Create an Account
username: password:
 
  MemeStreams Logo

Twice Filtered

search

noteworthy
Picture of noteworthy
My Blog
My Profile
My Audience
My Sources
Send Me a Message

sponsored links

noteworthy's topics
Arts
  Literature
   Fiction
   Non-Fiction
  Movies
   Documentary
   Drama
   Film Noir
   Sci-Fi/Fantasy Films
   War
  Music
  TV
   TV Documentary
Business
  Tech Industry
  Telecom Industry
  Management
Games
Health and Wellness
Home and Garden
Miscellaneous
  Humor
  MemeStreams
   Using MemeStreams
Current Events
  War on Terrorism
  Elections
  Israeli/Palestinian
Recreation
  Cars and Trucks
  Travel
   Asian Travel
Local Information
  Food
  SF Bay Area Events
Science
  History
  Math
  Nano Tech
  Physics
  Space
Society
  Economics
  Education
  Futurism
  International Relations
  History
  Politics and Law
   Civil Liberties
    Surveillance
   Intellectual Property
  Media
   Blogging
  Military
  Philosophy
Sports
Technology
  Biotechnology
  Computers
   Computer Security
    Cryptography
   Human Computer Interaction
   Knowledge Management
  Military Technology
  High Tech Developments

support us

Get MemeStreams Stuff!


 
There are great benefits to connectedness, but we haven't wrapped our minds around the costs.

a real grind
Topic: Miscellaneous 8:26 pm EDT, Apr 12, 2015

Amy Davidson:

Sane people or those not raised for it don't seem to want to be politicians anymore.

Rivka Galchen, on Austin Holland:

I had the impression of a man who loved science and was politely trying to endure waking up each day, after insufficient sleep, to discover himself in the role of a politician.

Leonard Mlodinow:

Newton never wrote a memoir, but if he had, he probably would have called it I Hope I Really Pissed You Off, or maybe, Don't Bother Me, You Ass.

David Runciman:

In a world of myriad possibilities, especially for those who have the technical abilities that bring lavish rewards in the private sector, politics looks like a real grind. True, successful politicians get to exercise real power now and then, which must be a thrill. But most politicians are not successful: they labour away, scrabbling for votes, striving for influence, only to find that someone has beaten them to it.

Hillary Clinton:

Everyday Americans need a champion. And I want to be that champion.

Roger Scruton:

It feels good to pretend, and when we all join in, it is almost as though we were not pretending at all.


imagine how appealing it will be
Topic: Miscellaneous 6:50 pm EDT, Apr 12, 2015

President Xi Jinping:

No internet safety means no national security. No informatization means no modernization.

Benjamin Dean, Fellow for Internet Governance and Cyber-security, School of International and Public Affairs at Columbia University:

As we plough billions of dollars into intelligence agencies, supposedly to keep us all safe from 'cyber-attacks', it has the effect of further weakening the already low incentives for companies to invest in information security themselves.

Erich Schubert:

It's now pretty much mainstream to download and run untrusted software in your "datacenter". That is bad, really bad. Before, admins would try hard to prevent security holes, now they call themselves "devops" and happily introduce them to the network themselves!

Maciej Ceglowski:

Surveillance as a business model is the only thing that makes a site like Facebook possible.

John Herrman:

If Facebook publishing is attractive to healthy companies, imagine how appealing it will be to dying ones.

Nicole Perlroth:

The Great Cannon, the researchers said in a report published Friday, allows China to intercept foreign web traffic as it flows to Chinese websites, inject malicious code and repurpose the traffic as Beijing sees fit.

Jon R. Lindsay, Tai Ming Cheung, and Derek Reveron:

It is futile to hope to eliminate cyber exploitation across national boundaries. It is simply too essential a tool for China's economic development and political stability strategy and for the national security strategy of the United States, although neither state likes to admit it publicly.

While it might not be possible to completely eliminate cyberthreats through norms or formal agreements, we should be able to avoid making them worse through ignorance.

Taylor Swift:

I have to stop myself from thinking about how many aspects of technology I don't understand.

An engineer:

You would be underwhelmed by the technology.

David Ulevitch:

Like it or not, every business is a security company now. Whether you build technology or provide services to consumers or other businesses ... you are a security company. If there is information inside your company you would never want disclosed ... you are a security company. If your business collects and stores personal or confidential data of any kind regardless of your vertical ... you are a security company. It's a fact.

Thomas Fuentes:

'Keep Fear Alive.' Keep it alive.

Rebecca Brock:

People say to me, "Whatever it takes." I tell them, It's going to take everything.


compelling parochial interest
Topic: Miscellaneous 8:30 am EDT, Apr 11, 2015

Barack Obama:

I, BARACK OBAMA, President of the United States of America ... hereby declare a national emergency ...

Former FBI assistant director Thomas Fuentes:

You know, it's my opposite of Jesse Jackson's 'Keep Hope Alive' -- it's 'Keep Fear Alive.' Keep it alive.

James Comey:

The Internet is the most dangerous parking lot imaginable.

Evan Perez and Shimon Prokupecz:

One official says the Russian hackers have "owned" the State Department system for months and it is not clear the hackers have been fully eradicated from the system.

Anonymous official:

We have other ways of getting at you ...

Larry Summers:

The legitimacy of US leadership depends on our resisting the temptation to abuse it in pursuit of parochial interest, even when that interest appears compelling.

Nicole Perlroth:

Ultimately, researchers say, the only way for Internet users and companies to protect themselves will be to encrypt their Internet traffic so that it cannot be intercepted and diverted as it travels to its intended target.

Steven Bellovin:

We don't even have the right words.


a convoluted spaghetti
Topic: Miscellaneous 7:17 am EDT, Apr  9, 2015

Bob Work:

Our technological dominance is no longer assured. Quite frankly, we're at the ragged edge of what is manageable.

Murat Demirbas:

We know that for large scale Internet services, a single request may invoke 100s of (micro)services, and that many services can lead to 80K-100K relationships. But it was still surprising to see that it took 400K traces for the call graph to start to converge to its final form. That must be one heck of a convoluted spaghetti of services.

Erich Schubert:

Stack is the new term for "I have no idea what I'm actually using".

Alex Stamos:

Companies across the world are waking up to the fact that their security posture is insufficient to fend off the threats that breached Sony, Anthem and JPMC, and we can no longer build products like it's 2005.

Dick Cheney:

It's a very dangerous situation. I think the threat is growing steadily, and I think our capacity to deal with it is rapidly diminishing.

Wes Felter:

We're getting into interest-only adjustable-rate subprime technical debt.

Shawn Henry:

We're not winning.

Barack Obama:

I, BARACK OBAMA, President of the United States of America ... hereby declare a national emergency ...


a fundamental, unavoidable asymmetry
Topic: Miscellaneous 5:33 am EDT, Apr  7, 2015

Natasha Singer:

As universities and colleges around the country expand their online course offerings, many administrators are introducing new technologies to deter cheating. The oversight, administrators say, is crucial to demonstrating the legitimacy of an online degree to students and their prospective employers.

John Herrman:

This is the problem Amazon has with so many of its new products: They are easy to see for what they are. They often feel, first and foremost, like solutions to Amazon's problems, not yours.

Jeff Atwood:

The act of writing (or cut-and-pasting) your own code is easier than understanding and peer reviewing someone else's code. There is a fundamental, unavoidable asymmetry of work here. The amount of code being churned out today -- even if you assume only a small fraction of it is "important" enough to require serious review -- far outstrips the number of eyeballs available to look at the code.

Wes Felter:

We're getting into interest-only adjustable-rate subprime technical debt.

Barack Obama:

I, BARACK OBAMA, President of the United States of America ... hereby declare a national emergency ...

Verlyn Klinkenborg:

Someone from the future, I'm sure, will marvel at our blindness and at the hole we have driven ourselves into, for we are completely committed to an unsustainable technology.


common understandings of responsible state behavior
Topic: Miscellaneous 6:21 am EDT, Apr  6, 2015

Sarah Bloom Raskin:

We are certainly developing a shared understanding of the threat; we now need to develop a consensus around ways to responsibly address this threat. In the current global environment of interconnectivity, we have seen a growing consensus around the need to ensure that international legal principles pertaining to state sovereignty, human rights, and state responsibility apply equally to conduct online as well as offline. As part of a broader effort to improve cybersecurity around the world, we are working with the international community to develop common understandings of responsible state behavior in cyberspace.

Ariha Setalvad:

More than 209,000 cybersecurity jobs in the U.S. are unfilled.

Jeff Williams, chief technology officer at Contrast Security:

Are they going to pay market salaries, not government salaries for this expertise?

Geoff Brumfiel:

Neal Ziring says the agency can't compete on money, so he tries to sell it in other ways: "You know we have good health benefits, and we're government, right? So we have a huge scope of insurance to choose from," he says.

Charles Dunlap, a retired Air Force JAG general:

Some of those [non-uniformed] people might not realize it, but they are belligerents, they are targetable, and they are targetable in the same basis as active duty military.

Sarah Bloom Raskin:

Another way for institutions to know that they will be able to respond and recover from a debilitating attack is to develop a cyber-incident playbook -- a so-called "Playbook for Preparedness."

Mary Meeker:

Do humans want everything to be like a game?

Eugene Kaspersky:

It is not possible to be the champion in every game.

Michael Lewis:

Perhaps now more than ever, clever people are habituated to being paid to ignore the spirit of any rule ... Upon seeing a new rule they do not think, "What social purpose does this serve, and how can I help it to do the job?" They think, "How can I game it?"

Ann Helen Petersen:

The more you make the evidence of the game disappear, the more your audience will be willing to forget that they're being played.

Shawn Henry:

We're not winning.

Steven Bellovin:

We don't even have the right words.


a dangerous journey
Topic: Miscellaneous 6:01 am EDT, Apr  6, 2015

White God:

When young Lili is forced to give up her beloved dog Hagen, because its mixed-breed heritage is deemed 'unfit' by The State, she and the dog begin a dangerous journey back towards each other.

Julia Baird:

Taylor Swift takes Meredith out in Manhattan and the singer Kesha takes her cat on airplane flights.

Craig Armstrong:

A lot of people say to me, 'I wish my cat would do that. I wish my cat was an adventure cat.'

Taylor Swift:

It is a daily struggle for me to not buy more cats.


circling back
Topic: Miscellaneous 5:58 am EDT, Apr  6, 2015

Stewart Baker:

Even the hackers don't want to work for government forever; they hope to run startups just like everybody else ...

Virginia Lehmkuhl-Dakhwe:

The number of jobs in information security is going to grow tenfold in the next 10 years.

Alex Stamos:

In my dreams, I squint up at the flock of sales cyber vultures, "circling back" until I lose my will to resist their entreaties, or perhaps to live.

Marc Rogers:

Let's face it -- most of today's so-called "cutting edge" security defenses are either so specific, or so brittle, that they really don't offer much meaningful protection against a sophisticated attacker or group of attackers.


the most important three percent
Topic: Miscellaneous 11:29 am EDT, Apr  4, 2015

Matt McKenna:

The fact that every new piece of culture or entertainment is at risk for being consumed by the ever-growing vortex of editorial hackery goes to show that our country's sources for news and opinion are nothing more than venues for the meaningless cacophony of harping sycophants and the ceaseless din of compulsively braying automatons spraying opinions into the air like a broken lawn sprinkler system.

Ta-Nehisi Coates:

What I remember ... is the fear -- the fear of offending, of asking impolite questions, of intruding. But you could not work for City Paper without learning how to walk the streets of DC, approach people you did not previously know and barrage them with intimate questions. This is an essential skill for any journalist -- but it also one of the hardest things to do.

An exchange:

David Sanger: There's a lot we miss every day. I go to work every day convinced that I've got a handle on fully 3% of what's going on, okay?
Stewart Baker: [laughing] The key is [that] you can persuade us it's the most important 3%.
David Sanger: [laughing] That's right. [laughing] That's right.

David Carr:

Perhaps Brian Williams sensed that he was king of an entropic kingdom imprisoned by incontinence and cholesterol ads. As the ever more manic news cycle whirred around his evening newscast, it would be hard not to feel a little beside the point. Everyone is in on the joke. It's all knowing winks and fake attacks on confected news read by people who are somewhat bored by what they do. It just seems less funny now.

William Deresiewicz:

Excellence isn't usually what gets you up the greasy pole. What gets you up is a talent for maneuvering.

James Rosen:

Dick Cheney embodies the maxim of the late nuclear theorist Herman Kahn, who famously said there are two types of people in the world: those who care what The New York Times says about them and those who do not.


the days of free-range hacking are over
Topic: Miscellaneous 10:19 pm EDT, Apr  2, 2015

Fran Howarth:

According to officials, the U.S. State Department hack is the worst that has ever been seen against a federal agency. All organizations -- not just governments -- need to beef up their ability to detect and respond to sophisticated attacks.

Lisa Monaco:

Cyber threats are at the top of the President's list of security concerns. We are at a transformational moment in how we approach cybersecurity.

Joel Brenner:

The Obama administration is really getting serious now.

James Lewis:

This sends a signal that the days of free-range hacking are over.

Michael Daniel:

The targets of these sanctions are malicious actors whose actions undermine our national security.

Kim Zetter:

Michael Daniel and John Smith were hard-pressed ... to identify specific examples of attacks that would qualify for these sanctions or explain the criteria for determining when an attack meets the threshold.

Jason Healey:

The government can use sanctions against cyber actors who target US foreign policy -- an interesting category and choice of words. This probably wasn't meant to include WikiLeaks-style "malicious cyber actors" but future administrations might interpret this more broadly.

Marcy Wheeler:

Does that include encryption providers?

Adam Segal:

Where does the tit-for-tat end?


(Last) Newer << 8 ++ 18 - 19 - 20 - 21 - 22 - 23 - 24 - 25 - 26 ++ 36 >> Older (First)
 
 
Powered By Industrial Memetics
RSS2.0