Data Protection Quotes

We've searched our database for all the quotes and captions related to Data Protection. Here they are! All 100 of them:

Another night then,' Mom said. 'Maybe on the weekend we can have a barbecue and invite your sister.' 'Or,' I said turning to Rafe, 'if you want to skip the whole awkward meet-the-family social event you could just submit your life story including your view on politics religion and every social issue imaginable along with anything else you think they might need to conduct a thorough background check.' Mom sighed. 'I really don't know why we even bother trying to be subtle around you.' 'Neither do I. It's not like he isn't going to realize he's being vetted as daughter-dating material.' Rafe grinned. 'So we are dating.' 'No. You have to pass the parental exam first. It'll take you awhile to compile the data. They'd like it in triplicate.' I turned to my parents. 'We have Kenjii. We have my cell phone. Since we aren't yet officially dating I'm sure you'll agree that's all the protection we need.' Dad choked on his coffee.
Kelley Armstrong (The Gathering (Darkness Rising, #1))
Rafe grinned. "So we are dating?" "No. You have to pass the parental exam first. It'll take you awhile to compile the data. They'd like it in triplicate." I turned to my parents. "We have Kenji. We have my cell phone. Since we aren't officially dating, I'm sure you'll agree that's all the protection we need." Dad chocked on his coffee.
Kelley Armstrong (The Gathering (Darkness Rising, #1))
In the absence of data, we will always make up stories. In fact, the need to make up a story, especially when we are hurt, is part of our most primitive survival wiring. Mean making is in our biology, and our default is often to come up with a story that makes sense, feels familiar, and offers us insight into how best to self-protect.
Brené Brown (Rising Strong: The Reckoning. The Rumble. The Revolution.)
Data is the pollution problem of the information age, and protecting privacy is the environmental challenge.
Bruce Schneier (Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World)
The scientific study of suffering inevitably raises questions of causation, and with these, issues of blame and responsibility. Historically, doctors have highlighted predisposing vulnerability factors for developing PTSD, at the expense of recognizing the reality of their patients' experiences… This search for predisposing factors probably had its origins in the need to deny that all people can be stressed beyond endurance, rather than in solid scientific data; until recently such data were simply not available… When the issue of causation becomes a legitimate area of investigation, one is inevitably confronted with issues of man's inhumanity to man, with carelessness and callousness, with abrogation of responsibility, with manipulation and with failures to protect.
Bessel van der Kolk (Traumatic Stress: The Effects of Overwhelming Experience on Mind, Body, and Society)
The ego is definitely an advancement, but it can be compared to the bark of the tree in many ways. The bark of the tree is flexible, extremely vibrant, and grows with the growth beneath. It is a tree’s contact with the outer world, the tree’s interpreter, and to some degree the tree’s companion. So should man’s ego be. When man’s ego turns instead into a shell, when instead of interpreting outside conditions it reacts too violently against them, then it hardens, becomes an imprisoning form that begins to snuff out important data, and to keep enlarging information from the inner self. The purpose of the ego is protective. It is also a device to enable the inner self to inhabit the physical plane. It is in other words a camouflage. It is the
Jane Roberts (The Early Sessions: Book 1 of The Seth Material)
One major irony here is that law, which always lags behind technological innovation by at least a generation, gives substantially more protections to a communication’s content than to its metadata—and yet intelligence agencies are far more interested in the metadata—the activity records that allow them both the “big picture” ability to analyze data at scale, and the “little picture” ability to make perfect maps, chronologies, and associative synopses of an individual person’s life, from which they presume to extrapolate predictions of behavior.
Edward Snowden (Permanent Record)
But the world is oddly lacking in discussions of what happens, physically, to Mom after the baby arrives. Before the baby, you’re a vessel to be cherished and protected. After the baby, you’re a lactation-oriented baby accessory.
Emily Oster (Cribsheet: A Data-Driven Guide to Better, More Relaxed Parenting, from Birth to Preschool (The ParentData Series Book 2))
Data: My positronic brain has several layers of shielding to protect me from power surges. It would be possible for you to remove my cranial unit and take it with you. Riker: Let me get this straight--you want me to take off your head? Data: Yes sir
Star Trek The Next Generation
Availability protection ensures reliability and timely access to data and resources to authorized individuals.
Shon Harris (CISSP Boxed Set)
Snooping data was alot like having indiscriminate sex—protection or noprotection, sooner or later you caught something.
Dan Brown (Digital Fortress)
Snooping data was a lot like having indiscriminate sex—protection or no protection, sooner or later you caught something.
Dan Brown (Digital Fortress)
Attention words. A single word wasn't enough. Not even for a particular segment. The brain had defenses, filters evolved over millions of years to protect against manipulation. The first was perception, the process of funneling an ocean of sensory input down to a few key data packages worthy of study by the cerebral cortex. When data got by the perception filter, it received attention. And she saw now that it must be like that all the way down: There must be words to attack each filter. Attention words and then maybe desire words and logic words and urgency words and command words. This was what they were teaching her. How to craft a string of words that would disable the filters one by one, unlocking each mental tumbler until the mind's last door swung open.
Max Barry (Lexicon)
Data was absolutely key. And because it will be key in the future too, when there is another outbreak somewhere, it is crucial to protect its credibility and the credibility of those who produce it. Data must be used to tell the truth, not to call to action, no matter how noble the intentions.
Hans Rosling (Factfulness: Ten Reasons We're Wrong About the World—and Why Things Are Better Than You Think)
After presenting the data and making my arguments about the unconstitutional exclusion of African Americans, the judge complained loudly. “I’m going to grant your motion, Mr. Stevenson, but I’ll be honest. I’m pretty fed up with people always talking about minority rights. African Americans, Mexican Americans, Asian Americans, Native Americans … When is someone going to come to my courtroom and protect the rights of Confederate Americans?
Bryan Stevenson (Just Mercy: A Story of Justice and Redemption)
If you have to maintain self-esteem by pulling down the standing of others, you are extraordinarily unfortunate in a variety of ways. Since you have to protect your feeling of personal worth by noting how unworthy everybody around you is, you are not provided with any data that are convincing evidence of your having personal worth; so it gradually evolves into 'I am not as bad as the other swine.' To be the best of swine, when it would be nice to be a person, is not a particularly good way of furthering anything except security operations. When security is achieved that way, it strikes at the very roots of that which is essentially human -- the utterly vital role of interpersonal relations.' from The Interpersonal Theory of Psychiatry
Helen Swick Perry (Psychiatrist of America: The Life of Henry Stack Sullivan)
One of the main cyber-risks is to think they don’t exist. The other is to try to treat all potential risks. Fix the basics, protect first what matters for your business and be ready to react properly to pertinent threats. Think data, but also business services integrity, awareness, customer experience, compliance, and reputation.
Stephane Nappo
I post Instagram photos that I think of as testaments to my beauty and then obsessively check the likes to see if the internet agrees. I collect this data more than I want to admit, trying to measure my allure as objectively and brutally as possible. I want to calculate my beauty to protect myself, to understand exactly how much power and lovability I have.
Emily Ratajkowski (My Body)
It's proper Netiquette to protect data with passwords. NetworkEtiquette.net
David Chiles
anonymity is valuable for all the reasons I’ve discussed in this chapter. It protects privacy, it empowers individuals, and it’s fundamental to liberty.
Bruce Schneier (Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World)
Responsible data and complete transparency are the unbreakable shields in the realm of large-scale Ethical AI for protecting humanity and fostering growth.
Sri Amit Ray (Ethical AI Systems: Frameworks, Principles, and Advanced Practices)
Protecting data is not just about preventing unauthorized access. It also involves ensuring data integrity and availability.
Enamul Haque (AI Horizons: Shaping a Better Future Through Responsible Innovation and Human Collaboration)
Fred’s vacuum-rated armor protected him from the smell of viscera, but it reported it to him as a slight increase in atmospheric methane levels. The stench of death reduced to a data point.
James S.A. Corey (The Butcher of Anderson Station (The Expanse, #1.5))
Both the Environmental Protection Agency and the Department of the Interior removed from their websites the links to climate change data. The USDA removed the inspection reports of businesses accused of animal abuse by the government. The new acting head of the Consumer Financial Protection Bureau, Mick Mulvaney, said he wanted to end public access to records of consumer complaints against financial institutions. Two weeks after Hurricane Maria, statistics that detailed access to drinking water and electricity in Puerto Rico were deleted from the FEMA website. In a piece for FiveThirtyEight, Clare Malone and Jeff Asher pointed out that the first annual crime report released by the FBI under Trump was missing nearly three-quarters of the data tables from the previous year.
Michael Lewis (The Fifth Risk: Undoing Democracy)
I write a bunch of form labels on the whiteboard, in a nonsensical order, along with a bunch of randomly sized input boxes. I include first name, last name, address, gender, city, state, email address, etc. Then I tell the interviewee that we’re designing a form to sign up for an email newsletter and to arrange them in the right order. Only people who ask me why I need the users’ gender, or physical address, or really, anything but their email address get a second interview. I won’t hire a designer who doesn’t ask why, and I won’t hire a designer whose desire to arrange boxes is more important than their desire to protect users’ data.
Mike Monteiro (Ruined by Design: How Designers Destroyed the World, and What We Can Do to Fix It)
Digital freedom stops where that of users begins... Nowadays, digital evolution must no longer be offered to a customer in trade-off between privacy and security. Privacy is not for sale, it's a valuable asset to protect.
Stephane Nappo
They have taken advantage of our trust, using sophisticated techniques to prey on the weakest aspects of human psychology, to gather and exploit private data, and to craft business models that do not protect users from harm.
Roger McNamee (Zucked: Waking Up to the Facebook Catastrophe)
In the pre-digital age, people hid their embarrassing thoughts from other people. In the digital age, they still hide them from other people, but not from the internet and in particular sites such as Google and PornHub, which protect their anonymity.
Seth Stephens-Davidowitz (Everybody Lies: Big Data, New Data, and What the Internet Can Tell Us About Who We Really Are)
I’ve laid down ten statistical commandments in this book. First, we should learn to stop and notice our emotional reaction to a claim, rather than accepting or rejecting it because of how it makes us feel. Second, we should look for ways to combine the “bird’s eye” statistical perspective with the “worm’s eye” view from personal experience. Third, we should look at the labels on the data we’re being given, and ask if we understand what’s really being described. Fourth, we should look for comparisons and context, putting any claim into perspective. Fifth, we should look behind the statistics at where they came from—and what other data might have vanished into obscurity. Sixth, we should ask who is missing from the data we’re being shown, and whether our conclusions might differ if they were included. Seventh, we should ask tough questions about algorithms and the big datasets that drive them, recognizing that without intelligent openness they cannot be trusted. Eighth, we should pay more attention to the bedrock of official statistics—and the sometimes heroic statisticians who protect it. Ninth, we should look under the surface of any beautiful graph or chart. And tenth, we should keep an open mind, asking how we might be mistaken, and whether the facts have changed.
Tim Harford (The Data Detective: Ten Easy Rules to Make Sense of Statistics)
While I was loading the washing machine, my telephone rang. A visitor and a phone call! A red-letter day indeed. It was Raymond. “I rang Bob’s mobile and explained the situation to him, and he dug out your number from the personnel files for me,” he said. I mean, really. Was all of me on show in buff folders, splayed wide for anyone to flick open and do with as they wished? “What a gross abuse of my privacy, not to mention an offense against the Data Protection Act,” I said. “I’ll be speaking to Bob about that next week.
Gail Honeyman (Eleanor Oliphant Is Completely Fine)
He was an accomplished computer hacker. During the past two years, he’d penetrated highly protected computer systems, in which he had planted rootkits that allowed him to swim through their networks without their security becoming aware that a secret fish explored the data depths.
Dean Koontz (Devoted)
The Internet of Things (IoT) devoid of comprehensive security management is tantamount to the Internet of Threats. Apply open collaborative innovation, systems thinking & zero-trust security models to design IoT ecosystems that generate and capture value in value chains of the Internet of Things.
Stephane Nappo
Ron Rivest, one of the inventors of RSA, thinks that restricting cryptography would be foolhardy: It is poor policy to clamp down indiscriminately on a technology just because some criminals might be able to use it to their advantage. For example, any U.S. citizen can freely buy a pair of gloves, even though a burglar might use them to ransack a house without leaving fingerprints. Cryptography is a data-protection technology, just as gloves are a hand-protection technology. Cryptography protects data from hackers, corporate spies, and con artists, whereas gloves protect hands from cuts, scrapes, heat, cold, and infection. The former can frustrate FBI wiretapping, and the latter can thwart FBI fingerprint analysis. Cryptography and gloves are both dirt-cheap and widely available. In fact, you can download good cryptographic software from the Internet for less than the price of a good pair of gloves.
Simon Singh (The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography)
What the data show: the fewer social relationships a person has, the shorter his or her life expectancy, and the worse the impact of various infectious diseases. Relationships that are medically protective can take the form of marriage, contact with friends and extended family, church membership, or other group affiliations.
Robert M. Sapolsky (Why Zebras Don't Get Ulcers: The Acclaimed Guide to Stress, Stress-Related Diseases, and Coping)
perfectionism is a desperate attempt to live up to impossible standards. Perfectionism will do anything to protect those impossible standards. It can’t let you find out how impossible they are, especially with the cold eye of data, so it terrifies you into thinking that you’ll be crushed by disappointment if you peer behind that curtain. Data would tell you that your bank account is low, but you’re spending a lot more on coffee than you think. If you started making it at home, you could easily start saving for a vacation. You might even stop comparing yourself to the impossible financial standards of your friends online. You might make some reasonable goals and completely change the way you view money. You might even have fun.
Jon Acuff (Finish: Give Yourself the Gift of Done)
Data Ambassador Job Description The Data Ambassador will serve as a liaison between all business stakeholders, end-users and technical resources to protect and promote data assets. This highly influential role will interact with all levels of the organization, guide the development of data assets, and ensure usage of data assets to drive a positive value proposition.
Laura B. Madsen (Disrupting Data Governance: A Call to Action)
Technology is a powerful force in our society. Data, software, and communication can be used for bad: to entrench unfair power structures, to undermine human rights, and to protect vested interests. But they can also be used for good: to make underrepresented people’s voices heard, to create opportunities for everyone, and to avert disasters. This book is dedicated to everyone working toward the good.
Martin Kleppmann (Designing Data-Intensive Applications: The Big Ideas Behind Reliable, Scalable, and Maintainable Systems)
Relying on hard data, committing to open and democratic communication, acknowledging fallibility: these are the central tenets of any system that aims to protect us from error. They are also markedly different from how we normally think—from our often hasty and asymmetric treatment of evidence, from the cloistering effects of insular communities, and from our instinctive recourse to defensiveness and denial.
Kathryn Schulz (Being Wrong: Adventures in the Margin of Error)
The materialist interpretation of the world and of science itself is protected not by the facts or by the data of our honest experiences, but by what is essentially social and professional peer pressure, something more akin to the grade-school playground or high school prom. The world is preserved through eyes rolling back, snide remarks, arrogant smirks and subtle, or not so subtle, social cues, and a kind of professional (or conjugal) shaming.
Jeffrey J. Kripal (The Flip: Epiphanies of Mind and the Future of Knowledge)
Privacy is not a luxury that we can only afford in times of safety. Instead, it's a value to be preserved. It's essential for liberty, autonomy, and human dignity. We must understand that privacy is not something to be traded away in some fearful attempt to guarantee security, but something to maintain and protect in order to have real security. None of this will happen without a change of attitude. In the end, we'll get the privacy we as a society demand and not a bit more.
Bruce Schneier (Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World)
Once companies amass troves of data on employees’ health, what will stop them from developing health scores and wielding them to sift through job candidates? Much of the proxy data collected, whether step counts or sleeping patterns, is not protected by law, so it would theoretically be perfectly legal. And it would make sense. As we’ve seen, they routinely reject applicants on the basis of credit scores and personality tests. Health scores represent a natural—and frightening—next step.
Cathy O'Neil (Weapons of Math Destruction: How Big Data Increases Inequality and Threatens Democracy)
Jacobson had been told to remove the Fourth Amendment protections from an experimental surveillance system, one of the most powerful spying programs the NSA had ever developed. The advanced system was still just a pilot project, but top NSA officials wanted to make it operational immediately—and use it to collect data on Americans. They had ordered Jacobson to strip away the carefully calibrated restrictions built into the system, which were designed to prevent it from illegally collecting information on U.S. citizens.
James Risen (Pay Any Price: Greed, Power, and Endless War)
For the third type of coping strategy, at the societal level, we need to ask how non-state actors (such as communities and nonprofit organizations) will respond to the consequences of the data revolution. We think a wave of civil-society organizations will emerge in the next decade designed to shield connected citizens from their governments and from themselves. Powerful lobbying groups will advocate content and privacy laws. Rights organizations that document repressive surveillance tactics will call for better citizen protection. There
Eric Schmidt (The New Digital Age: Reshaping the Future of People, Nations and Business)
Once the NSA embraced the Internet and a drift-net style of data collection, the agency was transformed. The bulk collection of phone and e-mail metadata, both inside the United States and around the world, has now become one of the NSA’s core missions. The agency’s analysts have discovered that they can learn far more about people by tracking their daily digital footprints through their metadata than they could ever learn from actually eavesdropping on their conversations. What’s more, phone and e-mail logging data comes with few legal protections, making it easy for the NSA to access.
James Risen (Pay Any Price: Greed, Power, and Endless War)
What was in fact blown up on the 8th of November 2016 was the social contract, the paradigm that says you can live comfortably without getting your hands dirty with politics. The belief that it only takes your one vote every four years (or no vote at all: you’re above politics) to have your freedoms protected. This belief was torn to pieces. The belief that institutions are here to protect us and take care of us, and we don’t need to bother ourselves with protecting these institutions from being eroded by corruption, lobbyists, monopolies, corporate and government control over our personal data.
Nadya Tolokonnikova (Read & Riot: A Pussy Riot Guide to Activism)
Most unsettling of all is this: the content of television is not a vision but a manufactured data stream that can be sanitised to “protect” or impose cultural values. Thus we are confronted with an addictive and all-pervasive drug that delivers an experience whose message is whatever those who deal the drug wish it to be. … Yet no drug in history has so quickly or completely isolated the entire culture of its users from contact with reality. And no drug in history has so completely succeeded in remaking in its own image the values of the culture that it has infected.”   - Terence McKenna, Food of the Gods
Steven Turner (The DMT Diaries: From Materialism to Modern Mysticism)
He further explained, “We started a project to see if we could get better at suggesting groups that will be meaningful to you. We started building artificial intelligence to do this. And it works. In the first six months, we helped 50% more people join meaningful communities.” His ultimate goal is “to help 1 billion people join meaningful communities….If we can do this, it will not only turn around the whole decline in community membership we’ve seen for decades, it will start to strengthen our social fabric and bring the world closer together.” This is such an important goal that Zuckerberg vowed “to change Facebook’s whole mission to take this on.”3 Zuckerberg is certainly correct in lamenting the breakdown of human communities. Yet several months after Zuckerberg made this vow, and just as this book was going to print, the Cambridge Analytica scandal revealed that data entrusted to Facebook was harvested by third parties and used to manipulate elections around the world. This made a mockery of Zuckerberg’s lofty promises, and shattered public trust in Facebook. One can only hope that before undertaking the building of new human communities, Facebook first commits itself to protecting the privacy and security of existing communities.
Yuval Noah Harari (21 Lessons for the 21st Century)
The era of data is here; we are now recorded. That, like all change, is frightening, but between the gunmetal gray of the government and the hot pink of product offers we just can’t refuse, there is an open and ungarish way. To use data to know yet not manipulate, to explore but not to pry, to protect but not to smother, to see yet never expose, and, above all, to repay that priceless gift we bequeath to the world when we share our lives so that other lives might be better—and to fulfill for everyone that oldest of human hopes, from Gilgamesh to Ramses to today: that our names be remembered, not only in stone but as part of memory itself.
Christian Rudder (Dataclysm: Love, Sex, Race, and Identity--What Our Online Lives Tell Us about Our Offline Selves)
Lavabit was an e-mail service that offered more security privacy than the large corporate e-mail services most of us use. It was a small company, owned and operated by a programmer named Ladar Levison, and it was popular among the tech-savvy. It had half a million users, Edward Snowden amongst them. Soon after Snowden fled to Hong Kong in 2013, Levison received a National Security Letter demanding that the company turn over the master encryption key that protected all of Lavabit’s users—and then not tell any of its customers that they could be monitored. Levison fought this order in court, and when it became clear that he had lost, he shut down his service rather than deceive and compromise his customers. The moral is clear. If you run a business, and the FBI or the NSA wants to turn it into a mass surveillance tool, it believes that it is entitled to do so, solely on its own authority. The agency can force you to modify your system. It can do it all in secret and then force your business to keep that secret. Once it does that, you no longer control that part of your business. If you’re a large company, you can’t shut it down. You can’t realistically terminate part of your service. In a very real sense, it is not your business anymore. It has become an arm of the vast US surveillance apparatus, and if your interest conflicts with the agency’s, the agency wins. Your business has been commandeered.
Bruce Schneier (Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World)
Here is what’s true. Today’s technology gives governments and corporations robust capabilities for mass surveillance. Mass surveillance is dangerous. It enables discrimination based on almost any criteria: race, religion, class, political beliefs. It is being used to control what we see, what we can do, and, ultimately, what we say. It is being done without offering citizens recourse or any real ability to opt out, and without any meaningful checks and balances. It makes us less safe. It makes us less free. The rules we had established to protect us from these dangers under earlier technological regimes are now woefully insufficient; they are not working. We need to fix that, and we need to do it very soon.
Bruce Schneier (Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World)
As black-box technologies become more widespread, there have been no shortage of demands for increased transparency. In 2016 the European Union's General Data Protection Regulation included in its stipulations the "right to an explanation," declaring that citizens have a right to know the reason behind the automated decisions that involve them. While no similar measure exists in the United States, the tech industry has become more amenable to paying lip service to "transparency" and "explainability," if only to build consumer trust. Some companies claim they have developed methods that work in reverse to suss out data points that may have triggered the machine's decisions—though these explanations are at best intelligent guesses. (Sam Ritchie, a former software engineer at Stripe, prefers the term "narratives," since the explanations are not a step-by-step breakdown of the algorithm's decision-making process but a hypothesis about reasoning tactics it may have used.) In some cases the explanations come from an entirely different system trained to generate responses that are meant to account convincingly, in semantic terms, for decisions the original machine made, when in truth the two systems are entirely autonomous and unrelated. These misleading explanations end up merely contributing another layer of opacity. "The problem is now exacerbated," writes the critic Kathrin Passig, "because even the existence of a lack of explanation is concealed.
Meghan O'Gieblyn (God, Human, Animal, Machine: Technology, Metaphor, and the Search for Meaning)
By 2011, enough data had been accumulated to show that some risk existed due to long-term, heavy use of mobile phones, compelling the International Agency for Research on Cancer, a branch of the World Health Organization, to classify mobile cell phone radiation in the Group 2B category, indicating a possible carcinogen (a substance or source of exposure that can cause cancer).14 This is the same category as DDT, lead, engine exhaust, chloroform, and glyphosate (the active ingredient in Roundup®). Later, in 2016, a $25 million study conducted by the National Toxicology Program (NTP), part of the National Institutes of Health, confirmed what many have believed for years—that exposure to EMF radiation emitted from cell phones can lead to serious health issues including brain and heart tumors.
Daniel T. DeBaun (Radiation Nation: Complete Guide to EMF Protection & Safety - The Proven Health Risks of EMF Radiation & What You Can Do to Protect Yourself & Family)
The states with fewer men’s deaths, Campbell tells the audience, are the states with good police responses, with good laws of protection, with decent resources for victims. In other words, Campbell says, “Abused women feel less like there’s no way out except to kill him.” In fact, since 1976 rates of men killed by women have dropped by nearly three-quarters.2 What she means is that there are states where abused women don’t have to resort to murdering their abusers to return to freedom. While there are no national statistics, some states collect this data. In New York, for example, two-thirds of incarcerated women in 2005 had been abused beforehand by the person they killed.3 Though in many states today, still, victims are barred from using their long histories of enduring violence at the hands of their partners in their own defense.
Rachel Louise Snyder (No Visible Bruises: What We Don’t Know About Domestic Violence Can Kill Us)
I started this book by talking about data as exhaust: something we all produce as we go about our information-age business. I think I can take that analogy one step further. Data is the pollution problem of the information age, and protecting privacy is the environmental challenge. Almost all computers produce personal information. It stays around, festering. How we deal with it—how we contain it and how we dispose of it—is central to the health of our information economy. Just as we look back today at the early decades of the industrial age and wonder how our ancestors could have ignored pollution in their rush to build an industrial world, our grandchildren will look back at us during these early decades of the information age and judge us on how we addressed the challenge of data collection and misuse. We should try to make them proud.
Bruce Schneier (Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World)
Eventually, we may reach a point when it will be impossible to disconnect from this all-knowing network even for a moment. Disconnection will mean death. If medical hopes are realised, future people will incorporate into their bodies a host of biometric devices, bionic organs and nano-robots, which will monitor our health and defend us from infections, illnesses and damage. Yet these devices will have to be online 24/7, both in order to be updated with the latest medical news, and in order to protect them from the new plagues of cyberspace. Just as my home computer is constantly attacked by viruses, worms and Trojan horses, so will be my pacemaker, my hearing aid and my nanotech immune system. If I don’t update my body’s anti-virus program regularly, I will wake up one day to discover that the millions of nano-robots coursing through my veins are now controlled by a North Korean hacker.
Yuval Noah Harari (Homo Deus: A History of Tomorrow)
We discussed what we want from you now,...you who had power and used it to burn the world. You burned a lot. You didn't just burn trees and cities and each other. You burned our admiration for the governments we grew up respecting. You burned our sense of safety in your care. You burned our patience, our ability to believe that the great things in this world you promised to protect will still be there for us and future generations. You burned our trust as you misused the data and surveillance we let you collect, first for O.S. and the Canner Device, then for the war, its propaganda and its lies. You burned our self-trust, too, since we know we are infused with your values, values we thought made both you and us people who would never do what you just did. We have to be afraid of ourselves now, vigilant against what you've taught us to be, since now we know we are something to be afraid and ashamed of. And even if you didn't personally kill in the war, if you carried arms, if you participated, you helped burn what nothing can bring back. No sentence can repair any of that. So, we want you to repair what you can. That's our sentence. We want you to rebuild the cities, replant the trees, replace the art, relaunch the satellites, fix the bridges you can fix to make up for the ones you can't. We want you to rebuild the system, too, fixing the holes this has exposed and making more safeguards so no one can misuse the cars and data and surveillance and trackers and such again. We want you to build it all back but better than it was, and faster than any past war has rebuilt. You weren't as good at peace as you thought you were, but maybe you can be as good at rebuilding. Everyone, even Minors like Tribune MASON who took part, if in your heart you know you were complicit, then build back what you burned with your own hours, your own efforts, your own hands. That's our sentence.
Ada Palmer (Perhaps the Stars (Terra Ignota, #4))
Peopleware. A major contribution during recent years has been DeMarco and Lister's 1987 book, Peopleware: Productive Projects and Teams. Its underlying thesis is that "The major problems of our work are not so much technological as sociological in nature." It abounds with gems such as, "The manager's function is not to make people work, it is to make it possible for people to work." It deals with such mundane topics as space, furniture, team meals together. DeMarco and Lister provide real data from their Coding War Games that show stunning correlation between performances of programmers from the same organization, and between workplace characteristics and both productivity and defect levels. The top performers' space is quieter, more private, better protected against interruption, and there is more of it. . . . Does it really matter to you . . . whether quiet, space, and privacy help your current people to do better work or [alternatively] help you to attract and keep better people?[19]
Frederick P. Brooks Jr. (The Mythical Man-Month: Essays on Software Engineering)
What are the health effects of the choice between austerity and stimulus? Today there is a vast natural experiment being conducted on the body economic. It is similar to the policy experiments that occurred in the Great Depression, the post-communist crisis in eastern Europe, and the East Asian Financial Crisis. As in those prior trials, health statistics from the Great Recession reveal the deadly price of austerity—a price that can be calculated not just in the ticks to economic growth rates, but in the number of years of life lost and avoidable deaths. Had the austerity experiments been governed by the same rigorous standards as clinical trials, they would have been discontinued long ago by a board of medical ethics. The side effects of the austerity treatment have been severe and often deadly. The benefits of the treatment have failed to materialize. Instead of austerity, we should enact evidence-based policies to protect health during hard times. Social protection saves lives. If administered correctly, these programs don’t bust the budget, but—as we have shown throughout this book—they boost economic growth and improve public health. Austerity’s advocates have ignored evidence of the health and economic consequences of their recommendations. They ignore it even though—as with the International Monetary Fund—the evidence often comes from their own data. Austerity’s proponents, such as British Prime Minister David Cameron, continue to write prescriptions of austerity for the body economic, in spite of evidence that it has failed. Ultimately austerity has failed because it is unsupported by sound logic or data. It is an economic ideology. It stems from the belief that small government and free markets are always better than state intervention. It is a socially constructed myth—a convenient belief among politicians taken advantage of by those who have a vested interest in shrinking the role of the state, in privatizing social welfare systems for personal gain. It does great harm—punishing the most vulnerable, rather than those who caused this recession.
David Stuckler (The Body Economic: Why Austerity Kills)
Atonement, expiation, laundering, prophylaxis, promotion and rehabilitation -- it is difficult to put a name to all the various nuances of this general commiseration which is the product of a profound indifference and is accompanied by a fierce strategy of blackmail, of the political takeover of all these negative passions. It is the `politically correct' in all its effects -- an enterprise of laundering and mental prophylaxis, beginning with the prophylactic treatment of language. Black people, the handicapped, the blind and prostitutes become `people of colour', `the disabled', `the visually impaired', and `sex workers': they have to be laundered like dirty money. Every negative destiny has to be cleaned up by a doctoring even more obscene than what it is trying to hide. Euphemistic language, the struggle against sexual harassment -- all this protective and protectionist masquerade is of the same order as the use of the condom. Its mental use, of course -- that is, the prophylactic use of ideas and concepts. Soon we shall think only when we are sheathed in latex. And the data suit of Virtual Reality already slips on like a condom.
Jean Baudrillard (The Perfect Crime)
While amassing one of the most lucrative fortunes in the world, the Kochs had also created an ideological assembly line justifying it. Now they had added a powerful political machine to protect it. They had hired top-level operatives, financed their own voter data bank, commissioned state-of-the-art polling, and created a fund-raising operation that enlisted hundreds of other wealthy Americans to help pay for it. They had also forged a coalition of some seventeen allied conservative groups with niche constituencies who would mask their centralized source of funding and carry their message. To mobilize Latino voters, they formed a group called the Libre Initiative. To reach conservative women, they funded Concerned Women for America. For millennials, they formed Generation Opportunity. To cover up fingerprints on television attack ads, they hid behind the American Future Fund and other front groups. Their network’s money also flowed to gun groups, retirees, veterans, antilabor groups, antitax groups, evangelical Christian groups, and even $4.5 million for something called the Center for Shared Services, which coordinated administrative tasks such as office space rentals and paperwork for the others. Americans for Prosperity, meanwhile, organized chapters all across the country. The Kochs had established what was in effect their own private political party.
Jane Mayer (Dark Money: The Hidden History of the Billionaires Behind the Rise of the Radical Right)
The “pale blue dot” image and Carl’s prose meditation on it have been beloved the world over ever since. It exemplifies just the kind of breakthrough that I think of as a fulfillment of Einstein’s hope for science. We have gotten clever enough to dispatch a spacecraft four billion miles away and command it to send us back an image of Earth. Seeing our world as a single pixel in the immense darkness is in itself a statement about our true circumstances in the cosmos, and one that every single human can grasp instantly. No advanced degree required. In that photo, the inner meaning of four centuries of astronomical research is suddenly available to all of us at a glance. It is scientific data and art equally, because it has the power to reach into our souls and alter our consciousness. It is like a great book or movie, or any major work of art. It can pierce our denial and allow us to feel something of reality—even a reality that some of us have long resisted. A world that tiny cannot possibly be the center of a cosmos of all that is, let alone the sole focus of its creator. The pale blue dot is a silent rebuke to the fundamentalist, the nationalist, the militarist, the polluter—to anyone who does not put above all other things the protection of our little planet and the life that it sustains in the vast cold darkness. There is no running away from the inner meaning of this scientific achievement.
Ann Druyan (Cosmos: Possible Worlds)
The intimate link existing between Yahweh and the Kenites is strengthened by the following observations: 1. The first mention of Yahweh (neither Elohim nor Yahweh-Elohim) in the book of Genesis is related to the birth of Cain: 'Now the man knew his wife Even, and she conceived and bore Cain, saying, "I have produced a man with the help of the LORD"' (Gen. 4.1). This may be a symbolic way to claim that the 'discovery' of Yahweh is concomitant to the discovery of metallurgy. 2. Enosh is mentioned in Genesis as the first man who worshipped Yahweh: 'To Seth also a son was born, and he names him Enosh. At that time people began to invoke the name of the LORD' (Gen. 4.26). Interestingly, Enosh is the father of Keynan (= Cain). Again, the worship of Yahweh appears to have been linked to the discovery of metallurgy. 3. The Kenites had a sign (taw) on their forehead. From Gen. 4.15, it appears that this sign signalled that Yahweh protects Cain and his sons. From Ezek. 9.4-6, it seems that, at the end of the First Temple period, a similar sign remained the symbol of devotion to Yahweh. 4. The book of Jeremiah confirms the existence of a Kenite worship of Yahweh as follows:'Jonadab son of Rechab shall not lack a descendant to stand before me [Yahweh] for all time' (Jer. 35.19). This fidelity of smelters and smiths to the initial Yahwistic tradition may explain why the liberators of Judah, Israel and Jerusalem are depicted as smiths in the book of Zechariah (Zech. 2.3-4). When considered together, these data suggest that Yahweh was intimately related with the metallurgists from the very discovery of copper smelting. (pp. 393-394) from 'Yahweh, the Canaanite God of Metallurgy?', JSOT 33.4 (2009): 387-404
Nissim Amzallag
GCHQ has traveled a long and winding road. That road stretches from the wooden huts of Bletchley Park, past the domes and dishes of the Cold War, and on towards what some suggest will be the omniscient state of the Brave New World. As we look to the future, the docile and passive state described by Aldous Huxley in his Brave New World is perhaps more appropriate analogy than the strictly totalitarian predictions offered by George Orwell's Nineteen Eighty-Four. Bizarrely, many British citizens are quite content in this new climate of hyper-surveillance, since its their own lifestyle choices that helped to create 'wired world' - or even wish for it, for as we have seen, the new torrents of data have been been a source of endless trouble for the overstretched secret agencies. As Ken Macdonald rightly points out, the real drives of our wired world have been private companies looking for growth, and private individuals in search of luxury and convenience at the click of a mouse. The sigint agencies have merely been handed the impossible task of making an interconnected society perfectly secure and risk-free, against the background of a globalized world that presents many unprecedented threats, and now has a few boundaries or borders to protect us. Who, then, is to blame for the rapid intensification of electronic surveillance? Instinctively, many might reply Osama bin Laden, or perhaps Pablo Escobar. Others might respond that governments have used these villains as a convenient excuse to extend state control. At first glance, the massive growth of security, which includes includes not only eavesdropping but also biometric monitoring, face recognition, universal fingerprinting and the gathering of DNA, looks like a sad response to new kinds of miscreants. However, the sad reality is that the Brave New World that looms ahead of us is ultimately a reflection of ourselves. It is driven by technologies such as text messaging and customer loyalty cards that are free to accept or reject as we choose. The public debate on surveillance is often cast in terms of a trade-off between security and privacy. The truth is that luxury and convenience have been pre-eminent themes in the last decade, and we have given them a much higher priority than either security or privacy. We have all been embraced the world of surveillance with remarkable eagerness, surfing the Internet in a global search for a better bargain, better friends, even a better partner. GCHQ vast new circular headquarters is sometimes represented as a 'ring of power', exercising unparalleled levels of surveillance over citizens at home and abroad, collecting every email, every telephone and every instance of internet acces. It has even been asserted that GCHQ is engaged in nothing short of 'algorithmic warfare' as part of a battle for control of global communications. By contrast, the occupants of 'Celtenham's Doughnut' claim that in reality they are increasingly weak, having been left behind by the unstoppable electronic communications that they cannot hope to listen to, still less analyse or make sense of. In fact, the frightening truth is that no one is in control. No person, no intelligence agency and no government is steering the accelerating electronic processes that may eventually enslave us. Most of the devices that cause us to leave a continual digital trail of everything we think or do were not devised by the state, but are merely symptoms of modernity. GCHQ is simply a vast mirror, and it reflects the spirit of the age.
Richard J. Aldrich (GCHQ)
But nothing in my previous work had prepared me for the experience of reinvestigating Cleveland. It is worth — given the passage of time — recalling the basic architecture of the Crisis: 121 children from many different and largely unrelated families had been taken into the care of Cleveland County Council in the three short months of the summer of 1987. (p18) The key to resolving the puzzle of Cleveland was the children. What had actually happened to them? Had they been abused - or had the paediatricians and social workers (as public opinion held) been over-zealous and plain wrong? Curiously — particularly given its high profile, year-long sittings and £5 million cost — this was the one central issue never addressed by the Butler-Sloss judicial testimony and sifting of internal evidence, the inquiry's remit did not require it to answer the main question. Ten years after the crisis, my colleagues and I set about reconstructing the records of the 121 children at its heart to determine exactly what had happened to them... (p19) Eventually, though, we did assemble the data given to the Butler-Sloss Inquiry. This divided into two categories: the confidential material, presented in camera, and the transcripts of public sessions of the hearings. Putting the two together we assembled our own database on the children each identified only by the code-letters assigned to them by Butler-Sloss. When it was finished, this database told a startlingly different story from the public myth. In every case there was some prima fade evidence to suggest the possibility of abuse. Far from the media fiction of parents taking their children to Middlesbrough General Hospital for a tummy ache or a sore thumb and suddenly being presented with a diagnosis of child sexual abuse, the true story was of families known to social services for months or years, histories of physical and sexual abuse of siblings and of prior discussions with parents about these concerns. In several of the cases the children themselves had made detailed disclosures of abuse; many of the pre-verbal children displayed severe emotional or behavioural symptoms consistent with sexual abuse. There were even some families in which a convicted sex offender had moved in with mother and children. (p20)
Sue Richardson (Creative Responses to Child Sexual Abuse: Challenges and Dilemmas)
The US traded its manufacturing sector’s health for its entertainment industry, hoping that Police Academy sequels could take the place of the rustbelt. The US bet wrong. But like a losing gambler who keeps on doubling down, the US doesn’t know when to quit. It keeps meeting with its entertainment giants, asking how US foreign and domestic policy can preserve its business-model. Criminalize 70 million American file-sharers? Check. Turn the world’s copyright laws upside down? Check. Cream the IT industry by criminalizing attempted infringement? Check. It’ll never work. It can never work. There will always be an entertainment industry, but not one based on excluding access to published digital works. Once it’s in the world, it’ll be copied. This is why I give away digital copies of my books and make money on the printed editions: I’m not going to stop people from copying the electronic editions, so I might as well treat them as an enticement to buy the printed objects. But there is an information economy. You don’t even need a computer to participate. My barber, an avowed technophobe who rebuilds antique motorcycles and doesn’t own a PC, benefited from the information economy when I found him by googling for barbershops in my neighborhood. Teachers benefit from the information economy when they share lesson plans with their colleagues around the world by email. Doctors benefit from the information economy when they move their patient files to efficient digital formats. Insurance companies benefit from the information economy through better access to fresh data used in the preparation of actuarial tables. Marinas benefit from the information economy when office-slaves look up the weekend’s weather online and decide to skip out on Friday for a weekend’s sailing. Families of migrant workers benefit from the information economy when their sons and daughters wire cash home from a convenience store Western Union terminal. This stuff generates wealth for those who practice it. It enriches the country and improves our lives. And it can peacefully co-exist with movies, music and microcode, but not if Hollywood gets to call the shots. Where IT managers are expected to police their networks and systems for unauthorized copying – no matter what that does to productivity – they cannot co-exist. Where our operating systems are rendered inoperable by “copy protection,” they cannot co-exist. Where our educational institutions are turned into conscript enforcers for the record industry, they cannot co-exist. The information economy is all around us. The countries that embrace it will emerge as global economic superpowers. The countries that stubbornly hold to the simplistic idea that the information economy is about selling information will end up at the bottom of the pile. What country do you want to live in?
Cory Doctorow (Content: Selected Essays on Technology, Creativity, Copyright, and the Future of the Future)
Months later, Time magazine would run its now infamous article bragging about how it had been done. Without irony or shame, the magazine reported that “[t]here was a conspiracy unfolding behind the scenes” creating “an extraordinary shadow effort” by a “well-funded cabal of powerful people” to oppose Trump.112 Corporate CEOs, organized labor, left-wing activists, and Democrats all worked together in secret to secure a Biden victory. For Trump, these groups represented a powerful Washington and Democratic establishment that saw an unremarkable career politician like Biden as merely a vessel for protecting their self-interests. Accordingly, when Trump was asked whom he blames for the rigging of the 2020 election, he quickly responded, “Least of all Biden.” Time would, of course, disingenuously frame this effort as an attempt to “oppose Trump’s assault on democracy,” even as Time reporter Molly Ball noted this shadow campaign “touched every aspect of the election. They got states to change voting systems and laws and helped secure hundreds of millions in public and private funding.” The funding enabled the country’s sudden rush to mail-in balloting, which Ball described as “a revolution in how people vote.”113 The funding from Democratic donors to public election administrators was revolutionary. The Democrats’ network of nonprofit activist groups embedded into the nation’s electoral structure through generous grants from Democratic donors. They helped accomplish the Democrats’ vote-by-mail strategy from the inside of the election process. It was as if the Dallas Cowboys were paying the National Football League’s referee staff and conducting all of their support operations. No one would feel confident in games won by the Cowboys in such a scenario. Ball also reported that this shadowy cabal “successfully pressured social media companies to take a harder line against disinformation and used data-driven strategies to fight viral smears.” And yet, Time magazine made this characterization months after it was revealed that the New York Post’s reporting on Hunter Biden’s corrupt deal-making with Chinese and other foreign officials—deals that alleged direct involvement from Joe Biden, resulting in the reporting’s being overtly censored by social media—was substantially true. Twitter CEO Jack Dorsey would eventually tell Congress that censoring the New York Post and locking it out of its Twitter account over the story was “a mistake.” And the Hunter Biden story was hardly the only egregious mistake, to say nothing of the media’s willful dishonesty, in the 2020 election. Republicans read the Time article with horror and as an admission of guilt. It confirmed many voters’ suspicions that the election wasn’t entirely fair. Trump knew the article helped his case, calling it “the only good article I’ve read in Time magazine in a long time—that was actually just a piece of the truth because it was much deeper than that.
Mollie Ziegler Hemingway (Rigged: How the Media, Big Tech, and the Democrats Seized Our Elections)
The trends speak to an unavoidable truth. Society's future will be challenged by zoonotic viruses, a quite natural prediction, not least because humanity is a potent agent of change, which is the essential fuel of evolution. Notwithstanding these assertions, I began with the intention of leaving the reader with a broader appreciation of viruses: they are not simply life's pathogens. They are life's obligate partners and a formidable force in nature on our planet. As you contemplate the ocean under a setting sun, consider the multitude of virus particles in each milliliter of seawater: flying over wilderness forestry, consider the collective viromes of its living inhabitants. The stunnig number and diversity of viruses in our environment should engender in us greater awe that we are safe among these multitudes than fear that they will harm us. Personalized medicine will soon become a reality and medical practice will routinely catalogue and weigh a patient's genome sequence. Not long thereafter one might expect this data to be joined by the patient's viral and bacterial metagenomes: the patient's collective genetic identity will be recorded in one printout. We will doubtless discover some of our viral passengers are harmful to our health, while others are protective. But the appreciation of viruses that I hope you have gained from these pages is not about an exercise in accounting. The balancing of benefit versus threat to humanity is a fruitless task. The viral metagenome will contain new and useful gene functionalities for biomedicine: viruses may become essential biomedical tools and phages will continue to optimize may also accelerate the development of antibiotic drug resistance in the post-antibiotic era and emerging viruses may threaten our complacency and challenge our society economically and socially. Simply comparing these pros and cons, however, does not do justice to viruses and acknowledge their rightful place in nature. Life and viruses are inseparable. Viruses are life's complement, sometimes dangerous but always beautiful in design. All autonomous self-sustaining replicating systems that generate their own energy will foster parasites. Viruses are the inescapable by-products of life's success on the planet. We owe our own evolution to them; the fossils of many are recognizable in ERVs and EVEs that were certainly powerful influences in the evolution of our ancestors. Like viruses and prokaryotes, we are also a patchwork of genes, acquired by inheritance and horizontal gene transfer during our evolution from the primitive RNA-based world. It is a common saying that 'beauty is in the eye of the beholder.' It is a natural response to a visual queue: a sunset, the drape of a designer dress, or the pattern of a silk tie, but it can also be found in a line of poetry, a particularly effective kitchen implement, or even the ruthless efficiency of a firearm. The latter are uniquely human acknowledgments of beauty in design. It is humanity that allows us to recognize the beauty in the evolutionary design of viruses. They are unique products of evolution, the inevitable consequence of life, infectious egotistical genetic information that taps into life and the laws of nature to fuel evolutionary invention.
Michael G. Cordingley (Viruses: Agents of Evolutionary Invention)
Specialized policies to protect against online attacks are offered by about 50 carriers, including big names like the American International Group, Chubb and Ace. As data breaches have become a reality of the business world, more companies are buying policies; demand increased 21 percent last year from 2012, according to Marsh, a risk management company and insurance broker. Yet companies say it is difficult to get as much coverage as they need, leaving them vulnerable to uncertain losses.
Anonymous
Similarly, those Internet tycoons who are apparently so willing to devalue our privacy are vehemently protective of their own. Google insisted on a policy of not talking to reporters from CNET, the technology news site, after CNET published Eric Schmidt’s personal details—including his salary, campaign donations, and address, all public information obtained via Google—in order to highlight the invasive dangers of his company. Meanwhile, Mark Zuckerberg purchased the four homes adjacent to his own in Palo Alto, at a cost of $30 million, to ensure his privacy. As CNET put it, “Your personal life is now known as Facebook’s data. Its CEO’s personal life is now known as mind your own business.” The same contradiction is expressed by the many ordinary citizens who dismiss the value of privacy yet nonetheless have passwords on their email and social media accounts. They put locks on their bathroom doors; they seal the envelopes containing their letters. They engage in conduct when nobody is watching that they would never consider when acting in full view. They say things to friends, psychologists, and lawyers that they do not want anyone else to know. They give voice to thoughts online that they do not want associated with their names. The many pro-surveillance advocates I have debated since Snowden blew the whistle have been quick to echo Eric Schmidt’s view that privacy is for people who have something to hide. But none of them would willingly give me the passwords to their email accounts, or allow video cameras in their homes.
Anonymous
Finally, we close this section with the following from the January 25, 2013, final rule: Covered entities and business associates that implement the specified technologies and methodologies with respect to protected health information are not required to provide notifications in the event of a breach of such information—that is, the information is not considered “unsecured” in such cases.58 We encourage covered entities and business associates to take advantage of the safe harbor provision of the breach notification rule by encrypting limited data sets and other protected health information pursuant to the Guidance. … If protected health information is encrypted pursuant to this guidance, then no breach notification is required following an impermissible use or disclosure of the information.”59
Anonymous
Like Felicity they methodically checked the house office, safe and family bank account details and financial affairs. Angelina then had Inspector Mick bug the boys’ homes, cars and offices and with the information she acquired came knowledge and contacts. She wrote a programme called listen, it saved all conversations digitally and converted it to text into a computer file in a remote location not traceable to her or anybody at 3WW but it recorded all his illicit dealings and it gave her valuable information. She hacked into their individual MIS computer systems and sent spyware via e-mail called virus protection free download and once opened it went through their c drive, all files on their computers, and copied all files to a ip address of a remote computer of Angelina’s request, in a phantom company named Borrow. All data was heavily encrypted and deleted after access and storage was onto an external hard drive storage box, deleting the electronic footpath. The spyware recorded their strokes on the keyboard and Angelina was able to secure even their banking pins and passwords and all their computer passwords. She had a brilliant computer mind, wasted in librarianship
Annette J. Dunlea
The fact that Costa Rica comes top of the HPI is both surprising and interesting. The data tells us just how well they are doing. Average life expectancy is 78.5 years; this is higher than the US, where it is only 77.9 years. Its ecological footprint is only 2.3 gHa, less than half that of the UK and a quarter that of the US, and only just over its global fair share which would be 2.1gHa. Meanwhile, largely unnoticed, Costa Ricans actually have the highest life satisfaction score globally, according to the 2008 Gallup World Poll, at 8.5 out of 10.0. What are they doing right in Costa Rica? Why are they so satisfied with life? A full answer is worth a book of its own, but here some clues: – They have one of the most developed welfare systems outside of Scandinavia, with clean water and adult literacy almost universal. – The army was abolished in 1949 and the monies freed up are spent on social programs. – There is a strong “core economy” of social networks of family, friends, and neighborhoods made possible by a sensible work/life balance and equal treatment of women. – It is a beautiful country with rich, protected, natural capital. There is clearly much we can learn from Costa Rica, and that is before we consider its environmental credentials: 99% of electricity is from renewable resources (mainly hydro); there is a carbon tax on emissions; and deforestation has been dramatically reversed in the last 20 years.
Nic Marks (The Happiness Manifesto)
( O1O'2920'8855 )PCASH( O1O'2920'8855 ) With an aim to promote the establishment of local ombudsmen, the ACRC has put forward various supporting measures and offered the Commission’ s knowledge and data about complaint handling to the ombudsmen. In this way, the local ombudsmen will be able to carry out their role as ombudsmen that protect the rights of the local residents
pcash
The important point to emphasize is that security metrics are a journey and not a destination.
Lance Hayden (IT Security Metrics : A Practical Framework for Measuring Security & Protecting Data)
Measurement without analysis and action wastes time and money and contributes to uncertainty and risk rather than reducing them.
Lance Hayden (IT Security Metrics : A Practical Framework for Measuring Security & Protecting Data)
One way programming languages avoid the issue of data being modified by concurrently running threads is by providing immutable data structures or collection classes. Clearly data that cannot change doesn't need to be protected. It is often desirable to be able to create new data structures that are similar to existing ones, for example, a list with a new item added at one end or a hash map with a new key/value pair added.
Anonymous
For years researchers have noted decreased levels of free radical damage in individuals who consume fish oil (the source of EPA and DHA), but with this new research, the relationship between fish oil and antioxidant protection is now clear. As Dr. Gao reported, “Our data support the hypothesis that the formation of… compounds generated from oxidation of EPA and DHA in vivo can reach concentrations high enough to induce Nrf2-based antioxidant and… detoxification defense systems.
David Perlmutter (Grain Brain: The Surprising Truth about Wheat, Carbs, and Sugar--Your Brain's Silent Killers)
Strengthening consumer data privacy protections in the United States is an important Administration priority. 1 Americans value privacy and expect protection from intrusions by both private and governmental actors. Strong privacy protections also are critical to sustaining the trust that nurtures Internet commerce and fuels innovation. Trust means the companies and technical systems on which we depend meet our expectations for privacy, security, and reliability. 2 In addition, United States leadership in consumer data privacy can help establish more flexible, innovation-enhancing privacy models among our international partners. 3
Anonymous
United States is committed to protecting privacy. It is an element of individual dignity and an aspect of participation in democratic society. To an increasing extent, privacy protections have become critical to the information-based economy. Stronger consumer data privacy protections will buttress the trust that is necessary to promote the full economic, social, and political uses of networked technologies. The increasing quantities of personal data that these technologies subject to collection, use, and disclosure have fueled innovation and significant social benefits. We can preserve these benefits while also ensuring that our consumer data privacy policy better reflects the value that Americans place on privacy and bolsters trust in the Internet and other networked technologies. The framework set forth in the preceding pages provides a way to achieve these goals. The Consumer Privacy Bill of Rights should be the legal baseline that governs consumer data privacy in the United States. The Administration will work with Congress to bring this about, but it will also work with privatesector stakeholders to adopt the Consumer Privacy Bill of Rights in the absence of legislation. To encourage adoption, the Department of Commerce will convene multistakeholder processes to encourage the development of enforceable, context-specific codes of conduct. The United States Government will engage with our international partners to increase the interoperability of our respective consumer data privacy frameworks. Federal agencies will continue to develop innovative privacy-protecting programs and guidance as well as enforce the broad array of existing Federal laws that protect consumer privacy. A cornerstone of this framework is its call for the ongoing participation of private-sector stakeholders. The views that companies, civil society, academics, and advocates provided to the Administration through written comments, public symposia, and informal discussions have been invaluable in shaping this framework. Implementing it, and making progress toward consumer data privacy protections that support a more trustworthy networked world, will require all of us to continue to work together★ 45 ★
Anonymous
Tracked Vehicles "Each war proves anew to those who may have had their doubts, the primacy of the main battle tank. Between wars, the tank is always a target for cuts. But in wartime, everyone remembers why we need it, in its most advanced, upgraded versions and in militarily significant numbers." - IDF Brigadier General Yahuda Admon (retired) Since their first appearance in the latter part of World War I, tanks have increasingly dominated military thinking. Armies became progressively more mechanised during World War II, with many infantry being carried in armoured carriers by the end of the war. The armoured personnel carrier (APC) evolved into the infantry fighting vehicle (IFV), which is able to support the infantry as well as simply transport them. Modern IFVs have a similar level of battlefield mobility to the tanks, allowing tanks and infantry to operate together and provide mutual support. Abrams Mission Provide heavy armour superiority on the battlefield. Entered Army Service 1980 Description and Specifications The Abrams tank closes with and destroys enemy forces on the integrated battlefield using mobility, firepower, and shock effect. There are three variants in service: M1A1, M1A2 and M1A2 SEP. The 120mm main gun, combined with the powerful 1,500 HP turbine engine and special armour, make the Abrams tank particularly suitable for attacking or defending against large concentrations of heavy armour forces on a highly lethal battlefield. Features of the M1A1 modernisation program include increased armour protection; suspension improvements; and an improved nuclear, biological and chemical (NBC) protection system that increases survivability in a contaminated environment. The M1A1D modification consists of an M1A1 with integrated computer and a far-target-designation capability. The M1A2 modernisation program includes a commander's independent thermal viewer, an improved commander's weapon station, position navigation equipment, a distributed data and power architecture, an embedded diagnostic system and improved fire control systems.
Russell Phillips (This We'll Defend: The Weapons & Equipment of the US Army)
M113 Family of Vehicles Mission Provide a highly mobile, survivable, and reliable tracked-vehicle platform that is able to keep pace with Abrams- and Bradley-equipped units and that is adaptable to a wide range of current and future battlefield tasks through the integration of specialised mission modules at minimum operational and support cost. Entered Army Service 1960 Description and Specifications After more than four decades, the M113 family of vehicles (FOV) is still in service in the U.S. Army (and in many foreign armies). The original M113 Armoured Personnel Carrier (APC) helped to revolutionise mobile military operations. These vehicles carried 11 soldiers plus a driver and track commander under armour protection across hostile battlefield environments. More importantly, these vehicles were air transportable, air-droppable, and swimmable, allowing planners to incorporate APCs in a much wider range of combat situations, including many "rapid deployment" scenarios. The M113s were so successful that they were quickly identified as the foundation for a family of vehicles. Early derivatives included both command post (M577) and mortar carrier (M106) configurations. Over the years, the M113 FOV has undergone numerous upgrades. In 1964, the M113A1 package replaced the original gasoline engine with a 212 horsepower diesel package, significantly improving survivability by eliminating the possibility of catastrophic loss from fuel tank explosions. Several new derivatives were produced, some based on the armoured M113 chassis (e.g., the M125A1 mortar carrier and M741 "Vulcan" air defence vehicle) and some based on the unarmoured version of the chassis (e.g., the M548 cargo carrier, M667 "Lance" missile carrier, and M730 "Chaparral" missile carrier). In 1979, the A2 package of suspension and cooling enhancements was introduced. Today's M113 fleet includes a mix of these A2 variants, together with other derivatives equipped with the most recent A3 RISE (Reliability Improvements for Selected Equipment) package. The standard RISE package includes an upgraded propulsion system (turbocharged engine and new transmission), greatly improved driver controls (new power brakes and conventional steering controls), external fuel tanks, and 200-amp alternator with four batteries. Additional A3 improvements include incorporation of spall liners and provisions for mounting external armour. The future M113A3 fleet will include a number of vehicles that will have high speed digital networks and data transfer systems. The M113A3 digitisation program includes applying hardware, software, and installation kits and hosting them in the M113 FOV. Current variants: Mechanised Smoke Obscurant System M548A1/A3 Cargo Carrier M577A2/A3 Command Post Carrier M901A1 Improved TOW Vehicle M981 Fire Support Team Vehicle M1059/A3 Smoke Generator Carrier M1064/A3 Mortar Carrier M1068/A3 Standard Integrated Command Post System Carrier OPFOR Surrogate Vehicle (OSV) Manufacturer Anniston Army Depot (Anniston, AL) United Defense, L.P. (Anniston, AL)
Russell Phillips (This We'll Defend: The Weapons & Equipment of the US Army)
Excitement, then, is a defense against anxiety, a transformation of anxiety into something more bearable, a melodrama. And if one lives protected from the worst of the endless random true mysteries, risks, and traumas of the real world, there grows a hunger for excitement - hang gliders, cigarette smoking, pacts with the devil, gambling, hallucinatory drugs, bank robbery, art, books written without adequate data. Most people who can have it cannot long bear calm contentment.
Robert Stoller
Available data indicate that the blood and saliva normally carry defensive factors which when present control the growth of the acid producing organisms and the local reactions at tooth surfaces. When these defensive factors are not present the acid producing organisms multiply and produce an acid which dissolves tooth structure. The origin of this protective factor is provided in nutrition and is directly related to the mineral content of the foods and to known and unknown vitamins particularly the fat-soluble. Clinical data demonstrate that by following the program outlined dental caries can be prevented or controlled when active in practically all individuals. This does not require either permission or prescription but it is the inherent right of every individual. A properly balanced diet is good for the entire body
Anonymous
Doctors and researchers, from local emergency rooms to the Centers for Disease Control (CDC), link the growing use of handheld electronic devices to an alarming increase in injuries to children, especially when parents or caregivers are distracted and fail to properly supervise young children in the moment. The Wall Street Journal, in a roundup of research and interviews with experts on the subject, noted that injuries to children under age five rose 12 percent between 2007 and 2010, after falling for much of the prior decade, according to the most recent data from the CDC.
Catherine Steiner-Adair (The Big Disconnect: Protecting Childhood and Family Relationships in the Digital Age)
Normally, identities of Americans are removed before this data is shared with another country to protect our privacy, but Israel seems to be an exception. The NSA gives Israel’s secretive Unit 8200 “raw SIGINT”—that’s signals intelligence.
Anonymous
The core functions of an FIU call for objectivity in decision making, the timely processing of incoming information, and strict protection of confidential data. As the exchange of information between FIUs is based in large part on trust, building an FIU that inspires trust from its counterparts is key to effective cooperation.
International Monetary Fund (Financial Intelligence Units: An Overview)
Invenio IT provides the services to protect your data and Datto Backup Systems are leading in backup and disaster recovery.
invenioit
Invenio It protect your most valuable assistance. You have no time for business interruptions, very little time to manage your backups, and your budget is unfold skinny. nonetheless losing your knowledge or access to that would be devastating.
invenioit
Computer security can simply be protecting your equipment and files from disgruntled employees, spies, and anything that goes bump in the night, but there is much more. Computer security helps ensure that your computers, networks, and peripherals work as expected all the time, and that your data is safe in the event of hard disk crash or a power failure resulting from an electrical storm. Computer security also makes sure no damage is done to your data and that no one is able to read it unless you want them to
Bruce Schneier
The goal is to give stakeholders the tools they need to better understand whether law enforcement is fairly and justly treating the public it is sworn to protect. The goal is not to stanch criticism or suppress controversy. It is to produce clean, clear and actionable data that both sides can use to intelligently and meaningfully debate the way forward.
Nick Selby (In Context: Understanding Police Killings of Unarmed Civilians)
The only way to stop big data from becoming big brother is introduce privacy laws that protect the basic human rights online.
Arzak Khan
From Privacy to Belonging Some people want to be anonymous, but others are willing to give up some personal information in exchange for the recognition and benefits that come from belonging. There is an ongoing and probably endless debate over the complex concept of privacy. How much private data do you want to share? And with whom? How much should you have to share in exchange for the privileges of membership? One challenge many people face is the desire to access an organization’s benefits while wanting to stay independent. Some want to be protected from Big Brother, while others want to avoid superfluous social interactions. Still others are unabashed joiners and simply want to connect.
Robbie Kellman Baxter (The Membership Economy (PB))
To use data to know yet not manipulate, to explore but not to pry, to protect but not to smother, to see yet never expose, and, above all, to repay that priceless gift we bequeath to the world when we share our lives so that other lives might be better—and to fulfill for everyone that oldest of human hopes, from Gilgamesh to Ramses to today: that our names be remembered, not only in stone but as part of memory itself.
Christian Rudder (Dataclysm: Love, Sex, Race, and Identity--What Our Online Lives Tell Us about Our Offline Selves)
Professor Craig Franklin of the University of Queensland mounted a crocodile research partnership with Steve. The idea was to fasten transmitters and data loggers on crocs to record their activity in their natural environment. But in order to place the transmitters, you had to catch the crocs first, and that’s where Steve’s expertise came in. Steve never felt more content than when he was with his family in the bush. “There’s nothing more valuable than human life, and this research will help protect both crocs and people,” he told us. The bush was where Steve felt most at home. It was where he was at his best. On that one trip, he caught thirty-three crocs in fourteen days. He wanted to do more. “I’d really like to have the capability of doing research on the ocean as well as in the rivers,” he told me. “I could do so much more for crocodiles and sharks if I had a purpose-built research vessel.” I could see where he was heading. I was not a big fan of boats. “I’m going to contact a company in Western Australia, in Perth,” he said. “I’m going to work on a custom-built research vessel.” As the wheels turned in his mind, he became more and more excited. “The sky’s the limit, mate,” he said. “We could help tiger sharks and learn why crocs go out to sea. There is no reason why we couldn’t help whales, too.” “Tell me how we can help whales,” I said, expecting to hear about a research project that he and Craig had in mind. “It will be great,” he said. “We’ll build a boat with an icebreaking hull. We’ll weld a can opener to the front, and join Sea Shepherd in Antarctica to stop those whaling boats in their tracks.” When we got back from our first trip to Cape York Peninsula with Craig Franklin, Steve immediately began drawing up plans for his boat. He wanted to make it as comfortable as possible. As he envisioned it, the boat would be somewhere between a hard-core scientific research vessel and a luxury cruiser. He designed three berths, a plasma screen television for the kids, and air-conditioned comfort below deck. He placed a big marlin board off the back, for Jet Skis, shark cages, or hauling out huge crocs. One feature that he was really adamant about was a helicopter pad. He designed the craft so that the helicopter could land on the top. Steve’s design plans went back and forth to Perth for months. “I want this boat’s primary function to be crocodile research and rescue work,” Steve said. “So I’m going to name her Croc One.” “Why don’t we call it For Sale instead?” I suggested. I’m not sure Steve saw the humor in that. Croc One was his baby. But for some reason, I felt tremendous trepidation about this boat. I attributed my feelings of concern to Bindi and Robert. Anytime you have kids on a boat, the rules change--no playing hide-and-seek, no walking on deck without a life jacket on. It made me uncomfortable to think about being two hundred miles out at sea with two young kids. We had had so many wild adventures together as a family that, ultimately, I had to trust Steve. But my support for Croc One was always, deep down, halfhearted at best. I couldn’t shake my feeling of foreboding about it.
Terri Irwin (Steve & Me)
Moreover, an archetype exists in the nation’s consciousness that connects student loan debt with irresponsibility. This is a result of well-publicized accounts of loan defaults in decades past in which students took out loans with no intention of ever paying them back and simply filed for bankruptcy after graduation. This perception was sufficiently strong that in the 1970s, Congress was convinced to remove bankruptcy protections from student loans. However, according to a March 2007 paper by John A. E. Pottow of the University of Michigan, this perception had a fatal flaw: “The fatal problem is that there are no empirical data to buttress the myth that students defraud creditors any more than other debtors.”1 In fact, it was shown that when student loans were dischargeable in bankruptcy, there was a less than 1 percent bankruptcy rate among student debtors.2 Nevertheless, this misconception has been so often repeated that it is now indelibly etched in the public’s mind.
Alan Collinge (The Student Loan Scam: The Most Oppressive Debt in U.S. History and How We Can Fight Back)
A clean desk policy directs users to keep their areas organized and free of papers. The primary security goal is to reduce threats of security incidents by ensuring the protection of sensitive data.
Darril Gibson (CompTIA Security+: Get Certified Get Ahead: SY0-401 Study Guide)
Finally, the gun homicide and murder data leave out an extremely important point. To contribute to the homicide data, a gun must be fired and kill someone. Guns can be fired without killing, and they can be used to threaten without being fired. The Bureau of Justice maintains records on instances in which crime victims protect themselves with a gun, either by firing the gun or threatening to fire the gun. Over the five years from 2007 through 2011, there were 235,700 instances in which a potential victims of violent crime defended themselves with a gun in the U.S. Over the same period, there were 64,695 gun deaths (excluding suicides) – and some of those deaths include deaths in which the potential victim killed the criminal. In other words, from 2007 through 2011, potential victims used guns (either by firing or threatening to fire) in defense against violent crime well over three times as often as someone used a gun to kill another. And this ignores gun use in defense against property crime. From 2007 through 2011, potential victims either fired or threatened to fire guns in defense of property crime 103,000 times. In total, guns were used defensively more than five times as often as someone used a gun to kill another.
Antony Davies (Cooperation and Coercion: How Busybodies Became Busybullies and What that Means for Economics and Politics)
...the data show "a nearly linear association" between pornography use among adolescents and lack of religiosity. ...the importance of religion for daily life, however, correlates with avoiding pornography. Data from other surveys show that the use of pornography "deadens religious impulses.
John Gee (Saving Faith: How Families Protect, Sustain, and Encourage Faith)
Having said that, not everything needs to be regulated. As argued by Lisa Quest and Anthony Charrie in MIT Sloan Management Review,1 regulation should focus on three overarching objectives and be proportionate to the level of risk: Safety: protecting individuals and societies, such as governments mandating air bags, or the use of the seat belts, but not the size or form of cars Competition: ensuring that there is healthy competition and a real chance for innovation to flourish, principles that are at the core of the capitalist model upon which today's Western world is based Privacy: establishing understandable and consistent parameters for data privacy and monetization
Maelle Gavet (Trampled by Unicorns: Big Tech's Empathy Problem and How to Fix It)
A long jumper is not allowed to measure her own jumps. A problem-solving organization should not be allowed to decide what data to publish either. The people trying to solve a problem on the ground, who will always want more funds, should not also be the people measuring progress. That can lead to really misleading numbers. It was data—the data showing that suspected cases were doubling every three weeks—that made me realize how big the Ebola crisis was. It was also data—the data showing that confirmed cases were now falling—that showed me that what was being done to fight it was working. Data was absolutely key. And because it will be key in the future too, when there is another outbreak somewhere, it is crucial to protect its credibility and the credibility of those who produce it. Data must be used to tell the truth, not to call to action, no matter how noble the intentions.
Hans Rosling (Factfulness: Ten Reasons We're Wrong About the World – and Why Things Are Better Than You Think)