Archive | October, 2014

The Natural History of Gmail Data Mining

The most striking thing about the early Gmail patents is how exhaustive they were in attempting to anticipate every conceivable attribute of an email message that might one day be exploited for ad targeting purposes. In many cases it would be years before Google was actually able to make these ideas operational in Gmail. The first version of ad serving in Gmail exploited only concepts directly extracted from message texts and did little or no user profiling this method would only be put into practice much later. Some attributes have still not been implemented today and perhaps never will be. For example, as far as I know, Google does not reach into your PC’s file system to examine other files residing in the same directory as the file you attach to a Gmail message, even though the patents explicitly describe this possibility.

Source: Jeff Gould on The Natural History of Gmail Data Mining

Comcast Apology

If you’re going to rebuild a company’s customer service reputation and customer experience, good foundations to start building on include transparency, accountability and brutal, yet humbling honesty. Kudos to the Comcast team for starting down this path.

We’re holding ourselves accountable and we are working hard to make real improvements across the board. While it will take us some time, we can and will do better than this.

Source: A Public Apology to Conal O’Rourke.

Authentication, Authorization and Accounting (AAA) Definition

Authentication, authorization, and accounting (AAA) is a term used to describe how an enterprise controls access to technology resources and data. In addition, some organization expand on this to also provides guidelines that help determine how and what policies are enforced and when audits are completed on this access. These combined processes are considered critical requirements for effective network management and security.