Create an Account
username: password:
  MemeStreams Logo

Twice Filtered


Picture of noteworthy
My Blog
My Profile
My Audience
My Sources
Send Me a Message

sponsored links

noteworthy's topics
   Film Noir
   Sci-Fi/Fantasy Films
   TV Documentary
  Tech Industry
  Telecom Industry
Health and Wellness
Home and Garden
   Using MemeStreams
Current Events
  War on Terrorism
  Cars and Trucks
   Asian Travel
Local Information
  SF Bay Area Events
  Nano Tech
  International Relations
  Politics and Law
   Civil Liberties
   Intellectual Property
   Computer Security
   Human Computer Interaction
   Knowledge Management
  Military Technology
  High Tech Developments

support us

Get MemeStreams Stuff!

Current Topic: Miscellaneous

it's supposed to be difficult
Topic: Miscellaneous 7:08 am EST, Nov  4, 2015

Derek Sivers:

We're all busy. We've all taken on too much. Saying yes to less is the way out.

Tim Ferriss:

Once you reach a decent level of professional success, lack of opportunity won't kill you. It's drowning in 7-out-of-10 "cool" commitments that will sink the ship.

Greg McKeown:

Make your peace with the fact that saying 'no' often requires trading popularity for respect.

Marilynne Robinson:

If you take something seriously, you're ready to encounter difficulty, run the risk, whatever. I mean, when people are turning in on themselves -- and God knows, arming themselves and so on -- against the imagined other, they're not taking their Christianity seriously.

It's supposed to be difficult. It's supposed to be a challenge.

Cormac McCarthy:

Anything that doesn't take years of your life and drive you to suicide hardly seems worth doing.

for the love of gatherings
Topic: Miscellaneous 7:18 am EST, Nov  2, 2015

Madeleine Schwartz:

What's most telling is often what is absent. The closer you get to someone else, the more you realize the distance separating you.

Horace Dediu:

The data under scrutiny is, as usual, the data that can be gathered. Unfortunately the data that can't be gathered is where the insight into what is happening may lie.

Tim Kreider's married friend:

It's not as if being married means you're any less alone.

follow the white rabbit
Topic: Miscellaneous 7:17 am EST, Nov  2, 2015

Arunpreet Singh:

Only full visibility allows detection, everything else will inevitably fail.

Marilynne Robinson:

Fear operates as an appetite or an addiction. You can never be safe enough.


Reports coming out of Ukraine suggest that the US is falling behind Russia in terms of cyber-warfare capabilities, while the importance of such capabilities is increasing.

Michael Hayden:

The United States is currently in a deep deterrence hole with respect to China in the cyber domain ...

a bountiful supply
Topic: Miscellaneous 9:45 am EST, Nov  1, 2015

Paul F. Roberts:

New functionality means new code, and new code invariably means vulnerabilities, explains Mark Litchfield. But, just as often, it is legacy code that is often rife with exploitable holes. And for researchers working on bounty programs, holes mean money.

Anders Fogh:

Seaborn and Dullien (2015) forcefully illustrated that what is normally a reliability issue can become a security issue very fast.

Eduard Kovacs:

CyberX says it has used an "innovative technique" to identify and exploit the vulnerabilities in MicroLogix PLCs. Researchers developed a piece of firmware that uses a special algorithm for searching the firmware code and mapping potentially vulnerable functions. The firmware is uploaded to a test device by bypassing a security mechanism for firmware validation, allowing experts to easily develop working exploits that can later be used against equipment that hasn't been tampered with.

a tug with no war
Topic: Miscellaneous 9:44 am EST, Nov  1, 2015

Georgia Tech:

The privacy tug-of-war between individuals and organizations has become a tug with no war.

Richard Lawler:

ACR software recognizes the video being displayed, matches it up and phones home the data. According to Vizio, its Inscape platform can pull some 100 billion anonymized datapoints from 8 million of its connected TVs every day.

Kate Kaye:

Nearly all the players exploring the burgeoning Telecom Data as a Service field, or TDaaS for short, are reluctant to provide the details of their operations, much less freely name their clients.

But the rewards may outweigh the possible tangles with government regulators, consumer advocates and even squeamish board members.

Unlike other types of location tracking, such as beacon technologies that work only with mobile apps that people have agreed to let track them, many services employing telco data require no explicit opt-ins by consumers. Companies like SAP instead rely on carriers' terms and conditions with their subscribers, calling acceptance of the terms equivalent to opting in.

believe you me
Topic: Miscellaneous 5:51 am EDT, Oct 30, 2015


If scientists at NASA's Jet Propulsion Laboratory in Pasadena are correct, a moderately-sized earthquake is expected within the next two-and-a-half years.

Their [simulation] results produced a shocking 99-percent chance of a magnitude 5.0 or greater in Los Angeles within three years.

Timothy Egan:

Life is full of risk. [And] the fear-industrial complex continues to dominate national priorities.


When people say 'Roach, I can't believe you're a prepper', I reply with, 'I can't believe you aren't'. It's important we don't underestimate how quickly things could turn sour.

Former FBI assistant director Thomas Fuentes:

Keep Fear Alive. Keep it alive.

Diego Gambetta:

We need to consider two questions about the rationality of this mindset: the first concerns the process of arriving at it; the second concerns the consequences of adopting it.

Brittany Bronson:

The only way to reason with an illusion is to stop believing it.

there is no spoon
Topic: Miscellaneous 5:48 am EDT, Oct 30, 2015

Sebastian Anthony:

Adriel Desautels told us that, in 2015, [Netragard's] average time for initial penetration of infrastructure -- without the use of zero-days -- was "about an hour." In 2014, however, it was just "four minutes."

Sean Michael Kerner:

What Synack does is bring together top security researchers from around the world and provide a platform that pays those researchers for bugs they find in an enterprise's Web and mobile applications as well as infrastructure components.

Horace Dediu:

The data under scrutiny is, as usual, the data that can be gathered. Unfortunately the data that can't be gathered is where the insight into what is happening may lie.

Matt Devost:

The key is not to think outside the box, but to think without the box.

Alex Whiting:

Ideas don't always carry the day.

Derek Steer:

While poorly trained algorithms can lead to poor outcomes, the same is true of poorly trained humans.

time to market
Topic: Miscellaneous 5:46 am EDT, Oct 30, 2015

Sasha Romanosky:

It is unclear how an insurer should interpret the responses [to a cyber security questionnaire]. While most people would agree that having a firewall or proper network access control is better than not having a firewall and no access control, it is unclear how an underwriter would interpret and operationalize the answers to these questions.


While our processes and approach are based on the industry best practices that we helped create, we have immediately put in place additional processes and technical controls to eliminate the possibility of human error.

Adriel Desautels:

The vast majority of vulnerabilities are exploited within days of them becoming known.

Maritza Santillan:

Malicious actors began exploiting a patched critical vulnerability found in Joomla -- a popular open-source content management system -- just four hours after its details were disclosed. For popular sites, webmasters likely only have a couple of hours, from disclosure to attack, making it critical for them to react fast.

the future you didn't know you wanted
Topic: Miscellaneous 5:44 am EDT, Oct 30, 2015

Brian Eno:

What I really like doing is what I call Import and Export. I like taking ideas from one place and putting them into another place and seeing what happens when you do that.

Jean-Luc Godard:

It's not where you take things from -- it's where you take them to.

Diana Kimball:

A one-word intention -- "Cake" -- could lead to a thousand rabbit holes; a wordless traversal of everything you've ever hoped for. Emerging from the lucid dream of visual search, you see a gridded still life symbolizing the future you didn't know you wanted.

Rob Horning:

More than just affording us serial opportunities to try to pin down the meanings of things, Pinterest invites us to view all the images the internet offers as advertisements. We are asked to scrutinize them for the bundle of affects they might contain, and then to perform the work that will liberate those qualities and allow them to circulate more freely as detached signifieds. It permits us to let an accumulative, shopping mentality govern everything we do online.

Ravi Somaiya:

The magazine will feature visual artists, with their work dotted through the pages, in part because research revealed that younger people are drawn to art.

serious games
Topic: Miscellaneous 9:13 pm EDT, Oct 28, 2015

David Jarvis:

CISOs and other security leaders are asking, "How do I assess the real security risks to my company? How can I best communicate that risk to the broader organization and manage expectations? Even if I succeed at that, do I have the skills, resources and tools for success?" These are all important questions.

Richard Bejtlich:

The administration should develop the capability to take asymmetric actions that target adversary core interests, but in a way that leverages our strengths against their weaknesses.

Lisa Monaco:

We are not where we need to be in terms of federal cybersecurity.

David Sanger:

The ultimate Russian hack on the United States could involve severing the fiber-optic cables at some of their hardest-to-access locations ... where the cables are hard to monitor and breaks are hard to find and repair.

Steven Bellovin:

There's good evidence that people are playing serious malicious games with the routing table.

James Suroweicki:

The only way to win the game is simply not to play.

(Last) Newer << 1 - 2 - 3 - 4 - 5 - 6 ++ 16 >> Older (First)
Powered By Industrial Memetics