Create an Account
username: password:
 
  MemeStreams Logo

Twice Filtered

search

noteworthy
Picture of noteworthy
My Blog
My Profile
My Audience
My Sources
Send Me a Message

sponsored links

noteworthy's topics
Arts
  Literature
   Fiction
   Non-Fiction
  Movies
   Documentary
   Drama
   Film Noir
   Sci-Fi/Fantasy Films
   War
  Music
  TV
   TV Documentary
Business
  Tech Industry
  Telecom Industry
  Management
Games
Health and Wellness
Home and Garden
Miscellaneous
  Humor
  MemeStreams
   Using MemeStreams
Current Events
  War on Terrorism
  Elections
  Israeli/Palestinian
Recreation
  Cars and Trucks
  Travel
   Asian Travel
Local Information
  Food
  SF Bay Area Events
Science
  History
  Math
  Nano Tech
  Physics
  Space
Society
  Economics
  Education
  Futurism
  International Relations
  History
  Politics and Law
   Civil Liberties
    Surveillance
   Intellectual Property
  Media
   Blogging
  Military
  Philosophy
Sports
Technology
  Biotechnology
  Computers
   Computer Security
    Cryptography
   Human Computer Interaction
   Knowledge Management
  Military Technology
  High Tech Developments

support us

Get MemeStreams Stuff!


 
There are great benefits to connectedness, but we haven't wrapped our minds around the costs.

the key to stopping all your hacking woes
Topic: Miscellaneous 10:20 pm EST, Feb 10, 2015

Krypt3ia:

Today we have businesses selling intelligence wholesale to corporations that are not mature enough to use the data they are being sold. While a mature organization might have use of these feeds and reports on various groups the average company out there today just cannot use the data because they lack the practices and people to truly understand the information as well as apply it to their orgs.

... These companies perpetuate the idea that attribution is the key to stopping all your hacking woes ...

Peter Stephenson:

If you really want to make this tool dance you will need to have a rather full understanding of where you want to go and how you think that you need to get there. There are some things that take a human, and it leverages its resources to make that effective. But to get the most out of it you need to be a pretty effective human in your own right.

Paul Braterman:

There is one important difference between human and animal arms races that Emlen does not discuss. Natural selection is brutal but rational, and expensive armament does not survive unless it does in reality contribute to its owner's individual fitness. Human weaponry is very different, because it is the result of political choices ... Dung beetles have better sense.

Marc Rogers:

Let's face it -- most of today's so-called "cutting edge" security defenses are either so specific, or so brittle, that they really don't offer much meaningful protection against a sophisticated attacker or group of attackers.


everything is communicable now
Topic: Miscellaneous 10:19 pm EST, Feb 10, 2015

Donovan Hohn:

"The [Chicago] canal is the only remaining link wanting to complete the most stupendous chain of inland communications in the world," one visitor to Chicago wrote in 1834. That use of the word "communications" sounds archaic to our ears, but there's a furtive meaning bottom-dwelling in those etymological channels. Ideas, goods, images, species -- everything is communicable now.

Robert Moore:

Guys, I wanted to let you know about a personal decision I recently made. I don't really feel like discussing it, but I want to put my position out there. Please be respectful. This is a really long post, but please read the whole thing.

I'm taking the brakes off my car. This isn't a rash decision, so please listen up.

Julia Angwin:

The fact that so much of the Internet's security software is underfunded is becoming increasingly problematic.

Game of Thrones:

Send a raven.

Megan Graham:

What qualifies as an emergency for these purposes? We don't know.

Michael Riley and Jordan Robertson:

The attack appears to follow a pattern of thefts of medical data by foreigners seeking a pathway into the personal lives and computers of a select group -- defense contractors, government workers and others, according to a U.S. government official familiar with a more than year-long investigation into the evidence of a broader campaign.

Paul McLeary:

The $585 billion fiscal year 2016 defense budget request -- so painstakingly sculpted by White House and Pentagon before being sent to Capitol Hill this week -- will likely die a long, complicated death as it winds its way through the congressional committees, analysts say.

If Congress begins cutting, it will likely leave the accounts that fund the politically sensitive compensation and benefits for service members alone, meaning the procurement and modernization lines will be on the chopping block.


bureaucrats are just what you need
Topic: Miscellaneous 10:18 pm EST, Feb 10, 2015

Damian Paletta and Dion Nissenbaum:

President Barack Obama is expected to meet with business executives in California on Friday to urge them to work more closely with the government to bolster their defenses.

The Economist:

Sometimes bureaucrats are just what you need.

Tyson Ho:

Bureaucracies and bloggers are ready to gut you at every turn.

Robert Hansen:

The harsh reality is that offensive research always draws more asses-into-seats than defensive research.

Ursula K. Le Guin:

The person who denies his own profound relationship with evil denies his own reality. He cannot do, or make; he can only undo, unmake.

Kyle Balluck:

"I think the things we put on the Internet are broken. What we're doing is we're putting a lotta devices on it that are unsecure," said Dan Kaufman.

When asked for an example of those unsecure devices, Kaufman answered, "Pretty much everything."

Kevin Poulsen:

It's easy to see lawmakers and regulators jumping on DJI's mandatory update as an easy cure, and mandating geofencing industrywide. When that happens, you can expect that circumventing drone firmware, for any reason, will become illegal, the same way hacking your car's programming is illegal. One thing is for certain: Nobody willing to strap a bomb to a toy drone will be deterred.


not as easy as it looks
Topic: Miscellaneous 11:42 am EST, Feb  8, 2015

Robert Pogue Harrison:

We like to think of ourselves as the stewards or even saviors of nature, yet the fact of the matter is, for the animal world at large, the human race represents nothing less than a natural disaster.

William H. Gass:

When I've wormed through a fence to reach a meadow, do I ever feel the same about the field?

Emrys Westacott:

When hope and evidence arm wrestle, hope usually comes out on top.

Sendhil Mullainathan:

The urge to find and call out the bigot is powerful, and doing so is satisfying. But it is also a way to let ourselves off the hook. Rather than point fingers outward, we should look inward -- and examine how, despite best intentions, we discriminate in ways big and small.

Doc Searls and David Weinberger:

Apparently knowing how to find one another interesting is not as easy as it looks.

Daniel J. Levitin:

It turns out the brain is very good at this deluding business.

Ursula K. Le Guin:

It is very hard not to be able to blame anybody else. But it may be worth it.

Ta-Nehisi Coates:

The interest in power is almost always accompanied by the need to sanctify that power.

Melinda Gates:

Let your heart break. It will change what you do with your optimism.


always be true
Topic: Miscellaneous 9:41 am EST, Feb  7, 2015

George W. Bush White House:

The greater the threat, the greater is the risk of inaction -- and the more compelling the case for taking anticipatory action to defend ourselves, even if uncertainty remains as to the time and place of the enemy's attack. To forestall or prevent such hostile acts by our adversaries, the United States will, if necessary, act pre-emptively.

Paul Graham:

It will always be true that most people who are great at anything are born outside the US.

Charlie Smith:

The authorities are hellbent on establishing cyber sovereignty in China. If they can convince more internet users to use Chinese services -- which they can readily censor and easily snoop on -- then they have taken one further step towards cyber sovereignty.

Josh Chin:

China announced sweeping new regulations requiring users of an array of Internet services to register with their real names and avoid spreading content that challenges national interests. Names that promote ... superstition and rumors are also banned, according to the statement. Users will also be required to agree to respect the ... truth before being allowed to use a given service.

Paul Mozur:

The Chinese government has adopted new regulations requiring companies that sell computer equipment to Chinese banks to turn over secret source code, submit to invasive audits and build so-called back doors into hardware and software, according to a copy of the rules obtained by foreign technology companies that do billions of dollars' worth of business in China.


the hardest-working guy in the industry
Topic: Miscellaneous 7:29 am EST, Feb  6, 2015

Craig McLean:

When Ed Sheeran signed his first record deal with Atlantic after three years of doing the pub singer-songwriter circuit, he ratcheted up his ambitions. "At Atlantic everyone said James Blunt was the hardest-working guy in the music industry. So I asked my manager to get James Blunt's diary from 2005." He studied Blunt's diary of shows and told his team: "We're doing all of that -- times two." He grins. "And that's exactly what we did. Because he was the hardest-working guy, I wanted to work twice as hard as him."

n+1 editors:

Today the era of the Kitchen Debate seems like a dream of slow living -- a few television channels, a single telephone for the household, no email, nine-to-five jobs, a delirious paucity of choices. At the time, it felt harried and oversped. But not (we insist) as harried as our own.

Arun Sundararajan:

People are monetizing their own downtime.

Rikki Rogers:

Make sure to not only carve out time for yourself, but to actually acknowledge that you're on the "leisure clock." Don't multitask -- enjoy the downtime, and mentally label it as such.

Seneca:

People are frugal in guarding their personal property; but as soon as it comes to squandering time they are most wasteful of the one thing in which it is right to be stingy.

Yuki Noguchi:

The average American office worker spends more than nine hours of every week preparing for, or attending, project update meetings.

Bijan Stephen:

How long do we wander the depths of the Internet to find the perfect GIF? How many hours do you spend clicking the random button on Wikipedia? Where is real life?

Leigh Alexander:

Does anyone still believe that the fear of missing an important call or work email is what keeps us tethered to our devices in the midst of other engagements? Misting our attention across the numerous empty, tactile diversions available on a smartphone is socially isolating, but there's a secret relief in that isolation.

Aaron Bleyaert:

After work one night, go up up up all the way to the top floor of the parking garage and walk all the way to the back. Look out at the twinkling lights of the skyscrapers of downtown Los Angeles and think about how every single one of those office lights represents a person. Try to imagine how they feel. What they're doing right then; if they miss someone special, if they wonder if someone special misses them. Then realize that most of those lights are probably shining into offices with no one in them except for a custodian or two. Realize you are alone, that you are staring at no one. Turn your collar up against the cold and drive home to a meal of a single chicken breast and steamed vegetables.


a global company specializing in the advanced pivoting techniques of very sophisticated actors
Topic: Miscellaneous 7:14 am EST, Feb  6, 2015

A Coca-Cola spokesperson:

The #MakeItHappy message is simple: The Internet is what we make it, and we hoped to inspire people to make it a more positive place. It's unfortunate that Gawker is trying to turn this campaign into something that it isn't. Building a bot that attempts to spread hate through #MakeItHappy is a perfect example of the pervasive online negativity Coca-Cola wanted to address with this campaign.

Dick Costolo:

We suck at dealing with abuse and trolls on the platform and we've sucked at it for years.

Lance Spitzner:

One of the most effective ways to mitigate phishing attacks is to train and measure employees through phishing assessments. Many organisations have a simulated phishing program, but how many can claim to be truly effective?

Eduard Kovacs:

The Russian team allegedly breached the entertainment company's network by sending spear phishing emails containing a remote access Trojan (RAT) to Sony employees in India, Russia and other Asian countries. Once they had access to the computers of these employees, the attackers leveraged advanced pivoting techniques to make their way to Sony's network in Culver City.

Ta-Nehisi Coates:

Honesty demands not just that you accept your errors, but that your errors are integral to developing a rigorous sense of study. I have found this to be true in, well, just about everything in life.

The Ministry of Justice:

The government has undertaken urgent investigations into how this incident was able to happen, and further investigations continue in relation to both the conduct of individuals and the organisational safeguards against information security breaches of this kind.

Joseph R. Swedish:

Despite our efforts, Anthem was the target of a very sophisticated external cyber attack.

Anthem is doing everything it can to ensure there is no further vulnerability to its database warehouses. Anthem has contracted with a global company specializing in the investigation and resolution of cyber attacks. We will work with this company to reduce the risk of any further vulnerabilities and work to strengthen security.


we're doing our best here
Topic: Miscellaneous 7:23 am EST, Feb  5, 2015

Debera Johnson:

Say I'm a big brand. I'm going to implant technology into my garment to track where you are in time and space, and understand who you're talking with and what they are wearing, so I can understand behaviors of my clients better. That is something the brands would love to do.

John Darnielle:

I know all the people I follow on Tumblr and all the people who follow me are united in one thing and one thing only: their ravenous enthusiasm for brands. "I came for the sense of a new community, one with a keen feel for the visual but with a passion for language, too," they say, "but it's the brands that keep me here. Sweet Christ I love brands. Let the mountains collapse into dust and the oceans all boil, but give me brands," they cry in the night. I personally remember, as a child, pleading with my parents to let me interface with my favorite brands. And interface we did. With the brands. The glorious, glorious brands.

John Brockman:

It's a culture. Call it the algorithmic culture.

Feilix Salmon:

For better or worse, the computers are now in control.

The Instapaper Team:

The Weekly is an algorithmically generated newsletter based on the most popular articles and highlights saved by Instapaper users, and unfortunately we didn't build the algorithm to filter profanity in any way.

Scott Shane, in 2005:

The Open Source Center will study obscure sources like T-shirt slogans in countries of interest.

Solid Gold Bomb, in 2013:

Although we did not in any way deliberately create the offensive t-shirts in question and it was the result of a scripted programming process that was compiled by only one member of our staff, we accept the responsibility of the error and are doing our best to correct the issues at hand. We're sorry for the ill feeling this has caused! We're doing our best here to fix the problem.


your friendly neighborhood dispensary of meaningful protection
Topic: Miscellaneous 7:31 am EST, Feb  4, 2015

Alexis Madrigal:

It's hard not to be disillusioned by the many charlatans and thinkfluencers peddling bullshit in and around the tech industry.

Adam Ghetti, of Ionic Security:

We're going to build the next big independent security company.

Marc Rogers:

Let's face it -- most of today's so-called "cutting edge" security defenses are either so specific, or so brittle, that they really don't offer much meaningful protection against a sophisticated attacker or group of attackers.

Konstantin Kakaes:

The presumption that quantitative techniques objectively assess "what works" is deeply flawed. Many attempts to collect and interpret data not only miss key factors, but transform for the worse the systems they claim only to be measuring.

Justices Brennan and Marshall:

There is no principle in the jurisprudence of fundamental rights which permits constitutional limitations to be dispensed with merely because they cannot be conveniently satisfied.


the evangelists of evidence are rather vague about the specifics
Topic: Miscellaneous 7:31 am EST, Feb  4, 2015

Patrick Eddington:

In 2011, a VIPR team took over the Amtrak station in Savannah, Georgia and conducted warrantless searches of detraining passengers. Over the last decade, VIPR teams have conducted thousands of such searches (according to Congressional testimony by TSA officials) and uncovered no terrorists.

PCLOB:

The Administration has not yet developed, as the Board recommended, a methodology for gauging the value of its counterterrorism programs.

David Sanger:

The president was vague about the specifics.

Benedict Evans:

Is the big data dividend worth the privacy implications? Is it better to let Google know when you flush the loo for what it can tell you about your bowels, or would people really rather not?

A contrarian's tweet:

Big Data, n.: the belief that any sufficiently large pile of s—-- contains a pony.

Nathan Jurgenson:

The data is big enough to entertain any story.

Konstantin Kakaes:

The central claim of data proponents is that data always has some positive value. This premise is false. Data-gathering that seems innocuous enough to the managerial class often brings with it undue burden on the subjects of the data gathering. Many important questions are simply not amenable to quantitative analysis, and never will be. By laundering their biases and preconceptions into the methodology they use to devise quantitative metrics, policymakers and social scientists can fool themselves and others into believing they are impartial and unbiased.

Unless the evangelists of evidence are resisted, they will steamroll over what they cannot measure, leaving us poorer as individuals and as a society, buried in a bureaucracy of numbers untethered from reality.

Evgeny Morozov:

Technology companies, having grabbed one of the most precious contemporary resources -- data -- now have the leverage over cash-strapped and unimaginative governments, pitching themselves as inevitable, benevolent saviours to the dull bureaucrats inside city administrations.

Thomas Fox-Brewster:

Amid calls from heads of state to allow intelligence agencies access to all private communications, Adam Ghetti the younger has launched a business, Ionic Security in Atlanta, that he hopes will make spies' intrusions into digital lives a near impossibility and data theft "irrelevant."


(Last) Newer << 14 ++ 24 - 25 - 26 - 27 - 28 - 29 - 30 - 31 - 32 ++ 42 >> Older (First)
 
 
Powered By Industrial Memetics
RSS2.0