Deliberately create the LIFE you want!
Take charge OR you will be living by "default" and that might not make you happy!
Deliberate creation requires conscious work and powerful thinking to accomplish the task of attending to your sacred "home" -- The body where YOU (your inner self) live: "Body Mind Spirit".
Your inner "SELF", the "YOU" that is within your body will let you know if you are "HAPPY" and on course!
From my Blog at Markethive.com!
This is OAuth. What does it mean for you?
Use your social account to signup!
OAuth (Open Authorization) is an open standard for token-based authentication and authorization on the Internet. OAuth, which is pronounced "oh-auth," allows an end user's account information to be used by third-party services, such as Facebook, Twitter, LinkedIn, etc. without exposing the user's password.
When a website wants to use the services of another—such as an online service wanting to post to your Twitter, Facebook, LinkedIn, etc. stream—instead of asking you to share your password, they will use OAuth instead.
3 participants in an OAuth transaction:
The user, the consumer, and the service provider. Imagine, Joe is the user, Social Platform is the consumer, and Twitter is the service provider who controls Joe’s secure resource (his Twitter stream). Joe would like Social Platform to be able to post shortened links to his stream. Here’s how it works:
Step 1 – The user makes a request
Joe (User): “Hey, Social Platform, I would like you to be able to post links directly to my Twitter stream.”
Social Platform (Consumer): “Great! Let me go ask for permission.”
Step 2 – The consumer obtains permission
Social Platform: “I have a user that would like me to post to his stream. Can I have a request token?”
Twitter (Service Provider): “Sure. Here’s a token and a secret.”
The secret is used to prevent request forgery. The consumer uses the secret to sign each request so that the service provider can verify it is actually coming from the consumer application.
Step 3 – The user is redirected to the service provider
Social Platform: “OK, Joe. I’m sending you over to Twitter so you can approve. Take this token with you.”
Note: This is the scary part. If Social Platform were super-shady Evil Co. it could pop up a window that looked like Twitter but was really phishing for your username and password. Always be sure to verify that the URL you’re directed to is actually the service provider (Twitter, in this case).
Step 4 – The user gives permission
Joe: “Twitter, I’d like to authorize this request token that Social Platform gave me.”
Twitter: “OK, just to be sure, you want to authorize Social Platform to do X, Y, and Z with your Twitter account?”
Twitter: “OK, you can go back to Social Platform and tell them they have permission to use their request token.”
Twitter marks the request token as “good-to-go,” so when the consumer requests access, it will be accepted (so long as it’s signed using their shared secret).
Step 5 – The consumer obtains an access token
Social Platform: “Twitter, can I exchange this request token for an access token?”
Twitter: “Sure. Here’s your access token and secret.”
Step 6 – The consumer accesses the protected resource
Social Platform: “I’d like to post this link to Joe’s stream. Here’s my access token!”
In this scenario, Joe never had to share his Twitter secret credentials with Social Platform. He simply delegated access using OAuth in a secure manner. At any time, Joe can login to Twitter and review the access he has granted and revoke tokens for specific applications without affecting others.
Hopefully this was a good lesson to get you familiar with OAuth so the next time you see “Sign-in with your social account” or similar delegated identity verification, you’ll have a good idea of what is going on.
Origional article by: Rob Sobers
AI (Artificial Intelligence) and robots threaten to unleash mass unemployment, scientists warn
Intelligent robots threaten millions of jobs
Advances in artificial intelligence will soon lead to robots that are capable of nearly everything humans do, threatening tens of millions of jobs in the coming 30 years, experts warned Saturday.
"We are approaching a time when machines will be able to outperform humans at almost any task," said Moshe Vardi, director of the Institute for Information Technology at Rice University in Texas.
"I believe that society needs to confront this question before it is upon us: If machines are capable of doing almost any work humans can do, what will humans do?" he asked at a panel discussion on artificial intelligence at the annual meeting of the American Association for the Advancement of Science.
Vardi said there will always be some need for human work in the future, but robot replacements could drastically change the landscape, with no profession safe, and men and women equally affected.
"Can the global economy adapt to greater than 50 percent unemployment?" he asked.
Automation and robotization have already revolutionized the industrial sector over the last 40 years, raising productivity but cutting down on employment.
Job creation in manufacturing reached its peak in the United States in 1980 and has been on the decline ever since, accompanied by stagnating wages in the middle class, said Vardi.
Automation and robotization have revolutionized the industrial sector over the last 40 years,
raising productivity but cutting down on employment
Today there are more than 200,000 industrial robots in the country and their number continues to rise.
Today, research is focused on the reasoning abilities of machines, and progress in this realm over the past 20 years has been spectacular, said Vardi.
"And there is every reason to believe the progress in the next 25 years will be equally dramatic," he said.
By his calculation, 10 percent of jobs related to driving in the United States could disappear due to the rise of driverless cars in the coming 25 years.
According to Bart Selman, professor of computer science at Cornell University, "in the next two or three years, semi-autonomous or autonomous systems will march into our society."
He listed self-driving cars and trucks, autonomous drones for surveillance and fully automatic trading systems, along with house robots and other kinds of "intelligence assistance" which make decisions on behalf of humans.
"We will be in sort of symbiosis with those machines and we will start to trust them and work with them," he predicted.
"This is the concern because we don't know the rate of growth of machine intelligence, how clever those machines will become."
The Pentagon has requested $19 billion for developing intelligent weapons systems
Will the machines remain understandable for the humans? Will humans will be able to control them? Will they remain a benefit for humans, or pose harms?
These questions and more are being raised anew due to recent advances in robotic technology that allow machines to see and hear, almost like people.
Selman said investment in artificial intelligence in the United States was by far the highest ever in 2015, since the birth of the industry some 50 years ago.
Business giants like Google, Facebook, Microsoft and Tesla, run by billionaire Elon Musk, are at the head of the pack.
Also, the Pentagon has requested 19 billion for developing intelligent weapons systems.
What is concerning about these new technologies is their ability to analyze data and execute complex tasks.
This raises concerns about whether humans might one day lose control of the artificial intelligence they once built, said Selman.
It's a concern that some of the world's great minds have raised too, including British astrophysicist Stephen Hawking, who warned in a BBC interview in 2014 that the consequences could be dire.
"It would take off on its own, and re-design itself at an ever increasing rate," he said.
"Humans, who are limited by slow biological evolution, couldn't compete, and would be superseded," he added.
"The development of full artificial intelligence could spell the end of the human race."
These questions have led scientists to call for the establishment of an ethical framework for the development of artificial intelligence, as well as safeguards for security in the years to come.
Last year Musk—the owner of SpaceX—donated 10 million to resolve such concerns, deeming artificial intelligence potentially more dangerous than nuclear weapons.
For Wendel Wallach, an ethicist at Yale University, such dangers require a global response.
He also called for a presidential order declaring that lethal autonomous weapons systems are in violation of international humanitarian law.
"The basic idea is that there is a need for concerted action to keep technology a good servant and not let it become a dangerous master."
My Network Company!
My Networking company of choice is JM Ocean Avenue. They strive in promoting their product to more actual customers than they do affiliates. This is required legally to show that the company is not operating a pyramid. It means that product is sold for its merits and not as a means to fulfill the required purchase by affiliates to qualify for their commission requirements.
They specialize in skin and health care products of which the 2 minute miracle gel is a well recognized product.
We work as a team in our group. So, It is your business, you are on your own, but you are never alone. We have training, information and tools to help you on your way to success. Our group uses the 2 minute tools described in the right hand column with the image "Ocean Stars Team Member".