Workflow
Data collection
icon
Search documents
Mohamed El-Erian: Should not undermine BLS' integrity by firing its chief
CNBC Television· 2025-08-04 19:07
right now it's by what's worked and which has been I and growth. >> Well, our next guest says that the market is largely ignoring a red flag in Friday's jobs report. It's among the three main narratives he's seeing emerging following President Trump's firing of BLS chief last week.At first argues the decision undermines institutional integrity. A second focusing on BLS data compilation challenges and how they've become increasingly problematic, and a third saying data revisions provide valuable insights. An ...
A Crypto-Incentive Approach for Training Data
Bloomberg Technology· 2025-07-22 19:32
Core Problem & Solution - AI model commoditization and decreasing compute costs highlight data as the primary bottleneck [1] - The company addresses the data bottleneck by coordinating data collection, labeling, and curation using crypto incentives [4] - Crypto and blockchain technology facilitate the placement of data and IP on an immutable ledger, enabling tracking, attribution, and licensing via smart contracts [7] Competitive Advantage & Market Opportunity - Meta Scale AI's partial acquisition created a vacuum in the AI data space, presenting an opportunity for competitors [6] - The company's decentralized approach allows collaboration with any IP, offering flexibility [15] - The company has already secured contracts, indicating market demand [13] Data Acquisition & Application - The company uses crypto incentives to coordinate data collection on a global scale, compensating contributors with stablecoins or other crypto tokens [6] - The collected data, including egocentric video footage from diverse settings, is crucial for training AI models, such as humanoid robots [9] - Contributors set licensing usage terms on the blockchain, ensuring IP safety [12] Business Model & Demand - The company acts as an agent to secure contracts, connecting data providers with AI model developers [13] - Many organizations are willing to work with the company, some dropping contracts from Scale AI [14][15]
Whispers of the Web: Exposing Data Privacy and Cyber Deception | Amit Dubey | TEDxNIIT University
TEDx Talks· 2025-07-09 15:14
[Music] Good morning everyone. Good morning again and thank you so much. I'm a cyber crime investigator and whatever I have learned in my life I have learned through criminals and I truly believe criminals are innovators.Every time we solve a case we learn something from them. And I always like to start my session with this line that I would love to change this world but they won't give me the source code. And I truly believe that this entire world is a software program and we all humans are very similar to ...
Watched, Tracked, Targeted | Shahd Elbassiouni | TEDxUniversity of Birmingham Dubai
TEDx Talks· 2025-07-01 16:00
Data Privacy Concerns - The internet's capacity to copy, spread, and retain information without consent poses risks to personal data [16] - Online data never expires, fades, or forgets, potentially resurfacing years later [12] - Social media algorithms can reinforce existing beliefs, potentially distorting perceptions of truth and increasing safety risks [13] Risks to Children - Children are increasingly vulnerable online due to greater access and potential exposure to inappropriate content and targeted manipulation [7][8] - Even child-friendly games can contain inappropriate ads, highlighting the need for ad-free versions and parental awareness [6] - Children may be targeted with personalized ads based on observed behavior, leading to fear and discomfort [5] Personal Security Recommendations - Individuals should be mindful of the information they share online, as even seemingly harmless posts can reveal sensitive details [9][11] - Disabling unnecessary permissions on devices and using two-factor authentication can enhance online security [15] - Open communication with children about their online experiences is crucial for fostering trust and addressing potential issues [15]