

Promotions

  • The Next Wave in the Internet’s Evolution; Steve Case; In The Wall Street Journal (WSJ); 2016-04-04.
    Teaser: First came getting people online. Then the apps era took over. Now a fresh reimagining is taking off.
    Mentions

    • too big to fail
    • Financial Technology (FinTech)
    • The “Waves”
      • First Wave → internet portals; e.g. AOL.
      • Second Wave  → applications & services on top of the internet.
      • Third Wave → something about ubiquity
    • coopetition (a neologism of cooperation & competition)
    • EdTech
    • Affordable Care Act
    • Uberized (industries)

The 5 Things Every Privacy Lawyer Needs to Know about the FTC: An Interview with Chris Hoofnagle | Daniel Solove

Daniel Solove; The 5 Things Every Privacy Lawyer Needs to Know about the FTC: An Interview with Chris Hoofnagle; In His Blog, on LinkedIn; 2016-03-02.

Original Source

Mentions

  • Civil Investigative Demand (CID)
  • <quote>The FTC has not found a way to police data brokers. Data brokers both create new privacy problems and intensify existing ones by offering mechanisms to secretly identify consumers and to link their otherwise pseudonymous behavior. The market provides little incentive for data brokers to recognize individuals’ privacy interests.</quote>
  • holder in due course rule

Listicle

  1. Relationships with staff may be more important than links to commissioners.
  2. It is possible to persuade the FTC to drop an investigation.
  3. A pugilistic posture does not help.
  4. To see around the corners, it pays to be familiar with the FTC’s other divisions.
  5. The FTC has enormous investigatory powers.

What Ash Read Learned When He Tried Being Authentic at Buffer, His Employer | Fast Company

What I Learned When I Tried Being Authentic At Work; Ash Read; In Fast Company; 2016-01-22.
Teaser: Studies found that more than half of us cover up part of our identity to fit in at work, so what does it take to be authentic at work?
Ash Read is a content farmistcrafter, on staff at Buffer.

Originally

Ash Read; What Does It Mean to Bring Your ‘Whole Self’ to Work?; In Some Blog as Buffer; 2016-01-17.
Ash Read is a content craftistfarmer on staff at Buffer.

Listicle

(the benefits)
  1. [He] learned to embrace vulnerability in [his] writing
  2. [He] experienced what it feels like to value kind over clever
  3. [He] made time to reflect.

Mentions

  • Authenticity, authentic
  • Happiness
  • Holism
  • Kind vs Clever

Aphorisms

(quoting)

What is wholeness
  • Leave nothing at the door.
  • Wholeness at home.
Make time to reflect
  • You deliberately find time for reflection, because that’s where your life-changing adjustments come from.
  • You have a calm approach to discussions and ponder points in your own time.
  • You find time to jump out of the tranches into the higher-level thinking that will move the needle.
  • You understand the value of patience and treat it as a muscle which needs practice to grow.

Who

Referenced

Previously

From the content farm