Create an Account
username: password:
 
  MemeStreams Logo

Twice Filtered

search

noteworthy
Picture of noteworthy
My Blog
My Profile
My Audience
My Sources
Send Me a Message

sponsored links

noteworthy's topics
Arts
  Literature
   Fiction
   Non-Fiction
  Movies
   Documentary
   Drama
   Film Noir
   Sci-Fi/Fantasy Films
   War
  Music
  TV
   TV Documentary
Business
  Tech Industry
  Telecom Industry
  Management
Games
Health and Wellness
Home and Garden
(Miscellaneous)
  Humor
  MemeStreams
   Using MemeStreams
Current Events
  War on Terrorism
  Elections
  Israeli/Palestinian
Recreation
  Cars and Trucks
  Travel
   Asian Travel
Local Information
  Food
  SF Bay Area Events
Science
  History
  Math
  Nano Tech
  Physics
  Space
Society
  Economics
  Education
  Futurism
  International Relations
  History
  Politics and Law
   Civil Liberties
    Surveillance
   Intellectual Property
  Media
   Blogging
  Military
  Philosophy
Sports
Technology
  Biotechnology
  Computers
   Computer Security
    Cryptography
   Human Computer Interaction
   Knowledge Management
  Military Technology
  High Tech Developments

support us

Get MemeStreams Stuff!


 
Current Topic: Miscellaneous

a path to vast wealth and economic power
Topic: Miscellaneous 6:49 am EST, Nov 10, 2015

Dave Aitel:

If you don't treat [software] security like a religious fanatic, you are going to be hurt like you can't imagine.

Fred Wilson:

Software is the oil of the information revolution. Companies that control the software infrastructure of the information revolution will sit back and collect the economic surplus of the information revolution and that will be a path to vast wealth and economic power.

Daniel Plainview:

I like to think of myself as an oilman. As an oilman, I hope that you'll forgive just good old fashioned plain-speaking.

The Economist, in 2015:

The notion of shared public ledgers may not sound revolutionary or sexy. Neither did double-entry book-keeping or joint-stock companies. Yet, like them, the blockchain is an apparently mundane process that has the potential to transform how people and businesses co-operate. Bitcoin fanatics are enthralled by the libertarian ideal of a pure, digital currency beyond the reach of any central bank. The real innovation is not the digital coins themselves, but the trust machine that mints them -- and which promises much more besides.

The Economist, in 2008:

Financial progress is about learning to deal with strangers in more complex ways.

Decius:

Money for me, databases for you.


the incentives are totally backward
Topic: Miscellaneous 6:48 am EST, Nov 10, 2015

Brad Spengler:

People don't really care that much. All of the incentives are totally backward, and the money isn't going where it's supposed to. The problem is just going to perpetuate itself.

Ian Bogost:

Computing has become infrastructure, but it doesn't work like infrastructure.

Fifty years' worth of attempts to turn software development into a legitimate engineering practice have failed.

Engineering has always been a well-paid profession, but computing is turning it into a type of speculative finance rather than a calling.

No reasonable person would want MacGyver building their bridges or buildings. Or software!

Jaron Lanier:

If you love a medium made of software, there's a danger that you will become entrapped in someone else's recent careless thoughts. Struggle against that!


a series of inherently nuanced trade-offs
Topic: Miscellaneous 6:47 am EST, Nov 10, 2015

Craig Timberg:

Linus Torvalds' broader message was this: Security of any system can never be perfect. So it always must be weighed against other priorities -- such as speed, flexibility and ease of use -- in a series of inherently nuanced trade-offs.

At a time when leading computer scientists are debating whether the Internet is so broken that it needs to be replaced, the network is expanding faster than ever, layering flaw upon flaw in an ever-expanding web of insecurity.

Torvalds has often said -- and reiterated after the meeting in Seoul -- that he is open to new kernel defenses if the cost in performance is reasonable. But debate remains about what qualifies as "reasonable."

Economist:

The average time between an attacker breaching a network and its owner noticing the intrusion is 205 days.

Many companies do not have a proper understanding of the threat they face. Eventually, they will become choosier and thriftier. But for now, cyber-security companies of all kinds can feast on misfortune.

Dan Goodin:

Almost as soon as one hole is closed, hackers find a new one.

Over the weekend, a researcher demonstrated two unpatched weaknesses that Web masters can exploit to track millions of people who visit their sites. Taken together, the attacks allow websites to compile a list of previously visited domains, even when users have flushed their browsing history, and to tag visitors with a tracking cookie that will persist even after users have deleted all normal cookies. Ironically, the techniques abuse relatively new security features that are already built into Google Chrome and Mozilla Firefox and that may make their way into other mainstream browsers in the future.


the most exciting and creative parts
Topic: Miscellaneous 3:24 pm EST, Nov  8, 2015

Jay Kaplan:

Instead of focusing on the commercial impact of cyberweapons, nation leaders need to focus on scaling back the infiltration of each other's technological infrastructure.

Jay Solomon:

US officials say the IRGC has developed an army of cyberattackers, trained by Russia, who have focused on targets as varied as Wall Street banks, Saudi oil companies and both internal and external opponents of the regime. A spokeswoman for Russia's Foreign Ministry denied Moscow trained Iranians in cyberwarfare and said such attacks are illegal under Russian law.

Lorenzo Franceschi-Bicchierai:

In a meeting in Annapolis, Maryland, on January 16, 2015, Kroll investigators asked former Hacking Team employees Alberto Velasco and Alberto Pelliccione, who was connected via Skype, whether [their new cybersecurity product] ReaQta could block Hacking Team's malware. The two, according to the firm's report, "laughed nervously." Pelliccione then said that indeed, ReaQta could neutralize Hacking Team's tools.

Danny Yadron:

To grow sales, FireEye's Dave DeWalt has to say he can stop the hackers. But for sales to keep growing, the hackers can't actually stop.

Freeman Dyson:

Science is not concerned only with things that we understand. The most exciting and creative parts of science are concerned with things that we are still struggling to understand. Wrong theories are not an impediment to the progress of science. They are a central part of the struggle.

Louis Menand:

We are not natural falsificationists: we would rather find more reasons for believing what we already believe than look for reasons that we might be wrong.


an infinitely reasonable creature
Topic: Miscellaneous 3:22 pm EST, Nov  8, 2015

Cedric Leighton:

Our military could be confronted by a tough cyber adversary at any moment.

BBC:

The draft bill's measures include: A legal duty on British companies to help law enforcement agencies hack devices to acquire information if it is reasonably practical to do so.

Benjamin Franklin:

So convenient a thing it is to be a reasonable Creature, since it enables one to find or make a Reason for every thing one has a mind to do.

Josh Wills:

The human capacity for post-hoc rationalization is basically infinite.


the power and the glory
Topic: Miscellaneous 7:26 am EST, Nov  4, 2015

The Economist:

Financial progress is about learning to deal with strangers in more complex ways.

Zerodium:

Our iOS #0day bounty has expired & we have one winning team who made a remote browser-based iOS 9.1/9.2b #jailbreak (untethered). Congrats!

Lorenzo Franceschi-Bicchierai:

Bekrar declined to identify the team that won the prize, as well as details about the exploits they found. He also declined to say how much he is planning to sell this exploit for.

Jonathan Mahler:

There are different ways to control a narrative.

Silence is one way to keep a secret.

Talking is another.

And they are not mutually exclusive.


the eyes have it
Topic: Miscellaneous 7:11 am EST, Nov  4, 2015

Anab Jain:

Anonymity is becoming a luxury. Where it will never be possible to forget or get lost ever again. Finding patterns from these trillions of megabytes of data has become the biggest asset of the 21st century.

James Risen:

At the lower end of the surveillance market are small firms that provide products designed to spy on people. These firms are in the so-called "lawful interception" business, selling malware and spyware to the police and other law enforcement agencies in the United States and Europe, as well as to governments. The interception industry is growing rapidly, with worldwide sales estimated to reach $1.3 billion by 2019, according to Markets and Markets, a research firm.

Bruce Schneier:

Welcome to the world of automatic facial recognition.

Without meaningful regulation, we're moving into a world where governments and corporations will be able to identify people both in real time and backwards in time, remotely and in secret.

BBC:

Police sources expect the new bill to require communication firms to retain data on website addresses for a year.

Maciej Ceglowski:

I've come to believe that a lot of what's wrong with the Internet has to do with memory.

How wonderful it felt when I first realized the permanent record didn't exist.

And then when I grew up, I helped build it for real.


it's supposed to be difficult
Topic: Miscellaneous 7:08 am EST, Nov  4, 2015

Derek Sivers:

We're all busy. We've all taken on too much. Saying yes to less is the way out.

Tim Ferriss:

Once you reach a decent level of professional success, lack of opportunity won't kill you. It's drowning in 7-out-of-10 "cool" commitments that will sink the ship.

Greg McKeown:

Make your peace with the fact that saying 'no' often requires trading popularity for respect.

Marilynne Robinson:

If you take something seriously, you're ready to encounter difficulty, run the risk, whatever. I mean, when people are turning in on themselves -- and God knows, arming themselves and so on -- against the imagined other, they're not taking their Christianity seriously.

It's supposed to be difficult. It's supposed to be a challenge.

Cormac McCarthy:

Anything that doesn't take years of your life and drive you to suicide hardly seems worth doing.


for the love of gatherings
Topic: Miscellaneous 7:18 am EST, Nov  2, 2015

Madeleine Schwartz:

What's most telling is often what is absent. The closer you get to someone else, the more you realize the distance separating you.

Horace Dediu:

The data under scrutiny is, as usual, the data that can be gathered. Unfortunately the data that can't be gathered is where the insight into what is happening may lie.

Tim Kreider's married friend:

It's not as if being married means you're any less alone.


follow the white rabbit
Topic: Miscellaneous 7:17 am EST, Nov  2, 2015

Arunpreet Singh:

Only full visibility allows detection, everything else will inevitably fail.

Marilynne Robinson:

Fear operates as an appetite or an addiction. You can never be safe enough.

SC:

Reports coming out of Ukraine suggest that the US is falling behind Russia in terms of cyber-warfare capabilities, while the importance of such capabilities is increasing.

Michael Hayden:

The United States is currently in a deep deterrence hole with respect to China in the cyber domain ...


(Last) Newer << 1 - 2 - 3 - 4 - 5 - 6 - 7 - 8 ++ 18 >> Older (First)
 
 
Powered By Industrial Memetics
RSS2.0