22,672 research outputs found

    APIs and Your Privacy

    Get PDF
    Application programming interfaces, or APIs, have been the topic of much recent discussion. Newsworthy events, including those involving Facebook’s API and Cambridge Analytica obtaining information about millions of Facebook users, have highlighted the technical capabilities of APIs for prominent websites and mobile applications. At the same time, media coverage of ways that APIs have been misused has sparked concern for potential privacy invasions and other issues of public policy. This paper seeks to educate consumers on how APIs work and how they are used within popular websites and mobile apps to gather, share, and utilize data. APIs are used in mobile games, search engines, social media platforms, news and shopping websites, video and music streaming services, dating apps, and mobile payment systems. If a third-party company, like an app developer or advertiser, would like to gain access to your information through a website you visit or a mobile app or online service you use, what data might they obtain about you through APIs and how? This report analyzes 11 prominent online services to observe general trends and provide you an overview of the role APIs play in collecting and distributing information about consumers. For example, how might your data be gathered and shared when using your Facebook account login to sign up for Venmo or to access the Tinder dating app? How might advertisers use Pandora’s API when you are streaming music? After explaining what APIs are and how they work, this report categorizes and characterizes different kinds of APIs that companies offer to web and app developers. Services may offer content-focused APIs, feature APIs, unofficial APIs, and analytics APIs that developers of other apps and websites may access and use in different ways. Likewise, advertisers can use APIs to target a desired subset of a service’s users and possibly extract user data. This report explains how websites and apps can create user profiles based on your online behavior and generate revenue from advertiser-access to their APIs. The report concludes with observations on how various companies and platforms connecting through APIs may be able to learn information about you and aggregate it with your personal data from other sources when you are browsing the internet or using different apps on your smartphone or tablet. While the paper does not make policy recommendations, it demonstrates the importance of approaching consumer privacy from a broad perspective that includes first parties and third parties, and that considers the integral role of APIs in today’s online ecosystem

    Asymptotic enumeration of incidence matrices

    Full text link
    We discuss the problem of counting {\em incidence matrices}, i.e. zero-one matrices with no zero rows or columns. Using different approaches we give three different proofs for the leading asymptotics for the number of matrices with nn ones as nn\to\infty. We also give refined results for the asymptotic number of i×ji\times j incidence matrices with nn ones.Comment: jpconf style files. Presented at the conference "Counting Complexity: An international workshop on statistical mechanics and combinatorics." In celebration of Prof. Tony Guttmann's 60th birthda

    Jane Eyre and Education

    Full text link
    Charlotte Brontë created the first female Bildungsroman in the English language when she wrote Jane Eyre in the mid-nineteenth century. Brontë’s novel explores the development of a young girl through her educational experiences. The main character, Jane Eyre, receives a formal education as a young orphan and eventually becomes both a teacher and a governess. Jane’s life never strays far from formal education, regardless of whether she is teaching or being taught. In each of Jane’s experiences, she learns invaluable lessons, both in and out of the classroom environment. Jane excels in the sphere of formal education, which allows her to become a graceful and accomplished woman. However Jane learns the most important lessons of her life during crises. The moral and spiritual lessons Jane acquires in times of difficulty are the most important educational experiences she receives, and they allow her to progress from a lonely orphan to a happily married woman

    Helium mining on the Moon: Site selection and evaluation

    Get PDF
    The feasibility of recovering helium (He) from the Moon as a source of fusion energy on Earth is currently being studied at the University of Wisconsin. Part of this study is selection and evaluation of potential sites for lunar He mining. Selection and evaluation of potential mining sites are based on four salient findings by various investigators of lunar samples: (1) Regoliths from areas underlain by highland materials contain less than 20 wppm He; (2) Certain maria regoliths contain less than 20 wppm He, but other contain 25 to 49 wppm; (3) The He content of a mare regolith is a function of its composition; regoliths rich in Ti are relatively rich in He; and (4) He is concentrated in the less than 100-micron size fractions of regoliths. The first three findings suggest that maria are the most promising mining sites, specifically, those that have high-Ti regoliths. Information on the regional distribution and extent of high-Ti regoliths comes mainly from two sources: direct sampling by various Apollo and Luna missions, and remote sensing by gamma-ray spectroscopy and Earth-based measurements of lunar spectral reflectance. Sampling provides essential control on calibration and interpretation of data from remote sensing. These data indicate that Mare Tranquillitatis is the principal area of high-Ti regolith of the eastern nearside, but large areas of high-Ti regolith are indicated in the Imbrium and Procellarum regions. Recovery of significant amounts of He-3 will require mining billions of tonnes of regolith. Large individual areas suitable for mining must therefore be delineated. The concentration of He in the finer size fractions and considerations of ease of mining mean that mining areas must be as free as possible of sizable craters and blocks of rock. Pending additional lunar missions, information regarding these features must be obtained from lunar photographs, photogeologic maps, and radar surveys. The present study is decidedly preliminary; available information is much to limited to permit even a close approach to final evaluations. As a prelude to recovery of He from the Moon, systematic exploration and sampling of high-Ti regoliths should therefore have a high priority in future lunar missions

    Simple approach to include external resistances in the Monte Carlo simulation of MESFETs and HEMTs

    Get PDF
    The contact and external series resistances play an important role in the performance of modern 0.1-0.2 μm HEMT's. It is not possible to include these resistances directly into the Monte Carlo simulations. Here we describe a simple and efficient way to include the external series resistances into the Monte Carlo results of the intrinsic device simulations. Examples of simulation results are given for a 0.2 μm pseudomorphic HEMT

    Privacy in Gaming

    Get PDF
    Video game platforms and business models are increasingly built on collection, use, and sharing of personal information for purposes of both functionality and revenue. This paper examines privacy issues and explores data practices, technical specifications, and policy statements of the most popular games and gaming platforms to provide an overview of the current privacy legal landscape for mobile gaming, console gaming, and virtual reality devices. The research observes how modern gaming aligns with information privacy notions and norms and how data practices and technologies specific to gaming may affect users and, in particular, child gamers. After objectively selecting and analyzing major players in gaming, the research notes the many different ways that game companies collect data from users, including through cameras, sensors, microphones, and other hardware, through platform features for social interaction and user-generated content, and by means of tracking technologies like cookies and beacons. The paper also notes how location and biometric data are collected routinely through game platforms and explores issues specific to mobile gaming and pairing with smartphones and other external hardware devices. The paper concludes that transparency as to gaming companies’ data practices could be much improved, especially regarding sharing with third party affiliates. In addition, the research considers how children’s privacy may be particularly affected while gaming, determining that special attention should be paid to user control mechanisms and privacy settings within games and platforms, that social media and other interactive features create unique privacy and safety concerns for children which require gamer and parent education, and that privacy policy language is often incongruent with age ratings advertised to children and parents. To contribute additional research value and resources, the paper attaches a comprehensive set of appendices, on which the research conclusions are in part based, detailing the technical specifications and privacy policy statements of popular games and gaming platforms for mobile gaming, console gaming, and virtual reality devices
    corecore