Skip to main content

大数据必将改变世界

发信人: mitbbs2715 (好吃不懒做), 信区: Programming
标  题: 大数据必将改变世界
发信站: BBS 未名空间站 (Thu Jun 12 02:06:02 2014, 美东)

如今数据指纹已经渗透到个人生活的各个部分,网上购物,对感兴趣商品的搜索记录,
你的经济活动个方面都有详细的记录,医院有详细的病例,即使没有去医院也有详细的
药品购买记录,博客,论坛,微信,电邮,语音,有你的思维痕迹,你的政治倾向,对
未来形势的预判,等等统统记录在案。
通过对这些数据的分析,程序能比"无形之手"更准确,更有效得配置市场资源。在产品
上市之前就预测出它的销量。在流行趋势还未显现之时就能提示根据未来的流行趋势进
行增产还是减产。能准确得知人们对经济形势的主观感受。它可以在犯罪分子还在酝酿
阶段就准确预测出他的犯罪倾向,和犯罪计划。它能观测出某个犯罪分子的改造可能,
精确量刑。 对经济活动数据的挖掘,让逃税,贪腐变得无处遁形。它可以在投票之前
就得到民众对政策的支持程度。通过对某个个体基因数据的分析,生活习惯的追踪,它
甚至可能在该个体显示出任何征兆之前就预测出他可能会得某种疾病,从而要求医生对
他进行更精确的追踪诊断,或者建议他改变生活习惯。甚至预测婚姻成功与否。
大数据让liquid democracy,和machine decision变得可能,在大数据和AI的带领下,
人类社会将步入空前高效,空前平等的时代。
http://gengwg.blogspot.com/

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...