Create an Account
username: password:
 
  MemeStreams Logo

a proven model

search

noteworthy
Picture of noteworthy
My Blog
My Profile
My Audience
My Sources
Send Me a Message

sponsored links

noteworthy's topics
Arts
  Literature
   Fiction
   Non-Fiction
  Movies
   Documentary
   Drama
   Film Noir
   Sci-Fi/Fantasy Films
   War
  Music
  TV
   TV Documentary
Business
  Tech Industry
  Telecom Industry
  Management
Games
Health and Wellness
Home and Garden
Miscellaneous
  Humor
  MemeStreams
   Using MemeStreams
Current Events
  War on Terrorism
  Elections
  Israeli/Palestinian
Recreation
  Cars and Trucks
  Travel
   Asian Travel
Local Information
  Food
  SF Bay Area Events
Science
  History
  Math
  Nano Tech
  Physics
  Space
Society
  Economics
  Education
  Futurism
  International Relations
  History
  Politics and Law
   Civil Liberties
    Surveillance
   Intellectual Property
  Media
   Blogging
  Military
  Philosophy
Sports
Technology
  Biotechnology
  Computers
   Computer Security
    Cryptography
   Human Computer Interaction
   Knowledge Management
  Military Technology
  High Tech Developments

support us

Get MemeStreams Stuff!


 
a proven model
Topic: Miscellaneous 10:29 pm EST, Feb 11, 2015

Natasha Singer:

In the study, titled "Unique in the Shopping Mall: On the Reidentifiability of Credit Card Metadata," a group of data scientists analyzed credit card transactions made by 1.1 million people in 10,000 stores over a three-month period. The data set contained details including the date of each transaction, amount charged and name of the store. Although the information had been "anonymized" by removing personal details like names and account numbers, the uniqueness of people's behavior made it easy to single them out.

Chris Cillizza:

There is simply no hiding things anymore.

Lisa Monaco:

We want this flow of information to go both ways.

Ursula K. Le Guin:

If you listen, what do you hear?

Andy Greenberg:

When asked if their vehicles monitored the CAN bus -- the network of digitally-controlled components in the car -- for malicious activity, half of the 16 automakers failed to respond to the question, many claiming that the answer was "confidential."

Cory Bennett:

It's a proven model, Lisa Monaco said.

PCLOB:

The Administration has not yet developed, as the Board recommended, a methodology for gauging the value of its counterterrorism programs.

Ursula K. Le Guin:

The first step is often the most important, and Jung says that the first step is to turn around and follow your own shadow.

Richard Hamming:

You can tell other people all the alibis you want. But to yourself try to be honest.



 
 
Powered By Industrial Memetics
RSS2.0