YouTube Driving Global Consumption of Music

If you are listening to music, chances are you’re on YouTube.

A music consumer report by the industry’s global body IFPI published Tuesday found that 86 percent of us listen to music through on-demand streaming.

And nearly half that time, 47 percent is spent on YouTube.

Video as a whole accounted for 52 percent of the time we spent streaming music, posing challenges to such subscription services as Spotify and SoundCloud.

But while Spotify’s estimated annual revenue per user was $20 (17.5 euros), YouTube’s was less than a dollar.

The London-based IFPI issued a broader overview in April that found digital sales for the first time making up the majority of global revenues thanks to streaming.

The report published Tuesday looked into where and when we listen to music.

It found that three in four people globally use smartphones, with the rate among 16- to 24-year-olds reaching 94 percent.

The highest levels were recorded in India, where 96 percent of consumers used smartphones for music, including 99 percent of young adults.

But music does not end when we put away our phones, with 86 percent globally also listening to the radio.

Copyright infringement was still a big issue, with unlicensed music accounting for 38 percent of what was consumed around the world.

“This report also shows the challenges the music community continues to face — both in the form of the evolving threat of digital copyright infringement as well as in the failure to achieve fair compensation from some user-upload services,” said IFPI chief Frances Moore.

The report noted that “96% of consumers in China and 96% in India listen to licensed music.”

It did not, however, say how many of those consumers also listened to music that infringed copyrights.

Overall, the average consumer spent 2.5 hours a day listening to music, with the largest share of it consumed while driving, the industry report said.

Google Drops Out of Bidding for Massive Pentagon Cloud Contract

Google is dropping out of the bidding for a huge Pentagon cloud computing contract that could be worth up to $10 billion, saying the deal would be inconsistent with its principles.

The decision by Google, confirmed to AFP in an email Tuesday, leaves a handful of other tech giants including Amazon in the running for the Joint Enterprise Defense Infrastructure (JEDI) contract aimed at modernizing the military’s computing systems.

The move comes following protests by Google employees on the tech giant’s involvement in separate military effort known as Project Maven using artificial intelligence to help interpret video images.

Google decided not to renew its involvement in Maven and this week backed away from the cloud computing contract, citing similar concerns about values.

“While we are working to support the US government with our cloud in many areas, we are not bidding on the JEDI contract because first, we couldn’t be assured that it would align with our AI Principles and second, we determined that there were portions of the contract that were out of scope with our current government certifications,” Google said in a statement.

“We will continue to pursue strategic work to help state, local and federal customers modernize their infrastructure and meet their mission critical requirements.”

In June, Google chief executive Sundar Pichai unveiled a set of principles on the company’s use of artificial intelligence, saying that the company would not participate in “technologies that cause or are likely to cause overall harm” and would stay away from “weapons or other technologies whose principal purpose or implementation is to cause or directly facilitate injury to people.”

Popularity of Scooters Creates Jobs for ‘Juicers’

U.S. cities are being overtaken by the scooter craze young and old riding rented electric-powered scooters everywhere. That has given rise to a new line of work people who go out at night to charge those scooters to earn some money. Michelle Quinn met some “juicers.”

Popularity of Electric Scooters Creates Jobs for ‘Juicers’

You see them everywhere in U.S. cities — young and old riding rented electric-powered scooters. When they are done, they can leave the scooters anywhere. 

Someone has to find and charge the scooters, then return them to designated hot spots where customers can use them the next day. And that has given rise to a new line of work — scooter juicers. 

Shivali Sharma is a stay-at-home mom in San Jose, California, and a Marine staff sergeant on medical leave. She works as a juicer to earn money while her boys sleep. 

“The hunt is fun,” she said.

It’s a new kind of piece work, made possible by GPS and phone apps. 

Sharma and her family noticed the scooters being left on their streets. It intrigued them.

“We were like, ‘What is this scooter doing? Who does it belong to?’” she said.

Then they heard about juicing and signed up. The company sent them charging stations. 

For the past several months, Sharma’s routine is set. Each night, this single mom leaves her twins with her parents and checks her phone app for Lime scooters scattered around the city, sending out GPS locator signals, all needing to be charged. She earns $6 per scooter, more if the scooter is harder to reach.

Charging scooters at home

For the scooter companies, juicers solve two problems — finding the scooters and then using their own electricity to charge them before putting them back on the streets. 

The competition among the juicers is part of the appeal, something Lime, one of the scooter companies, didn’t expect.

“The fact that juicers compare it to Pokemon Go is a happy accident,” said Will Lee, project manager at Lime, a San Francisco-based electric bike and scooter company. “Now that we’ve hit on this motivation, this gamification motivation among the juicers, we have done things to maybe amplify it or try to feed into folks’ natural desire to play the game.”

Gamification of work

To increase juicers’ engagement as the night progresses, Lime raises the dollar amount a juicer can get per scooter. A scooter in the middle of a homeless encampment may go for $10. The company plans to create levels of juicers, like a video game. 

Sharma, who has harvested more than 1,000 scooters, may be considered a super juicer. She can get 29 scooters in her truck. The work can be tiring. Each scooter weighs 15 kilos. Dealing with the competition is part of the gig. 

“There’s been many instances where I’ve been standing right next to a scooter just waiting for my app to kick in so I can collect the scooter,” she said. “Somebody’s come up from behind me just taking it, like, don’t you see me standing here?”

Sharma’s nightly hunt takes a lot of stamina. She works six nights a week, and wakes up at 3:30 a.m. to put all the scooters around the city before 7 a.m. She gets paid by 7:30 a.m. each day. 

As the gig economy grows, and more jobs like juicers are created, people like Sharma, who are willing to hustle, are finding new kinds of work. 

WSJ: Google Hid Protracted Data Leak to Avoid Consequences

Google exposed the personal data of about 500,000 Google+ users to potential misuse by outside developers for years through a bug, then concealed the error to avoid consequences, according to an investigation published by The Wall Street Journal Monday.

Parent company Alphabet Inc responded by announcing it would shut down Google+, a largely defunct social network launched in 2011 to compete with Facebook. Shares of Alphabet Inc fell by about 1 percent in response to the story.  

“Our Privacy & Data Protection Office reviewed this issue, looking at the type of data involved, whether we could accurately identify the users to inform, whether there was any evidence of misuse, and whether there were any actions a developer or user could take in response,” Google said of the error in a statement to VOA News. “None of these thresholds were met in this instance.”

The report alleges that the bug became active in 2015, only being discovered by Google and shut down in March of this year. Google confirmed that it had discovered the bug in March, but would not say when it became active.

The Wall Street Journal says it reviewed an internal memo circulated among Google’s legal staff and senior executives that warned of “immediate regulatory interest” and public comparisons to Facebook’s user information leak to Cambridge Analytica should the mistake become public.

According to the paper, the memo said that while Google could not find evidence that the exposed data had been misused, it also could not prove that misuse did not happen.

CEO Sundar Pichai was reportedly informed of the decision to not tell users after it had already been made by an internal committee.

The data exposed included full names, email addresses, birth dates, gender, profile pictures, places lived, occupations and relationship status. It did not include phone numbers, the content of emails or messages, or other kinds of communication data.

Google also said it would begin restricting the data it provides to outside developers. Hours after the story broke, “Google+” was a top trending term on Twitter.

Twitter Says it Will Crack Down on Abusers in Letter to Advisers

Twitter will strengthen rules rules to prevent sexual harassment and abuse on its platform, the social media company said Monday in an email to the collection of safety advocates, researchers and academics it uses help set its policies. There will also be harsher penalties for misconduct.

The new guidelines include immediately and permanently suspending the accounts of anyone who posts or is the source of non-consensual nudity. Twitter’s definition of non-consensual nudity will be expanded to include photos that are taken covertly.

Third parties will now be able to report unwanted sexual advances from one user to another. Previously, only those directly involved in the matter could do so.

Twitter also promised to publish new rules adding hate symbols and imagery to its definition of sensitive media.

The changes come on the heels of a series of tweets from CEO Jack Dorsey Friday pledging to limit the number of bullies and harassers using Twitter.

The micro-blogging platform faced intense criticism last year after it temporarily banned actress Rose McGowan last year for a tweeting out contact information for person she said was connected with Harvey Weinstein, who has faced accusations of sexual assault from McGowan and others.

Facebook Wants People to Invite Its Cameras into Their Homes

Facebook is launching the first electronic device to bear its brand, a screen and camera-equipped gadget intended to make video calls easier and more intuitive.

But it’s unclear if people will open their homes to an internet-connected camera sold by a company with a shoddy track record on protecting user privacy.

Facebook is marketing the device, called Portal, as a way for its more than 2 billion users to chat with one another without having to fuss with positioning and other controls. The device features a camera that uses artificial intelligence to automatically pan and zoom as people move around during calls.

The Portal will feature two different screen sizes. It will go on sale in early November for roughly $200 to $350.

Internet of Things Could Revolutionize City Planning

The massive breach of Facebook and the exposure of the information of an estimated 50 million users last week has highlighted one of the problems with all the data we are putting out into the world. City planners share those concerns, but they’re looking also looking at how “Big Data” may be a big boost in helping their own cities develop. VOA’s Kevin Enochs reports.

DHS: No Reason to Doubt Firms’ Denials of China Hack

The U.S. Department of Homeland Security said Saturday it currently had no reason to doubt statements from companies that have denied a Bloomberg report that their supply chains were compromised by malicious computer chips inserted by Chinese intelligence services.

“The Department of Homeland Security is aware of the media reports of a technology supply chain compromise,” DHS said in a statement.

“Like our partners in the UK, the National Cyber Security Centre, at this time we have no reason to doubt the statements from the companies named in the story,” it said.

Bloomberg Businessweek on Thursday cited 17 unidentified intelligence and company sources as saying that Chinese spies had placed computer chips inside equipment used by around 30 companies, as well as multiple U.S. government agencies, which would give Beijing secret access to internal networks.

Apple and Amazon

Britain’s national cyber security agency said Friday it had no reason to doubt the assessments made by Apple Inc and Amazon.com Inc challenging the report.

Apple contested the Bloomberg report Thursday, saying its own internal investigations found no evidence to support the story’s claims and that neither the company, nor its contacts in law enforcement, were aware of any investigation by the FBI on the matter.

Apple’s recently retired general counsel, Bruce Sewell, told Reuters he called the FBI’s then-general counsel, James Baker, last year after being told by Bloomberg of an open investigation of Super Micro Computer Inc, a hardware maker whose products Bloomberg said were implanted with malicious Chinese chips.

“I got on the phone with him personally and said, ‘Do you know anything about this?” Sewell said of his conversation with Baker. “He said, ‘I’ve never heard of this, but give me 24 hours to make sure.’ He called me back 24 hours later and said ‘Nobody here knows what this story is about.” Baker and the FBI declined to comment Friday.

Robotic Farm Promises Cheap Local Produce

The U.S. farm-to-table trend is definitely one of the latest. Americans are hungry for fresh, organic produce in their homes, and in many cases they are willing to pay more for it. But in an urban setting, residents don’t have a farm next door. The company Iron Ox is looking to change that, with the help of robust robotics. VOA’s Kevin Enochs has the story.

US Plans to Rewrite Rules that Impede Self-driving Cars

The Trump administration is moving ahead with plans to revise safety rules that bar fully self-driving cars from the roads without equipment such as steering wheels, pedals and mirrors, according to a document made public on Thursday.

The National Highway Traffic Safety Administration (NHTSA) “intends to reconsider the necessity and appropriateness of its current safety standards” as applied to automated vehicles, the U.S. Department of Transportation said in an 80-page update of its principles dubbed “Automated Vehicles 3.0.”

The department, as reported by Reuters earlier on Thursday, disclosed that the NHTSA wants comment “on proposed changes to particular safety standards to accommodate automated vehicle technologies and the possibility of setting exceptions to certain standards that are relevant only when human drivers are present.”

U.S. Transportation Secretary Elaine Chao released the document at a department event. In the report, Chao said that self-driving cars have the potential to dramatically reduce traffic crashes and road deaths. But she added the “public has legitimate concerns about the safety, security, and privacy of automated technology.”

Automakers must currently meet nearly 75 auto safety standards, many of which were written with the assumption that a licensed driver will be in control of the vehicle.

General Motors Co in January filed a petition seeking an exemption for the current rules to use vehicles without steering wheels and other human controls as part of a ride-sharing fleet it plans to deploy in 2019.

NHTSA has not declared the GM petition complete, a step necessary before it can rule on the merits. NHTSA said it plans to propose modernizing procedures to follow when reviewing exemption petitions.

Alphabet Inc’s Waymo unit plans to launch an autonomous ride-hailing service for the general public with no human driver behind the steering wheel in Arizona later this year. But unlike GM, Waymo’s vehicles will have human controls for the time being.

In March, a self-driving Uber Technologies Inc vehicle struck and killed a pedestrian, while the backup safety driver was watching a video, police said. Uber suspended testing in the aftermath and some safety advocates said the crash showed the system was not safe enough to be tested on public roads.

NHTSA has stepped up its self-driving car focus as legislation in Congress on self-driving cars, which passed the U.S. House of Representatives in 2017, has stalled. It has only a slender chance of being approved in 2018, congressional aides said.

The report said “NHTSA’s current statutory authority to establish motor vehicle safety standards is sufficiently flexible to accommodate the design and performance of different” automated vehicles.

The Center for Auto Safety said NHTSA should require companies to “submit evidence” that their self-driving technology is safe “before involuntarily involving human beings in their testing.”

GM said in a statement on Thursday that “legislation is still urgently needed” to allow “the full deployment of self-driving vehicles.”

Automakers have warned it could take too long for NHTSA to rewrite the rules to allow for the widespread of adoption of self-driving cars without human controls.

The department also said it “no longer recognizes the designations of ten automated vehicle proving grounds” announced in January 2017.

The sites, including a Michigan center that U.S. President Donald Trump visited last year, were named by Congress to be eligible for $60 million in grants “to fund demonstration projects that test the feasibility and safety” of self-driving vehicles.

The Transportation Department also announced it will start studying the workforce impacts of automated vehicles with the Labor, Commerce, and the Health and Human Services departments. 

The report also said the Trump administration will not support calls to end human driving. The department “embraces the freedom of the open road, which includes the freedom for Americans to drive their own vehicles.”

US Warns of New Hacking From China-Linked Group

The U.S. government warned Wednesday that a hacking group widely known as cloudhopper, which Western cybersecurity firms have linked to the Chinese government, has launched attacks on technology service providers in a campaign to steal data from their clients.

The Department of Homeland issued a technical alert for cloudhopper, which it said was engaged in cyber espionage and theft of intellectual property, after experts with two prominent U.S. cybersecurity companies warned earlier this week that Chinese hacking activity has surged amid the escalating trade war between Washington and Beijing.

Chinese authorities have repeatedly denied claims by Western cybersecurity firms that it supports hacking.

Homeland Security

Homeland Security released the information to support U.S. companies in responding to attacks by the group, which is targeting information technology, energy, health care, communications and manufacturing firms.

“These cyber threat actors are still active and we strongly encourage our partners in government and industry to work together to defend against this threat,” DHS official Christopher Krebs said in a statement.

The reported increase in Chinese hacking follows what cybersecurity firms have described as a lull in such attacks prompted by a 2015 agreement between Chinese President Xi Jinping and former U.S. President Barrack Obama to curb cyber-enabled economic theft.

“I can tell you now unfortunately the Chinese are back,” Dmitri Alperovitch, chief technology officer of U.S. cybersecurity firm CrowdStrike, said Tuesday at a security conference in Washington.

“We’ve seen a huge pickup in activity over the past year and a half. Nowadays they are the most predominant threat actors we see threatening institutions all over this country and Western Europe,” he said.

Analysts with FireEye, another U.S. cybersecurity firm, said that some of the Chinese hacking groups it tracks have become more active in recent months.

Advice to US firms

Wednesday’s alert provided advice on how U.S. firms can prevent, identify and remediate attacks by cloudhopper, which is also known as Red Leaves and APT10.

The hacking group has largely targeted firms known as managed service providers, which supply telecommunications, technology and other services to business around the globe.

Managed service providers, or MSPs, are attractive targets because their networks provide routes for hackers to access sensitive systems of their many clients, said Ben Read, a senior intelligence manager with FireEye.

“We’ve seen this group route malware through an MSP network to other targets,” Read said.