Skip to main content

Our daily event log

Usage of technical devices and gadgets is very common these days. With the proliferation of devices which can access internet and spread of 3G, more and more people can now stay connected. Facebook, Twitter, YouTube and other such social networking sites, and emails are the major reasons for people to stay online most of the time.

From Facebook Timeline to sending emails or SMSs, we are all creating an event log. This is an ongoing endless process. Companies like Google earn a living out of it. How? I'll tell you.

First, let us understand how we are creating this event log. This log does not stay with us. It stays with the service provider. Simple example, we send an SMS, it creates a log - in the sender's and receivers' mobile. Even more, it is appended to several logs with the service provider - from the sender, transmitter to the receiver. Same with emails. We use them all for records. "Remember, I had sent you a reminder email yesterday afternoon to follow-up with the client"? Are some common statements. And the other person cannot deny it.

This log is not limited to only SMSs or emails. It has a higher coverage. Someone called her friend on a particular time of the day and the call lasted for, umm say, 10 mins. Then after 1hr or so, the friend called back and the call lasted for 30 mins. The geographic location of all the participants is also logged.

Same with internet access. The time and duration of internet connectivity, the sites visited, the geographic location, IP address. Even the data transferred, in case of an insecure access.

Whoa, so we do not have a privacy at all. Any given time, when we are connected, someone is tracking our activities, location and other such information. Yes!

Though this information is accessible to a limited audience and they cannot use it against us, but this information is available. Hackers are always trying to get such information. Personal Health records maintained online, Credit cards used, and other similar information.

Google and other such companies apply this logic to track what we search, show relevant results, calculate trends, display premium ads and overall, monetize the entire process. Other companies claim to suggest us items as per our shopping habits and trends.

Wherever we go, whatever we do, this log stays with us - tracing our footsteps, keeping an eye on us, noting everything from what we do, how we do and for how long and with whom! Those who do not pay attention, fall prey to people or groups who know how to extract and misuse this information.


We need to be careful while we are connected - someone's logging all the time

- Vivek

Comments

Popular posts from this blog

Assembla hit by a virus?

Today hosted task management site Assembla was hit by some virus. Around 3 hours back we got Service Unavailable - DNS failure error when trying to access the portal.
Trying to call any API from Assembla returns with the following unwanted HTML code prepended to the response:
<html><head><meta http-equiv="refresh" content="0; URL=http://sedoparking.com/?path=home"></head><body><a href="http://sedoparking.com/?path=home">Please click here</a></body></html>
We have logged a ticket with them. The response was quick but when we tried to post a reply comment we consistently got error - Your CAPTCHA words didn't match We'll keep on chasing them for updates and hope safety for Assembla users.

- Vivek

Count and Label DNA strands

This is a proof of concept (POC) developed using Python3, NumPy, and OpenCV, to count and label the number of DNA strands from an image of combed DNA molecules.
The technique of Adaptive Mean Thresholding is used here.
There are several Thresholding algorithms available.

Of Imitation, Innovation, Inspiration and Improvisation

Copy-paste was never easier, thanks to modern technology. Ideas and innovations now spread even faster. When a product is launched in the market, within a few days, we have other vendors with a similar offering. The case is more severe with mobiles and tablets.