“It began with a small group of digital obsessives recording their heartbeat. Today the ‘quantified self’ movement is a gadget-filled fitness craze.” – (Sunday Telegraph Magazine, 2013)
The quantified self goes beyond simply weighing oneself everyday, it goes to subjecting oneself to quantitative habits, its the incorporation of technology to gaining data such as oxygen, heartbeat, how much sleep one’s gotten, how many paces one’s walked and states of mood just to name a few.
So why would people do this? Why would people force themselves to be measured every moment of every day? The main objective here as told by Gary Wolf is that of self knowledge…of getting to know ourselves better.
One of the main aspects that is particularly interesting is how this digital-driven movement has moved towards becoming more fitness and wellbeing based. If you’re wearing a fitbit and tracking your heartrate and pace counter every day you’re participating in this movement.
Achieving self-knowledge, like Gary Wolf said, an important step towards self improvement, and many people gather in communities to share their data between each other, usually fitness-wise, where individuals all act as separate nodes in the community, each with the same equal goal.
It’s interesting as these huge amounts of data, are now generated daily by individuals, which could never happen before. This sort of big data can be extracted by huge companies and corporations to understand complex aspects of a place’s population, such as roughly on average the amount of exercise undertook daily.
This is a map back in 2012 showing the amount of Flame infections discovered on customer machines.
So what is flame? It’s a massive, highly sophisticated piece of malware that was infecting targeting systems in Iran, Syria, Lebanon and Sudan for at least two years.
So the malware was initially discovered by Kaspersky, who stated that it dwarfs Stuxnet in size, and it was believed it was wrecking havoc on Iran’s nuclear programs in 2009 and 2010. What’s interesting is this virus was recognized as part of an espionage toolkit, but there was no way to identify these sinister forces as its difficult to find exactly where keyloggers, worms, malware and other viruses originate.
It was found that it was originally utilized to spy on users of infected computers and steal data from them, be it keystrokes, recorded conversations and important government documents.
It’s such a complex piece of malware that Gostev, chief security expert of the time at Kaspersky stated it could take almost 10 years to understand it in its entirety.
However, what was interesting was the spreading mechanisms that are typical with Malware such as Stuxnet were switched off, possibly to avoid accelerated detection by the creator or attackers.
The malware also has no kill date, however the operators can spread a kill module that will eliminate all aspects of the virus, picking up all breadcrumbs left behind.
“…and on Jan 14, just 10 days after Bouazizi died, Ben Ali’s 23-year old rule of Tunisia was over.”
So just a little background, Ben Ali was the dictator of of Tunisia since 1987, on November 2010, Wikileaks released cables on Tunisia confirming extensive government corruption under Ben Ali’s rule. It included how the dictator’s house was very modern, his ruling family would feed his guests with vast amounts of food despite the country suffering massive financial pressure with many living in poverty.
“I think Android hurts them more than it helps them. It’s just going to divide them and people who want to be their partners.” – Steve Jobs, 2008
So Android’s device philosophy is all about it’s technology being open source. This means that you can root your phone since they give out the open source code, you can browse Android’s many unofficial app markets if Google Play isn’t your thing, there’s zero control over the platform, content and userbase.
This can be compared to Apple’s own ideal situation of complete control and closed devices. Apple wants all software and hardware to be absolutely exclusive to them, this is because unlike Android they do not want their users tinkering with their software and finding vulnerabilities, ruining the experience for everyone.
Apple repairs and parts for mobile phones and their desktop computers can only be purchased and repaired by licensed resellers or official stores.
This control spills over to the specific app store itself, all apps are undergone through this walled garden approach, it has to undergo an approval process controlled by Apple.
This is pretty much complete control, but this doesn’t necessarily mean it’s a horrible idea.
This means that users can ensure reliability of their product alongside ease of access, if a user isn’t particularly interested in open source coding, tinkering and making their phone unique (which is the majority of the general public) then Apple hardware is absolutely the way to go.
Why go through all the troubleshooting of other open source products when you can just buy an Apple product and know for a fact that it’ll work fine?
I created a prezi which focused on the Walled Garden approach, particularly why it is appealing, the issues surrounding it and what happens when it disappears, I further touch on how this approach influences my Digital Artefact and the mediums and media sites I’ve chosen to present my content.
“It turns out to be absolutely ubiquitous in human affairs, economies and nature itself.” – Chris AndersonSo I’m going to explain a bit about the long tail.
What is the long tail?
Well as Chris Anderson put it on his website, it’s “… the theory that our culture and economy is increasingly shifting away from the focus on a relatively small number of ‘hits’, at the head of the demand curve and towards a huge number of niches in the tail.”