“
Another night then,' Mom said. 'Maybe on the weekend we can have a barbecue and invite your sister.'
'Or,' I said turning to Rafe, 'if you want to skip the whole awkward meet-the-family social event you could just submit your life story including your view on politics religion and every social issue imaginable along with anything else you think they might need to conduct a thorough background check.'
Mom sighed. 'I really don't know why we even bother trying to be subtle around you.'
'Neither do I. It's not like he isn't going to realize he's being vetted as daughter-dating material.'
Rafe grinned. 'So we are dating.'
'No. You have to pass the parental exam first. It'll take you awhile to compile the data. They'd like it in triplicate.' I turned to my parents. 'We have Kenjii. We have my cell phone. Since we aren't yet officially dating I'm sure you'll agree that's all the protection we need.'
Dad choked on his coffee.
”
”
Kelley Armstrong (The Gathering (Darkness Rising, #1))
“
Rafe grinned. "So we are dating?"
"No. You have to pass the parental exam first. It'll take you awhile to compile the data. They'd like it in triplicate."
I turned to my parents. "We have Kenji. We have my cell phone. Since we aren't officially dating, I'm sure you'll agree that's all the protection we need."
Dad chocked on his coffee.
”
”
Kelley Armstrong (The Gathering (Darkness Rising, #1))
“
A robust cybersecurity framework is essential to protect a company's digital assets, sensitive data, and critical infrastructure.
”
”
Hendrith Vanlon Smith Jr. (Board Room Blitz: Mastering the Art of Corporate Governance)
“
In the absence of data, we will always make up stories. In fact, the need to make up a story, especially when we are hurt, is part of our most primitive survival wiring. Mean making is in our biology, and our default is often to come up with a story that makes sense, feels familiar, and offers us insight into how best to self-protect.
”
”
Brené Brown (Rising Strong: The Reckoning. The Rumble. The Revolution.)
“
Data is the pollution problem of the information age, and protecting privacy is the environmental challenge.
”
”
Bruce Schneier (Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World)
“
The scientific study of suffering inevitably raises questions of causation, and with these, issues of blame and responsibility. Historically, doctors have highlighted predisposing vulnerability factors for developing PTSD, at the expense of recognizing the reality of their patients' experiences… This search for predisposing factors probably had its origins in the need to deny that all people can be stressed beyond endurance, rather than in solid scientific data; until recently such data were simply not available… When the issue of causation becomes a legitimate area of investigation, one is inevitably confronted with issues of man's inhumanity to man, with carelessness and callousness, with abrogation of responsibility, with manipulation and with failures to protect.
”
”
Bessel van der Kolk (Traumatic Stress: The Effects of Overwhelming Experience on Mind, Body, and Society)
“
The ego is definitely an advancement, but it can be compared to the bark of the tree in many ways. The bark of the tree is flexible, extremely vibrant, and grows with the growth beneath. It is a tree’s contact with the outer world, the tree’s interpreter, and to some degree the tree’s companion. So should man’s ego be. When man’s ego turns instead into a shell, when instead of interpreting outside conditions it reacts too violently against them, then it hardens, becomes an imprisoning form that begins to snuff out important data, and to keep enlarging information from the inner self. The purpose of the ego is protective. It is also a device to enable the inner self to inhabit the physical plane. It is in other words a camouflage. It is the
”
”
Jane Roberts (The Early Sessions: Book 1 of The Seth Material)
“
One major irony here is that law, which always lags behind technological innovation by at least a generation, gives substantially more protections to a communication’s content than to its metadata—and yet intelligence agencies are far more interested in the metadata—the activity records that allow them both the “big picture” ability to analyze data at scale, and the “little picture” ability to make perfect maps, chronologies, and associative synopses of an individual person’s life, from which they presume to extrapolate predictions of behavior.
”
”
Edward Snowden (Permanent Record)
“
But the world is oddly lacking in discussions of what happens, physically, to Mom after the baby arrives. Before the baby, you’re a vessel to be cherished and protected. After the baby, you’re a lactation-oriented baby accessory.
”
”
Emily Oster (Cribsheet: A Data-Driven Guide to Better, More Relaxed Parenting, from Birth to Preschool (The ParentData Series Book 2))
“
Data: My positronic brain has several layers of shielding to protect me from power surges. It would be possible for you to remove my cranial unit and take it with you.
Riker: Let me get this straight--you want me to take off your head?
Data: Yes sir
”
”
Star Trek The Next Generation
“
Availability protection ensures reliability and timely access to data and resources to authorized individuals.
”
”
Shon Harris (CISSP Boxed Set)
“
Snooping data was alot like having indiscriminate sex—protection or noprotection, sooner or later you caught something.
”
”
Dan Brown (Digital Fortress)
“
Snooping data was a lot like having indiscriminate sex—protection or no protection, sooner or later you caught something.
”
”
Dan Brown (Digital Fortress)
“
Attention words. A single word wasn't enough. Not even for a particular segment. The brain had defenses, filters evolved over millions of years to protect against manipulation. The first was perception, the process of funneling an ocean of sensory input down to a few key data packages worthy of study by the cerebral cortex. When data got by the perception filter, it received attention. And she saw now that it must be like that all the way down: There must be words to attack each filter. Attention words and then maybe desire words and logic words and urgency words and command words. This was what they were teaching her. How to craft a string of words that would disable the filters one by one, unlocking each mental tumbler until the mind's last door swung open.
”
”
Max Barry (Lexicon)
“
Data was absolutely key. And because it will be key in the future too, when there is another outbreak somewhere, it is crucial to protect its credibility and the credibility of those who produce it. Data must be used to tell the truth, not to call to action, no matter how noble the intentions.
”
”
Hans Rosling (Factfulness: Ten Reasons We're Wrong About the World—and Why Things Are Better Than You Think)
“
After presenting the data and making my arguments about the unconstitutional exclusion of African Americans, the judge complained loudly. “I’m going to grant your motion, Mr. Stevenson, but I’ll be honest. I’m pretty fed up with people always talking about minority rights. African Americans, Mexican Americans, Asian Americans, Native Americans … When is someone going to come to my courtroom and protect the rights of Confederate Americans?
”
”
Bryan Stevenson (Just Mercy: A Story of Justice and Redemption)
“
If you have to maintain self-esteem by pulling down the standing of others, you are extraordinarily unfortunate in a variety of ways. Since you have to protect your feeling of personal worth by noting how unworthy everybody around you is, you are not provided with any data that are convincing evidence of your having personal worth; so it gradually evolves into 'I am not as bad as the other swine.' To be the best of swine, when it would be nice to be a person, is not a particularly good way of furthering anything except security operations. When security is achieved that way, it strikes at the very roots of that which is essentially human -- the utterly vital role of interpersonal relations.' from The Interpersonal Theory of Psychiatry
”
”
Helen Swick Perry (Psychiatrist of America: The Life of Henry Stack Sullivan)
“
I’ve laid down ten statistical commandments in this book. First, we should learn to stop and notice our emotional reaction to a claim, rather than accepting or rejecting it because of how it makes us feel. Second, we should look for ways to combine the “bird’s eye” statistical perspective with the “worm’s eye” view from personal experience. Third, we should look at the labels on the data we’re being given, and ask if we understand what’s really being described. Fourth, we should look for comparisons and context, putting any claim into perspective. Fifth, we should look behind the statistics at where they came from—and what other data might have vanished into obscurity. Sixth, we should ask who is missing from the data we’re being shown, and whether our conclusions might differ if they were included. Seventh, we should ask tough questions about algorithms and the big datasets that drive them, recognizing that without intelligent openness they cannot be trusted. Eighth, we should pay more attention to the bedrock of official statistics—and the sometimes heroic statisticians who protect it. Ninth, we should look under the surface of any beautiful graph or chart. And tenth, we should keep an open mind, asking how we might be mistaken, and whether the facts have changed.
”
”
Tim Harford (The Data Detective: Ten Easy Rules to Make Sense of Statistics)
“
One of the main cyber-risks is to think they don’t exist. The other is to try to treat all potential risks.
Fix the basics, protect first what matters for your business and be ready to react properly to pertinent threats. Think data, but also business services integrity, awareness, customer experience, compliance, and reputation.
”
”
Stephane Nappo
“
I post Instagram photos that I think of as testaments to my beauty and then obsessively check the likes to see if the internet agrees. I collect this data more than I want to admit, trying to measure my allure as objectively and brutally as possible. I want to calculate my beauty to protect myself, to understand exactly how much power and lovability I have.
”
”
Emily Ratajkowski (My Body)
“
It's proper Netiquette to protect data with passwords. NetworkEtiquette.net
”
”
David Chiles
“
Responsible data and complete transparency are the unbreakable shields in the realm of large-scale Ethical AI for protecting humanity and fostering growth.
”
”
Sri Amit Ray (Ethical AI Systems: Frameworks, Principles, and Advanced Practices)
“
anonymity is valuable for all the reasons I’ve discussed in this chapter. It protects privacy, it empowers individuals, and it’s fundamental to liberty.
”
”
Bruce Schneier (Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World)
“
Protecting data is not just about preventing unauthorized access. It also involves ensuring data integrity and availability.
”
”
Enamul Haque (AI Horizons: Shaping a Better Future Through Responsible Innovation and Human Collaboration)
“
Fred’s vacuum-rated armor protected him from the smell of viscera, but it reported it to him as a slight increase in atmospheric methane levels. The stench of death reduced to a data point.
”
”
James S.A. Corey (The Butcher of Anderson Station (The Expanse, #1.5))
“
Both the Environmental Protection Agency and the Department of the Interior removed from their websites the links to climate change data. The USDA removed the inspection reports of businesses accused of animal abuse by the government. The new acting head of the Consumer Financial Protection Bureau, Mick Mulvaney, said he wanted to end public access to records of consumer complaints against financial institutions. Two weeks after Hurricane Maria, statistics that detailed access to drinking water and electricity in Puerto Rico were deleted from the FEMA website. In a piece for FiveThirtyEight, Clare Malone and Jeff Asher pointed out that the first annual crime report released by the FBI under Trump was missing nearly three-quarters of the data tables from the previous year.
”
”
Michael Lewis (The Fifth Risk: Undoing Democracy)
“
I write a bunch of form labels on the whiteboard, in a nonsensical order, along with a bunch of randomly sized input boxes. I include first name, last name, address, gender, city, state, email address, etc. Then I tell the interviewee that we’re designing a form to sign up for an email newsletter and to arrange them in the right order. Only people who ask me why I need the users’ gender, or physical address, or really, anything but their email address get a second interview. I won’t hire a designer who doesn’t ask why, and I won’t hire a designer whose desire to arrange boxes is more important than their desire to protect users’ data.
”
”
Mike Monteiro (Ruined by Design: How Designers Destroyed the World, and What We Can Do to Fix It)
“
Digital freedom stops where that of users begins... Nowadays, digital evolution must no longer be offered to a customer in trade-off between privacy and security. Privacy is not for sale, it's a valuable asset to protect.
”
”
Stephane Nappo
“
They have taken advantage of our trust, using sophisticated techniques to prey on the weakest aspects of human psychology, to gather and exploit private data, and to craft business models that do not protect users from harm.
”
”
Roger McNamee (Zucked: Waking Up to the Facebook Catastrophe)
“
Welcome to Anarchy.Cloud. We provide information storage and remote computing services from low orbit server stations. Our operating entity belongs to no nation, political party, or corporation. As far as practicable, we endeavor to help you circumvent laws like the American PATRIOT Act and the supplements to the European Union’s Article 29 of the Data Protection Directive, which are designed to invade data privacy in the name of antiterrorism.
”
”
Chen Qiufan (Waste Tide)
“
Ron Rivest, one of the inventors of RSA, thinks that restricting cryptography would be foolhardy: It is poor policy to clamp down indiscriminately on a technology just because some criminals might be able to use it to their advantage. For example, any U.S. citizen can freely buy a pair of gloves, even though a burglar might use them to ransack a house without leaving fingerprints. Cryptography is a data-protection technology, just as gloves are a hand-protection technology. Cryptography protects data from hackers, corporate spies, and con artists, whereas gloves protect hands from cuts, scrapes, heat, cold, and infection. The former can frustrate FBI wiretapping, and the latter can thwart FBI fingerprint analysis. Cryptography and gloves are both dirt-cheap and widely available. In fact, you can download good cryptographic software from the Internet for less than the price of a good pair of gloves.
”
”
Simon Singh (The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography)
“
In the pre-digital age, people hid their embarrassing thoughts from other people. In the digital age, they still hide them from other people, but not from the internet and in particular sites such as Google and PornHub, which protect their anonymity.
”
”
Seth Stephens-Davidowitz (Everybody Lies: Big Data, New Data, and What the Internet Can Tell Us About Who We Really Are)
“
While I was loading the washing machine, my telephone rang. A visitor and a phone call! A red-letter day indeed. It was Raymond. “I rang Bob’s mobile and explained the situation to him, and he dug out your number from the personnel files for me,” he said. I mean, really. Was all of me on show in buff folders, splayed wide for anyone to flick open and do with as they wished? “What a gross abuse of my privacy, not to mention an offense against the Data Protection Act,” I said. “I’ll be speaking to Bob about that next week.
”
”
Gail Honeyman (Eleanor Oliphant Is Completely Fine)
“
He was an accomplished computer hacker. During the past two years, he’d penetrated highly protected computer systems, in which he had planted rootkits that allowed him to swim through their networks without their security becoming aware that a secret fish explored the data depths.
”
”
Dean Koontz (Devoted)
“
The Internet of Things (IoT) devoid of comprehensive security management is tantamount to the Internet of Threats.
Apply open collaborative innovation, systems thinking & zero-trust security models to design IoT ecosystems that generate and capture value in value chains of the Internet of Things.
”
”
Stephane Nappo
“
What the data show: the fewer social relationships a person has, the shorter his or her life expectancy, and the worse the impact of various infectious diseases. Relationships that are medically protective can take the form of marriage, contact with friends and extended family, church membership, or other group affiliations.
”
”
Robert M. Sapolsky (Why Zebras Don't Get Ulcers: The Acclaimed Guide to Stress, Stress-Related Diseases, and Coping)
“
As black-box technologies become more widespread, there have been no shortage of demands for increased transparency. In 2016 the European Union's General Data Protection Regulation included in its stipulations the "right to an explanation," declaring that citizens have a right to know the reason behind the automated decisions that involve them. While no similar measure exists in the United States, the tech industry has become more amenable to paying lip service to "transparency" and "explainability," if only to build consumer trust. Some companies claim they have developed methods that work in reverse to suss out data points that may have triggered the machine's decisions—though these explanations are at best intelligent guesses. (Sam Ritchie, a former software engineer at Stripe, prefers the term "narratives," since the explanations are not a step-by-step breakdown of the algorithm's decision-making process but a hypothesis about reasoning tactics it may have used.) In some cases the explanations come from an entirely different system trained to generate responses that are meant to account convincingly, in semantic terms, for decisions the original machine made, when in truth the two systems are entirely autonomous and unrelated. These misleading explanations end up merely contributing another layer of opacity. "The problem is now exacerbated," writes the critic Kathrin Passig, "because even the existence of a lack of explanation is concealed.
”
”
Meghan O'Gieblyn (God, Human, Animal, Machine: Technology, Metaphor, and the Search for Meaning)
“
perfectionism is a desperate attempt to live up to impossible standards. Perfectionism will do anything to protect those impossible standards. It can’t let you find out how impossible they are, especially with the cold eye of data, so it terrifies you into thinking that you’ll be crushed by disappointment if you peer behind that curtain. Data would tell you that your bank account is low, but you’re spending a lot more on coffee than you think. If you started making it at home, you could easily start saving for a vacation. You might even stop comparing yourself to the impossible financial standards of your friends online. You might make some reasonable goals and completely change the way you view money. You might even have fun.
”
”
Jon Acuff (Finish: Give Yourself the Gift of Done)
“
Data Ambassador Job Description The Data Ambassador will serve as a liaison between all business stakeholders, end-users and technical resources to protect and promote data assets. This highly influential role will interact with all levels of the organization, guide the development of data assets, and ensure usage of data assets to drive a positive value proposition.
”
”
Laura B. Madsen (Disrupting Data Governance: A Call to Action)
“
Technology is a powerful force in our society. Data, software, and communication can be used for bad: to entrench unfair power structures, to undermine human rights, and to protect vested interests. But they can also be used for good: to make underrepresented people’s voices heard, to create opportunities for everyone, and to avert disasters. This book is dedicated to everyone working toward the good.
”
”
Martin Kleppmann (Designing Data-Intensive Applications: The Big Ideas Behind Reliable, Scalable, and Maintainable Systems)
“
Relying on hard data, committing to open and democratic communication, acknowledging fallibility: these are the central tenets of any system that aims to protect us from error. They are also markedly different from how we normally think—from our often hasty and asymmetric treatment of evidence, from the cloistering effects of insular communities, and from our instinctive recourse to defensiveness and denial.
”
”
Kathryn Schulz (Being Wrong: Adventures in the Margin of Error)
“
The materialist interpretation of the world and of science itself is protected not by the facts or by the data of our honest experiences, but by what is essentially social and professional peer pressure, something more akin to the grade-school playground or high school prom. The world is preserved through eyes rolling back, snide remarks, arrogant smirks and subtle, or not so subtle, social cues, and a kind of professional (or conjugal) shaming.
”
”
Jeffrey J. Kripal (The Flip: Epiphanies of Mind and the Future of Knowledge)
“
Privacy is not a luxury that we can only afford in times of safety. Instead, it's a value to be preserved. It's essential for liberty, autonomy, and human dignity. We must understand that privacy is not something to be traded away in some fearful attempt to guarantee security, but something to maintain and protect in order to have real security.
None of this will happen without a change of attitude. In the end, we'll get the privacy we as a society demand and not a bit more.
”
”
Bruce Schneier (Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World)
“
Once companies amass troves of data on employees’ health, what will stop them from developing health scores and wielding them to sift through job candidates? Much of the proxy data collected, whether step counts or sleeping patterns, is not protected by law, so it would theoretically be perfectly legal. And it would make sense. As we’ve seen, they routinely reject applicants on the basis of credit scores and personality tests. Health scores represent a natural—and frightening—next step.
”
”
Cathy O'Neil (Weapons of Math Destruction: How Big Data Increases Inequality and Threatens Democracy)
“
Jacobson had been told to remove the Fourth Amendment protections from an experimental surveillance system, one of the most powerful spying programs the NSA had ever developed. The advanced system was still just a pilot project, but top NSA officials wanted to make it operational immediately—and use it to collect data on Americans. They had ordered Jacobson to strip away the carefully calibrated restrictions built into the system, which were designed to prevent it from illegally collecting information on U.S. citizens.
”
”
James Risen (Pay Any Price: Greed, Power, and Endless War)
“
For the third type of coping strategy, at the societal level, we need to ask how non-state actors (such as communities and nonprofit organizations) will respond to the consequences of the data revolution. We think a wave of civil-society organizations will emerge in the next decade designed to shield connected citizens from their governments and from themselves. Powerful lobbying groups will advocate content and privacy laws. Rights organizations that document repressive surveillance tactics will call for better citizen protection. There
”
”
Eric Schmidt (The New Digital Age: Reshaping the Future of People, Nations and Business)
“
Once the NSA embraced the Internet and a drift-net style of data collection, the agency was transformed. The bulk collection of phone and e-mail metadata, both inside the United States and around the world, has now become one of the NSA’s core missions. The agency’s analysts have discovered that they can learn far more about people by tracking their daily digital footprints through their metadata than they could ever learn from actually eavesdropping on their conversations. What’s more, phone and e-mail logging data comes with few legal protections, making it easy for the NSA to access.
”
”
James Risen (Pay Any Price: Greed, Power, and Endless War)
“
What was in fact blown up on the 8th of November 2016 was the social contract, the paradigm that says you can live comfortably without getting your hands dirty with politics. The belief that it only takes your one vote every four years (or no vote at all: you’re above politics) to have your freedoms protected. This belief was torn to pieces. The belief that institutions are here to protect us and take care of us, and we don’t need to bother ourselves with protecting these institutions from being eroded by corruption, lobbyists, monopolies, corporate and government control over our personal data.
”
”
Nadya Tolokonnikova (Read & Riot: A Pussy Riot Guide to Activism)
“
Most unsettling of all is this: the content of television is not a vision but a manufactured data stream that can be sanitised to “protect” or impose cultural values. Thus we are confronted with an addictive and all-pervasive drug that delivers an experience whose message is whatever those who deal the drug wish it to be. … Yet no drug in history has so quickly or completely isolated the entire culture of its users from contact with reality. And no drug in history has so completely succeeded in remaking in its own image the values of the culture that it has infected.” - Terence McKenna, Food of the Gods
”
”
Steven Turner (The DMT Diaries: From Materialism to Modern Mysticism)
“
He further explained, “We started a project to see if we could get better at suggesting groups that will be meaningful to you. We started building artificial intelligence to do this. And it works. In the first six months, we helped 50% more people join meaningful communities.” His ultimate goal is “to help 1 billion people join meaningful communities….If we can do this, it will not only turn around the whole decline in community membership we’ve seen for decades, it will start to strengthen our social fabric and bring the world closer together.” This is such an important goal that Zuckerberg vowed “to change Facebook’s whole mission to take this on.”3 Zuckerberg is certainly correct in lamenting the breakdown of human communities. Yet several months after Zuckerberg made this vow, and just as this book was going to print, the Cambridge Analytica scandal revealed that data entrusted to Facebook was harvested by third parties and used to manipulate elections around the world. This made a mockery of Zuckerberg’s lofty promises, and shattered public trust in Facebook. One can only hope that before undertaking the building of new human communities, Facebook first commits itself to protecting the privacy and security of existing communities.
”
”
Yuval Noah Harari (21 Lessons for the 21st Century)
“
The era of data is here; we are now recorded. That, like all change, is frightening, but between the gunmetal gray of the government and the hot pink of product offers we just can’t refuse, there is an open and ungarish way. To use data to know yet not manipulate, to explore but not to pry, to protect but not to smother, to see yet never expose, and, above all, to repay that priceless gift we bequeath to the world when we share our lives so that other lives might be better—and to fulfill for everyone that oldest of human hopes, from Gilgamesh to Ramses to today: that our names be remembered, not only in stone but as part of memory itself.
”
”
Christian Rudder (Dataclysm: Love, Sex, Race, and Identity--What Our Online Lives Tell Us about Our Offline Selves)
“
Lavabit was an e-mail service that offered more security privacy than the large corporate e-mail services most of us use. It was a small company, owned and operated by a programmer named Ladar Levison, and it was popular among the tech-savvy. It had half a million users, Edward Snowden amongst them. Soon after Snowden fled to Hong Kong in 2013, Levison received a National Security Letter demanding that the company turn over the master encryption key that protected all of Lavabit’s users—and then not tell any of its customers that they could be monitored. Levison fought this order in court, and when it became clear that he had lost, he shut down his service rather than deceive and compromise his customers. The moral is clear. If you run a business, and the FBI or the NSA wants to turn it into a mass surveillance tool, it believes that it is entitled to do so, solely on its own authority. The agency can force you to modify your system. It can do it all in secret and then force your business to keep that secret. Once it does that, you no longer control that part of your business. If you’re a large company, you can’t shut it down. You can’t realistically terminate part of your service. In a very real sense, it is not your business anymore. It has become an arm of the vast US surveillance apparatus, and if your interest conflicts with the agency’s, the agency wins. Your business has been commandeered.
”
”
Bruce Schneier (Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World)
“
Here is what’s true. Today’s technology gives governments and corporations robust capabilities for mass surveillance. Mass surveillance is dangerous. It enables discrimination based on almost any criteria: race, religion, class, political beliefs. It is being used to control what we see, what we can do, and, ultimately, what we say. It is being done without offering citizens recourse or any real ability to opt out, and without any meaningful checks and balances. It makes us less safe. It makes us less free. The rules we had established to protect us from these dangers under earlier technological regimes are now woefully insufficient; they are not working. We need to fix that, and we need to do it very soon.
”
”
Bruce Schneier (Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World)
“
By 2011, enough data had been accumulated to show that some risk existed due to long-term, heavy use of mobile phones, compelling the International Agency for Research on Cancer, a branch of the World Health Organization, to classify mobile cell phone radiation in the Group 2B category, indicating a possible carcinogen (a substance or source of exposure that can cause cancer).14 This is the same category as DDT, lead, engine exhaust, chloroform, and glyphosate (the active ingredient in Roundup®). Later, in 2016, a $25 million study conducted by the National Toxicology Program (NTP), part of the National Institutes of Health, confirmed what many have believed for years—that exposure to EMF radiation emitted from cell phones can lead to serious health issues including brain and heart tumors.
”
”
Daniel T. DeBaun (Radiation Nation: Complete Guide to EMF Protection & Safety - The Proven Health Risks of EMF Radiation & What You Can Do to Protect Yourself & Family)
“
The states with fewer men’s deaths, Campbell tells the audience, are the states with good police responses, with good laws of protection, with decent resources for victims. In other words, Campbell says, “Abused women feel less like there’s no way out except to kill him.” In fact, since 1976 rates of men killed by women have dropped by nearly three-quarters.2 What she means is that there are states where abused women don’t have to resort to murdering their abusers to return to freedom. While there are no national statistics, some states collect this data. In New York, for example, two-thirds of incarcerated women in 2005 had been abused beforehand by the person they killed.3 Though in many states today, still, victims are barred from using their long histories of enduring violence at the hands of their partners in their own defense.
”
”
Rachel Louise Snyder (No Visible Bruises: What We Don’t Know About Domestic Violence Can Kill Us)
“
I started this book by talking about data as exhaust: something we all produce as we go about our information-age business. I think I can take that analogy one step further. Data is the pollution problem of the information age, and protecting privacy is the environmental challenge. Almost all computers produce personal information. It stays around, festering. How we deal with it—how we contain it and how we dispose of it—is central to the health of our information economy. Just as we look back today at the early decades of the industrial age and wonder how our ancestors could have ignored pollution in their rush to build an industrial world, our grandchildren will look back at us during these early decades of the information age and judge us on how we addressed the challenge of data collection and misuse. We should try to make them proud.
”
”
Bruce Schneier (Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World)
“
Eventually, we may reach a point when it will be impossible to disconnect from this all-knowing network even for a moment. Disconnection will mean death. If medical hopes are realised, future people will incorporate into their bodies a host of biometric devices, bionic organs and nano-robots, which will monitor our health and defend us from infections, illnesses and damage. Yet these devices will have to be online 24/7, both in order to be updated with the latest medical news, and in order to protect them from the new plagues of cyberspace. Just as my home computer is constantly attacked by viruses, worms and Trojan horses, so will be my pacemaker, my hearing aid and my nanotech immune system. If I don’t update my body’s anti-virus program regularly, I will wake up one day to discover that the millions of nano-robots coursing through my veins are now controlled by a North Korean hacker.
”
”
Yuval Noah Harari (Homo Deus: A History of Tomorrow)
“
We discussed what we want from you now,...you who had power and used it to burn the world. You burned a lot. You didn't just burn trees and cities and each other. You burned our admiration for the governments we grew up respecting. You burned our sense of safety in your care. You burned our patience, our ability to believe that the great things in this world you promised to protect will still be there for us and future generations. You burned our trust as you misused the data and surveillance we let you collect, first for O.S. and the Canner Device, then for the war, its propaganda and its lies. You burned our self-trust, too, since we know we are infused with your values, values we thought made both you and us people who would never do what you just did. We have to be afraid of ourselves now, vigilant against what you've taught us to be, since now we know we are something to be afraid and ashamed of. And even if you didn't personally kill in the war, if you carried arms, if you participated, you helped burn what nothing can bring back. No sentence can repair any of that. So, we want you to repair what you can. That's our sentence. We want you to rebuild the cities, replant the trees, replace the art, relaunch the satellites, fix the bridges you can fix to make up for the ones you can't. We want you to rebuild the system, too, fixing the holes this has exposed and making more safeguards so no one can misuse the cars and data and surveillance and trackers and such again. We want you to build it all back but better than it was, and faster than any past war has rebuilt. You weren't as good at peace as you thought you were, but maybe you can be as good at rebuilding. Everyone, even Minors like Tribune MASON who took part, if in your heart you know you were complicit, then build back what you burned with your own hours, your own efforts, your own hands. That's our sentence.
”
”
Ada Palmer (Perhaps the Stars (Terra Ignota, #4))
“
Peopleware. A major contribution during recent years has been DeMarco and Lister's 1987 book, Peopleware: Productive Projects and Teams. Its underlying thesis is that "The major problems of our work are not so much technological as sociological in nature." It abounds with gems such as, "The manager's function is not to make people work, it is to make it possible for people to work." It deals with such mundane topics as space, furniture, team meals together. DeMarco and Lister provide real data from their Coding War Games that show stunning correlation between performances of programmers from the same organization, and between workplace characteristics and both productivity and defect levels. The top performers' space is quieter, more private, better protected against interruption, and there is more of it. . . . Does it really matter to you . . . whether quiet, space, and privacy help your current people to do better work or [alternatively] help you to attract and keep better people?[19]
”
”
Frederick P. Brooks Jr. (The Mythical Man-Month: Essays on Software Engineering)
“
What are the health effects of the choice between austerity and stimulus? Today there is a vast natural experiment being conducted on the body economic. It is similar to the policy experiments that occurred in the Great Depression, the post-communist crisis in eastern Europe, and the East Asian Financial Crisis. As in those prior trials, health statistics from the Great Recession reveal the deadly price of austerity—a price that can be calculated not just in the ticks to economic growth rates, but in the number of years of life lost and avoidable deaths.
Had the austerity experiments been governed by the same rigorous standards as clinical trials, they would have been discontinued long ago by a board of medical ethics. The side effects of the austerity treatment have been severe and often deadly. The benefits of the treatment have failed to materialize. Instead of austerity, we should enact evidence-based policies to protect health during hard times. Social protection saves lives. If administered correctly, these programs don’t bust the budget, but—as we have shown throughout this book—they boost economic growth and improve public health.
Austerity’s advocates have ignored evidence of the health and economic consequences of their recommendations. They ignore it even though—as with the International Monetary Fund—the evidence often comes from their own data. Austerity’s proponents, such as British Prime Minister David Cameron, continue to write prescriptions of austerity for the body economic, in spite of evidence that it has failed.
Ultimately austerity has failed because it is unsupported by sound logic or data. It is an economic ideology. It stems from the belief that small government and free markets are always better than state intervention. It is a socially constructed myth—a convenient belief among politicians taken advantage of by those who have a vested interest in shrinking the role of the state, in privatizing social welfare systems for personal gain. It does great harm—punishing the most vulnerable, rather than those who caused this recession.
”
”
David Stuckler (The Body Economic: Why Austerity Kills)
“
Atonement, expiation, laundering, prophylaxis, promotion and rehabilitation -- it is difficult to put a name to all the various nuances of this general commiseration which is the product of a profound indifference and is accompanied by a fierce strategy of blackmail, of the political takeover of all these negative passions. It is the `politically correct' in all its effects -- an enterprise of laundering and mental prophylaxis, beginning with the prophylactic treatment of language. Black people, the handicapped, the blind and prostitutes become `people of colour', `the disabled', `the visually impaired', and `sex workers': they have to be laundered like dirty money. Every negative destiny has to be cleaned up by a doctoring even more obscene than what it is trying to hide.
Euphemistic language, the struggle against sexual harassment -- all this protective and protectionist masquerade is of the same order as the use of the condom. Its mental use, of course -- that is, the prophylactic use of ideas and concepts. Soon we shall think only when we are sheathed in latex. And the data suit of Virtual Reality already slips on like a condom.
”
”
Jean Baudrillard (The Perfect Crime)
“
While amassing one of the most lucrative fortunes in the world, the Kochs had also created an ideological assembly line justifying it. Now they had added a powerful political machine to protect it. They had hired top-level operatives, financed their own voter data bank, commissioned state-of-the-art polling, and created a fund-raising operation that enlisted hundreds of other wealthy Americans to help pay for it. They had also forged a coalition of some seventeen allied conservative groups with niche constituencies who would mask their centralized source of funding and carry their message. To mobilize Latino voters, they formed a group called the Libre Initiative. To reach conservative women, they funded Concerned Women for America. For millennials, they formed Generation Opportunity. To cover up fingerprints on television attack ads, they hid behind the American Future Fund and other front groups. Their network’s money also flowed to gun groups, retirees, veterans, antilabor groups, antitax groups, evangelical Christian groups, and even $4.5 million for something called the Center for Shared Services, which coordinated administrative tasks such as office space rentals and paperwork for the others. Americans for Prosperity, meanwhile, organized chapters all across the country. The Kochs had established what was in effect their own private political party.
”
”
Jane Mayer (Dark Money: The Hidden History of the Billionaires Behind the Rise of the Radical Right)
“
The “pale blue dot” image and Carl’s prose meditation on it have been beloved the world over ever since. It exemplifies just the kind of breakthrough that I think of as a fulfillment of Einstein’s hope for science. We have gotten clever enough to dispatch a spacecraft four billion miles away and command it to send us back an image of Earth. Seeing our world as a single pixel in the immense darkness is in itself a statement about our true circumstances in the cosmos, and one that every single human can grasp instantly. No advanced degree required. In that photo, the inner meaning of four centuries of astronomical research is suddenly available to all of us at a glance. It is scientific data and art equally, because it has the power to reach into our souls and alter our consciousness. It is like a great book or movie, or any major work of art. It can pierce our denial and allow us to feel something of reality—even a reality that some of us have long resisted.
A world that tiny cannot possibly be the center of a cosmos of all that is, let alone the sole focus of its creator. The pale blue dot is a silent rebuke to the fundamentalist, the nationalist, the militarist, the polluter—to anyone who does not put above all other things the protection of our little planet and the life that it sustains in the vast cold darkness. There is no running away from the inner meaning of this scientific achievement.
”
”
Ann Druyan (Cosmos: Possible Worlds)
“
The intimate link existing between Yahweh and the Kenites is strengthened by the following observations:
1. The first mention of Yahweh (neither Elohim nor Yahweh-Elohim) in the book of Genesis is related to the birth of Cain: 'Now the man knew his wife Even, and she conceived and bore Cain, saying, "I have produced a man with the help of the LORD"' (Gen. 4.1). This may be a symbolic way to claim that the 'discovery' of Yahweh is concomitant to the discovery of metallurgy.
2. Enosh is mentioned in Genesis as the first man who worshipped Yahweh: 'To Seth also a son was born, and he names him Enosh. At that time people began to invoke the name of the LORD' (Gen. 4.26). Interestingly, Enosh is the father of Keynan (= Cain). Again, the worship of Yahweh appears to have been linked to the discovery of metallurgy.
3. The Kenites had a sign (taw) on their forehead. From Gen. 4.15, it appears that this sign signalled that Yahweh protects Cain and his sons. From Ezek. 9.4-6, it seems that, at the end of the First Temple period, a similar sign remained the symbol of devotion to Yahweh.
4. The book of Jeremiah confirms the existence of a Kenite worship of Yahweh as follows:'Jonadab son of Rechab shall not lack a descendant to stand before me [Yahweh] for all time' (Jer. 35.19). This fidelity of smelters and smiths to the initial Yahwistic tradition may explain why the liberators of Judah, Israel and Jerusalem are depicted as smiths in the book of Zechariah (Zech. 2.3-4).
When considered together, these data suggest that Yahweh was intimately related with the metallurgists from the very discovery of copper smelting. (pp. 393-394)
from 'Yahweh, the Canaanite God of Metallurgy?', JSOT 33.4 (2009): 387-404
”
”
Nissim Amzallag
“
GCHQ has traveled a long and winding road. That road stretches from the wooden huts of Bletchley Park, past the domes and dishes of the Cold War, and on towards what some suggest will be the omniscient state of the Brave New World. As we look to the future, the docile and passive state described by Aldous Huxley in his Brave New World is perhaps more appropriate analogy than the strictly totalitarian predictions offered by George Orwell's Nineteen Eighty-Four. Bizarrely, many British citizens are quite content in this new climate of hyper-surveillance, since its their own lifestyle choices that helped to create 'wired world' - or even wish for it, for as we have seen, the new torrents of data have been been a source of endless trouble for the overstretched secret agencies. As Ken Macdonald rightly points out, the real drives of our wired world have been private companies looking for growth, and private individuals in search of luxury and convenience at the click of a mouse. The sigint agencies have merely been handed the impossible task of making an interconnected society perfectly secure and risk-free, against the background of a globalized world that presents many unprecedented threats, and now has a few boundaries or borders to protect us. Who, then, is to blame for the rapid intensification of electronic surveillance? Instinctively, many might reply Osama bin Laden, or perhaps Pablo Escobar. Others might respond that governments have used these villains as a convenient excuse to extend state control. At first glance, the massive growth of security, which includes includes not only eavesdropping but also biometric monitoring, face recognition, universal fingerprinting and the gathering of DNA, looks like a sad response to new kinds of miscreants. However, the sad reality is that the Brave New World that looms ahead of us is ultimately a reflection of ourselves. It is driven by technologies such as text messaging and customer loyalty cards that are free to accept or reject as we choose. The public debate on surveillance is often cast in terms of a trade-off between security and privacy. The truth is that luxury and convenience have been pre-eminent themes in the last decade, and we have given them a much higher priority than either security or privacy. We have all been embraced the world of surveillance with remarkable eagerness, surfing the Internet in a global search for a better bargain, better friends, even a better partner.
GCHQ vast new circular headquarters is sometimes represented as a 'ring of power', exercising unparalleled levels of surveillance over citizens at home and abroad, collecting every email, every telephone and every instance of internet acces. It has even been asserted that GCHQ is engaged in nothing short of 'algorithmic warfare' as part of a battle for control of global communications. By contrast, the occupants of 'Celtenham's Doughnut' claim that in reality they are increasingly weak, having been left behind by the unstoppable electronic communications that they cannot hope to listen to, still less analyse or make sense of. In fact, the frightening truth is that no one is in control. No person, no intelligence agency and no government is steering the accelerating electronic processes that may eventually enslave us. Most of the devices that cause us to leave a continual digital trail of everything we think or do were not devised by the state, but are merely symptoms of modernity. GCHQ is simply a vast mirror, and it reflects the spirit of the age.
”
”
Richard J. Aldrich (GCHQ)
“
According to the antimicrobial hypothesis, spices kill or inhibit the growth of microorganisms and prevent the production of toxins in the foods we eat and so help humans to solve a critical problem of survival: avoiding being made ill or poisoned by the foods we eat (Sherman & Flaxman, 2001). Several sources of evidence support this hypothesis. First, of the 30 spices for which we have solid data, all killed many of the species of foodborne bacteria on which they were tested. Can you guess which spices are most powerful in killing bacteria? They are onion, garlic, allspice, and oregano. Second, more spices, and more potent spices, tend to be used in hotter climates, where unrefrigerated food spoils more quickly, promoting the rapid proliferation of dangerous microorganisms. In the hot climate of India, for example, the typical meat dish recipe calls for nine spices, whereas in the colder climate of Norway, fewer than two spices are used per meat dish on average. Third, more spices tend to be used in meat dishes than in vegetable dishes (Sherman & Hash, 2001). This is presumably because dangerous microorganisms proliferate more on unrefrigerated meat; dead plants, in contrast, contain their own physical and chemical defenses and so are better protected from bacterial invasion. In short, the use of spices in foods is one means that humans have used to combat the dangers carried on the foods we eat. The authors of the antimicrobial hypothesis are not proposing that humans have a specialized evolved adaptation for the use of spices, although they do not rule out this possibility. Rather, it is more likely that eating certain spices was discovered through accident or experimentation; people discovered that they were less likely to feel sick after eating leftovers cooked with aromatic plant products. Use of those antimicrobial spices then likely spread through cultural transmission—by imitation or verbal instruction.
”
”
David M. Buss (Evolutionary Psychology: The New Science of the Mind)
“
But nothing in my previous work had prepared me for the experience of reinvestigating Cleveland. It is worth — given the passage of time — recalling the basic architecture of the Crisis: 121 children from many different and largely unrelated families had been taken into the care of Cleveland County Council in the three short months of the summer of 1987. (p18)
The key to resolving the puzzle of Cleveland was the children. What had actually happened to them? Had they been abused - or had the paediatricians and social workers (as public opinion held) been over-zealous and plain wrong? Curiously — particularly given its high profile, year-long sittings and £5 million cost — this was the one central issue never addressed by the Butler-Sloss judicial testimony and sifting of internal evidence, the inquiry's remit did not require it to answer the main question. Ten years after the crisis, my colleagues and I set about reconstructing the records of the 121 children at its heart to determine exactly what had happened to them... (p19)
Eventually, though, we did assemble the data given to the Butler-Sloss Inquiry. This divided into two categories: the confidential material, presented in camera, and the transcripts of public sessions of the hearings. Putting the two together we assembled our own database on the children each identified only by the code-letters assigned to them by Butler-Sloss.
When it was finished, this database told a startlingly different story from the public myth. In every case there was some prima fade evidence to suggest the possibility of abuse. Far from the media fiction of parents taking their children to Middlesbrough General Hospital for a tummy ache or a sore thumb and suddenly being presented with a diagnosis of child sexual abuse, the true story was of families known to social services for months or years, histories of physical and sexual abuse of siblings and of prior discussions with parents about these concerns. In several of the cases the children themselves had made detailed disclosures of abuse; many of the pre-verbal children displayed severe emotional or behavioural symptoms consistent with sexual abuse. There were even some families in which a convicted sex offender had moved in with mother and children. (p20)
”
”
Sue Richardson (Creative Responses to Child Sexual Abuse: Challenges and Dilemmas)
“
The US traded its manufacturing sector’s health for its entertainment industry, hoping that Police Academy sequels could take the place of the rustbelt. The US bet wrong.
But like a losing gambler who keeps on doubling down, the US doesn’t know when to quit. It keeps meeting with its entertainment giants, asking how US foreign and domestic policy can preserve its business-model. Criminalize 70 million American file-sharers? Check. Turn the world’s copyright laws upside down? Check. Cream the IT industry by criminalizing attempted infringement? Check. It’ll never work. It can never work. There will always be an entertainment industry, but not one based on excluding access to published digital works. Once it’s in the world, it’ll be copied. This is why I give away digital copies of my books and make money on the printed editions: I’m not going to stop people from copying the electronic editions, so I might as well treat them as an enticement to buy the printed objects.
But there is an information economy. You don’t even need a computer to participate. My barber, an avowed technophobe who rebuilds antique motorcycles and doesn’t own a PC, benefited from the information economy when I found him by googling for barbershops in my neighborhood.
Teachers benefit from the information economy when they share lesson plans with their colleagues around the world by email. Doctors benefit from the information economy when they move their patient files to efficient digital formats. Insurance companies benefit from the information economy through better access to fresh data used in the preparation of actuarial tables. Marinas benefit from the information economy when office-slaves look up the weekend’s weather online and decide to skip out on Friday for a weekend’s sailing. Families of migrant workers benefit from the information economy when their sons and daughters wire cash home from a convenience store Western Union terminal.
This stuff generates wealth for those who practice it. It enriches the country and improves our lives.
And it can peacefully co-exist with movies, music and microcode, but not if Hollywood gets to call the shots. Where IT managers are expected to police their networks and systems for unauthorized copying – no matter what that does to productivity – they cannot co-exist. Where our operating systems are rendered inoperable by “copy protection,” they cannot co-exist. Where our educational institutions are turned into conscript enforcers for the record industry, they cannot co-exist.
The information economy is all around us. The countries that embrace it will emerge as global economic superpowers. The countries that stubbornly hold to the simplistic idea that the information economy is about selling information will end up at the bottom of the pile.
What country do you want to live in?
”
”
Cory Doctorow (Content: Selected Essays on Technology, Creativity, Copyright, and the Future of the Future)
“
Months later, Time magazine would run its now infamous article bragging about how it had been done. Without irony or shame, the magazine reported that “[t]here was a conspiracy unfolding behind the scenes” creating “an extraordinary shadow effort” by a “well-funded cabal of powerful people” to oppose Trump.112 Corporate CEOs, organized labor, left-wing activists, and Democrats all worked together in secret to secure a Biden victory. For Trump, these groups represented a powerful Washington and Democratic establishment that saw an unremarkable career politician like Biden as merely a vessel for protecting their self-interests. Accordingly, when Trump was asked whom he blames for the rigging of the 2020 election, he quickly responded, “Least of all Biden.” Time would, of course, disingenuously frame this effort as an attempt to “oppose Trump’s assault on democracy,” even as Time reporter Molly Ball noted this shadow campaign “touched every aspect of the election. They got states to change voting systems and laws and helped secure hundreds of millions in public and private funding.” The funding enabled the country’s sudden rush to mail-in balloting, which Ball described as “a revolution in how people vote.”113 The funding from Democratic donors to public election administrators was revolutionary. The Democrats’ network of nonprofit activist groups embedded into the nation’s electoral structure through generous grants from Democratic donors. They helped accomplish the Democrats’ vote-by-mail strategy from the inside of the election process. It was as if the Dallas Cowboys were paying the National Football League’s referee staff and conducting all of their support operations. No one would feel confident in games won by the Cowboys in such a scenario. Ball also reported that this shadowy cabal “successfully pressured social media companies to take a harder line against disinformation and used data-driven strategies to fight viral smears.” And yet, Time magazine made this characterization months after it was revealed that the New York Post’s reporting on Hunter Biden’s corrupt deal-making with Chinese and other foreign officials—deals that alleged direct involvement from Joe Biden, resulting in the reporting’s being overtly censored by social media—was substantially true. Twitter CEO Jack Dorsey would eventually tell Congress that censoring the New York Post and locking it out of its Twitter account over the story was “a mistake.” And the Hunter Biden story was hardly the only egregious mistake, to say nothing of the media’s willful dishonesty, in the 2020 election. Republicans read the Time article with horror and as an admission of guilt. It confirmed many voters’ suspicions that the election wasn’t entirely fair. Trump knew the article helped his case, calling it “the only good article I’ve read in Time magazine in a long time—that was actually just a piece of the truth because it was much deeper than that.
”
”
Mollie Ziegler Hemingway (Rigged: How the Media, Big Tech, and the Democrats Seized Our Elections)
“
The trends speak to an unavoidable truth. Society's future will be challenged by zoonotic viruses, a quite natural prediction, not least because humanity is a potent agent of change, which is the essential fuel of evolution. Notwithstanding these assertions, I began with the intention of leaving the reader with a broader appreciation of viruses: they are not simply life's pathogens. They are life's obligate partners and a formidable force in nature on our planet. As you contemplate the ocean under a setting sun, consider the multitude of virus particles in each milliliter of seawater: flying over wilderness forestry, consider the collective viromes of its living inhabitants. The stunnig number and diversity of viruses in our environment should engender in us greater awe that we are safe among these multitudes than fear that they will harm us.
Personalized medicine will soon become a reality and medical practice will routinely catalogue and weigh a patient's genome sequence. Not long thereafter one might expect this data to be joined by the patient's viral and bacterial metagenomes: the patient's collective genetic identity will be recorded in one printout. We will doubtless discover some of our viral passengers are harmful to our health, while others are protective. But the appreciation of viruses that I hope you have gained from these pages is not about an exercise in accounting. The balancing of benefit versus threat to humanity is a fruitless task. The viral metagenome will contain new and useful gene functionalities for biomedicine: viruses may become essential biomedical tools and phages will continue to optimize may also accelerate the development of antibiotic drug resistance in the post-antibiotic era and emerging viruses may threaten our complacency and challenge our society economically and socially. Simply comparing these pros and cons, however, does not do justice to viruses and acknowledge their rightful place in nature.
Life and viruses are inseparable. Viruses are life's complement, sometimes dangerous but always beautiful in design. All autonomous self-sustaining replicating systems that generate their own energy will foster parasites. Viruses are the inescapable by-products of life's success on the planet. We owe our own evolution to them; the fossils of many are recognizable in ERVs and EVEs that were certainly powerful influences in the evolution of our ancestors. Like viruses and prokaryotes, we are also a patchwork of genes, acquired by inheritance and horizontal gene transfer during our evolution from the primitive RNA-based world.
It is a common saying that 'beauty is in the eye of the beholder.' It is a natural response to a visual queue: a sunset, the drape of a designer dress, or the pattern of a silk tie, but it can also be found in a line of poetry, a particularly effective kitchen implement, or even the ruthless efficiency of a firearm. The latter are uniquely human acknowledgments of beauty in design. It is humanity that allows us to recognize the beauty in the evolutionary design of viruses. They are unique products of evolution, the inevitable consequence of life, infectious egotistical genetic information that taps into life and the laws of nature to fuel evolutionary invention.
”
”
Michael G. Cordingley (Viruses: Agents of Evolutionary Invention)
“
Like Felicity they methodically checked the house office, safe and family bank account details and financial affairs. Angelina then had Inspector Mick bug the boys’ homes, cars and offices and with the information she acquired came knowledge and contacts. She wrote a programme called listen, it saved all conversations digitally and converted it to text into a computer file in a remote location not traceable to her or anybody at 3WW but it recorded all his illicit dealings and it gave her valuable information. She hacked into their individual MIS computer systems and sent spyware via e-mail called virus protection free download and once opened it went through their c drive, all files on their computers, and copied all files to a ip address of a remote computer of Angelina’s request, in a phantom company named Borrow. All data was heavily encrypted and deleted after access and storage was onto an external hard drive storage box, deleting the electronic footpath. The spyware recorded their strokes on the keyboard and Angelina was able to secure even their banking pins and passwords and all their computer passwords. She had a brilliant computer mind, wasted in librarianship
”
”
Annette J. Dunlea
“
The Implementation of GDPR into law is a sensible and proactive approach to help protect data, systems and remove neglect and possible misuse or data breach of data. It is unlikely that all EU and UK business will be ready on time, but we do recommend that serious consideration is given to the topic and your approach going forward.
”
”
Alistair Dickinson (The Essential Business Guide to GDPR: A business owner’s perspective to understanding & implementing GDPR)
“
With GDPR the responsibility has now shifted to the business owner and controller to make sure that they do everything they can to protect their data silos and databases for all business systems while giving individuals more rights. Within the GDPR regulation, it is now depicted that protection is a given Human Right, and details outline the rights of individuals under the new articles and recitals.
”
”
Alistair Dickinson (The Essential Business Guide to GDPR: A business owner’s perspective to understanding & implementing GDPR)
“
A data protection officer (DPO) is an enterprise security leadership role required by the General Data Protection Regulation (GDPR). Data protection officers are responsible for overseeing data protection strategy and implementation to ensure compliance with GDPR requirements.
”
”
Alistair Dickinson (The Essential Business Guide to GDPR: A business owner’s perspective to understanding & implementing GDPR)
“
After Trump took office, DJ Patil watched with wonder as the data disappeared across the federal government. Both the Environmental Protection Agency and the Department of the Interior removed from their websites the links to climate change data.
”
”
Michael Lewis (The Fifth Risk: Undoing Democracy)
“
So what should we do with this information? One simple, fairly uncontroversial idea: we can utilize the area-level data to allocate resources. If a city has a huge rise in suicide-related searches, we can up the suicide awareness in this city. The city government or nonprofits might run commercials explaining where people can get help, for example. Similarly, if a city has a huge rise in searches for “kill Muslims,” police departments might be wise to change how they patrol the streets. They might dispatch more officers to protect the local mosque, for example.
”
”
Seth Stephens-Davidowitz (Everybody Lies: Big Data, New Data, and What the Internet Can Tell Us About Who We Really Are)
“
If, as I believe, the conceptual structures we construct today are too complicated to be accurately specified in advance, and too complex to be built faultlessly, then we must take a radically different approach. Let us turn to nature and study complexity in living things, instead of just the dead works of man. Here we find constructs whose complexities thrill us with awe. The brain alone is intricate beyond mapping, powerful beyond imitation, rich in diversity, self-protecting, and self-renewing. The secret is that it is grown, not built. So it must be with our software systems. Some years ago Harlan Mills proposed that any software system should be grown by incremental development.[11] That is, the system should first be made to run, even though it does nothing useful except call the proper set of dummy subprograms. Then, bit by bit it is fleshed out, with the subprograms in turn being developed into actions or calls to empty stubs in the level below. I have seen the most dramatic results since I began urging this technique on the project builders in my software engineering laboratory class. Nothing in the past decade has so radically changed my own practice, or its effectiveness. The approach necessitates top-down design, for it is a top-down growing of the software. It allows easy backtracking. It lends itself to early prototypes. Each added function and new provision for more complex data or circumstances grows organically out of what is already there. The morale effects are startling. Enthusiasm jumps when there is a running system, even a simple one. Efforts redouble when the first picture from a new graphics software system appears on the screen, even if it is only a rectangle. One always has, at every stage in the process, a working system. I find that teams can grow much more complex entities in four months than they can build.
”
”
Frederick P. Brooks Jr. (The Mythical Man-Month: Essays on Software Engineering)
“
In the past, security guides often suggested that it was necessary to overwrite multiple times (or “passes”). This may be true to some extent for flash media, as described below, but is apparently no longer true for traditional magnetic hard drives. See National Institute of Standards and Technology, NIST Special Publication 800-88, Revision 1. “Guidelines for Media Sanitization” (Dec. 2014) (“For storage devices containing magnetic media, a single overwrite pass with a [fixed] pattern such as binary zeroes typically hinders recovery of data even if state of the art laboratory techniques are applied to attempt to retrieve the data.”)
”
”
Sophia Cope (Digital Privacy at the U.S. Border: Protecting the Data on Your Devices and in the Cloud)
“
In Lock splitting we use different locks for different parts of the application. In Lock striping we use multiple locks to protect different parts of the same data structure. ConcurrentHashMap
”
”
Knowledge Powerhouse (Top 100 Java Multi-threading Interview Questions)
“
Even with a network of computers belonging to a company stretched across the world, the data is generally only required to be backed up around 3 to 5 locations. Additionally, billions of dollars are spent in order to protect these databases. In the case of a blockchain database, the data can exist on thousands of computers around the globe at a fraction of the cost.
”
”
Chris Lambert (Cryptocurrency: How I Turned $400 into $100,000 by Trading Cryptocurrency for 6 months (Crypto Trading Secrets Book 1))
“
The main finding was that vegan and lacto-ovo vegetarian diets were associated with a nearly one-half reduction in risk of type 2 diabetes compared with the risk associated with nonvegetarian diets after adjustment for a number of socioeconomic and lifestyle factors, as well as low BMI, that are typically associated with vegetarianism. Pesco- and semi-vegetarian diets were associated with intermediate risk reductions: between one-third and one-quarter. These data indicate that vegetarian diets may in part counteract the environmental forces leading to obesity and increased rates of type 2 diabetes, though only vegan diets were associated with a BMI in the optimal range. Inclusion of meat, meat products, and fish in the diet, even on a less than weekly basis, seems to limit some of the protection associated with a vegan or lacto-ovo vegetarian diet. These findings may be explained by adverse effects of meat and fish, protective effects of typical constituents of vegan and lacto-ovo vegetarian diets, other characteristics of people who choose vegetarian diets, or a combination of these factors.
”
”
Serena Tonstad
“
Writing, for me, is the equivalent of laying on the Psychologist Couch. I must write or I become disoriented by the deluge of data I take in each day. Writing is a REBOOT. A cleaning of my old files to make room for new information.
I get it out of my system the things i cant say correctly to others. I express the darkness and the light of my mind and soul. Once i'm done, there is a sort of HEALING that i didn't have before. I become just a little more BALANCED. I am able to function better and with more precision. Writing becomes my Virus Protection.
”
”
Levon Peter Poe
“
Rather than having a single file that can be easily corrupted, altering how the cryptocurrency operates, there a number of copies of that same file that would need to be altered in the same way. This means it is virtually impossible for a hacker to crack the database due to the fact the data can simply reinstate itself to keep the chain of data secure. This allows the data to be protected for a fraction of the cost without requiring highly expensive cyber security software and services.
”
”
Chris Lambert (Cryptocurrency: How I Turned $400 into $100,000 by Trading Cryptocurrency for 6 months (Crypto Trading Secrets Book 1))
“
Know Singapore’s Credit Bureau to Get License Money Lender Approval
Do you ever wonder how a licensed money lender like banks get the information they need to decide whether they will approve your loan or not? In this article, you’ll know the Credit Bureau Singapore (CBS) role on the moneylenders’ process of lending money.
History of CBS
Association of Banks in Singapore (ABS) and DBIC Holdings owns CBS. It was founded on November 15, 2002, and its key role is to serve as a financial risk management tool for financial institutions. Among CBS founders’ are Citibank, United Overseas Bank (UOB), Development Bank of Singapore (DBS), Oversea-Chinese Banking Corporation (OCBC), American Express, ANZ, Maybank, HSBC and Standard Chartered Bank.
Key Role of CBS on Licensed Money Lender Loan Approval
The CBS is a private company established to help financial companies and credit card institutions to evaluate the threats and opportunities of giving credit to possible or current customers. To put simply, when you apply for a loan, the CBS gives the licensed moneylender your credit report. This credit report reflects your credit information such as credit history, repayment track, and in some cases default records, lawsuit, and bankruptcy reports. This valuable information is collected from financial institutions and other public data resources (like subpoena and data of bankruptcy) which is part of CBS.
The Banking Act allows the CB to get such customer’s confidential data and produce a “complete risk profile.” CBS follows a stringent code of conduct to protect the consumer’s data privacy. Only the official members of CBS can access and use the credit information. Licensed money lender should not disclose any information about their clients’ credit background to any third party. The CB also cannot collect customer’s personal data such as contact numbers, home address, credit limit, and salary.
Now that you finally know who helps licensed money lender to decide your loan’s approval, you should now know that borrowing money is not as simple as it sounds. Multiple agencies are working together to check whether you are worthy of the money.
”
”
Michael Arnold
“
Know Singapore’s Credit Bureau to Get License Money Lender Approval
Do you ever wonder how a licensed money lender like banks get the information they need to decide whether they will approve your loan or not? In this article, you’ll know the Credit Bureau Singapore (CBS) role on the moneylenders’ process of lending money.
History of CBS
Association of Banks in Singapore (ABS) and DBIC Holdings owns CBS. It was founded on November 15, 2002, and its key role is to serve as a financial risk management tool for financial institutions. Among CBS founders’ are Citibank, United Overseas Bank (UOB), Development Bank of Singapore (DBS), Oversea-Chinese Banking Corporation (OCBC), American Express, ANZ, Maybank, HSBC and Standard Chartered Bank.
Key Role of CBS on Licensed Money Lender Loan Approval
The CBS is a private company established to help financial companies and credit card institutions to evaluate the threats and opportunities of giving credit to possible or current customers. To put simply, when you apply for a loan, the CBS gives the licensed moneylender your credit report. This credit report reflects your credit information such as credit history, repayment track, and in some cases default records, lawsuit, and bankruptcy reports. This valuable information is collected from financial institutions and other public data resources (like subpoena and data of bankruptcy) which is part of CBS.
The Banking Act allows the CB to get such customer’s confidential data and produce a “complete risk profile.” CBS follows a stringent code of conduct to protect the consumer’s data privacy. Only the official members of CBS can access and use the credit information. Licensed money lender should not disclose any information about their clients’ credit background to any third party. The CB also cannot collect customer’s personal data such as contact numbers, home address, credit limit, and salary.
Now that you finally know who helps licensed money lender to decide your loan’s approval, you should now know that borrowing money is not as simple as it sounds. Multiple agencies are working together to check whether you are worthy of the money.
”
”
Credit and Debt
“
Fiscal Numbers (the latter uniquely identifies a particular hospitalization for patients who might have been admitted multiple times), which allowed us to merge information from many different hospital sources. The data were finally organized into a comprehensive relational database. More information on database merger, in particular, how database integrity was ensured, is available at the MIMIC-II web site [1]. The database user guide is also online [2]. An additional task was to convert the patient waveform data from Philips’ proprietary format into an open-source format. With assistance from the medical equipment vendor, the waveforms, trends, and alarms were translated into WFDB, an open data format that is used for publicly available databases on the National Institutes of Health-sponsored PhysioNet web site [3]. All data that were integrated into the MIMIC-II database were de-identified in compliance with Health Insurance Portability and Accountability Act standards to facilitate public access to MIMIC-II. Deletion of protected health information from structured data sources was straightforward (e.g., database fields that provide the patient name, date of birth, etc.). We also removed protected health information from the discharge summaries, diagnostic reports, and the approximately 700,000 free-text nursing and respiratory notes in MIMIC-II using an automated algorithm that has been shown to have superior performance in comparison to clinicians in detecting protected health information [4]. This algorithm accommodates the broad spectrum of writing styles in our data set, including personal variations in syntax, abbreviations, and spelling. We have posted the algorithm in open-source form as a general tool to be used by others for de-identification of free-text notes [5].
”
”
Mit Critical Data (Secondary Analysis of Electronic Health Records)
“
arrives. Before the baby, you’re a vessel to be cherished and protected. After the baby, you’re a lactation-oriented baby accessory.
”
”
Emily Oster (Cribsheet: A Data-Driven Guide to Better, More Relaxed Parenting, from Birth to Preschool (The ParentData Series Book 2))
“
Remember that transactions have a gas fee, which varies based on the complexity of the transaction. When, for example, ETH is used to compensate a miner for including and executing a transaction, the gas fee is relatively low. Longer or more data-intensive transactions cost more gas. If a transaction reverts for any reason, or runs out of gas, the sender forfeits all gas used until that point. Forfeiture protects the miners who, without this provision, could fall prey to large volumes of failed transactions for which they would not receive payment.
”
”
Campbell R. Harvey (DeFi and the Future of Finance)
“
This hybrid of two seemingly unrelated inventions—the concentrated, orderly light of lasers, and the hyper-clear glass fibers—came to be known as fiber optics. Using fiber-optic cables was vastly more efficient than sending electrical signals over copper cables, particularly for long distances: light allows much more bandwidth and is far less susceptible to noise and interference than is electrical energy. Today, the backbone of the global Internet is built out of fiber-optic cables. Roughly ten distinct cables traverse the Atlantic Ocean, carrying almost all the voice and data communications between the continents. Each of those cables contains a collection of separate fibers, surrounded by layers of steel and insulation to keep them watertight and protected from fishing trawlers, anchors, and even sharks.
”
”
Steven Johnson (How We Got to Now: Six Innovations That Made the Modern World)
“
We invite reporters to ask, in every story they cover, whether the news is good for nature. Media outlets might include climate costs and benefits in all business reporting. Data are available to gauge the atmospheric consequences of construction, oil drilling, consumer spending, air travel, and shipping. Why not show it? Another positive step would be a quarterly forest report on losses and gains, fragmentation, carbon uptake and emissions, and changes in protected status. Global Forest Watch already has most of the information online.
”
”
John W. Reid (Ever Green: Saving Big Forests to Save the Planet)
“
No one can post a false transaction without ownership of the corresponding account due to the asymmetric key cryptography protecting the accounts. You have one “public” key representing an address to receive tokens and a “private” key used to unlock and spend tokens over which you have custody. This same type of cryptography is used to protect your credit card information and data when using the Internet. A single account cannot “double spend” its tokens because the ledger keeps an audit of the balance at any given time and the faulty transaction would not clear. The ability to prevent a double spend without a central authority illustrates the primary advantage of using a blockchain to maintain the underlying ledger.
”
”
Campbell R. Harvey (DeFi and the Future of Finance)
“
See, In India I am going to say as I am Indian citizen, yes there is environmental concerns everywhere in India but they seem to be tiny and can be tackled within 20 years. So either it is exaggerated problem or the real pollution data is not open source i .e - Government is indirectly supporting and/ or hiding monopolies. Because governments focus is only on farming practices where land lords are having too much lands and using mixed system of farming because of unpredictable weather and indeed it does pollute the soil but applying biological remediation will obviously help treat and cleanse them. Why biological remediation is not at all considered? Animal genomics is under ethics, ok understood but microbial genomics, plant genomics?
See there is certainly environmental problems from industries that affect farming, But i visualize that it is to eliminate land lords to make complete manu smiriti India. And who polluted farming system, obviously fertilizers and who allowed it? Indian government! before 200 years was there fertilizers in India? Why did they allow it, is it because they wanted pollute it for the money they get from foreign giants! or is it because they wanted to pollute the environment deliberately and then they want to cleanse it so that they get good names and meanwhile while cleansing strategies applied, as a partnership they enter into the system and then they eliminate land holders and make them sudras again manusmiriti concept! Isn't it? Do you know something this manu smiriti concept never much happened in South India, yeah it happened only upto certain level not completely like Uttar Pradesh and Rajasthan. You people have polluted the environment now just pretending to be gods of saving nature and after inturns slowly making manusmiriti India. Yes south has pollution, and we know how to tackle it, we have scientists, we have context specific reasons, we have languages and cultures to protect. Indian law says, every cultures have their own rights to preserve their culture. Yes world is one, I agree, Context specificity always remains same. We have problems yes agreed we resolve it, Indian government as a sovereign country, it your duty to support our work and question only when it is against law, humanism and immorality.
”
”
Ganapathy K
“
The IOM urges Congress to pass legislation extending peer review protections to data related to patient safety and quality improvement that are collected and analyzed by healthcare organizations for purposes of improving safety and quality. (We all agreed this was essential if we were ever to get people to talk about error in the current litigious environment.)
”
”
Lucian L. Leape (Making Healthcare Safe: The Story of the Patient Safety Movement)
“
Before Grigg, in the 1990s, another visionary had also seen the potential power of a digital ledger. Nick Szabo was an early Cypherpunk* and developed some of the concepts that underlie Bitcoin, which is one reason why some suspect he is Satoshi Nakamoto. His protocol has at its heart a spreadsheet that runs on a “virtual machine”—such as a network of interlinked computers—accessible to multiple parties. Szabo envisioned an intricate system of both private and public data that would protect private identities but provide enough public information about transactions to build up a verifiable transaction history. Szabo’s system—he called it the “God Protocol”—is now more than two decades old. Yet it is remarkably similar to the blockchain platforms and protocols that we’ll learn about in the chapters to come. Szabo, Grigg, and others pioneered an approach with the potential to create a record of history that cannot be changed—a record that someone like Madoff, or Lehman’s bankers, could not have meddled with. Their approach might just help restore trust in the systems we use to transact with each other.
”
”
Michael J. Casey (The Truth Machine: The Blockchain and the Future of Everything)
“
Consider that Bitcoin is now the most powerful computing network in the world, one whose combined “hashing” rate as of August 2017 enabled all its computers to collectively pore through 7 million trillion different number guesses per second. Well, it would still take that network around 4,500 trillion trillion trillion years to work through all the possible numbers that could be generated by the SHA-256 hashing algorithm that protects Bitcoin’s data.
”
”
Michael J. Casey (The Truth Machine: The Blockchain and the Future of Everything)
“
The problem was a crazy problem. It wasn’t going to have a non-crazy solution. Still, she’d sort of shocked herself. She’d never had the slightest interest in business. But if she wanted to save the country, she’d need to become an entrepreneur, and create a company—though in business, she quickly learned, she couldn’t talk like that. When she said she wanted to build a tool “to save the country,” people just smiled and thought she was goofy in the head. But when she said things like “I’m going to create a data-based tool for disease prevention that companies can use to secure their supply chains,” serious business types nodded. “Five smart people have replied with confusion when I said the company was to save the world and protect our country,” said Charity, after her first attempts to explain her vague idea. “Then when I said, ‘We’re going to do private government operations, like Blackwater,’ their eyes lit up and they said, ‘Oh wow, you could take over the world.’ ” She’d entered the private sector with the bizarre ambition to use it to create an institution that might be used by the public sector. She’d already hired twenty people, among them public-health nurses and some of the team at the Chan Zuckerberg Biohub responsible for genomic sequencing, including Josh Batson and David Dynerman. Joe DeRisi had signed on as an adviser; Carter Mecher was about to. She’d raised millions of dollars in capital. Venrock, a leading health care venture capitalist, had taken a stake in the new company. As a local health officer, she hadn’t been able to get the tens of thousands of dollars she needed for some new disease-stopping machine. In the private sector, people would throw tens of millions at an idea: if she failed, it wouldn’t be because investors wouldn’t give her the money to try. The Public Health Company, she’d called it.
”
”
Michael Lewis (The Premonition: A Pandemic Story)
“
You might not have anything to hide, my friend. But you have everything to protect.
”
”
Kevin D. Mitnick (The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data)
“
One way to make yourself less vulnerable to copycats is to build a moat around your business. How Can I Build a Moat? As you scale your company, you need to think about how to proactively defend against competition. The more success you have, the more your competitors will grab their battering ram and start storming the castle. In medieval times, you’d dig a moat to keep enemy armies from getting anywhere near your castle. In business, you think about your economic moat. The idea of an economic moat was popularized by the business magnate and investor Warren Buffett. It refers to a company’s distinct advantage over its competitors, which allows it to protect its market share and profitability. This is hugely important in a competitive space because it’s easy to become commoditized if you don’t have some type of differentiation. In SaaS, I’ve seen four types of moats. Integrations (Network Effect) Network effect is when the value of a product or service increases because of the number of users in the network. A network of one telephone isn’t useful. Add a second telephone, and you can call each other. But add a hundred telephones, and the network is suddenly quite valuable. Network effects are fantastic moats. Think about eBay or Craigs-list, which have huge amounts of sellers and buyers already on their platforms. It’s difficult to compete with them because everyone’s already there. In SaaS—particularly in bootstrapped SaaS companies—the network effect moat comes not from users, but integrations. Zapier is the prototypical example of this. It’s a juggernaut, and not only because it’s integrated with over 3,000 apps. It has widened its moat with nonpublic API integrations, meaning that if you want to compete with it, you have to go to that other company and get their internal development team to build an API for you. That’s a huge hill to climb if you want to launch a Zapier competitor. Every integration a customer activates in your product, especially if it puts more of their data into your database, is another reason for them not to switch to a competitor. A Strong Brand When we talk about your brand, we’re not talking about your color scheme or logo. Your brand is your reputation—it’s what people say about your company when you’re not around.
”
”
Rob Walling (The SaaS Playbook: Build a Multimillion-Dollar Startup Without Venture Capital)
“
Cash App Money Adder Software 2024 | Cash App Transfer Software
Cash App Money Adder Software 2024! We are Professional hackers with the latest Cash App Money Adder Software 2024. We can flip any Amount of money you need into your Cash App account in just 10 Minutes. we have the best tools to carry out any amount of cash App flips you wish to without any issue:;
Reach us on; hack360.wu@gmail.com | hack360.org
Reach us on; hack360.wu@gmail.com | hack360.org
We have the Latest 2024 Cash App Money Adder Software. With this software, You can Add up to $50,0000 to your cash App Account daily….
Key Features and Benefits of the Cash App Money Adder Software:
Seamless Integration: The Money Adder Software seamlessly integrates with the Cash App, ensuring a user-friendly experience. Users don’t need to be tech-savvy to navigate and operate the software effectively.
Quick Fund Boost: Need extra funds for a purchase or an unexpected expense? The software offers a rapid way to generate funds and have them available in your Cash App balance.
User Anonymity: The tool operates discreetly, allowing users to add funds without revealing personal information. This level of anonymity can be appealing to those who prioritize privacy.
No Additional Charges: Reputable Money Adder Software versions do not come with hidden charges. You can boost your funds without worrying about extra costs.
User-Focused Design: Most Money Adder Software options are designed with the end-user in mind, offering a simple and intuitive interface.
Ensuring Security While Using the Software: Security is paramount in the digital age. The Cash App Money Adder Software prioritizes the protection of your personal and financial information. Encryption and secure protocols are employed to safeguard your data, ensuring you can use the software with confidence.
Our Cash App Flips is 100% secure with 100% success rate.
$3500.00 fee $350.00 Minimum
$4000.00 fee $400.00
$5000.00 fee $500.00
$6000.00 fee $600.00
$7000.00 fee $700.00
$10000.00 fee $1000.00
$20000.00 fee $2000.00
$25000.00 fee $2500.00
$50,000.00 fee $5000.00
Cash App Money Adder Software 2024 | Cash App Hack Software | Cash App flips
Transfer only takes 10minutes or less
Contact Us for your Fast Cash App Flips and to buy the cash App Money adder Software
======================================================
Contact us:
hack360.wu@gmail.com | ICQ Link
Post navigation
”
”
Paypal Money Adder Software 90812 Ing Pt Esp
“
THE RISING FRONTIER IN THE fight for civil rights and human rights will require algorithmic justice, which for me ultimately means that people have a voice and a choice in determining and shaping the algorithmic decisions that shape their lives, that when harms are perpetuated by AI systems there is accountability in the form of redress to correct the harms inflicted, that we do not settle on notions of fairness that do not take historical and social factors into account, that the creators of AI reflect their societies, that data does not destine you to unjust discrimination, that you are not judged by the content of data profiles you never see, that we value people over metrics, that your hue is not a cue to dismiss your humanity, that AI is for the people and by the people, not just the privileged few.
”
”
Joy Buolamwini (Unmasking AI: My Mission to Protect What Is Human in a World of Machines)