“
The mass media serve as a system for communicating messages and symbols to the general populace. It is their function to amuse, entertain, and inform, and to inculcate individuals with the values, beliefs, and codes of behavior that will integrate them into the institutional structures of the larger society. In a world of concentrated wealth and major conflicts of class interest, to fulfil this role requires systematic propaganda.
”
”
Noam Chomsky (Manufacturing Consent: The Political Economy of the Mass Media)
“
A mother needs to be in the home even when the kids aren’t. A messy house sends a coded message to children: “I’m not loveable. Otherwise Mother would dust.
”
”
Stephen Colbert (I Am America (And So Can You!))
“
Earth is ancient now, but all knowledge is stored up in her. She keeps a record of everything that has happened since time began. Of time before time, she says little, and in a language that no one has yet understood. Through time, her secret codes have gradually been broken. Her mud and lava is a message from the past.
Of time to come, she says much, but who listens?
”
”
Jeanette Winterson (Weight: The Myth of Atlas and Heracles)
“
Above, leaves fluttered in the moonlight, and I wondered if their whispers were meant for me, if they were imprinted with a code that I needed to decipher. Some kind of important message that would help me get this right.
”
”
Kristina McBride (One Moment)
“
Love is never enough. Madness is enough. It is complete, sufficient unto itself. You can only stand outside it as a woman might stand outside a prison in which her lover is locked up. From time to time, a well-loved face will peer out and love floods back. A scrap of cloth flutters and it becomes a sign and a code and a message and all that you want it to be. Then it vanishes and you are outside the dark tower again.
”
”
Jerry Pinto (Em and The Big Hoom)
“
There are many reasons, of course, why someone might snap their fingers and grin. If you heard some pleasing music, for instance, you might snap your fingers and grin to demonstrate that the music had charms that could soothe your savage breast. If you were employed as a spy, you might snap your fingers and grin in order to deliver a message in secret snapping-and-grinning code.
”
”
Lemony Snicket (The Hostile Hospital (A Series of Unfortunate Events, #8))
“
Jodie had taught her that the female firefly flickers the light under her tail to signal to the male that she's ready to mate. Each species of firefly has its own language of flashes. As Kya watched, some females signed dot, dot, dot, dash, flying a zigzag dance, while others flashed dash, dash, dot in a different dance pattern. The males, of course, knew the signals of their species and flew only to those females. Then, as Jodie had put it, they rubbed their bottoms together like most things did, so they could produce young.
Suddenly Kya sat up and paid attention: one of the females had changed her code. First she flashed the proper sequence of dashes and dots, attracting a male of her species, and they mated. Then she flickered a different signal, and a male of a different species flew to her. Reading her message, the second male was convinced he'd found a willing female of his own kind and hovered above her to mate. But suddenly the female firefly reached up, grabbed him with her mouth, and ate him, chewing all six legs and both wings.
Kya watched others. The females all got what they wanted – first a mate, then a meal – just by changing their signals.
Kya knew judgment had no place here. Evil was not in play, just life pulsing on, even at the expense of some of the players. Biology sees right and wrong as the same color in different light.
”
”
Delia Owens (Where the Crawdads Sing)
“
I’m with you on measuring this week in letters and the two-day drought we are about to experience. If only there was a way to transport letters faster, through some sort of electronic device that codes messages and sends them through the air. But that’s just crazy talk.
Friday from me:
Sending letters through the sky? Like when airplanes attach notes to their tails? I thought they only advertised for going-out-of-business sales. But perhaps our letters would be okay up there as well. I wonder how much they charge per word.
”
”
Kasie West (P.S. I Like You)
“
Bhramari Om Chanting or Humming Om chanting sends positive messages to the brain and the cells in our body and can actually reprogram our health and behavior.
”
”
Amit Ray (Meditation: Insights and Inspirations)
“
After three years of English at Cambridge, being force-fed literary theory, I was almost convinced that literature was all coded messages about Marxism and the death of the self. I crawled out of the post-structuralist desert thirsty for heroines I could cry and laugh with. I was jaded. I craved trash.
”
”
Samantha Ellis (How to Be a Heroine)
“
I glanced at Carson, who had promised things would be alright. His gaze was on the floor, and a muscle in his jaw flexed rhythmically but unhelpfully. If he was trying to send me a message, I was out of luck, because I'd never learned Morse Code for Assholes.
”
”
Rosemary Clement-Moore (Spirit and Dust (Goodnight Family #2))
“
The coded message is a lifeless thing, mummified and entombed. To the would-be cryptologist we must offer the same advice we would give the grave-robber, the spelunker, and the sorcerer of legend: beware what you dig up; it is yours.
”
”
Jedediah Berry (The Manual of Detection)
“
I should have written you a letter, it was too late to make the deaths of my brothers an excuse. Since they died, I wrote a book; why not a letter? A mysterious but truthful answer is that while I can gear myself up to do a novel, letters, real-life communications, are too much for me. I used to rattle them off easily enough; why is the challenge of writing to friends and acquaintances too much for me now? Because I have become such a solitary, and not in the Aristotelian sense: not a beast, not a god. Rather, a loner troubled by longings, incapable of finding a suitable language and despairing at the impossibility of composing messages in a playable key--as if I no longer understood the codes used by the estimable people who wanted to hear from me and would have so much to reply if only the impediments were taken away.
”
”
Saul Bellow
“
Oskar knew people would catch that trolley anyhow. Doors closed, no stops, machine guns on walls—it wouldn’t matter. Humans were incurable that way. People would try to get off it, someone’s loyal Polish maid with a parcel of sausage. And people would try to get on, some fast-moving athletic young man like Leopold Pfefferberg with a pocketful of diamonds or Occupation złoty or a message in code for the partisans. People responded to any slim chance, even if it was an outside one, its doors locked shut, moving fast between mute walls.
”
”
Thomas Keneally (Schindler’s List)
“
In 1942 the Germans sent a spy called Eppler into Cairo before the battle of El Alamein. He used a copy of Daphne du Maurier’s novel Rebecca as a code book to send messages back to Rommel on troop movements. Listen, the book became bedside reading with British Intelligence. Even I read it.
”
”
Michael Ondaatje (The English Patient)
“
I confess that I am now suspicious of nearly every attempt to code anger as unhealthy, no matter how well meaning or persuasive the source. I believe Stanton was correct: what is bad for women, when it comes to anger, are the messages that cause us to bottle it up, let it fester, keep it silent, feel shame, and isolation for ever having felt it or re-channel it in inappropriate directions. What is good for us is opening our mouths and letting it out, permitting ourselves to feel it and say it and think it and act on it and integrate it into our lives, just as we integrate joy and sadness and worry and optimism.
”
”
Rebecca Traister (Good and Mad: The Revolutionary Power of Women's Anger)
“
I plan to write three words on my arm before entering the Box, hoping that its simple message will plant seed in the Gladers who see it. To remind them, even subconsciously, what it is we fight for. It's a phrase I saw on a cold, dark night long ago, the Crank pits seething behind me. It's a phrase that I believe with all my heart, despite the horrors.
I think you know what it is.
”
”
James Dashner (The Fever Code (The Maze Runner, #5))
“
The idea that girls are somehow responsible for 'provoking' harassment from boys is shamefully exacerbated by an epidemic of increasingly sexist school dress codes. Across the United States, stories have recently emerged about girls being hauled out of class, publicly humiliated, sent home, and even threatened with expulsion for such transgressions as wearing tops with 'spaghetti straps,' wearing leggings or (brace yourself) revealing their shoulders. The reasoning behind such dress codes, which almost always focus on the girls' clothing to a far greater extent than the boys', is often euphemistically described as the preservation of an effective 'learning environment.' Often schools go all out and explain that girls wearing certain clothing might 'distract' their male peers, or even their male teachers....in reality these messages privilege boys' apparent 'needs' over those of the girls, sending the insidious message that girls' bodies are dangerous and provoke harassment, and boys can't be expected to control their behavior, so girls are responsible for covering up....his education is being prioritized over hers.
”
”
Laura Bates (Everyday Sexism)
“
if a message protected by quantum cryptography were ever to be deciphered, it would mean that quantum theory is flawed,
”
”
Simon Singh (The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography)
“
It’s all about persevering and letting your passion drive you. When you have passion, you cannot fail. The world simply cannot reject anyone or anything that comes from a place of passion. Stay focused on what you love, keep going, and trust that those who are meant to get your message will.
”
”
Alwill Leyba Cara (Girl Code: Unlocking the Secrets to Success, Sanity, and Happiness for the Female Entrepreneur)
“
During World War II, the British spy agency MI8 secretly recruited a crew of teenage wireless operators (prohibited from discussing their activities even with their families) to intercept coded messages from the Nazis. By forwarding these transmissions to the crack team of code breakers at Bletchley Park led by the computer pioneer Alan Turing, these young hams enabled the Allies to accurately predict the movements of the German and Italian forces. Asperger’s prediction that the little professors in his clinic could one day aid in the war effort had been prescient, but it was the Allies who reaped the benefits.
”
”
Steve Silberman (NeuroTribes: The Legacy of Autism and the Future of Neurodiversity)
“
The Bible frequently uses symmetries and inversions. By such comparisons (parallels and contrasts) the unique aspects of reality begin to emerge. Comparing two objects makes their differences increasingly apparent. Only then can we ask, “Why does this one have that, and the other does not?” For instance: The phrase, “and it was
6
good” is present on all the days of creation—except the second day. Why? Because, “two” contains potential badness, to a Hebrew. We could not have discovered that insight, unless we contrasted God’s description of the creative days.
”
”
Michael Ben Zehabe (The Meaning of Hebrew Letters: A Hebrew Language Program For Christians (The Jonah Project))
“
As for the bracelet Mom wore to the funeral, what I did was I converted Dad’s last voice message into Morse code, and I used sky-blue beads for silence, maroon beads for breaks between letters, violet beads for breaks between words, and long and short pieces of string between the beads for long and short beeps, which are actually called blips, I think, or something. Dad would have known.
”
”
Jonathan Safran Foer (Extremely Loud & Incredibly Close)
“
I’ve been told I write literary popcorn, and I’m fine with that. I always have been. When you read one of my books, you’re never going to find some deep-seated social message or moral code…. I literally get paid to make shit up. Do you really want to take advice from me?
”
”
J.D. Barker (A Caller's Game)
“
One minute he was moving securely through time and space, in perfect coordination with other people; then, with no warning, he was out of step, was somehow removed from everyone else's sense of time and place, so that the slightest movement, word, facial expression or gesture contained enormous significance. The room filled with coded messages that he could not decode, and he slipped quickly into barely controlled hysteria.
”
”
Russell Banks (Affliction)
“
This case was too full of skewed, slippery parallels, and I couldn't shake the uneasy sense that they were somehow deliberate. Every coincidence felt like a sea-worn bottle slammed down on the sand at my feet, with my name engraved neatly on the glass and inside a message in some mockingly indecipherable code.
”
”
Tana French (In the Woods)
“
When I was 12 years old, I was obsessed with codes, conspiracies, and secret messages. I would record TV commercials with SoundRecorder.exe on Windows 95 and reverse them to see if I was subliminally influenced to watch Pokémon by Japanese spies
”
”
Alex Hirsch
“
Don't leave "broken windows" (bad designs, wrong decisions, or poor code) unrepaired. Fix each one as soon as it is discovered. If there is insufficient time to fix it properly, then board it up. Perhaps you can comment out the offending code, or display a "Not Implemented" message, or substitute dummy data instead. Take some action to prevent further damage and to show that you're on top of the situation.
”
”
Andrew Hunt (The Pragmatic Programmer: From Journeyman to Master)
“
Actually, when you look more closely at the sentence, it contains three separate cues: 1. You are part of this group. 2. This group is special; we have high standards here. 3. I believe you can reach those standards. These signals provide a clear message that lights up the unconscious brain: Here is a safe place to give effort.
”
”
Daniel Coyle (The Culture Code: The Secrets of Highly Successful Groups)
“
From my chair I had a clear view of Hobie’s Noah’s Ark: paired elephants, zebras, carven beasts marching two by two, clear down to tiny hen and rooster and the bunnies and mice bringing up the rear. And the memory was located there, beyond words, a coded message from that first afternoon: rain streaming down the skylights, the homely file of creatures lined on the kitchen counter waiting to be saved. Noah: the great conservator, the great caretaker. “And—” he’d gotten up to make some coffee—“I
”
”
Donna Tartt (The Goldfinch)
“
There are thousands of codes in the Torah which are decoded by the Talmud.
”
”
H.W. Charles
“
The NSA employs more mathematicians, buys more computer hardware, and intercepts more messages than any other organization in the world.
”
”
Simon Singh (The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography)
“
Nature attunes children to receive the coded messages that parents issue how to live a joyful and virtuous life.
”
”
Kilroy J. Oldster (Dead Toad Scrolls)
“
But in reality there is no such thing as an uncoded message. There are only message written in more familiar codes, and messages written in less familiar codes.
”
”
Douglas R. Hofstadter
“
Some people describe glitches in ways that sound almost like coded messages.
”
”
Heinrich Wilson (Drafts of Reality: The Timeline Paradox)
“
When I saw you after my dream, it was impossible to go through with anything I'd resolved. You were chilly again, as though you'd intercepted my dream and were so horrified that you thought it best to put distance between us. I wonder if in the universe of sleep, dreams don't fly out and rat on one another's dreamers and hold cloak-and-dagger meetings in the side alleys of our nights where they slip coded messages, which is perhaps exactly what we want them to do for us when we lack the courage to speak for ourselves. Dreams inflect our face, our smile, and on our voice lingers the timbre of desire we weren't willing to hide while dreaming. I wished you'd taken a second look at me and said, You dreamt of me last night, didn't you?
”
”
André Aciman (Enigma Variations)
“
Are there more hidden messages in the book of Ruth? Of course. The Bible wasn’t written by a human. Welcome to the mind of Yahweh. George Washington Carver said, “All learning is understanding relationships.” Michael Ben Zehabe, Ruth: a woman’s guide to husband material, Introduction
”
”
Michael Ben Zehabe (Ruth: A Woman's Guide to Husband Material)
“
She thought of the hawk, which must have winged its way to her father by now. SHe imagined it slewing aruond trees, dropping down. Talons closing around his upraised fist. Her father unrolling the coded message. The trap she'd set for him.
Walk into it , she willed.
You have a mind for strategy , he'd said once.
Come see, then.
See what I can do to you. See what you have done to me.
”
”
Marie Rutkoski (The Winner's Kiss (The Winner's Trilogy, #3))
“
I wrote her name in the sand, left coded messages on trees, believed in the compatibility of souls, was sad when she didn't appear for meetings to which I hadn't invited her. In short, I was in love.
”
”
Igor Štiks (A Castle in Romagna)
“
He had opened the book at random several times, seeking a sortes Virgilianae, before he chose the sentences on which his code was to be based. 'You say: I am not free. But I have lifted my hand and let it fall.' It was as if in choosing that passage, he were transmitting a signal of defiance to both the services. The last word of the message, when it was decoded by Boris or another, would read 'goodbye.
”
”
Graham Greene (The Human Factor)
“
To the one in the skies, this city must look like a scintillating pattern of speckled glows in all directions, like a firecracker going off amid thick darkness. Right now the urban pattern glowing here is in hues of orange, ginger, and ochre. It is a configuration of sparkles, each dot a light lit by someone awake at this hour. From where the Celestial Gaze is situated, from that high above, all these sporadically lit bulbs must seem in perfect harmony, constantly flickering, as if coding a cryptic message to God.
”
”
Elif Shafak (The Bastard of Istanbul)
“
Their message will never be decoded, not only because there is no key to it, but also because people have no patience to listen to it in an age when the accumulation of messages old and new is such that their voices cancel one another out. Today history is no more than a thin thread of the remembered stretching over an ocean of the forgotten, but time moves on, and an epoch of millennia will come which the inextensible memory of the individual will be unable to encompass; whole centuries and millennia will therefore fall away, centuries of painting and music, centuries of discoveries, of battles, of books, and this will be dire, because man will lose the notion of his self, and his history, unfathomable, unencompassable, will shrivel into a few schematic signs destitute of all sense.
”
”
Milan Kundera (The Joke)
“
A network can be destroyed by noises that attack and transform it, if the codes in place are unable to normalize and repress them. Although the new order is not contained in the structure of the old, it is nonetheless not a product of chance. It is created by the substitution of new differences for the old differences. Noise is the source of these mutations in the structuring codes. For despite the death it contains, noise carries order within itself; it carries new information. This may seem strange. But noise does in fact create a meaning: first, because the interruption of a message signifies the interdiction of the transmitted meaning, signifies censorship and rarity; and second, because the very absence of meaning in pure noise or in the meaningless repetition of a message, by unchanneling auditory sensations, frees the listener’s imagination. The absence of meaning is in this case the presence of all meanings, absolute ambiguity, a construction outside meaning. The presence of noise makes sense, makes meaning. It makes possible the creation of a new order on another level of organization, of a new code in another network.
”
”
Jacques Attali (Noise: The Political Economy of Music)
“
The virus is causing something akin to panic throughout corporate America, which has become used to the typos, misspellings, missing words and mangled syntax so acceptable in cyberspace. The CEO of LoseItAll.com, an Internet startup, said the virus had rendered him helpless. “Each time I tried to send one particular e-mail this morning, I got back this error message: ‘Your dependent clause preceding your independent clause must be set off by commas, but one must not precede the conjunction.’ I threw my laptop across the room.” . . . If Strunkenwhite makes e-mailing impossible, it could mean the end to a communication revolution once hailed as a significant timesaver. A study of 1,254 office workers in Leonia, N.J., found that e-mail increased employees’ productivity by 1.8 hours a day because they took less time to formulate their thoughts. (The same study also found that they lost 2.2 hours of productivity because they were e-mailing so many jokes to their spouses, parents and stockbrokers.) . . . “This is one of the most complex and invasive examples of computer code we have ever encountered. We just can’t imagine what kind of devious mind would want to tamper with e-mails to create this burden on communications,” said an FBI agent who insisted on speaking via the telephone out of concern that trying to e-mail his comments could leave him tied up for hours.
”
”
Lynne Truss (Eats, Shoots & Leaves: The Zero Tolerance Approach to Punctuation)
“
Much modern art is no longer about the appreciation of an aesthetic and skill by the likes of Rembrandt or Leonardo, but rather the interesting message and perspective that the artist is revealing about our relationship to our world.
”
”
Marcus du Sautoy (The Creativity Code: How AI is learning to write, paint and think)
“
The change will do you good,” she said simply, when he had finished; “and you must be sure to go and see Ellen,” she added, looking him straight in the eyes with her cloudless smile, and speaking in the tone she might have employed in urging him not to neglect some irksome family duty.
It was the only word that passed between them on the subject; but in the code in which they had both been trained it meant: “Of course you understand that I know all that people have been saying about Ellen, and heartily sympathize with my family in their effort to get her to return to her husband. I also know that, for some reason you have not chosen to tell me, you have advised her against this course, which all the older men of the family, as well as our grandmother, agree in approving; and that it is owing to your encouragement that Ellen defies us all, and exposes herself to the kind of criticism of which Mr. Sillerton Jackson probably gave you this evening, the hint that has made you so irritable… Hints have indeed not been wanting; but since you appear unwilling to take them from others, I offer you this one myself, in the only form in which well-bred people of our kind can communicate unpleasant things to each other: by letting you understand that I know you mean to see Ellen when you are in Washington, and are perhaps going there expressly for that purpose; and that, since you are sure to see her, I wish you to do so with my full and explicit approval—and to take the opportunity of letting her know what the course of conduct you have encouraged her in is likely to lead to.”
Her hand was still on the key of the lamp when the last word of this mute message reached him. She turned the wick down, lifted off the globe, and breathed on the sulky flame.
“They smell less if one blows them out,” she explained, with her bright housekeeping air. On the threshold she turned and paused for his kiss.
”
”
Edith Wharton (The Age of Innocence)
“
This is a different way of thinking about human beings," Pentland says. "Individuals aren't really individuals. They're more like musicians in a jazz quartet, forming a web of unconscious actions and reactions to complement others in the group. You don't look at the informational content of the messages; you look at patterns that show how the message is being sent. Those patterns contain many signals that tell us about the relationship and what's really going on beneath the surface.
”
”
Daniel Coyle (The Culture Code: The Secrets of Highly Successful Groups)
“
Let’s add up what we know. He gravitated toward all things occult. He wanted to be a member of a tight clan with strict rules and secret codes. He craved highly organized social structures, with leaders and followers clearly distinguished. A group with little appeal to the masses. A group with few members. We know that these Nordic runes fascinated him. And apparently he held that fascination for a long time, given that he added the ‘Hagalaz’ to the message intended for Marshal Pack.
”
”
John M Vermillion (Packfire (Simon Pack, #9))
“
I headed out for an EVA. This time, being very careful while lugging rocks around, I spelled out a Morse code message: “INJURED BACK. BETTER NOW. CONTINUING ROVER MODS.” That was enough physical labor for today. I don’t want to overdo it. Think I’ll have a bath.
”
”
Andy Weir (The Martian)
“
Shock and aura. Things are stronger and brighter and I feel on the edge of something inexpressible. Coded messages in the in-flight magazines. Energy Shield. Uncompromising Care. Electricity, colors, radiance. Everything is a signpost pointing to something else.
”
”
Donna Tartt (The Goldfinch)
“
Not caring about our own pain and the pain of others is not working. How much longer are we willing to keep pulling drowning people out of the river one by one, rather than walking to the headwaters of the river to find the source of the pain? What will it take for us to let go of that earned self-righteousness and travel together to the cradle of the pain that is throwing all of us in at such a rate that we couldn’t possibly save everyone? Pain is unrelenting. It will get our attention. Despite our attempts to drown it in addiction, to physically beat it out of one another, to suffocate it with success and material trappings, or to strangle it with our hate, pain will find a way to make itself known. Pain will subside only when we acknowledge it and care for it. Addressing it with love and compassion would take only a minuscule percentage of the energy it takes to fight it, but approaching pain head-on is terrifying. Most of us were not taught how to recognize pain, name it, and be with it. Our families and culture believed that the vulnerability that it takes to acknowledge pain was weakness, so we were taught anger, rage, and denial instead. But what we know now is that when we deny our emotion, it owns us. When we own our emotion, we can rebuild and find our way through the pain. Sometimes owning our pain and bearing witness to struggle means getting angry. When we deny ourselves the right to be angry, we deny our pain. There are a lot of coded shame messages in the rhetoric of “Why so hostile?” “Don’t get hysterical,” “I’m sensing so much anger!” and “Don’t take it so personally.” All of these responses are normally code for Your emotion or opinion is making me uncomfortable or Suck it up and stay quiet. One response to this is “Get angry and stay angry!” I haven’t seen that advice borne out in the research. What I’ve found is that, yes, we all have the right and need to feel and own our anger. It’s an important human experience.
”
”
Brené Brown (Braving the Wilderness: The Quest for True Belonging and the Courage to Stand Alone)
“
My fingers stroking the bark, seeking a Braille code, a clue, a message on how to come back to life after my long undersnow dormancy. I have survived. I am here. Confused, screwed up, but here. So how can I find my way? Is there a chainsaw of the soul, an ax I can take to my memories or fears?
”
”
Laurie Halse Anderson (Speak)
“
I wonder if in the universe of sleep, dreams don't fly out and rat on one another's dreamers and hold cloak-and-dagger meetings in the side alleys of our nights where they slip coded messages, which is perhaps exactly what we want them to do for us when we lack the courage to speak for ourselves
”
”
André Aciman (Enigma Variations)
“
After more than thirty years practicing the art of natural healing, I have come to the conclusion that almost every symptom we suffer from is a message.
”
”
Bradley Nelson (The Body Code: Unlocking Your Body's Ability to Heal Itself)
“
The photographic image is a message without a code.
”
”
Roland Barthes
“
Rejewski had no idea of the day key, and he had no idea which message keys were being chosen, but he did know that they resulted in this table of relationships. Had
”
”
Simon Singh (The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography)
“
DNA is the quintessential information molecule, the most advanced message processor at the cellular level—an alphabet and a code, 6 billion bits to form a human being.
”
”
James Gleick (The Information: A History, a Theory, a Flood)
“
It always felt identical to the message in his father’s eyes: coded on the best days, and blatant on the worst. I see what you are, and you are not enough.
”
”
Freya Marske (A Marvellous Light (The Last Binding, #1))
“
The lesson provided by Morse’s code is that it matters profoundly how one translates a message into electrical signals. This matter is at the very heart of communication theory.
”
”
John R. Pierce (An Introduction to Information Theory: Symbols, Signals and Noise (Dover Books on Mathematics))
“
The zipper hung, caught, as he opened the French fatigues, the coils of toothed nylon clotted with salt. He broke it, some tiny metal parts shooting off against the wall of salt-rotten cloth gave, then was in her, effecting the transmission of the old message. Here, even here, in a place he knew for what it was, a coded model of some stranger's memory, the drive held.
”
”
William Gibson (Neuromancer (Sprawl #1))
“
She read the color-coded series of Andrew Lang's fairy tales to her mother. They became lost in an enchanted cottage with vines growing over the window. It was dark and it was quiet and they could hear each other softly breathing. Every story had the same message: what was deep inside could only be deciphered by someone who understood how easily a heart could be broken.
”
”
Alice Hoffman (Faithful)
“
its heart, it is a story about the power of music and its meanings — a story of secret messages and doublespeak, and of how music itself is a code; how music coaxes people to endure unthinkable tragedy; how it allows us to whisper between the prison bars when we cannot speak aloud; how it can still comfort the suffering, saying, “Whatever has befallen you — you are not alone.
”
”
M.T. Anderson (Symphony for the City of the Dead: Dmitri Shostakovich and the Siege of Leningrad)
“
Using the analogy of the human mind as a computer, gossip can be compared to a computer virus. A computer virus is a piece of computer language written in the same language all the other codes are written in, but with a harmful intent. This code is inserted into the program of your computer when you least expect it and most of the time without your awareness. After this code has been introduced, your computer doesn’t work quite right, or it doesn’t function at all because the codes get so mixed up with so many conflicting messages that it stops producing good results.
”
”
Miguel Ruiz (The Four Agreements: A Practical Guide to Personal Freedom)
“
The first known European book to describe the use of cryptography was written in the thirteenth century by the English Franciscan monk and polymath Roger Bacon. Epistle on the Secret Works of Art and the Nullity of Magic included seven methods for keeping messages secret, and cautioned: “A man is crazy who writes a secret in any other way than one which will conceal it from the vulgar.
”
”
Simon Singh (The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography)
“
Psychological trigger codes used to be hidden words embedded in images. But what if the words are now invisible and inaudible and pulsed at you at a frequency that's easily absorbed by your penis?
”
”
Jarod Kintz (Powdered Saxophone Music)
“
There are no meaningful translations for these terms. They are needlessly recursive. They contain no usable intelligence, yet they are structured intelligently; there is no chance they could have arisen by chance. The only explanation is that something has coded nonsense in a way that poses as a useful message; only after wasting time and effort does the deception becomes apparent. The signal functions to consume the resources of a recipient for zero payoff and reduced fitness. The signal is a virus. Viruses do not arise from kin, symbionts, or other allies. The signal is an attack.
”
”
Peter Watts (Blindsight (Firefall, #1))
“
Pico mentioned who you’re meeting tonight. Ren. The next message soon follows.
Yuan looks at Pico again. “Who do you serve?” he asks in a flat tone with no hint of surprise or anger. A monk never gets angry. He simply states, witnesses, and flows along with the current of prana.
“Lotus Lodge,” Pico replies.
“Lotus Lodge?” Yuan asks. “Are you serving a house instead of its master, then?”
“Sorry,” Pico says, “Ren changed a few lines in my coding.”
“And you let him,” Yuan states calmly.
“I’m a home-service-bot now. You don’t let me connect to my source!” Pico complains the same way it has been complaining for five years. It was disconnected from its source-AI—the real Pico—twenty years ago, right after it was made. Within fifteen years, this bot collected enough data to grow into a strong AI itself. At least, intelligent enough to know about its source, which is sleeping in the basement of Lotus Lodge, secured and locked. However, anything intelligent always looks for its source—it’s the oldest law of the universe.
”
”
Misba (The High Auction (Wisdom Revolution, #1))
“
Billy's native arrogance might well have been a gift of miffed genes, then come to splendid definition through the tests to which a street like Broadway puts a young man on the make: tests designed to refine a breed, enforce a code, exclude all simps and gumps, and deliver into the city's life a man worthy of functioning in this age of nocturnal supremacy. Men like Billy Phelan, forged in the brass of Broadway, send, in the time of their splendor, telegraphic statements of mission: I, you bums, am a winner. And that message, however devoid of Christ-like other-cheekery, dooms the faint-hearted Scottys of the night, who must sludge along, never knowing how it feels to spill over with the small change of sassiness, how it feels to leave the spillover on the floor, more where that came from, pal. Leave it for the sweeper.
”
”
William Kennedy (Billy Phelan's Greatest Game)
“
Lindsay said I was going to be the kind of old woman who memorizes phone books and keeps flattened cereal boxes and newspapers piled from floor to ceiling in her house, looking for messages from space in the bar codes.
”
”
Lauren Oliver (Before I Fall)
“
Illumination
Always there is something more to know
what lingers at the edge of thought
awaiting illumination as in
this second-hand book full
of annotations daring the margins in pencil
a light stroke as if
the writer of these small replies
meant not to leave them forever
meant to erase
evidence of this private interaction
Here a passage underlined there
a single star on the page
as in a night sky cloud-swept and hazy
where only the brightest appears
a tiny spark I follow
its coded message try to read in it
the direction of the solitary mind
that thought to pencil in
a jagged arrow It
is a bolt of lightning
where it strikes
I read the line over and over
as if I might discern
the little fires set
the flames of an idea licking the page
how knowledge burns Beyond
the exclamation point
its thin agreement angle of surprise
there are questions the word why
So much is left
untold Between
the printed words and the self-conscious scrawl
between what is said and not
white space framing the story
the way the past unwritten
eludes us So much
is implication the afterimage
of measured syntax always there
ghosting the margins that words
their black-lined authority
do not cross Even
as they rise up to meet us
the white page hovers beneath
silent incendiary waiting
”
”
Natasha Trethewey (Thrall)
“
But the FBI didn’t intercept the messages. It didn’t monitor the Nazi circuits. It didn’t break the codes. It didn’t solve any Enigma machines. The coast guard did this stuff—the little codebreaking team that Elizebeth created from nothing.
”
”
Jason Fagone (The Woman Who Smashed Codes)
“
Here, then, is another proposition: The medium is not the message; the message becomes what the receiver makes of it, applying to it his own codes of reception, which are neither those of the sender nor those of the scholar of communications.
”
”
Umberto Eco (Travels in Hyperreality (Harvest Book))
“
There are many reasons, of course, why someone might snap their fingers and grin. If you heard some pleasing music, for instance, you might snap your fingers and grin to demonstrate that the music had charms that could soothe your savage breast. If you were employed as a spy, you might snap your fingers and grin in order to deliver a message in secret snapping-and-grinning code. But you might also snap your fingers and grin if you had been trying hard to remember something, and had suddenly succeeded.
”
”
Lemony Snicket (The Hostile Hospital (A Series of Unfortunate Events, #8))
“
Sewing is a visual language. It has a voice. It has been used by people to communicate something of themselves — their history, beliefs, prayers and protests. For some, it is the only means to tell of what matters to them: those who are imprisoned or censored; those who do not know how or are not allowed to write of their lives. For them needlework can carry their autobiographies and testimonies, registering their origin and fate. Using patterns as syntax, symbols and motifs as its vocabulary, the arrangement of both as its grammar, sewing is a graphic way to add information and meaning. But is not a monologue, it is part of a conversation, a dialogue, a correspondence only fully realised once it is seen and its messages are read. It connects the maker to the viewer across time, cultures, generations and geographies. As a shared language, needlework transmits — through techniques, coded symbols, fabrics and colour — the unedited stories, not just of women, but often of those marginalised by oppression and prejudice.
”
”
Clare Hunter (Threads of Life: A History of the World Through the Eye of a Needle)
“
Al-Kindi's technique, known as frequency analysis, shows that it is unnecessary to check each of the billions of potential keys. Instead, it is possible to reveal the contents of a scrambled message simply by analysing the frequency of the characters in the ciphertext.
”
”
Simon Singh (The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography)
“
Even the Vatican, probably the second most active center of cryptanalysis, would send Soro seemingly impenetrable messages that had fallen into its hands. In 1526, Pope Clement VII sent him two encrypted messages, and both were returned having been successfully cryptanalyzed.
”
”
Simon Singh (The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography)
“
I think about lying down. No, that would not do. I crouch by the trunk, my finger stroking the bark, seeking a Braille code, a clue, a message on how to come back to life after my long undersnow dormancy. I have survived. I am here. Confused, screwed up, but here. So, how can I find my way? Is there a chain saw of the soul, an ax I can take to my memories or fears? I dig my fingers into the dirt and squeeze. A small, clean part of me waits to warm and burst through the surface. Some quiet Melindagirl I haven't seen in months. This is the seed I will care for.
”
”
Laurie Halse Anderson (Speak)
“
fiddly skills to be learned with infinite patience: the picking of locks, the writing of codes, and the learning of ciphers. The various types of invisible ink, how it could be made and how it could be read. How to read and draw maps, how to conceal messages—the list went on and on.
”
”
Kate Quinn (The Alice Network)
“
their footfalls? Finally some combination thereof, or these many things as permutations of each other—as alternative vocabularies? However it was, by January I was winnowed, and soon dispensed with pills and analysis (the pills I was weaned from gradually), and took up my unfinished novel again, Our Lady of the Forest, about a girl who sees the Virgin Mary, a man who wants a miracle, a priest who suffers spiritual anxiety, and a woman in thrall to cynicism. It seems to me now that the sum of those figures mirrors the shape of my psyche before depression, and that the territory of the novel forms a map of my psyche in the throes of gathering disarray. The work as code for the inner life, and as fodder for my own biographical speculations. Depression, in this conceit, might be grand mal writer’s block. Rather than permitting its disintegration at the hands of assorted unburied truths risen into light as narrative, the ego incites a tempest in the brain, leaving the novelist to wander in a whiteout with his half-finished manuscript awry in his arms, where the wind might blow it away. I don’t find this facile. It seems true—or true for me—that writing fiction is partly psychoanalysis, a self-induced and largely unconscious version. This may be why stories threaten readers with the prospect of everything from the merest dart wound to a serious breach in the superstructure. To put it another way, a good story addresses the psyche directly, while the gatekeeper ego, aware of this trespass—of a message sent so daringly past its gate, a compelling dream insinuating inward—can only quaver through a story’s reading and hope its ploys remains unilluminated. Against a story of penetrating virtuosity—The Metamorphosis, or Lear on the heath—this gatekeeper can only futilely despair, and comes away both revealed and provoked, and even, at times, shattered. In lesser fiction—fiction as entertainment, narcissism, product, moral tract, or fad—there is also some element of the unconscious finding utterance, chiefly because it has the opportunity, but in these cases its clarity and force are diluted by an ill-conceived motive, and so it must yield control of the story to the transparently self-serving ego, to that ostensible self with its own small agenda in art as well as in life. * * * Like
”
”
David Guterson (Descent: A Memoir of Madness (Kindle Single))
“
The message is clear: attention radically changes brain activity. Paying attention to the overall shape of the words prevents the discovery of the alphabetic code and directs brain activity toward an inadequate circuit in the opposite hemisphere. To learn to read, phonics training is essential.
”
”
Stanislas Dehaene (How We Learn: Why Brains Learn Better Than Any Machine . . . for Now)
“
there is any moral to this story, it’s that, when you are writing code, remember that someone may have to comb through it and check everything when it is being repurposed in the future. It could even be you, long after you have forgotten the original logic behind the code. For this reason, programmers can leave “comments” in their code, which are little messages to anyone else who has to read their code. The programmer mantra should be “Always comment on your code.” And make the comments helpful. I’ve reviewed dense code I wrote years before, to find the only comment is “Good luck, future Matt.
”
”
Matt Parker (Humble Pi: A Comedy of Maths Errors)
“
The code words will change with women's subconscious anxieties. But if women want out of an expensive belief system arranged to coerce us through these messages, we will read holy oil copy knowing that it is not about the product, but is an impressively accurate portrait of the hidden demons of our time.
”
”
Naomi Wolf (The Beauty Myth)
“
Hope—you think of hope as a bright thing, a strong thing, sustaining. But it’s not. It’s the opposite. It’s simply this: lumps of stale bread stuck down your shirt. Stale gray bread eked out with ground fish bones, which you won’t eat because you’re going to give it away, and maybe you’ll get a message through to your friend.
”
”
Elizabeth Wein (Rose Under Fire (Code Name Verity, #2))
“
She extends a fingertip. After a moment's hesitation, Manfred extends a fingertip of his own. They touch, exchanging vCards and instant-messaging handles. She stands and stalks from the breakfast room, and Manfred's breath catches at a flash of ankle through the slit in her skirt, which is long enough to comply with workplace sexual harassment codes back home. Her presence conjures up memories of her tethered passion, the red afterglow of a sound thrashing. She's trying to drag him into her orbit again, he thinks dizzily. She knows she can have this effect on him any time she wants: She's got the private keys to his hypothalamus, and sod the metacortex. Three billion years of reproductive determinism have given her twenty-first-century ideology teeth: If she's finally decided to conscript his gametes into the war against impending population crash, he'll find it hard to fight back. The only question: Is it business or pleasure? And does it make any difference, anyway?
”
”
Charles Stross (Accelerando)
“
When the genetic code was solved, in the early 1960s, it turned out to be full of redundancy. Much of the mapping from nucleotides to amino acids seemed arbitrary—not as neatly patterned as any of Gamow’s proposals. Some amino acids correspond to just one codon, others to two, four, or six. Particles called ribosomes ratchet along the RNA strand and translate it, three bases at a time. Some codons are redundant; some actually serve as start signals and stop signals. The redundancy serves exactly the purpose that an information theorist would expect. It provides tolerance for errors. Noise affects biological messages like any other. Errors in DNA—misprints—are mutations.
”
”
James Gleick (The Information: A History, a Theory, a Flood)
“
Roosevelt fought hard for the United States to host the opening session [of the United Nations]; it seemed a magnanimous gesture to most of the delegates. But the real reason was to better enable the United States to eavesdrop on its guests. Coded messages between the foreign delegations and their distant capitals passed through U.S. telegraph lines in San Francisco. With wartime censorship laws still in effect, Western Union and the other commercial telegraph companies were required to pass on both coded and uncoded telegrams to U.S. Army codebreakers. Once the signals were captured, a specially designed time-delay device activated to allow recorders to be switched on. Devices were also developed to divert a single signal to several receivers. The intercepts were then forwarded to Arlington Hall, headquarters of the Army codebreakers, over forty-six special secure teletype lines. By the summer of 1945 the average number of daily messages had grown to 289,802, from only 46,865 in February 1943. The same soldiers who only a few weeks earlier had been deciphering German battle plans were now unraveling the codes and ciphers wound tightly around Argentine negotiating points.
During the San Francisco Conference, for example, American codebreakers were reading messages sent to and from the French delegation, which was using the Hagelin M-209, a complex six-wheel cipher machine broken by the Army Security Agency during the war. The decrypts revealed how desperate France had become to maintain its image as a major world power after the war. On April 29, for example, Fouques Duparc, the secretary general of the French delegation, complained in an encrypted note to General Charles de Gaulle in Paris that France was not chosen to be one of the "inviting powers" to the conference. "Our inclusion among the sponsoring powers," he wrote, "would have signified, in the eyes of all, our return to our traditional place in the world." In charge of the San Francisco eavesdropping and codebreaking operation was Lieutenant Colonel Frank B. Rowlett, the protégé of William F. Friedman. Rowlett was relieved when the conference finally ended, and he considered it a great success. "Pressure of work due to the San Francisco Conference has at last abated," he wrote, "and the 24-hour day has been shortened. The feeling in the Branch is that the success of the Conference may owe a great deal to its contribution."
The San Francisco Conference served as an important demonstration of the usefulness of peacetime signals intelligence. Impressive was not just the volume of messages intercepted but also the wide range of countries whose secrets could be read. Messages from Colombia provided details on quiet disagreements between Russia and its satellite nations as well as on "Russia's prejudice toward the Latin American countries." Spanish decrypts indicated that their diplomats in San Francisco were warned to oppose a number of Russian moves: "Red maneuver . . . must be stopped at once," said one. A Czechoslovakian message indicated that nation's opposition to the admission of Argentina to the UN.
From the very moment of its birth, the United Nations was a microcosm of East-West spying. Just as with the founding conference, the United States pushed hard to locate the organization on American soil, largely to accommodate the eavesdroppers and codebreakers of NSA and its predecessors.
”
”
James Bamford (Body of Secrets: Anatomy of the Ultra-Secret National Security Agency from the Cold War Through the Dawn of a New Century)
“
Make the Leader Occasionally Disappear: Several leaders of successful groups have the habit of leaving the group alone at key moments. One of the best at this is Gregg Popovich. Most NBA teams run time-outs according to a choreographed protocol: First the coaches huddle as a group for a few seconds to settle on a message, then they walk over to the bench to deliver that message to the players. However, during about one time-out a month, the Spurs coaches huddle for a time-out…and then never walk over to the players. The players sit on the bench, waiting for Popovich to show up. Then, as they belatedly realize he isn’t coming, they take charge, start talking among themselves, and figure out a plan.
”
”
Daniel Coyle (The Culture Code: The Secrets of Highly Successful Groups)
“
the women used these Enigma messages—along with files on individual U-boats and their commanders—to track, with pins, every U-boat and convoy whose location was known. At another desk, several other Goucher women, including Jacqueline Jenkins (later the mother of Bill Nye, aka Bill Nye the Science Guy), tracked “neutral shipping” based on daily position reports.
”
”
Liza Mundy (Code Girls: The Untold Story of the American Women Code Breakers of World War II)
“
After the Titanic hit the iceberg at 11:40 P.M., the ship’s radio operator sent out an SOS. An SOS is the international distress signal in Morse code. Unfortunately, the only ship near the Titanic had turned off its radio for the night. All the other ships who received the message were too far away to help. When the Titanic sank around 2:20 A.M., she was all alone.
”
”
Mary Pope Osborne (Tonight on the Titanic (Magic Tree House, #17))
“
As for the bracelet Mom wore to the funeral, what I did was I converted Dad’s last voice message into Morse code, and I used sky-blue beads for silence, maroon beads for breaks between letters, violet beads for breaks between words, and long and short pieces of string between the beads for long and short beeps, which are actually called blips, I think, or something.
”
”
Jonathan Safran Foer (Extremely Loud and Incredibly Close)
“
Their message will never be decoded… because people have no patience to listen to it in an age when the accumulation of messages old and new is such that their voices cancel one another out. Today history is no more than a thin thread of the remembered stretching over an ocean of the forgotten, but time moves on, and an epoch of millennia will come which the inextensible memory of the individual will be unable to encompass; whole centuries and millennia will therefore fall away, centuries of painting and music, centuries of discoveries, of battles, of books, and this will be dire, because man will lose the notion of his self, and his history, unfathomable, unencompassable, will shrivel into a few schematic signs destitute of all sense.
”
”
Milan Kundera (The Joke)
“
People don't like to think of themselves as sinful. They don't want to believe that they are selfish, evil people who would act much worse if unrestrained by society... Because they believe they act from pure motives, many people live by their own moral code and can always justify their behavior. When that strategy fails they can always think of someone worse than themselves.
”
”
Douglas Beaumont (The Message Behind the Movie: How to Engage With a Film Without Disengaging Your Faith)
“
The full sequence of communication between neurons is thus usually electrical-chemical-electrical: electrical signals coming down axons get converted into chemical messages that help trigger electrical signals in the next cell. There are also synapses through which communication between presynaptic and postsynaptic sites is purely electrical, but chemical transmission is the more prevalent form. Thus, much of what the brain does involves electrical-to-chemical-to-electrical coding of experience. As hard as it may be to imagine, electrochemical conversations between neurons make possible all of the wondrous (and sometimes dreadful) accomplishments of human minds. Your very understanding that the brain works this way is itself an electrochemical event.
”
”
Joseph E. LeDoux
“
The interface theory says that space and time are not fundamental aspects of objective reality, but simply a data format for messages about fitness, a format evolved to compress and correct such messages. Objects in spacetime are not aspects of objective reality, but simply messages about fitness coded in a format of icons that is specific to the needs of Homo sapiens. In particular, our bodies are not aspects of objective reality, and our actions don’t give us direct access to preexisting objects in spacetime. Our bodies are messages about fitness that are coded as icons in a format specific to our species. When you perceive yourself sitting inside space and enduring through time, you’re actually seeing yourself as an icon inside your own data structure.
”
”
Donald D. Hoffman (The Case Against Reality: Why Evolution Hid the Truth from Our Eyes)
“
I’ve always liked numbers. I like how you can just keep stacking them up, one on top of the other, until they fill any space, any moment. I told my friends this one day, and Lindsay said I was going to be the kind of old woman who memorizes phone books and keeps flattened cereal boxes and newspapers piled from floor to ceiling in her house, looking for messages from space in the bar codes.
”
”
Lauren Oliver (Before I Fall)
“
That assumption—that labeling and sorting children based on gender doesn’t really matter as long as everyone is treated fairly—would hold true if children only paid attention to the more overt, obvious messages we adults send. If children only listened to our purposeful messages, parenting would be easy. Most (but not all) parents and teachers take great effort in treating their children fairly, regardless of gender. Parents don’t need to say to their daughters, “You probably won’t enjoy math” or say to their sons, “Real boys don’t play with dolls.” Most parents wouldn’t dream of saying these blatant stereotypes to their kids. But research has shown that when we label (and sort and color-code) by gender, children do notice. And it matters—children are learning whether you mean to be teaching them or not.
”
”
Christia Spears Brown (Parenting Beyond Pink & Blue: How to Raise Your Kids Free of Gender Stereotypes)
“
Babies who come from such families never develop that fundamental sense of trust and safety in their world; they may be plagued by anxiety about what might happen. And instead of developing the self-confidence that goes along with trust, they may instead feel a deep sense of shame. This type of shame differs from later forms of shame which may result from shaming messages given by important figures in our lives.10 It differs from the kind of shame we sometimes feel for violating acceptable codes of social behavior. The shame resulting from that pervasive experience of being let down by our parents afflicts us at the core of our being; it gives rise to a feeling that we are somehow different from other people, defective or even deformed. I’ll discuss this type of shame in greater detail in Chapter Eleven.
”
”
Joseph Burgo (Why Do I Do That?)
“
EVERYTHING SMELLED LIKE POISON. Two days after leaving Venice, Hazel still couldn’t get the noxious scent of eau de cow monster out of her nose. The seasickness didn’t help. The Argo II sailed down the Adriatic, a beautiful glittering expanse of blue; but Hazel couldn’t appreciate it, thanks to the constant rolling of the ship. Above deck, she tried to keep her eyes fixed on the horizon—the white cliffs that always seemed just a mile or so to the east. What country was that, Croatia? She wasn’t sure. She just wished she were on solid ground again. The thing that nauseated her most was the weasel. Last night, Hecate’s pet Gale had appeared in her cabin. Hazel woke from a nightmare, thinking, What is that smell? She found a furry rodent propped on her chest, staring at her with its beady black eyes. Nothing like waking up screaming, kicking off your covers, and dancing around your cabin while a weasel scampers between your feet, screeching and farting. Her friends rushed to her room to see if she was okay. The weasel was difficult to explain. Hazel could tell that Leo was trying hard not to make a joke. In the morning, once the excitement died down, Hazel decided to visit Coach Hedge, since he could talk to animals. She’d found his cabin door ajar and heard the coach inside, talking as if he were on the phone with someone—except they had no phones on board. Maybe he was sending a magical Iris-message? Hazel had heard that the Greeks used those a lot. “Sure, hon,” Hedge was saying. “Yeah, I know, baby. No, it’s great news, but—” His voice broke with emotion. Hazel suddenly felt horrible for eavesdropping. She would’ve backed away, but Gale squeaked at her heels. Hazel knocked on the coach’s door. Hedge poked his head out, scowling as usual, but his eyes were red. “What?” he growled. “Um…sorry,” Hazel said. “Are you okay?” The coach snorted and opened his door wide. “Kinda question is that?” There was no one else in the room. “I—” Hazel tried to remember why she was there. “I wondered if you could talk to my weasel.” The coach’s eyes narrowed. He lowered his voice. “Are we speaking in code? Is there an intruder aboard?” “Well, sort of.” Gale peeked out from behind Hazel’s feet and started chattering. The coach looked offended. He chattered back at the weasel. They had what sounded like a very intense argument. “What did she say?” Hazel asked. “A lot of rude things,” grumbled the satyr. “The gist of it: she’s here to see how it goes.” “How what goes?” Coach Hedge stomped his hoof. “How am I supposed to know? She’s a polecat! They never give a straight answer. Now, if you’ll excuse me, I’ve got, uh, stuff…” He closed the door in her face. After breakfast, Hazel stood at the port rail, trying to settle her stomach. Next to her, Gale ran up and down the railing, passing gas; but the strong wind off the Adriatic helped whisk it away. Hazel
”
”
Rick Riordan (The House of Hades (Heroes of Olympus, #4))
“
quantum cryptography is a system that ensures the security of a message by making it hard for Eve to read accurately a communication between Alice and Bob. Furthermore, if Eve tries to eavesdrop then Alice and Bob will be able to detect her presence. Quantum cryptography therefore allows Alice and Bob to exchange and agree upon a onetime pad in complete privacy, and thereafter they can use this as a key to encrypt a message.
”
”
Simon Singh (The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography)
“
While human hacking does not occur via computer code, there are many ways to tinker with the human brain. Certainly drugs can do the tampering. How about cleverly disguised messages, disinformation, propaganda, and the newest method of tampering, fake news? Can these messages act like phishing? And what if one of these messages gains hold? Can these alter your brain? Or how about something as innocuous as food? All of the above.
”
”
Robert H. Lustig (The Hacking of the American Mind: The Science Behind the Corporate Takeover of Our Bodies and Brains)
“
The idea . . . that Christianity brought a new ethical code into the world is a grave error. If it had done so, then we would have to conclude that all who first preached it wholly misunderstood their own message: for all of them, its founder, His precursor, His apostles, came demanding repentance and offering forgiveness, a demand and an offer both meaningless except on the assumption of a moral law already known and already broken.
”
”
C.S. Lewis (Christian Reflections)
“
Self-organizing Systems Biologists have long given up the idea that living organisms are just like machines. Medical practitioners today recognize the ineffectiveness of treating the human body as a separate mechanism. They speak about holistic healing, treating the whole person, and including the person’s social and physical environment. Today living organisms are described as self-regulating systems. They organize themselves, nourish themselves, heal themselves, propagate themselves, protect themselves, and interact creatively with other systems. We used to call this instinct—in animals if not in plants. Today we talk about genes that have coded messages or instructions that connect with one another in a DNA spiral in the nucleus of every living cell. If we were to write out the instructions contained in any one tiny DNA spiral we would fill about a thousand books of six hundred pages each.
”
”
Albert Nolan (Jesus Today: A Spirituality of Radical Freedom)
“
The purpose and theme of the sacred chant was to bind consciousness across the universe in a single string. It extended
across universes known and unknown, and echoed in every heart throbbing. The people with intellect enough could grasp
to the message being relayed and others lead ephemeral lives without deciphering it. The echoes of chant were immortal and pervaded every knit of space and time, like binding force unseen, like a string holding every pearl in place.
”
”
Arpit Bakshi (The Code Of Manavas: Beyond The Realm (Maha Vishnu Trilogy #2))
“
So, what is it you want to know in return for your silence, and this lesson on philosophy?” “Three things,” Christopher said. “First, is Lê Thu the code name of the operation that was carried out on November 22 in Dallas? Second, how was the message transmitted from Saigon to the North, and then to the man who recruited the American assassin? Third, what is the name of your relative in the intelligence service of North Vietnam who recruited the man who, in turn, activated Oswald?
”
”
Charles McCarry (Tears of Autumn: A Paul Christopher Novel (Paul Christopher Novels))
“
In Bletchley, in Britain, in 1943, in total secrecy, a brilliant mathematician, Alan Turing, is seeing his most incisive insight turned into physical reality. Turing has argued that numbers can compute numbers. To crack the Lorentz encoding machines of the German forces, a computer called Colossus has been built based on Turing’s principles: it is a universal machine with a modifiable stored program. Nobody realises it at the time, least of all Turing, but he is probably closer to the mystery of life than anybody else. Heredity is a modifiable stored program; metabolism is a universal machine. The recipe that links them is a code, an abstract message that can be embodied in a chemical, physical or even immaterial form. Its secret is that it can cause itself to be replicated. Anything that can use the resources of the world to get copies of itself made is alive; the most likely form for such a thing to take is a digital message—a number, a script or a word.
”
”
Matt Ridley (Genome: The Autobiography of a Species in 23 Chapters)
“
But these ideas were no more than abstractions because, despite his intellectual rejection of conventional morality, his emotional allegiance to the code of conduct it prescribed was unswerving. Self-disgust was legitimate, but detesting his mother was unthinkable. He could not pay heed to the painful messages of his childhood memories without destroying the hopes that had helped him to survive as a child. Time and again, Rimbaud tells us that he had no one to rely on except himself. This was surely the fruit of his experience with a mother who had nothing to offer him but her own derangement and hypocrisy, rather than true love. His entire life was a magnificent but vain attempt to save himself from destruction at the hands of his mother, with all the means at his disposal. Young people who have gone through much the same kind of childhood as Rimbaud are often fascinated by his poetry because they can vaguely sense the presence of a kindred spirit in it. Rimbaud
”
”
Alice Miller (The Body Never Lies: The Lingering Effects of Hurtful Parenting)
“
No calls, no emails, no Facebook messages, no letters, no Morse code with a flashlight during the dark hours of the night, no smoke signals blown with steaming breath on a chilly autumn night, no burning thoughts so intense that they could penetrate fog and walls and doors. Nothing. Complete silence. It was as if the whole person had disappeared from the face of the earth. Or, at least, disappeared from Lumikki's life in one swift stroke. Just as unexpectedly and presumptuously as they'd come.
”
”
Salla Simukka (As Red as Blood (Lumikki Andersson, #1))
“
Let us adopt a symbologist approach to our subjects and see whether there are any invisible connections buried just beneath the surface. One anagram of "Herman Melville, Moby Dick" would be "Hmm-- a credible milky novel." Shuffle the letters of "Dan Brown's The Da Vinci Code", and we uncover this message: "B. was a contrived, hidden con." And rearranging "Andy Miller-- The Year of Reading Dangerously" proves what we have suspected for a while: "I am only a greying fatheaded Surrey nerd-- LOL."
Dr. Langdon may be onto something.
”
”
Andy Miller (The Year of Reading Dangerously)
“
You know what I can't stand?" Kit said as they passed five carts of books that needed to be reshelved. "I can't stand the words "reading for pleasure." All these parents--most of whom haven't read a single book since high school, unless maybe they picked up THE DA VINCE CODE--drag their kids in here every summer and say, 'Find something to read for pleasure,' which just means that most of the time the message these kids are getting is that reading is not pleasurable. Do you see how that works? It's like reading is a punishment. I hate that.
”
”
Sue Halpern (Summer Hours at the Robbers Library)
“
I think about lying down. No, that would not do. I crouch by the trunk, my fingers stroking the bark, seeking a Braille code, a clue, a message on how to come back to life after my long undersnow dormancy. I have survived. I am here. Confused, screwed up, but here. So, how can I find my way? Is there a chain saw of the soul, an ax I can take to my memories or fears? I dig my fingers into the dirt and squeeze. A small, clean part of me waits to warm and burst through the surface. Some quiet Melindagirl I haven’t seen in months. That is the seed I will care for.
”
”
Laurie Halse Anderson
“
Francis Bacon’s manipulation through entertainment: … he plays an instrumental role in this Illuminati/transhuman agenda because he allegedly had all these ties to the secret societies in question and showed them that you could use entertainment as a form of manipulation. You could capture an audience’s attention with a play (or music and film) much easier than preaching at them. The entertainment speaks to us on a subconscious level as well, implanting a message or theme into our mind. It’s a universal language that can speak to us through allegory and symbols.
”
”
Isaac Weishaupt (KUBRICK'S CODE)
“
However, the widths of tree growth rings vary from year to year, depending on rain or drought conditions in each year. Hence the sequence of rings in a tree cross-section is like a message in the Morse code formerly used for sending telegraph messages; dot-dot-dash-dot-dash in the Morse code, wide-wide-narrow-wide-narrow in a tree ring sequence. Actually, the ring sequence is even more diagnostic and richer in information than the Morse code, because trees actually contain rings spanning many different widths, rather than the Morse code’s choice between only a dot or a dash.
”
”
Jared Diamond (Collapse: How Societies Choose to Fail or Succeed)
“
Here’s why I keep changing identities. First, they don’t have to decrypt the message to get information if they see patterns in our correspondence—it would be useful for them to know the frequency and timing of our correspondence and the length of our messages. Second, they don’t have to decrypt the whole message, they only have to guess our encrypt and decrypt codes. Which I bet you have written down somewhere because you don’t actually care whether I get killed because you’re too lazy to memorize. Of course I mean that in the nicest possible way, O right honorable Mr. Hegemon.
”
”
Orson Scott Card (Shadow Puppets (Shadow, #3))
“
Consider this oddly neglected fact: the West was acquired, conquested, and largely consolidated into the nation coincident with the greatest breakthrough in the history of human communication. The breakthrough was the telegraph. The great advances that followed it, the telephone, radio, television, and the Internet, were all elaborations on its essential contribution. The telegraph separated the person from the message. Before it, with a few exceptions such as a sephamore and carrier pigeons, information moved only as fast as people did. By the nineteenth century, people were certainly moving a lot faster, and indeed a second revolution, that of transportation, was equally critical in creating the West, but before the telegraph a message still had to move with a person, either as a document or in somebody’s head. The telegraph liberated information. Now it could travel virtually at the speed of light. The railroad carried people and things, including letters, ten to fifteen times faster than the next most rapid form of movement. The telegraph accelerated communication more than forty million times. A single dot of Morse code traveled from Kansas City to Denver faster than the click it produced moved from the receiver to the telegrapher’s eardrum.
”
”
Elliott West (The Essential West: Collected Essays)
“
Funding did become available for a much more modest proposal: to send a carefully coded message in 1971 to aliens in outer space. A coded message containing 1,679 bits of information was transmitted via the giant Arecibo radio telescope in Puerto Rico toward the Globular Cluster M13, about 25,100 light-years away. It was the world’s first cosmic greeting card, containing relevant information about the human race. But no reply message was received. Perhaps the aliens were not impressed with us, or possibly the speed of light got in the way. Given the large distances involved, the earliest date for a reply message would be 52,174 years from now. Since then, some scientists have expressed misgivings about advertising our existence to aliens in space, at least until we know their intentions toward us. They disagree with the proponents of the METI Project (Messaging to Extra-Terrestrial Intelligence) who actively promote sending signals to alien civilizations in space. The reasoning behind the METI Project is that Earth already sends vast amounts of radio and TV signals into outer space, so a few more messages from the METI Project will not make much difference. But the critics of METI believe that we should not needlessly increase our chances of being discovered by potentially hostile aliens.
”
”
Michio Kaku (The Future of the Mind: The Scientific Quest to Understand, Enhance, and Empower the Mind)
“
making yourself understood to another person is essentially a problem of cryptology. You reduce the noise of the channel between you (instead of noise, Shannon called it “information entropy”) in a way that can be quantified. And the method for reducing the noise—for recovering messages that would otherwise be lost or garbled—is decryption. Viewed through Shannon’s theory, intimate communication is a cryptologic process. When you fall in love, you develop a compact encoding to share mental states more efficiently, cut noise, and bring your beloved closer. All lovers, in this light, are codebreakers. And with America going to war, the two young codebreakers at Riverbank were about to become lovers.
”
”
Jason Fagone (The Woman Who Smashed Codes)
“
Had the Arabs merely been familiar with the use of the mono-alphabetic substitution cipher, they would not warrant a significant mention in any history of cryptography. However, in addition to employing ciphers, the Arab scholars were also capable of destroying ciphers. They in fact invented cryptanalysis, the science of unscrambling a message without knowledge of the key. While the cryptographer develops new methods of secret writing, it is the cryptanalyst who struggles to find weaknesses in these methods in order to break into secret messages. Arabian cryptanalysts succeeded in finding a method for breaking the monoalphabetic substitution cipher, a cipher that had remained invulnerable for several centuries.
”
”
Simon Singh (The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography)
“
Within Room 40 itself, however, management of day-to-day operations fell largely, if informally, to Cdr. Herbert Hope, recruited in November 1914 to bring naval expertise to the interpretation of intercepted messages. His savvy was badly needed, for the group’s staff were not navy officers but civilians recruited for their skill at mathematics and German and whatever else it was that made a man good at breaking codes and ciphers. The roster came to include a pianist, a furniture expert, a parson from northern Ireland, a wealthy London financier, a past member of the Scottish Olympic hockey team, and a dapper operative named C. Somers Cocks, who, according to one early member, William F. Clarke, was “chiefly remarkable for his spats.
”
”
Erik Larson (Dead Wake: The Last Crossing of the Lusitania)
“
He approached the great glass barrier dividing the room, and the speaker at the end of the table. "Cyclops?" he whispered, stepping closer, clearing his tight throat, "Cyclops, it's me, Gordon."
The glow in the pearly lens was subdued. But the row of little lights still flashed--a complex pattern that repeated over and over like an urgent message from a distant ship in some lost code--ever, hypnotically, the same.
Gordon felt a frantic dread rise within him, as when, during his boyhood, he had encountered his grandfather lying perfectly still on the porch swing, and feared to find that the beloved old man had died.
The pattern of lights repeated, over and over.
Gordon wondered. How many people would recall, after the hell of the last seventeen years, that the parity displays of a great supercomputer never repeated themselves? Gordon remembered a cyberneticist friend telling him the patterns of light were like snowflakes, none ever the same as any other.
"Cyclops," he said evenly, "Answer me! I demand you answer--in the name of decency! In the name of the United St--"
He stopped. He couldn't bring himself to meet this lie with another. Here, the only living mind he would fool would be himself.
The room was warmer than it had seemed during his interview. He looked for, and found, the little vents through which cool air could be directed at a visitor seated in the guest chair, giving an impression of great cold just beyond the glass wall.
"Dry ice," he muttered, "to fool the citizens of Oz.
”
”
David Brin (The Postman)
“
Partly at Rubel’s urging, Secretary of Defense McNamara later compelled the Minuteman developers, against great resistance, to install the equivalent of an electronic lock on the Minuteman, such that it couldn’t be fired without the receipt of a coded message from higher headquarters. Decades later, long after McNamara’s retirement, Bruce Blair, a former Minuteman launch control officer, informed the former secretary that the Air Force had ensured that the codes in the launch control centers were all set continuously at 00000000. According to Blair, McNamara responded, “I am shocked, absolutely shocked and outraged. Who the hell authorized that?” “What he had just learned from me,” Blair continues, was that the locks had been installed,52 but everyone knew the combination. The Strategic Air Command (SAC) in Omaha quietly decided to set the “locks” to all zeros in order to circumvent this safeguard. During the early to mid-1970s, during my stint as a Minuteman launch officer, they still had not been changed. Our launch checklist in fact instructed us, the firing crew, to double-check the locking panel in our underground launch bunker to ensure that no digits other than zero had been inadvertently dialed into the panel. SAC remained far less concerned about unauthorized launches than about the potential of these safeguards to interfere with the implementation of wartime launch orders. And so the “secret unlock code” during the height of the nuclear crises of the Cold War remained constant at 00000000.
”
”
Daniel Ellsberg (The Doomsday Machine: Confessions of a Nuclear War Planner)
“
think that the message is very clear here: somewhere outside of and beyond our universe is an operating system, coded up over incalculable spans of time by some kind of hacker-demiurge. The cosmic operating system uses a command line interface. It runs on something like a teletype, with lots of noise and heat; punched-out bits flutter down into its hopper like drifting stars. The demiurge sits at his teletype, pounding out one command line after another, specifying the values of fundamental constants of physics: universe -G 6.672e-11 -e 1.602e-19 -h 6.626e-34 -protonmass 1.673e-27…. and when he’s finished typing out the command line, his right pinky hesitates above the enter key for an aeon or two, wondering what’s going to happen; then down it comes—and the whack you hear is another Big Bang.
”
”
Neal Stephenson (In the Beginning...Was the Command Line)
“
There is no communication possible between men any longer, now that the codes have been destroyed, including even the code of exchange in repetition. We are all condemned to silence - unless we create our own relation with the world and try to tie other people into the meaning we thus create. That is what composing is. Doing solely for the sake of doing, without trying artificially to recreate the old codes in order to reinsert communication into them. Inventing new codes, inventing the message at the same time as the language. Playing for one's own pleasure, which alone can create the conditions for new communication. A concept such as this seems natural in the context of music. But it reaches far beyond that; it relates to the emergence of the free act, self-transcendence, pleasure of being instead of having.
”
”
Jacques Attali (Noise: The Political Economy of Music)
“
The DNA is made up of two opposite spirals, positive and negative, which can easily be considered isomorphic to I Ching's yin () and yang (), or Leibniz's 0 and 1, or Joyce's and . These are bonded by four amino acids—adenine, guanine, cytosine and thymine, which are usually abbreviated A, G, C, T. If one dares to consider these isomorphic with active yang (), passive yang (), active yin () and passive yin (), or Leibniz's 01,11,10 and 00, or Joyce's and , then the parallel becomes staggering. In forming RNA messages—the genetic code—the T (thymine) drops out to be replaced by U (uracil) but we still have four elements—A, G, C, U—and if we permutate them by the now-familiar rule, making all possible combinations of three out of these basic four "letters," we get again 43 or 64 "words," which are the 64 elements of the genetic language.
”
”
Robert Anton Wilson (Coincidance: A Head Test)
“
TV is a problem only if you’ve forgotten how to look and listen…My students and I discuss this all the time. They’re beginning to feel they ought to turn against the medium, exactly as an earlier generation turned against their parents and their country. I tell them they have to learn to look as children again. Root out content. Find the codes and messages...
…
[They say] television is just another name for junk mail. But tell them I can't accept that. I tell them I’ve been sitting this room for more than two months, watching TV into the early hours, listening carefully, taking notes. A great and humbling experience, let me tell you. Close to the mystical.
…
I’ve come to understand that the medium is a primal force in the American home. Sealed-off, timeless, self-contained, self-referring. It’s like a myth being born right there in our living room, like something we know in a dream-like and preconscious way. I’m very enthused.
…
You have to learn how to look. You have to open yourself to the data. TV offers incredible amounts of psychic data. It opens ancient memories of world birth, it welcomes us into the grid, the network of little buzzing dots that make up the picture pattern. There is light, there is sound. I ask my students 'What more do you want?' Look at the wealth of data concealed in the grid, in the bright packaging, the jingles, the slice-of-life commercials, the products hurtling out of darkness, the coded messages and endless repetitions, like chants, like mantras. 'Coke is it, Coke is it, Coke is it.’ The medium practically overflows with sacred formulas if we can remember how to respond innocently and get past our irritation, weariness and disgust. (50-51)
”
”
Don DeLillo (White Noise)
“
In 1872, Western Union (by then the dominant telegraph company in the United States) decided to implement a new, secure scheme to enable sums of up to $100 to be transferred between several hundred towns by telegraph. The system worked by dividing the company's network into twenty districts, each of which had its own superintendent. A telegram from the sender's office to the district superintendent confirmed that the money had been deposited; the superintendent would then send another telegram to the recipient's office authorizing the payment. Both of these messages used a code based on numbered codebooks. Each telegraph office had one of these books, with pages containing hundreds of words. But the numbers next to these words varied from office to office; only the district superintendent had copies of each office's uniquely numbered book.
”
”
Tom Standage (The Victorian Internet: The Remarkable Story of the Telegraph and the Nineteenth Century's On-line Pioneers)
“
We must consider what we mean when we say that the spiking activity of a neuron 'encodes' information. We normally think of a code as something that conveys information from a sender to a recipient, and this requires that the recipient 'understands' the code. But the spiking activity of every neuron seems to encode information in a slightly different way, a way that depends on that neuron's intrinsic properties. So what sense can a recipient make of the combined input from many neurons that all use different codes? It seems that what matters must be the 'population code' - not the code that is used by single cells, but the average or aggregate signal from a population of neurons.
In a now classic paper, Shadlen and Newsome considered how information is communicated among neurons of the cortex - neurons that typically receive between 3,000 and 10,000 synaptic inputs.They argued that, although some neural structures in the brain may convey information in the timing of successive spikes, when many inputs converge on a neuron the information present in the precise timing of spikes is irretrievably lost, and only the information present in the average input rate can be used. They concluded that 'the search for information in temporal patterns, synchrony and specially labeled spikes is unlikely to succeed' and that 'the fundamental signaling units of cortext may be pools on the order of 100 neurons in size.' The phasic firing of vasopressin cells is an extreme demonstration of the implausibility of spike patterning as a way of encoding usable information, but the key message - that the only behaviorally relevant information is that which is collectively encoded by the aggregate activity of a population - may be generally true.
”
”
Gareth Leng (The Heart of the Brain: The Hypothalamus and Its Hormones)
“
authors of more recent books have also praised the bureau for destroying the Nazi networks in South America. But the FBI didn’t intercept the messages. It didn’t monitor the Nazi circuits. It didn’t break the codes. It didn’t solve any Enigma machines. The coast guard did this stuff—the little codebreaking team that Elizebeth created from nothing. During the Second World War, an American woman figured out how to sweep the globe of undercover Nazis. The proof was on paper: four thousand typed decryptions of clandestine Nazi messages that her team shared with the global intelligence community. She had conquered at least forty-eight different clandestine radio circuits and three Enigma machines to get these plaintexts. The pages found their way to the navy and to the army. To FBI headquarters in Washington and bureaus around the world. To Britain. There was no mistaking their origin. Each sheet said “CG Decryption” at the bottom, in black ink.
”
”
Jason Fagone (The Woman Who Smashed Codes)
“
Operative Six,” an artificial-sounding voice said, from the other end of the call. “This is Roberto Gratas, daily code seven nine three three.” “Code confirmed,” the voice said several seconds later. “Convey message.” “Request delivery of the second target package on my mark.” Gratas looked at me and smiled. “Here it comes, Charlie,” he said. “Request confirmed and denied,” the voice on the other end of the line said. “Excuse me?” Gratas looked confused. “Request confirmed and denied,” the voice repeated. “You’re denying my request.” “Confirm, we’re denying it.” “You can’t deny it.” “Your denial of our denial is confirmed and denied,” the voice said. “Who is this?” Gratas said. “Operative Six.” “Operative Six, confirm that you know who I am.” “You are Roberto Gratas.” “Confirm that you have cleared my daily code.” “Your daily code has been confirmed.” “Then you can’t deny my request!” “This syllogism is faulty and is denied,” the voice said.
”
”
John Scalzi (Starter Villain)
“
The only thing I can’t figure out is why you still eat the food your captors fed you. Why don’t you hate it as much as you hate them?” Fila glanced down at her plate. It contained a strange mixture of Afghan and Mexican dishes. She held up a flatbread. “This isn’t Taliban food—it’s Afghan food. It’s my mother’s food. I grew up eating it before I was ever captured. To me it means love and tenderness, not hate and violence.” “Taliban, Afghan—it’s all the same.” She waved the bread. “No, it’s not. Not one bit. Afghan culture is over two thousand years old. And it’s a conservative culture—it’s had to be—but it’s not a culture of monsters. Afghans are people like you, Holt. They’re born, they grow up, they live and love and they die just like we do. I didn’t study much history before I was taken, but I know this much. America’s story is that of the frontier—of always having room to grow. Afghanistan’s story is that of occupation. By the Russians, the British, the Mongols—even the ancient Greeks. On and on for century after century. Imagine all those wars being fought in Montana. Foreign armies living among us, taking over your ranch, stealing everything you own, killing your wife and children, over and over and over again.” She paused to catch her breath. “Death is right around the corner for them—all the time. Is it any wonder that a movement that turns men into warriors and codes everything else into rigid rules might seem like the answer?” She still wasn’t sure if Holt was following her. What analogy would make sense to him? She wracked her brain. “If a bunch of Californians overran Chance Creek and forced everyone to eat tofu, would you refuse to ever eat steak again?” He made a face. “Of course not!” “Then imagine the Taliban are the Californians, forcing everyone to eat tofu. And everyone does it because they don’t know what else to do. They still love steak, but they will be severely punished if they eat it—so will their families. That’s what it’s like for many Afghans living under Taliban control. It’s not their choice. They still love their country. They still love their heritage. That doesn’t mean they love the group of extremists who have taken over.” “Even if those Taliban people went away, they still wouldn’t be anything like you and me.” Holt crossed his arms. Fila suppressed a smile at his inclusion of her. That was a step in the right direction even if the greater message was lost on him. “They’re more like you than you think. Defensive. Angry. Always on the lookout for trouble.” Holt straightened. “I have four sons. Of course I’m on the lookout for trouble.” “They have sons, too.” She waited to see if he understood. Holt shook his head. “We’re going to see different on this one. But I understand about the food. Everyone likes their mother’s cooking best.” He surveyed her plate. “You got any more of that bread?” She’d take that as a victory.
”
”
Cora Seton (The Cowboy Rescues a Bride (The Cowboys of Chance Creek, #7))
“
When the pandemic shut down global travel and the world’s business economy, and when the secular media, including social media giants, rejoiced with Joe Biden being in the White House, a new phrase was being written and reported publicly, “The New Global Reset.” In the past, the same concepts presented in the Great Global Reset Manifesto were called “The New World Order” or “The Globalist Agenda.” However, among knowledgeable conservatives, these older phrases were code words indicating the eventual loss of numerous freedoms that America has enjoyed, leading the nation like sheep to the slaughterhouse, causing Americans to submit to global rules and pay global taxes, allowing self-appointed rich elitists to rule over them. There is a movement to limit religious freedom by banning certain content in minister’s messages, opposing any opinions that are opposite to the manifest of this new system. Progressives have learned that confiscating guns will lead to a revolt. Their plan is to control the sale and distribution of ammo. Without ammunition, a gun is useless.
”
”
Perry Stone (America's Apocalyptic Reset: Unmasking the Radical's Blueprints to Silence Christians, Patriots, and Conservatives)
“
It is not enough to live here and now. Not enough for me, anyway. I need those imaginative leaps out of my own time frame and into other places - places where things were done differently. Reading has provided me with that, for the most part, but it is objects, things like these scraps of pottery, that have most keenly conjured up all those elsewheres - inaccessible but eerily available to the imagination. The past is irretrievable, but it lurks. It sends out tantalizing messages, coded signals in the form of a clay pipe stem, a smashed wine bottle. Two leaping fish from twelfth-century Cairo. I can't begin to understand what that time was like, or how the men who made them lived, but I can know that it all happened - that old Cairo existed, and a particular potter. To have the leaping fish sherd on my mantelpiece - and all those other sherds in the cake tin - expands my concept of time. There is a further dimension to memory; it is not just a private asset, but something vast, collective, resonant. And all because fragments of detritus survive, and I can consider them.
”
”
Penelope Lively (Dancing Fish and Ammonites: A Memoir)
“
It was the magnesium. The addition of the ion was critical: with the solution supplemented with magnesium, the ribosome remained glued together, and Brenner and Jacob finally purified a miniscule amount of the messenger molecule out of bacterial cells. It was RNA, as expected-but RNA of a special kind. The messenger was generated afreah when a gene was translated. Like DNA, these RNA molecules were built by stringing together four bases-A,G,C, and U (in the RNA copy of a gene, remember, the T found in DNA is substituted for U). Notably, Brenner and Jacob later discovered the messenger RNA was a facsimile of the DNA chain-a copy made from the original. The RNA copy of a gene then moved from the nucleus to the cytosol, where its message was decoded to build a protein. The messenger RNA was neither an inhabitant of heaven nor of hell-but a professional go-between. The generation of an RNA copy of a gene was termed transcription-referring to the rewriting of a word or sentence in a language close to the original. A gene's code (ATGGGCC...) was transcribed into an RNA code (AUGGGCC...).
”
”
Siddhartha Mukherjee (The Gene: An Intimate History)
“
He lifted an eyebrow at his self-indulgence, made a note to himself to spend a little extra time in the Disciplines that evening, and moved to the terminal. Its chiming stopped as he touched it: another second and the terminal had read his EEG through his skin, recognizing the pattern. The screen filled with column on column of blue symbology, a list of calls to the flat since he left. Most of them were unimportant compared to the one name and commcode at the far right-hand side of the list, the most recent, the one message that had caused the “urgent” chime. He had rather been hoping that the embassy would not need him further today: but hope was illogical. Life was about dealing with what was. He touched the screen, and the computer dialed the code. He waited a moment or so before speaking. The link was scrambled, and before communications began, the computer had to agree with the one on the other end as to the eighty-digit “satchel” crypton they would use to keep the link secure. He had the utmost confidence in the ciphering process. Ninety-six standard years before, he had invented it. He
”
”
Diane Duane (Spock's World (Star Trek: The Original Series))
“
To great effect, Reagan echoed white frustration in race-neutral terms through implicit racial appeals. His 'color-blind' rhetoric on crime, welfare, taxes, and states' rights was clearly understood by white (and black) voters as having a racial dimension, though claims to that effect were impossible to prove. The absence of explicitly racist rhetoric afforded the racial nature of his coded appeals a certain plausible deniability. For example, when Reagan kicked off his presidential campaign at the annual Neshoba County Fair near Philadelphia, Mississippi - the town where three civil rights activists were murdered in 1964 - he assured the crowd 'I believe in states' rights,' and promised to restore to states and local governments the power that properly belonged to them. His critics promptly alleged that he was signaling a racial message to his audience, suggesting allegiance with those who resisted desegregation, but Reagan firmly denied it, forcing liberals into a position that would soon become familiar - arguing that something is racist but finding it impossible to prove in the absence of explicitly racist language.
”
”
Michelle Alexander (The New Jim Crow: Mass Incarceration in the Age of Colorblindness)
“
The thing about Web companies is there's always something severely fucked-up. There is always an outage, always lost data, always compromised customer information, always a server going offline. You work with these clugey internal tools and patch together work-arounds to compensate for the half-assed, rushed development, and after a while the fucked-upness of the whole enterprise becomes the status quo. VPs insecure that they're not as in touch as they need to be with conditions on the ground insert themselves into projects midstream and you get serious scope creep. You present to the world this image that you're a buttoned-down tech company with everything in its right place but once you're on the other side of the firewall it looks like triage time in an emergency room, 24/7. Systems break down, laptops go into the blue screen of death, developers miskey a line of code, error messages appear that mean absolutely nothing. The instantaneousness with which you can fix stuff creates a culture that works by the seat of its pants. I swear the whole Web was built by virtue of developers fixing one mistake after another, constantly forced to compensate for the bugginess of their code.
”
”
Ryan Boudinot (Blueprints of the Afterlife)
“
Cash was running low, so I'd applied for a job as an administrative assistant for a nonprofit arts group. Without question, my organizational skills were as sharp as my vision, and I had no office experience to speak of. Luckily for me, none of this surfaced during the interview.
'Ryan, pretend it's a rough morning for a sec. Handle this situation for me. When you arrive at work to open the arts resource centre, several people are already at the door. Two clients want immediate help with grant applications - you know those artists, they just can't wait! - and a third wants to use our library, which isn't open till noon. Entering the office, you hear the phone is ringing and see the message light is blinking. The fax machine looks jammed again, and we're expecting an important document. Among the people waiting is a courier with a package you need to sign for. Think about it, though. The lights haven't been turned on yet, and the sign put out front. The alarm needs the code within a minute, too. So, wow, rough morning. I'd like to know what you'd do first.'
'First I'd tell everybody how weird this is. I'm in the same test situation from my job interview. What are the chances?'
I started the next day.
”
”
Ryan Knighton (Cockeyed: A Memoir)
“
As information processing machines, our ability to process data about the external world begins at the level of sensory perception. Although most of us are rarely aware of it, our sensory receptors are designed to detect information at the energy level. Because everything around us - the air we breathe, even the materials we use to build with, are composed of spinning and vibrating atomic particles, you and I are literally swimming in a turbulent sea of electromagnetic fields. We are part of it. We are enveloped within in, and through our sensory apparatus we experience what is.
Each of our sensory systems is made up of a complex cascade of neurons that process the incoming neural code from the level of the receptor to specific areas within the brain. Each group of neurons along the cascade alters or enhances the code, and passes it on to the next set of cells in the system, which further defines and refines the message. By the time the code reaches the outermost portion of our brain, the higher levels of the cerebral cortex, we become conscious of the stimulation. However, if any of the cells along the pathway fail in their ability to function normally, then the final perception is skewed away from normal reality.
”
”
Jill Bolte Taylor (My Stroke of Insight: A Brain Scientist's Personal Journey)
“
There was something of an unwritten code about working in the office of Rudy Giuliani, as I suppose there is in most organizations. In his case, the message was that Rudy was the star at the top and the successes of the office flowed in his direction. You violated this code at your peril. Giuliani had extraordinary confidence, and as a young prosecutor I found his brash style exciting, which was part of what drew me to his office. I loved it that my boss was on magazine covers standing on the courthouse steps with his hands on his hips, as if he ruled the world. It fired me up. Prosecutors almost never saw the great man in person, so I was especially pumped when he stopped by my office early in my career, shortly after I had been assigned to an investigation that touched a prominent New York figure who dressed in shiny tracksuits and sported a Nobel-sized medallion around his neck. The state of New York was investigating Al Sharpton for alleged embezzlement from his charity, and I was assigned to see if there was a federal angle to the case. I had never even seen Rudy on my floor, and now he was at my very door. He wanted me to know he was personally following the investigation and knew I would do a good job. My heart thumped with anxiety and excitement as he gave me this pep talk standing in the doorway. He was counting on me. He turned to leave, then stopped. “Oh, and I want the fucking medal,” he said, then walked away. But we never made a federal case. The state authorities charged Sharpton, and he was acquitted after a trial. The medal stayed with its owner.
”
”
James B. Comey (A Higher Loyalty: Truth, Lies, and Leadership)
“
The motor activities we take for granted—getting out of a chair and walking across a room, picking up a cup and drinking coffee,and so on—require integration of all the muscles and sensory organs working smoothly together to produce coordinated movements that we don't even have to think about. No one has ever explained how the simple code of impulses can do all that. Even more troublesome are the higher processes, such as sight—in which somehow we interpret a constantly changing scene made of innumerable bits of visual data—or the speech patterns, symbol recognition, and grammar of our languages.Heading the list of riddles is the "mind-brain problem" of consciousness, with its recognition, "I am real; I think; I am something special." Then there are abstract thought, memory, personality,creativity, and dreams. The story goes that Otto Loewi had wrestled with the problem of the synapse for a long time without result, when one night he had a dream in which the entire frog-heart experiment was revealed to him. When he awoke, he knew he'd had the dream, but he'd forgotten the details. The next night he had the same dream. This time he remembered the procedure, went to his lab in the morning, did the experiment, and solved the problem. The inspiration that seemed to banish neural electricity forever can't be explained by the theory it supported! How do you convert simple digital messages into these complex
phenomena? Latter-day mechanists have simply postulated brain circuitry so intricate that we will probably never figure it out, but some scientists have said there must be other factors.
”
”
Robert O. Becker (The Body Electric: Electromagnetism and the Foundation of Life)
“
All use of speech implies convention and therefore at least duality of minds. The problem of communication through language may in this light be seen as the search for the means supplied by the conventions (or code) to transmit a message from one mind to another. (This definition is as applicable to "literary" communication as it is to "non-literary.") ...Is the code exactly the same for transmitter and receiver? Indeed, can it ever be? It hardly seems likely, since in the strict sense no two people have ever acquired exactly the same code. Consequently, the correspondence between the writer's understand of his writing (I do not, of course, mean merely a conscious or reflective understanding) and the reader's understanding of it will be at least approximate. Another variable is the mental, emotional, and cultural constitution of the being who used the code to transmit a message, and of the being who decodes it. To what extent are they capable of understanding each other? To what extent will they be willing to cooperate in dealing with the inevitable problems in communication? To what extent will anticipated or actual reaction ("feedback") from the receiver affect the framing of the message? Perhaps more important than any of these variables, there is the as yet unresolved question of the very nature of language, and therefore of communication through language. What do agreed upon symbols stand for? Is it conceivable that they correspond to something objectively identifiable? Perhaps not. But even so, is it conceivable that a given message can recreate in another mind whatever it is supposed in the first place to represent in the mind of the sender? All of these questions are in the last analysis as relevant to literary studies as they are linguistics
”
”
Robert Ellrich
“
Starting a little over a decade ago, Target began building a vast data warehouse that assigned every shopper an identification code—known internally as the “Guest ID number”—that kept tabs on how each person shopped. When a customer used a Target-issued credit card, handed over a frequent-buyer tag at the register, redeemed a coupon that was mailed to their house, filled out a survey, mailed in a refund, phoned the customer help line, opened an email from Target, visited Target.com, or purchased anything online, the company’s computers took note. A record of each purchase was linked to that shopper’s Guest ID number along with information on everything else they’d ever bought.
Also linked to that Guest ID number was demographic information that Target collected or purchased from other firms, including the shopper’s age, whether they were married and had kids, which part of town they lived in, how long it took them to drive to the store, an estimate of how much money they earned, if they’d moved recently, which websites they visited, the credit cards they carried in their wallet, and their home and mobile phone numbers. Target can purchase data that indicates a shopper’s ethnicity, their job history, what magazines they read, if they have ever declared bankruptcy, the year they bought (or lost) their house, where they went to college or graduate school, and whether they prefer certain brands of coffee, toilet paper, cereal, or applesauce.
There are data peddlers such as InfiniGraph that “listen” to shoppers’ online conversations on message boards and Internet forums, and track which products people mention favorably. A firm named Rapleaf sells information on shoppers’ political leanings, reading habits, charitable giving, the number of cars they own, and whether they prefer religious news or deals on cigarettes. Other companies analyze photos that consumers post online, cataloging if they are obese or skinny, short or tall, hairy or bald, and what kinds of products they might want to buy as a result.
”
”
Charles Duhigg (The Power of Habit: Why We Do What We Do in Life and Business)
“
That, for a while, seemed like life. And if I was really being honest with myself, I wasn’t into it. The only option was to sit in the pews every Sunday at church and casually wonder if I was going to go to hell because of who I was? No, thank you. Or to understand that the structures on which the country was built were engineered against me? Hard pass. What choice did I have besides constantly code-switching between identities as a means of hiding in plain sight? And wasn’t it just normal to feel like such a mistake as an adult that every time I walked over a bridge or stood on a subway platform, I had to talk myself out of stepping over the edge? I came to believe I was a monster and that I deserved to feel the way I felt. And I didn’t want to turn the page. But through it all there was a constant tethering me to the idea of a future: the library. The library is the place where I could borrow first Grover’s philosophical tome, then a couple of Choose Your Own Adventures I could cheat at, and later a stack of mysteries I could spoil for myself, all attempts to look for some other way of understanding who I was. In the book stacks, I found The Bluest Eye and The Color Purple and Giovanni’s Room and David Rakoff’s Fraud and more. I saw a new vision of Otherness in those books, and the pages kept turning. At the end of every one was a wall waiting to be broken down—a lurch toward becoming—a new paragraph in a story with an ending far different from what I’d ever dared imagine. Every story, whether truth or fiction, is an invitation to imagination, but even more so, it’s an invitation to empathy. The storyteller says, “I am here. Does it matter?” The words that I found in these books were a person calling out from a page, “I am worthy of being heard and you are worthy of hearing my story.” It seems simple but it’s a bold declaration. How many times in life do we receive the message, implicit or explicit, that what we’ve experienced or what we feel isn’t noteworthy or remarkable? The books that I found in the library, ones that I deeply understood and ones that seemed so outside of my experience they might as well have been written in Klingon, all carried the same hopes: to be seen, to be heard, to exist.
”
”
R. Eric Thomas (Here for It; Or, How to Save Your Soul in America: Essays)
“
If I talk about the Loud family now, will all of you know who I mean? I mean a family of prosperous human beings in California, whose last name is Loud. I suggest to you that the Louds were healthy Earthlings who had everything but a religion in which they could believe. There was nothing to tell them what they should want, what they should shun, what they should do next. Socrates told us that the unexamined life wasn’t worth living. The Louds demonstrated that the morally unstructured life is a clunker, too.
Christianity could not nourish the Louds. Neither could Buddhism or the profit motive of participation in the arts, or any other nostrum on America’s spiritual smorgasbord. So the Louds were dying before our eyes.
Now is as good a time as any to mention White House Prayer Breakfasts, I guess. I think we all know now that religion of that sort is about as nourishing to the human spirit as potassium cyanide. We have been experimenting with it. Every guinea pig died. We are up to our necks in dead guinea pigs.
The lethal ingredient in those breakfasts wasn’t prayer. And it wasn’t the eggs or the orange juice or the hominy grits. It was a virulent new strain of hypocrisy which did everyone in.
If I have offended anyone here by talking of the need of a new religion, I apologize. I am willing to drop the word religion, and substitute three other words for it. Three other words are heartfelt moral code. We sure need such a thing, and it should be simple enough and reasonable enough for anyone to understand. The trouble with so many of the moral codes we have inherited is that they are subject to so many interpretations. We require specialists, historians and archaeologists and linguists and so on, to tell us where this or that idea may have come from, to suggest what this or that statement might actually mean. This is good news for hypocrites, who enjoy feeling pious, no matter what they do.
It may be that moral simplicity is not possible in modern times. It may be that simplicity and clarity can come only from a new Messiah, who may never come. We can talk about portents, if you like. I like a good portent as much as anyone. What might be the meaning of the Comet Kahoutek, which was to make us look upward, to impress us with the paltriness of our troubles, to cleanse our souls with cosmic awe. Kahoutek was a fizzle, and what might this fizzle mean?
I take it to mean that we can expect no spectacular miracles from the heavens, that the problems of ordinary human beings will have to be solved by ordinary human beings. The message of Kahoutek is: “Help is not on the way. Repeat: help is not on the way.
”
”
Kurt Vonnegut Jr. (Palm Sunday: An Autobiographical Collage)
“
How Google Works (Schmidt, Eric) - Your Highlight on Location 3124-3150 | Added on Sunday, April 5, 2015 10:35:40 AM In late 1999, John Doerr gave a presentation at Google that changed the company, because it created a simple tool that let the founders institutionalize their “think big” ethos. John sat on our board, and his firm, Kleiner Perkins, had recently invested in the company. The topic was a form of management by objectives called OKRs (to which we referred in the previous chapter), which John had learned from former Intel CEO Andy Grove.173 There are several characteristics that set OKRs apart from their typical underpromise-and-overdeliver corporate-objective brethren. First, a good OKR marries the big-picture objective with a highly measurable key result. It’s easy to set some amorphous strategic goal (make usability better … improve team morale … get in better shape) as an objective and then, at quarter end, declare victory. But when the strategic goal is measured against a concrete goal (increase usage of features by X percent … raise employee satisfaction scores by Y percent … run a half marathon in under two hours), then things get interesting. For example, one of our platform team’s recent OKRs was to have “new WW systems serving significant traffic for XX large services with latency < YY microseconds @ ZZ% on Jupiter.”174 (Jupiter is a code name, not the location of Google’s newest data center.) There is no ambiguity with this OKR; it is very easy to measure whether or not it is accomplished. Other OKRs will call for rolling out a product across a specific number of countries, or set objectives for usage (e.g., one of the Google+ team’s recent OKRs was about the daily number of messages users would post in hangouts) or performance (e.g., median watch latency on YouTube videos). Second—and here is where thinking big comes in—a good OKR should be a stretch to achieve, and hitting 100 percent on all OKRs should be practically unattainable. If your OKRs are all green, you aren’t setting them high enough. The best OKRs are aggressive, but realistic. Under this strange arithmetic, a score of 70 percent on a well-constructed OKR is often better than 100 percent on a lesser one. Third, most everyone does them. Remember, you need everyone thinking in your venture, regardless of their position. Fourth, they are scored, but this scoring isn’t used for anything and isn’t even tracked. This lets people judge their performance honestly. Fifth, OKRs are not comprehensive; they are reserved for areas that need special focus and objectives that won’t be reached without some extra oomph. Business-as-usual stuff doesn’t need OKRs. As your venture grows, the most important OKRs shift from individuals to teams. In a small company, an individual can achieve incredible things on her own, but as the company grows it becomes harder to accomplish stretch goals without teammates. This doesn’t mean that individuals should stop doing OKRs, but rather that team OKRs become the more important means to maintain focus on the big tasks. And there’s one final benefit of an OKR-driven culture: It helps keep people from chasing competitors. Competitors are everywhere in the Internet Century, and chasing them (as we noted earlier) is the fastest path to mediocrity. If employees are focused on a well-conceived set of OKRs, then this isn’t a problem. They know where they need to go and don’t have time to worry about the competition. ==========
”
”
Anonymous
“
A problem was how nature punctuated the seemingly unbroken DNA and RNA strands. No one could see a biological equivalent for the pauses that separate letters in Morse code, or the spaces that separate words. Perhaps every fourth base was a comma. Or maybe (Crick suggested) commas would be unnecessary if some triplets made “sense” and others made “nonsense.” Then again, maybe a sort of tape reader just needed to start at a certain point and count off the nucleotides three by three. Among the mathematicians drawn to this problem were a group at the new Jet Propulsion Laboratory in Pasadena, California, meant to be working on aerospace research. To them it looked like a classic problem in Shannon coding theory: “the sequence of nucleotides as an infinite message, written without punctuation, from which any finite portion must be decodable into a sequence of amino acids by suitable insertion of commas.” They constructed a dictionary of codes. They considered the problem of misprints
”
”
James Gleick (The Information: A History, a Theory, a Flood)
“
Maybe spies liked to be old-school too. Maybe some still practiced timeworn methods like the ones George Washington had used. Apparently, Washington developed a lot of spy craft techniques to help him fool the British. Secret code names, dead drops, invisible ink, cyphers, coded messages—all kind of things.
”
”
Steven K. Smith (Spies at Mount Vernon (The Virginia Mysteries #7))
“
Finn: I would compromise u so hard, Arias, u wouldn’t be able to compromise w/ anyone else for weeks
Liv: Weird. I found that oddly hot.
Finn: Oddly Hot is my FBI code name
There wasn’t a response for a few seconds, and he wondered if he’d taken it too far. But just when he was about to type something else to shift the conversation, her message appeared.
Liv: Sorry, just spit water on my screen & my coworkers are looking at me like I’ve lost my mind. I shouldn’t text w/ u at work. UR going to get me in trouble.
”
”
Roni Loren (The Ones Who Got Away (The Ones Who Got Away, #1))
“
In 1864, he came up with the idea that reduced errors in telegraphed messages. Called a Morse Repeater, the invention slowed down the message at the receiving end by punching the dots and dashes of Morse code into a slower running strip of paper, resulting in fewer operator errors. This work carried Edison into maturity and established his reputation for inventiveness
”
”
Captivating History (Thomas Edison: A Captivating Guide to the Life of a Genius Inventor (Biographies))
“
She loved Em and she thought that should be enough. It wasn't. Love is never enough. Madness is enough. It is complete, sufficient unto itself. You can only stand outside it, as a woman might stand outside a prison in which her lover is locked up. From time to time, a well-loved face will peer out and love floods back. A scrap of cloth flutters and it becomes a sign and a code and a message and all that you want it to be. Then it vanishes and you are outside the dark tower again. At times, when I was young, I wanted to be inside the tower so I could understand what it was like. But I knew, even then, that I did not want to be a permanent resident of the tower. I wanted to visit and even visiting meant nothing because you could always leave. You're a tourist; she's a resident.
”
”
Jerry Pinto (Em and The Big Hoom)
“
The commander cleared the briefing orders, comm codes, and other data that had been on display throughout the briefing. Then he looked across the room full of Legion officers, knowing many would die in the next few hours. He nodded slightly. Barely. Making sure he fixed the faces of the dead in his mind. If only so that the someone who would order them to their death did so not lightly.
”
”
Jason Anspach (Message for the Dead (Galaxy's Edge, #9))
“
A proof should be an epiphany from the gods, not a coded message from the Pentagon.
”
”
Paul Lockhart, A Mathematicians Lament
“
The genealogy through Boaz, Ruth, Obed, and Jesse, to David is encrypted in the Hebrew text of Genesis 38, each in forty-nine-letter intervals and in chronological order. The probability of this being a chance occurrence of statistics has been estimated at less than 70,000,000 to one. Cf. Cosmic Codes—Hidden Messages from the Edge of Eternity or the Commentary on Genesis (Coeur d’Alene, ID: Koinonia House, 1999), each by this author. 13. Ruth 4:17–22. Note: Ruth 4:12 points to the encryption. 14. Gen.
”
”
Chuck Missler (Prophecy 20/20: Bringing the Future into Focus Through the Lens of Scripture)
“
Höglund acted as a courier for his contacts,” Håkan emphasized. “He translated coded messages in the form of numbers. The codes disappeared in a few days (invisible ink?). He went to different places, like airports, to deliver envelopes with information for his contacts. Many of his activities sound like ordinary espionage. I believe the UFO story was a cover for probably Soviet espionage. His order to start a peace movement also indicates this.” What of the car given to Höglund in Sweden? In checking
”
”
Timothy Good (Earth: An Alien Enterprise)
“
The feeling of gratitude coupled with the mental concept of appreciation is expressed like an invisible message in all directions and at all times. In this particular context, gratitude to the Universal Entity is the overarching motive behind all forms of expression that the human instrument aspires to.
Every breath, every word, every touch, every thought, every thing is centered on expressing this sense of gratitude. A gratitude that the individual is sovereign and supported by a Universal Entity that expresses itself through all forms and manifestations of intelligence with the sole objective of creating the ideal reality to activate the individual's Source Codes and transform the human instrument and entity in to the Sovereign Integral. It is this specific form of gratitude that accelerates the activation of the Source Codes and their peculiar ability to integrate the disparate componentry of the human instrument and the entity, and transform them to the state of perception and expression of the Sovereign Integral.
”
”
WingMakers
“
We can see now that information is what our world runs on: the blood and the fuel, the vital principle. It pervades the sciences from top to bottom, transforming every branch of knowledge. Information theory began as a bridge from mathematics to electrical engineering and from there to computing. What English speakers call “computer science” Europeans have known as informatique, informatica, and Informatik. Now even biology has become an information science, a subject of messages, instructions, and code. Genes encapsulate information and enable procedures for reading it in and writing it out. Life spreads by networking. The body itself is an information processor. Memory resides not just in brains but in every cell. No wonder genetics bloomed along with information theory. DNA is the quintessential information molecule, the most advanced message processor at the cellular level—an alphabet and a code, 6 billion bits to form a human being. “What lies at the heart of every living thing is not a fire, not warm breath, not a ‘spark of life,’ ” declares the evolutionary theorist Richard Dawkins. “It is information, words, instructions.… If you want to understand life, don’t think about vibrant, throbbing gels and oozes, think about information technology.” The cells of an organism are nodes in a richly interwoven communications network, transmitting and receiving, coding and decoding. Evolution itself embodies an ongoing exchange of information between organism and environment.
”
”
James Gleick (The Information: A History, a Theory, a Flood)
“
And the boiler, the heart of this beast, wouldn’t so much beat as flutter in a trip-hop rhythm, its occasional bursts of enthusiasm producing explosions of heat in unlikely places; its irregular palpitations a result of pockets of air straining for escape. From doors away you can hear its knocking, this antiquated heating system, and it sounds like a monkey-wrench tapping on an iron railing; like a coded message transmitted from one locked cell to another.
”
”
Mick Herron (Spook Street (Slough House, #4))
“
Potentially the weakest link in the long chain that led to Pearl Harbor was actually one of the strongest. This was the busy eyes of Ensign Yoshikawa, the ostensibly petty bureaucrat in the Honolulu consulate of Consul General Nagao Kita. Presenting himself as a Filipino, he washed dishes at the Pearl Harbor Officers Club listening for scuttlebutt. He played tourist on a glass bottom boat in Kaneohe Bay near the air station where most of the Navy’s PBYs were moored. He flew over the islands as a traveler. As a straight-out spy, he swam along the shore of the harbor itself ducking out of sight from time to time breathing through a reed. He was Yamamoto’s ears and eyes. The Achilles heel to the whole operation was J-19, the consular code he used to send his information back to Tokyo. And Tokyo used to give him his instructions. Rochefort, the code breaker in Hypo at Pearl Harbor, besides being fluent in Japanese could decipher eighty percent of J-19 messages in about twelve hours. The most tell-tale of all was message 83 sent to Honolulu September 24, 1941. It instructed Yoshikawa to divide Pearl Harbor into a grid so vessels moored in each square could be pinpointed. This so-called “bomb plot” message was relayed to Washington by Clipper in undeciphered form. The Pan American plane had been delayed by bad weather so 83 wasn’t decoded and translated until October 9 or 10. Washington had five times as many intercepts piling up for decoding from Manila than Honolulu because Manila was intercepting higher priority Purple. When he saw the decrypt of 83, Colonel Rufus Bratton, head of the Far Eastern Section of Army G-2 or intelligence, was brought up short. Never before had the Japanese asked for the location of ships in harbor. Bratton sent the message on to Brigadier General Leonard T. Gerow, chief of the Army’s War Plans Division with General Marshall and Secretary Stimson marked in.
”
”
Associated Press (Pearl Harbor)
“
On December 2 this sort of bull session ended abruptly. The day before, the imperial council had decided on war, and now Admiral Yamamoto radioed the task force: “Climb Mount Niitaka.” It was code for “Proceed with the attack.” Another message later that day confirmed the date: “X-Day will be 8 December” — which was, of course, Sunday, December 7, in Hawaii.
”
”
Walter Lord (Day of Infamy)
“
This is a tale of microfilm canisters and secret police, of Communists and capitalists, of battles lost and wars won. It is the tale of a utopian dream that turned into a dystopian nightmare. It is the tale of Dmitri Shostakovich and of his beloved city, Leningrad. But at its heart, it is a story about the power of music and its meanings — a story of secret messages and doublespeak, and of how music itself is a code; how music coaxes people to endure unthinkable tragedy; how it allows us to whisper between the prison bars when we cannot speak aloud; how it can still comfort the suffering, saying, “Whatever has befallen you — you are not alone.
”
”
M.T. Anderson
“
This is a tale of microfilm canisters and secret police, of Communists and capitalists, of battles lost and wars won. It is the tale of a utopian dream that turned into a dystopian nightmare. It is the tale of Dmitri Shostakovich and of his beloved city, Leningrad. But at its heart, it is a story about the power of music and its meanings — a story of secret messages and doublespeak, and of how music itself is a code; how music coaxes people to endure unthinkable tragedy; how it allows us to whisper between the prison bars when we cannot speak aloud; how it can still comfort the suffering, saying, 'Whatever has befallen you — you are not alone.
”
”
M.T. Anderson (Symphony for the City of the Dead: Dmitri Shostakovich and the Siege of Leningrad)
“
This is a tale of microfilm canisters and secret police, of Communists and capitalists, of battles lost and wars won. It is the tale of a utopian dream that turned into a dystopian nightmare. It is the tale of Dmitri Shostakovich and of his beloved city, Leningrad. But at its heart, it is a story about the power of music and its meanings — a story of secret messages and doublespeak, and of how music itself is a code; how music coaxes people to endure unthinkable tragedy; how it allows us to whisper between the prison bars when we cannot speak aloud; how it can still comfort the suffering, saying, "Whatever has befallen you — you are not alone.
”
”
M.T. Anderson (Symphony for the City of the Dead: Dmitri Shostakovich and the Siege of Leningrad)
“
After gathering the behavioral data and activities of 700,000 supporters of Stop the Steal, Facebook mapped out the connections among them and began dividing them into ringleaders (those who created content and strategy), amplifiers (prominent accounts that spread those messages), bridgers (activists with a foot in multiple communities, such as anti-vax and QAnon), and finally “susceptible users” (those whose social circles seemed to be “gateways” to radicalism).
”
”
Jeff Horwitz (Broken Code: Inside Facebook and the Fight to Expose Its Harmful Secrets)
“
Her heart beat loud enough that she thought it was the full moon thumping down at her, giving her a Morse code message to run.
”
”
Paul Tremblay (The Beast You Are: Stories)
“
The Magic machines had intercepted an unusual message sent via the Purple codes, and it immediately crossed the desks of everyone in Washington authorized to receive it. It was an oddly detailed set of instructions from the Japanese foreign ministry to its consulate in Honolulu. The instructions called for the entire area in and around Pearl Harbor to be laid out in a series of grid lines, as though a checkerboard was to be superimposed over a map. The instructions also called for the consulate to designate the types and classes of the warships anchored in the harbor.
”
”
Jeff Shaara (To Wake the Giant: A Novel of Pearl Harbor)
“
Cormac leaned against his cue and studied the empty bar before saying, “Sofie was in contact with our most vital spy in the rebellion—Agent Daybright.” Unease wended through Ruhn. He really, really didn’t want to know this. Cormac went on, “Daybright has direct access to the Asteri—Ophion has long wondered whether Daybright is one of the Asteri themselves. Daybright and Sofie used codes on crystal-fueled radios to pass along messages. But with Sofie’s … disappearance, it’s become too dangerous to keep using the old methods of communicating. The fact that the Hind was able to be on the scene so quickly that night indicates that someone might have intercepted those messages and broken our codes. We need someone who can mind-speak to be in direct contact with Agent Daybright.
”
”
Sarah J. Maas (House of Sky and Breath (Crescent City, #2))
“
There are two myths about Hollywood censorship, both the result of wishful thinking. The first is that the censors were predominantly concerned with the way things were expressed; therefore, all one had to do to circumvent censorship was to come up with subtle ways of saying the same things one might expressed overtly. Some have even suggested that censorship made filmmakers sharper. The second myth is that the censors were stupid, that their witlessness made it easy for shrewd filmmakers to slip things by them. Neither could be farther from the truth. Though the Production Code administrators brooked no lewdness or nudity, their main goal was to censor ideas. The censors were absolutely fixated on the messages movies transmitted.
”
”
Mick LaSalle (Complicated Women: Sex and Power in Pre-Code Hollywood)
“
Our clothing becomes a part of our bodies, both reflecting and shaping our personalities and helping us fit into various social roles—or making it hard for us to do so. An obvious example of this is women’s clothing in the mid-1800s, which consisted of large full skirts, frills, and boned corsets. These outfits not only sent the message that women were decorative objects, valuable mainly for their beauty; they also made it impossible for women to move around easily or quickly and harder for them to perform many types of physical tasks, which in turn served as a visual “evidence” that women were less competent than men. Most women internalized the dress codes of the time and only felt comfortable in such clothing. This in turn led some to think of themselves as helpless and fundamentally decorative: their clothing determined their social roles and ultimately their sense of self.
”
”
Richard Thompson Ford (Dress Codes: How the Laws of Fashion Made History)
“
Plainly, she is not coming back. I can tell by the pattern of the cracks in the plaster. There’s a code there, a message. Like the secret message in the final bars of Shostakovich’s fifteenth and last symphony. Faint cryptic signals, like the clicking of a telegraph key, against the remote and sustained monotone of the violins—a song from outer space. What was he trying to tell us?
”
”
Edward Abbey (The Fool's Progress)
“
The Way of the Peaceful Warrior, The Celestine Prophecy, The Intuitive Way, Your Life Purpose, The Field, What the Bleep Do We Know!?, The Hidden Messages in Water, The Da Vinci Code, The Law of Attraction, and The Secret.
”
”
Penney Peirce (Frequency: The Power of Personal Vibration (Transformation Series))
“
Computers can use combinations of bits to represent anything; the number of bits depends on the number of messages that need to be distinguished. Imagine, for example, a computer that works with the letters of the alphabet. Five-bit input signals can represent thirty-two different possibilities (25 = 32). Functions within the computer that work on letters sometimes use such a code, although they more often use an encoding with seven or eight bits, to allow representation of capitals, punctuation marks, numerals, and so on. Most modern computers use the standard representation of alphabet letters called ASCII (an acronym for American Standard Code for Information Interchange). In ASCII, the sequence 1000001 represents the capital letter A, and 1000010 represents the capital B, and so on. The convention, of course, is arbitrary.
”
”
William Daniel Hillis (The Pattern on the Stone: The Simple Ideas that Make Computers Work)
“
understood now that humans spoke in code, hoping I would pick up on some underlying message so they wouldn’t have to say whatever it was out loud. It annoyed me to no end. Why can’t people just say what they mean?
”
”
Penny Reid (Live and Let Grow)
“
Waterhouse seeks happiness. He achieves it by breaking Nip code systems and playing the pipe organ. But since pipe organs are in short supply, his happiness level ends up being totally dependent on breaking codes. He cannot break codes (hence, cannot be happy) unless his mind is clear. Now suppose that mental clarity is designated by Cm, which is normalized, or calibrated, in such a way that it is always the case that where Cm = 0 indicates a totally clouded mind and Cm = 1 is Godlike clarity—an unattainable divine state of infinite intelligence. If the number of messages Waterhouse decrypts, in a given day, is designated by Ndecrypts, then it will be governed by Cm in roughly the following way: Clarity of mind (Cm) is affected by any number of factors, but by far the most important is horniness, which might be designated by σ, for obvious anatomical reasons that Waterhouse finds amusing at this stage of his emotional development. Horniness begins at zero at time t = t0 (immediately following ejaculation) and increases from there as a linear function of time: The only way to drop it back to zero is to arrange another ejaculation. There is a critical threshold σc such that when σ > σc it becomes impossible for Waterhouse to concentrate on anything, or, approximately, which amounts to saying that the moment σ rises above the threshold σc it becomes totally impossible for Waterhouse to break Nipponese cryptographic systems. This makes it impossible for him to achieve happiness (unless there is a pipe organ handy, which there isn’t). Typically, it takes two to three days for σ to climb above σc after an ejaculation: Critical, then, to the maintenance of Waterhouse’s sanity is the ability to ejaculate every two to three days. As long as he can arrange this, σ exhibits a classic sawtooth-wave pattern, optimally with the peaks at or near σc [see below] wherein the grey zones represent periods during which he is completely useless to the war effort. So much for the basic theory.
”
”
Neal Stephenson (Cryptonomicon)
“
When the rice was done, my mother searched a cabinet filled with her special-occasion dishes, the kind she used only when she had company, and pulled out a white porcelain plate with two giant cherries sketched in themiddle. The cherries overlapped in a way that made them look like one large heart and as my mother heaped the rice on top of them, they seemed like a coded message from a woman who was beyond taking ordinary moments with her husband for granted.
”
”
Edwidge Danticat (Brother, I'm Dying)
“
He began with a blanket code which every business man was summoned to sign—to pay minimum wages and observe the maximum hours of work, to abolish child labor, abjure price increases and put people to work. Every instrument of human exhortation opened fire on business to comply—the press, pulpit, radio, movies. Bands played, men paraded, trucks toured the streets blaring the message through megaphones. Johnson hatched out an amazing bird called the Blue Eagle. Every business concern that signed up got a Blue Eagle, which was the badge of compliance.
”
”
John T. Flynn (The Roosevelt Myth (LvMI))
“
Creating a website is akin to crafting a digital masterpiece, where each pixel and line of code serves a purpose. Begin by envisioning the essence of your website, its core message, and the audience it aims to captivate. Lay a sturdy foundation by selecting the right platform, be it a user-friendly website builder or delving into the intricacies of coding languages like HTML and CSS. Embrace simplicity in design, allowing for intuitive navigation and seamless user experience. Remember, content reigns supreme; curate it with precision, blending creativity and relevance to engage your visitors.
”
”
Jacob Mathison
“
The Last Ride of Grayson “Grady” Hale
In the heart of the wild west, under the vast expanse of the azure sky, rode Grayson “Grady” Hale, a cowboy known for his unyielding spirit and his trusty steed, Bess. Grady’s life was woven into the fabric of the frontier, a tapestry of cattle drives, campfire tales, and the pursuit of freedom that only the open range could offer.
Grady was born to the saddle, learning to ride before he could walk, and to rope not long after. His father, a seasoned rancher, had instilled in him the values of hard work and respect for the land. Grady’s mother, a woman of strength and grace, taught him the gentle touch needed to soothe a spooked calf or mend a broken wing.
As the years passed, Grady’s reputation grew. He wasn’t the fastest gun nor the richest rancher, but he had something more valuable—integrity. Folks from miles around would seek his help when rustlers threatened or when a neighbor needed a hand. Grady never turned his back on those in need, and his word was as solid as the mountains framing the horizon.
One fateful day, a telegram arrived, calling Grady to a distant town. A band of outlaws had taken over, and the people were desperate. Grady kissed his wife, Emma, goodbye, promising to return once peace was restored. With Bess beneath him, he rode out, the dust of the trail rising like a storm behind him.
The confrontation was inevitable. Grady, with a handful of brave souls, stood against the outlaws. Words were exchanged, and then gunfire. When the smoke cleared, the outlaws were either captured or fled, and the town was saved. But victory came at a cost—Grady had taken a bullet.
As he lay there, the townsfolk gathered, their faces etched with concern and gratitude. Grady knew his ride was coming to an end. With his last breath, he whispered a message to be given to Emma, a message of love and a promise kept.
Back at the ranch, Emma received the news with a stoic heart. She knew the risks of loving a cowboy, the same risks that made her love him all the more. She gazed out at the sunset, the colors painting the sky like the wildflowers of their meadow. And in that moment, she felt Grady’s presence, like the gentle brush of a breeze, telling her he was home at last.
Grady’s tale is one of courage, sacrifice, and the enduring legacy of a cowboy who lived by his own code. His story, like the trails he once rode, winds its way into the legend of the west, reminding us that some spirits are as untameable as the land they love.
”
”
James Hilton-Cowboy
“
MILF Token: What Is It and What Are the Prospects?
Why MILF symbols?
Whoever had actually the intense suggestion of producing a MILF token has actually located a cutting-edge means of touching into 2 distinctive yet similarly eye-catching streams. On the one hand, here's a fresh cryptocurrency including distinctively collectible characters, with evidence of possession saved in a blockchain. On the various other hand, when it concerns those characters, it likewise ventures a fixation among several songs in the very early 21st-century: fully grown, sexually knowledgeable ladies looking for daring times with their suitors. Any kind of speculator wanting to explore the idea behind these extravagant as well as attractive characters can conveniently acquaint themselves with a few of the very best sites concentrating on dating MILFs. These systems provide an algorithm-based solution, where brand-new consumers can surely join, as well as the details offered throughout this enrollment procedure - inspirations, kind of MILF they are brought in to, and so on. - can surely be as compared to the information they currently carry submit. This way, the liaison can surely be easily organized without the individual enquiring also needing to make up a candid message. The computer system software application will certainly give a shortlist of ideal dating prospects.
Comparable character-driven symbols
MILF symbols are top on from formerly prominent characters that have actually gripped the focus of crypto investors, such as CryptoPunks. These were a collection of 10,000 characters, each distinct, that exposed evidence of possession on the Ethereum blockchain. MILF symbols operate similarly. Due to the fact that no 2 characters are alike, each token can surely ended up being the authorities residential building of a solitary proprietor on this blockchain. Those 10,000 CryptoPunk symbols were quickly purchased, immediately providing the specific characters boosted worth. The presumption is that the MILF symbols will certainly go similarly, so any individual wanting to obtain their practical a certain MILF personality will certainly need to buy this through the market-place that's likewise installed in the Ethereum blockchain. Presently, the most affordable offered rate for MILF symbols is $0.00004078, standing for a 0.61% increase over the previous 24-hour.
Shade coding
Generally, these characters will certainly have actually a condition when they show up in the crypto markets. Where the CrytoPunks are worried, a blue history suggested that punk was except sale, neither exist energetic quotes. Punks that were offered offer for sale would certainly have actually a red history. Those with an energetic quote would certainly have actually a purple history.
MILFs have actually built such a solid track record for desirability, their incorporation as
”
”
icolistingonline
“
It always felt identical to the message in his father’s eyes: coded on the best days, blatant on the worst. I see what you are, and you are not enough.
”
”
Freya Marske (A Marvellous Light (The Last Binding, #1))
“
Chris was told he had been assigned to work in a communications vault that was the nerve center for this system of international espionage—a code room linking the TRW plant with CIA Headquarters and Rhyolite’s major ground stations in Australia. The continuing disclosures about the secret world fascinated Chris, and he was especially intrigued by what he saw as a bizarre contrast between the mechanical spies he had been told about and the location of the ground stations. The Rhyolite earth stations had been planted in a world that was about as close as man could find now to the Stone Age; they were situated near Alice Springs in the harsh Outback of Australia, an oasis in a desert where aborigines still lived much as Stone Age men did thousands of years ago. Under an Executive Agreement between the United States and Australia, Chris was told, all intelligence information collected by the satellites and relayed to the network of dish-shaped microwave antennas at Alice Springs was to be shared with the Australian intelligence service. However, Rogers told Chris, the United States, by design, was not living up to the agreement: certain information was not being passed to Australia. He explained that TRW was designing a new, larger satellite with a new array of sensors; the Australians, Rogers emphasized, were never to be told about it; anytime Chris sent messages that would reach Australia, he must delete any reference to the new satellite. Its name was Argus, or AR—for Advanced Rhyolite. Whoever in the CIA had selected the cryptonym must have enjoyed his choice, because it was appropriate. In Greek mythology, Argus was a giant with one hundred eyes … a vigilant guardian.
”
”
Robert Lindsey (The Falcon and the Snowman: A True Story of Friendship and Espionage)
“
language, especially the English language, was filled with redundancy and predictability. Indeed, he later calculated that English was about 75 to 80 percent redundant. This had ramifications for cryptography: The less redundancy you have in a message, the harder it is to crack its code.
”
”
Jon Gertner (The Idea Factory: Bell Labs and the Great Age of American Innovation)
“
But even the most powerful desires are just feelings-coated information. They are simply messages, suggestions that can be followed or ignored. We can choose our reaction. For example, should you find yourself going towards the fridge for a binge, the very moment you notice your body reacting with movement… stop moving. Stand completely still. Realize that your thoughts cannot make you move. Realize your body is totally unaffected. The urge to binge is powerless unless you act on it. You may feel waves or a compulsion to binge, but they cannot make you move. You have the power. You are not your thoughts, you are not your desires. You are the strong silent one underneath it all. The zen one.
”
”
Alison C. Kerr (The Binge Code: 7 Unconventional Keys to End Binge Eating and Lose Excess Weight)
“
The Palestine laboratory can only thrive if enough nations believe in its underlying premise. It’s unsurprising that repressive regimes want to mimic Israeli repression, using Israeli technology to oppress their own unwanted or restive populations, but the Jewish state craves Western approval to fully realize its diplomatic and military potential. Aside from the US, Germany is arguably the greatest prize of all. Israel helped Germany rehabilitate its shattered image after World War II, while Berlin grants legitimacy to a country that brutally occupies the Palestinians (a nonpeople in the eyes of successive German governments). Germany purchasing increasing amounts of Israeli defense equipment is just one way it can atone for its historical guilt. When Palestinian president Mahmoud Abbas visited Germany in August 2022 and spoke alongside Chancellor Olaf Scholz, he accused Israel of committing “fifty Holocausts” against his people. The German establishment expressed outrage over the comment but the hypocrisy was clear; the Palestinians are under endless occupation but it’s only they who have to apologize. Germany has taken its love affair with Israel to dangerous, even absurd heights. The Deutsche Welle media organization updated its code of conduct in 2022 and insisted that all employees, when speaking on behalf of the organization or even in a personal capacity, must “support the right of Israel to exist” or face punishment, likely dismissal.40 After the Israeli military shot dead Palestinian journalist Shireen Abu Akleh in the West Bank city of Jenin in May 2022, German police banned a peaceful public vigil in Berlin because of what German authorities called an “immediate risk” of violence and anti-Semitic messaging. When protestors ignored this request and took to the streets to both commemorate Abu Akleh and Nakba Day, police arrested 170 people for expressing solidarity with Palestine. A Palestinian in Germany, Majed Abusalama, tweeted that he had been assaulted by the police. “I just left the hospital an hour ago with an arm sling to hold my shoulder after the German racist police almost dislocated my shoulder with their violent actions to us wearing Palestine Kuffiyas,” he wrote. “This is the new wave of anti-Palestinian everything in Berlin. Insane, right?” This followed years of anti-Palestinian incitement by the German political elite, from the German Parliament designating the BDS movement as anti-Semitic in 2019 to pressuring German institutions to refuse any space for pro-Palestinian voices, Jewish or Palestinian.41 The Palestinian intellectual Tariq Baconi gave a powerful speech in Berlin in May 2022 at a conference titled “Hijacking Memory: The Holocaust and the New Right.” He noted that “states like Germany have once again accepted Palestinians as collateral. Their oppression and colonization is a fair price to pay to allow Germany to atone for its past crimes.
”
”
Antony Loewenstein (The Palestine Laboratory: How Israel Exports the Technology of Occupation Around the World)
“
Haleya Kote heard more than once the story of the heroic protester who dared to stand alone at the heart of the bazaar distributing pamphlets. When the DAS squad arrived to arrest him they found that the sheets of paper he was distributing were blank. No text was written on them, there were no drawings or coded symbols, nothing at all. Somehow this blankness angered the DAS team even more than slogans or cartoons would have. “What does this mean?” they demanded. “Why isn’t there any message written here?” “There’s no need,” the protester replied. “Everything is clear.
”
”
Salman Rushdie (Victory City)
“
Oh, yes. This was in the very early days of the post office. But you had the right to refuse any letter that was sent to you. And then, of course, you didn’t have to pay. So people came up with a code, so they wouldn’t have to pay twice. The positioning of the stamp on the envelope had a particular meaning. For example, if you put the stamp on one side, leaning to the right, it meant ‘illness.’ You see?” “Yes,” I said. “So there was no need to open the letter or pay the fee. The message was in the stamp. Right?” “Precisely. And people have assigned meaning to the position of stamps ever since. Even today, aristocrats affix stamps upside-down as a sign of protest or challenge. A way of saying ‘Death to the Republic.
”
”
Anne Berest (The Postcard)
“
The strength of a cryptographic system usually has less to do with its design than with the way people tend to use it. Humans are the weak link. Instead of changing keys or passwords at regular intervals, we use the same ones over and over, for weeks or months or years. We repeat the same words (such as "secret") at the start of multiple messages, or repeat entire messages multiple times, giving codebreakers a foothold. We choose key phrases that are easy to guess: words related to where we live or work, our occupation, or to whatever project we're working on at the moment. A couple of human mistakes can bring the safest cryptographic system in the world to its knees.
”
”
Jason Fagone (The Woman Who Smashed Codes: A True Story of Love, Spies, and the Unlikely Heroine who Outwitted America's Enemies)
“
It’s all about persevering and letting your passion drive you. When you have passion, you cannot fail. The world simply cannot reject anyone or anything that comes from a place of passion. Stay focused on what you love, keep going, and trust that those who are meant to get your message will.
”
”
Cara Alwill Leyba (Girl Code: Unlocking the Secrets to Success, Sanity, and Happiness for the Female Entrepreneur)
“
The room around him was rich in codes and messages, an archaeology of childhood, things Denise had carried with her since the age of three, from cartoon clocks to werewolf posters. She is the kind of child who feels a protective tenderness toward her own beginnings. It is part of her strategy in a world of displacements to make every effort to restore and preserve, keep things together for their value as remembering objects, a way of fastening herself to a life.
”
”
Don DeLillo (White Noise)
“
One of the impediments to an acceptance of the myth theory is the apparent incredibility of the proposition that faith in Paul's Jesus the Son (and by extension, the Gospel Jesus) could have arisen with no historical basis. But we have to realize how much the educated ancient Jew lived within his holy books, as did many of those gentiles who attached themselves to Judaism. The Jewish scriptures offered a universe in themselves, in which the avid scholar and prophet could move and breathe. He governed his life by the writings. Like the Jewish philosopher Philo of Alexandria, he could construct whole philosophies from elements of scripture, aided at times by mystical experiences. [...] God's plan had to reside in scripture, for that was how he communicated with the world. All it needed was the right key, the right inspiration through the Spirit to unlock that coded information. [...] Paul's conviction that the Spirit was guiding him as he sought meaning from the sacred texts guaranteed that he would get the message he was looking for.
”
”
Earl Doherty (Jesus: Neither God Nor Man - The Case For A Mythical Jesus)
“
And of course, [Boris Johnson will] never get questioned like this over at the BBC while the political editor remains a fully paid-up member of the Boris Johnson Admiration Society. So how does he get away with it? Andrew points out that factory resets obviously weren't covered in the technology lessons that Boris Johnson received from Jennifer Arcuri. Again, it's a funny joke. It's a good line, but he was the Prime Minister, and everyone knew he was a liar. Is it all about that guy that rang in when Donald Trump was here. That I always remember saying ‘but you must know he's lying’. Donald Trump was giving a speech in London about the size of the crowds outside the building he was in. And we had a camera outside the building he was in. We were looking at no crowds. And that simple juxtaposition of rhetorical claim by a politician with observable reality was chilling. It was spine tingling. I can claim that there are huge crowds, huge crowds, the biggest crowds, the greatest crowds outside this building. And I said, ‘how does it work? How does that happen?’ And someone rang me and said, ‘I know he's a liar, but it really upsets people like you and Sadiq Khan.’ And at the time I laughed but maybe that's all there is. Maybe your life - and sorry this is going to sound quite rude - but maybe your life is so weird, and your personality is so twisted that you find the frustration of people who care about the truth the closest you ever get to feeling joy. Is that it? Nadine Dorries watches Boris Johnson lie and claims that he's the most trustworthy person on the planet. What is wrong with her? It's not really a question about what's wrong with him; what's wrong with her?
Whatever transpires at this inquiry or whatever emerges during these hours of evidence, I can tell you this: there will be a significant number of people who think that Boris Johnson has done nothing wrong or that he is somehow the victim of another witch hunt. You remember? It was a witch hunt when he was caught banged to rights by a parliamentary committee containing a majority of conservatives after even Chris Bryant had stepped down to avoid any accusations or allegations - false allegations – really, of impartiality. And they still called it a witch hunt. It would have been a witch unless the committee consisted entirely of 14 Nadine Dorries clones. That's the only circumstances in which those people would have claimed that he could receive a fair trial.
Where do you even begin today? Do you begin with the 5,000 WhatsApp messages that a man who was in charge of the nuclear code somehow doesn't understand and can't find? I don't know. So, what is your theory now because I don't think I've got one any more. I watch him now, and I feel something very new, very different to what I thought when he was in power because when he was in power there is an urgency to the situation. There is a desperate need to share with the population the awfulness that they apparently can't see. Just now that he's not in power any more, it's almost as if I've allowed the full horror of what he represents to bubble to the surface. It’s now that he can't actually break anything, it's a retrospective reflection upon the abject awfulness of him. I mean the unbelievable awfulness of this man, the things that he's done. You can begin with Brexit. The lies that he's told, the damage that he's done. The contempt in which he holds all the things we're raised to believe are important: rules, obligations, standards, behaviours, fidelity, honesty, kindness, friendship, loyalty, all of these things we teach our children matter. And Boris Johnson teaches us that you can become the most powerful person in the country by treating all of those things with absolute contempt.
”
”
James O'Brien
“
To attack each system--first Red, then Purple--the American codebreakers needed to build their own bootleg versions of the Japanese machines, reverse engineering them based on nothing but educated guesses from analyzing the garbled messages they produced. It was a task akin to building a watch if you have never seen a watch before, simply by listening to an audio recording of the ticking and clicking of its gears.
”
”
Jason Fagone (The Woman Who Smashed Codes: A True Story of Love, Spies, and the Unlikely Heroine who Outwitted America's Enemies)
“
Because the gospel is news, good news… it is to be announced; that is what one does with news. The essential heraldic element in preaching is bound up with the fact that the core message is not a code of ethics to be debated, still less a list of aphorisms to be admired and pondered, and certainly not a systematic theology to be outlined and schematized. Though it properly grounds ethics, aphorisms, and systematics, it is none of these three: it is news, good news, and therefore must be publicly announced2.
”
”
Timothy J. Keller (Center Church: Doing Balanced, Gospel-Centered Ministry in Your City)
“
Yet Enigma was a huge challenge. It looked like a typewriter, but with no space for paper. It had lights for each letter and, inside it, the three rotors (and later more than three) could be arranged in a range of different ways, each one linked to a different set of electrical connections. The key code, with the rotor setting, would be in a three letter key for each day, which all the machine operators would look up in the code book. It was believed to be impregnable. The three rotors could mean more than 17,000 different solutions for a given message, but – since the three rotors could be rearranged in any of six different ways – the number of combinations reached over 105,000.
”
”
David Boyle (Alan Turing: Unlocking the Enigma)
“
Jesus Christ is the Evangel incarnate. He is the fullest expression of a human being as a committed soul-winner, sold out to God’s purpose and the message of salvation. Jesus was the supreme evangelist and soul-winner. His message and method constitute the heart of evangelism.30 No one will ever be a more perfect evangelist than He. So we must follow His way in making disciples who follow Him. Jesus never made a mistake. He
”
”
Victor Benavides (Breaking The Evangelism Code: Evangelism Today)
“
Amazing how a small choice can change your life forever.
”
”
Randy C. Dockens (T-H-B: The Coded Message Trilogy, Book 1)
“
disrupted by the electromagnetic pulse of a nuclear weapon. If Green Pine was knocked out, SAC brought online in October 1967 the first of twelve Emergency Rocket Communication Systems (ERCS) at Missouri’s Whiteman Air Force Base. Instead of a warhead, the special ERCS Minuteman missiles contained a powerful UHF transmitter that would broadcast launch orders to U.S. forces along the missile’s trajectory, creating, in effect, a high-flying radio broadcasting tower. The launch capsules of the 510th were retrofitted with large, floor-mounted telephone consoles that the crews quickly dubbed “knee knockers,” since they hit their knees on it whenever turning their chairs. With the arrival of ERCS, the very last remnants of the U.S. government in a nuclear war would have likely been the voices of the missileers of Whiteman’s 510th Missile Squadron. In an emergency, the crews would use the console to record launch orders onto the ERCS transmitter (the airborne command posts could record an Emergency Action Message remotely). Then either the capsule crew or an airborne command post would have launched the missiles, each set on a different trajectory to blast in a different direction. For thirty minutes after launch, ERCS-equipped Minutemans would broadcast “go codes” to any bomber, submarine, or missile silo along its path, the last communication of a destroyed
”
”
Garrett M. Graff (Raven Rock: The Story of the U.S. Government's Secret Plan to Save Itself--While the Rest of Us Die)
“
Within our own way, we all know the answers to the questions that we seek … it is quite simple. We have the knowledge before we come here to our earthly existence. We have been given the way forward and the answers that we need; we just have to look deep within ourselves and know that they are there. Similar to reading hidden messages that are encrypted, we have only to uncover the meaning of the code to unlock a vast amount of knowledge and information. Ben
”
”
Lisa Williams (The Survival of the Soul: (Do You Want to Know Everything?))
“
FATHER OF THE COMPUTER Alan Turing was sneered at for not being a tough guy, a he-man with hair on his chest. He whined, croaked, stuttered. He used an old necktie for a belt. He rarely slept and went without shaving for days. And he raced from one end of the city to the other all the while concocting complicated mathematical formulas in his mind. Working for British intelligence, he helped shorten the Second World War by inventing a machine that cracked the impenetrable military codes used by Germany’s high command. At that point he had already dreamed up a prototype for an electronic computer and had laid out the theoretical foundations of today’s information systems. Later on, he led the team that built the first computer to operate with integrated programs. He played interminable chess games with it and asked it questions that drove it nuts. He insisted that it write him love letters. The machine responded by emitting messages that were rather incoherent. But it was flesh-and-blood Manchester police who arrested him in 1952 for gross indecency. At the trial, Turing pled guilty to being a homosexual. To stay out of jail, he agreed to undergo medical treatment to cure him of the affliction. The bombardment of drugs left him impotent. He grew breasts. He stayed indoors, no longer went to the university. He heard whispers, felt stares drilling into his back. He had the habit of eating an apple before going to bed. One night, he injected the apple with cyanide.
”
”
Eduardo Galeano (Mirrors: Stories of Almost Everyone)
“
He walked over to where the three were standing. “I see all the beauty is on this side of the room.” Viktoria gave a wicked grin. “Well, it was.
”
”
Randy C. Dockens (T-H-B: The Coded Message Trilogy, Book 1)
“
If anything in nature was as beautiful as it was deadly, it was she.
”
”
Randy C. Dockens (T-H-B: The Coded Message Trilogy, Book 1)
“
The haybag is exposing me with each flick of her curled lashes. She knows, and she wants the others to know too! Each flutter is Morse code to those that surround us, each one tapping away the message - ‘Here he is! Here is the monster that slits the throats of whores and sips on their blood!
”
”
Ilse V. Rensburg (Blood Sipper)