Databases Quotes

We've searched our database for all the quotes and captions related to Databases. Here they are! All 200 of them:

Um, because you're loopier than Flacky McPsycho, Mayor of Crazytown?" "My databases show no record of this Crazytown of which you speak. A brain the size of an entire city burns inside me. My intelligence quotient is beyond the human scale. I would prefer if you did not refer to me in such a fashion." "Oh, poor baby. Did I hurt the mass-murdering psychopathic artificial intelligence's feelings?
Amie Kaufman (Illuminae (The Illuminae Files, #1))
When you stepped on Jared’s toes, you’d get punched in the gut. If you stepped on Jax’s toes, he’d hack into the county database and issue a warrant for your arrest.
Penelope Douglas (Rival (Fall Away, #2))
I’m a modern man, a man for the millennium. Digital and smoke free. A diversified multi-cultural, post-modern deconstruction that is anatomically and ecologically incorrect. I’ve been up linked and downloaded, I’ve been inputted and outsourced, I know the upside of downsizing, I know the downside of upgrading. I’m a high-tech low-life. A cutting edge, state-of-the-art bi-coastal multi-tasker and I can give you a gigabyte in a nanosecond! I’m new wave, but I’m old school and my inner child is outward bound. I’m a hot-wired, heat seeking, warm-hearted cool customer, voice activated and bio-degradable. I interface with my database, my database is in cyberspace, so I’m interactive, I’m hyperactive and from time to time I’m radioactive. Behind the eight ball, ahead of the curve, ridin the wave, dodgin the bullet and pushin the envelope. I’m on-point, on-task, on-message and off drugs. I’ve got no need for coke and speed. I've got no urge to binge and purge. I’m in-the-moment, on-the-edge, over-the-top and under-the-radar. A high-concept, low-profile, medium-range ballistic missionary. A street-wise smart bomb. A top-gun bottom feeder. I wear power ties, I tell power lies, I take power naps and run victory laps. I’m a totally ongoing big-foot, slam-dunk, rainmaker with a pro-active outreach. A raging workaholic. A working rageaholic. Out of rehab and in denial! I’ve got a personal trainer, a personal shopper, a personal assistant and a personal agenda. You can’t shut me up. You can’t dumb me down because I’m tireless and I’m wireless, I’m an alpha male on beta-blockers. I’m a non-believer and an over-achiever, laid-back but fashion-forward. Up-front, down-home, low-rent, high-maintenance. Super-sized, long-lasting, high-definition, fast-acting, oven-ready and built-to-last! I’m a hands-on, foot-loose, knee-jerk head case pretty maturely post-traumatic and I’ve got a love-child that sends me hate mail. But, I’m feeling, I’m caring, I’m healing, I’m sharing-- a supportive, bonding, nurturing primary care-giver. My output is down, but my income is up. I took a short position on the long bond and my revenue stream has its own cash-flow. I read junk mail, I eat junk food, I buy junk bonds and I watch trash sports! I’m gender specific, capital intensive, user-friendly and lactose intolerant. I like rough sex. I like tough love. I use the “F” word in my emails and the software on my hard-drive is hardcore--no soft porn. I bought a microwave at a mini-mall; I bought a mini-van at a mega-store. I eat fast-food in the slow lane. I’m toll-free, bite-sized, ready-to-wear and I come in all sizes. A fully-equipped, factory-authorized, hospital-tested, clinically-proven, scientifically- formulated medical miracle. I’ve been pre-wash, pre-cooked, pre-heated, pre-screened, pre-approved, pre-packaged, post-dated, freeze-dried, double-wrapped, vacuum-packed and, I have an unlimited broadband capacity. I’m a rude dude, but I’m the real deal. Lean and mean! Cocked, locked and ready-to-rock. Rough, tough and hard to bluff. I take it slow, I go with the flow, I ride with the tide. I’ve got glide in my stride. Drivin and movin, sailin and spinin, jiving and groovin, wailin and winnin. I don’t snooze, so I don’t lose. I keep the pedal to the metal and the rubber on the road. I party hearty and lunch time is crunch time. I’m hangin in, there ain’t no doubt and I’m hangin tough, over and out!
George Carlin
Um…” Simon started slowly “at the risk of stating the obvious I feel I have to point out that Interpol has the worldʼs best database of international criminals.” “Thatʼs the idea ” Gabrielle said with a nod. “And I feel compelled to remind you that weʼre international criminals ” he finished but Kat was already smiling. “Donʼt worry Simon. Itʼs not like anyone in there knows it was a bunch of teenagers who robbed the Henley.
Ally Carter (Uncommon Criminals (Heist Society, #2))
ART said, What does it want? To kill all the humans, I answered. I could feel ART metaphorically clutch its function. If there were no humans, there would be no crew to protect and no reason to do research and fill its databases. It said, That is irrational. I know, I said, if the humans were dead, who would make the media? It was so outrageous, it sounded like something a human would say.
Martha Wells (Artificial Condition (The Murderbot Diaries, #2))
Somewhere in that database my name sat in its own little niche, the name of a reject, undisciplined and worthless. Just the way I liked it.
Ilona Andrews (Magic Bites (Kate Daniels, #1))
Finally, most identity thefts occur when databases are not securely managed. So, my advice? Don’t ever end up in a database.
Joseph Fink (Welcome to Night Vale (Welcome to Night Vale, #1))
This is the truth: We are a nation accustomed to being afraid. If I’m being honest, not just with you but with myself, it’s not just the nation, and it’s not just something we’ve grown used to. It’s the world, and it’s an addiction. People crave fear. Fear justifies everything. Fear makes it okay to have surrendered freedom after freedom, until our every move is tracked and recorded in a dozen databases the average man will never have access to. Fear creates, defines, and shapes our world, and without it, most of us would have no idea what to do with ourselves. Our ancestors dreamed of a world without boundaries, while we dream new boundaries to put around our homes, our children, and ourselves. We limit our potential day after day in the name of a safety that we refuse to ever achieve. We took a world that was huge with possibility, and we made it as small as we could.
Mira Grant (Feed (Newsflesh, #1))
For all we know, this”—he scrolled up on the phone screen to find a label—“this Wikipedia information database here is compiled by complete idiots.
John Scalzi (Redshirts)
We’ve got one huge advantage—people believe what they see in databases. They’ve never learned the most important rule of cyberspace—computers don’t lie but liars can compute.
Terry Hayes (I Am Pilgrim (Pilgrim, #1))
This is systems security for the Central Intelligence Agency. We would like to know why you are attempting to hack one of our classified databases.
Dan Brown (The Lost Symbol (Robert Langdon, #3))
I filed him in my mental database under Useless Prick, for future reference.
Tana French (Faithful Place (Dublin Murder Squad, #3))
How hard do you think it'd be to hack into the database of a major research university?" Mac hesitated. "Since you're asking me on a cell phone, in front of God and the NSA- impossible.
Rob Thomas
Nobody ever imagined a bunch of Orcs would steal a database table…
Charles Stross (Halting State (Halting State, #1))
Perhaps there is supranatural: reason beyond the normal definitions of fact or data-based logic; something that only makes sense if you can see a bigger picture of reality. Maybe that is where faith fits in.
William Paul Young (The Shack)
Artemis said, "I don't like lollipops." It was a woefully inadequate response, and Artemis was instantly appalled with himself. Pathetic really. I don't like lollipops. No self respecting criminal mastermind would be caught dead using the word lollipops. He really would have to put together a database of witty responses for occasions such a this.
Eoin Colfer (Artemis Fowl (Artemis Fowl, #1))
Not enough people know or understand just how little freedom we have left.
Korban Blake
His mind raced through past horrors experienced first hand and from the accounts of others. He mentally flipped through a grim database which contained everything from vegan flatmates to psychotic pimps.
Irvine Welsh
I’m probably the only sixteen-year-old girl in a three hundred mile radius who knows how to distinguish between a poltergeist from an actual ghost (hint: If you can disrupt it with nitric acid, or if it throws new crap at you every time, it’s a poltergeist), or how to tell if a medium’s real or faking it (poke ‘em with a true iron needle). I know the six signs of a good occult store (Number One is the proprietor bolts the door before talking about Real Business) and the four things you never do when you’re in a bar with other people who know about the darker side of the world (don’t look weak). I know how to access public information and talk my way around clerks in courthouses (a smile and the right clothing will work wonders). I also know how to hack into newspaper files, police reports, and some kinds of government databases (primary rule: Don’t get caught. Duh).
Lilith Saintcrow (Strange Angels (Strange Angels, #1))
There were no sex classes. No friendship classes. No classes on how to navigate a bureaucracy, build an organization, raise money, create a database, buy a house, love a child, spot a scam, talk someone out of suicide, or figure out what was important to me. Not knowing how to do these things is what messes people up in life, not whether they know algebra or can analyze literature.
William Upski Wimsatt
a ‘change’ is any activity that is physical, logical, or virtual to applications, databases, operating systems, networks, or hardware that could impact services being delivered.
Gene Kim (The Phoenix Project: A Novel About IT, DevOps, and Helping Your Business Win)
I think the best life would be one that's lived off the grid. No bills, your name in no government databases. No real proof you're even who you say you are, aside from, you know, being who you say you are. I don't mean living in a mountain hut with solar power and drinking well water. I think nature's beautiful and all, but I don't have any desire to live in it. I need to live in a city. I need pay as you go cell phones in fake names, wireless access stolen or borrowed from coffee shops and people using old or no encryption on their home networks. Taking knife fighting classes on the weekend! Learning Cantonese and Hindi and how to pick locks. Getting all sorts of skills so that when your mind starts going, and you're a crazy raving bum, at least you're picking their pockets while raving in a foreign language at smug college kids on the street. At least you're always gonna be able to eat.
Joey Comeau
Hate Poem I hate you truly. Truly I do. Everything about me hates everything about you. The flick of my wrist hates you. The way I hold my pencil hates you. The sound made by my tiniest bones were they trapped in the jaws of a moray eel hates you. Each corpuscle singing in its capillary hates you. Look out! Fore! I hate you. The blue-green jewel of sock lint I’m digging from under by third toenail, left foot, hates you. The history of this keychain hates you. My sigh in the background as you explain relational databases hates you. The goldfish of my genius hates you. My aorta hates you. Also my ancestors. A closed window is both a closed window and an obvious symbol of how I hate you. My voice curt as a hairshirt: hate. My hesitation when you invite me for a drive: hate. My pleasant “good morning”: hate. You know how when I’m sleepy I nuzzle my head under your arm? Hate. The whites of my target-eyes articulate hate. My wit practices it. My breasts relaxing in their holster from morning to night hate you. Layers of hate, a parfait. Hours after our latest row, brandishing the sharp glee of hate, I dissect you cell by cell, so that I might hate each one individually and at leisure. My lungs, duplicitous twins, expand with the utter validity of my hate, which can never have enough of you, Breathlessly, like two idealists in a broken submarine.
Julie Sheehan
Many of our problems are broadly similar to those that undermined ... Norse Greenland, and that many other past societies also struggled to solve. Some of those past societies failed (like the Greenland Norse) and others succeeded ... The past offers us a rich database from which we can learn in order that we may keep on succeeding.
Jared Diamond (Collapse: How Societies Choose to Fail or Succeed)
I'm sorry,' said Silyen, barely glancing up from his book. 'I'm a prodigy of Skill, not a missing persons' database.
Vic James (Bright Ruin (Dark Gifts, #3))
Reader, if you don’t know what a database is, rest assured that an explanation of the concept would in no way increase your enjoyment in reading this account.
Neal Stephenson (The Rise and Fall of D.O.D.O. (D.O.D.O. #1))
It’s not night yet for your lonely bonfire,” Pico says. “But I could understand the significance of a daylight bonfire if I could access my source database.
Misba (The High Auction (Wisdom Revolution, #1))
Journalists can sound grandiose when they talk about their profession. Some of us are adrenaline junkies; some of us are escapists; some of us do wreck our personal lives and hurt those who love us most. This work can destroy people. I have seen so many friends and colleagues become unrecognizable from trauma: short-tempered, sleepless, and alienated from friends. But after years of witnessing so much suffering in the world, we find it hard to acknowledge that lucky, free, prosperous people like us might be suffering, too. We feel more comfortable in the darkest places than we do back home, where life seems too simple and too easy. We don’t listen to that inner voice that says it is time to take a break from documenting other people’s lives and start building our own. Under it all, however, are the things that sustain us and bring us together: the privilege of witnessing things that others do not; an idealistic belief that a photograph might affect people’s souls; the thrill of creating art and contributing to the world’s database of knowledge. When I return home and rationally consider the risks, the choices are difficult. But when I am doing my work, I am alive and I am me. It’s what I do. I am sure there are other versions of happiness, but this one is mine.
Lynsey Addario (It's What I Do: A Photographer's Life of Love and War)
Advertising executives must be wringing their greedy hands over the prospect, anxious for their next holiday campaign. Mom is helpless before them all. We’re not a family anymore. We’re a commodity in an Amazon database. Are we humans, or consumers?
Michael Benzehabe (Zonked Out: The Teen Psychologist of San Marcos Who Killed Her Santa Claus and Found the Blue-Black Edge of the Love Universe)
relentless practice creates a database of experience that you can draw upon to make more enlightened choices.
Tom Kelley (Creative Confidence: Unleashing the Creative Potential Within Us All)
dictionaries are not set up to adapt to a user’s mental pictorial database of things.
Kory Stamper (Word by Word: The Secret Life of Dictionaries)
Om is that eternal music which can smooth away all the creases of negativity in our Karmic database.
Banani Ray (Glory of OM: A Journey to Self-Realization)
And in the UK, cameras mounted on vehicles that look like souped-up Google StreetView cars now drive around automatically cross-checking our likenesses with a database of wanted people.
Hannah Fry (Hello World: How to be Human in the Age of the Machine)
Introspection makes our conscious motives and strategies transparent to us, while we have no sure means of deciphering them in others. Yet we never genuinely know our true selves. We remain largely ignorant of the actual unconscious determinants of our behavior, and therefore we cannot accurately predict what our behavior will be in circumstances beyond the safety zone of our past experience. The Greek motto “Know thyself,” when applied to the minute details of our behavior, remains an inaccessible ideal. Our “self” is just a database that gets filled in through our social experiences, in the same format with which we attempt to understand other minds, and therefore it is just as likely to include glaring gaps, misunderstandings, and delusions.
Stanislas Dehaene (Consciousness and the Brain: Deciphering How the Brain Codes Our Thoughts)
Is there any way to check and see if Nick and Daisy were ever at Hecate? They must have had different names or you'd remember them." I don't know why I was holding out hope that Dad would be all, "Why, yes, let me check the Hecate Enrollment Roster 9000 computer database." Those lists were probably written on pieces of parchment with quill feathers.
Rachel Hawkins (Demonglass (Hex Hall, #2))
Well, bingo, his name popped up in the database on this crime ring’s computer as one of their own. Sloane, Wilma, KazuKen, Celi-hag, BunnyMuff, were all part of the illegal and criminal cyber-bullying ring that used blackmail to extort celebrities and famous authors, musicians, schools like Aunt Sookie Acting Academy for money or they will post lies, false rumors, photo shopped fake photos, and accusations of fake awards, fake credentials on the internet. They did that to Summer and tried to do that with Aunt Sookie, apparently. But as seemingly innocent as they seem, using young girls’ photos as their supposed fake identities, they really were part of a larger crime ring.”, Loving Summer by Kailin Gow
Kailin Gow (Loving Summer (Loving Summer, #1))
I typed "royal family" into a dream-interpretation website, but they didn't have that in their database, so then I typed "butt" and hit "interpret," and this came back: To see your buttocks in your dream represents your instincts and urges. It also said: To dream that your buttocks are misshapen suggests undeveloped or wounded aspects of your psyche. But my butt was shaped all right, so that let me know my psyche was developed, and the first part told me to trust my instincts, to trust my butt, the butt that trusted him.
Miranda July (No One Belongs Here More Than You)
Every advance in information technology involves choosing what you want to preserve and what you want to ditch. Scanning rare books on to microfilm is a costly business. The library won't let you do it yourself - they decide first which books should be scanned and which should just rot away in the basement. Against that eventuality, people should start hoarding the kind of books committees of rational people will decide against scanning into a database.
Robert Twigger
Writing in Library Journal, Ben Vershbow of the Institute for the Future of Book envisioned a digital ecology in which "parts of books will reference parts of other books. Books will be woven toghether out of components in remote databases and servers." Kevin Kelly wrote in The New York times Magagzine: "In the the new world of books, every bit informs another; every page reads all the other pages.
Jeff Jarvis (What Would Google Do?)
The beauty in the genome is of course that it's so small. The human genome is only on the order of a gigabyte of data...which is a tiny little database. If you take the entire living biosphere, that's the assemblage of 20 million species or so that constitute all the living creatures on the planet, and you have a genome for every species the total is still about one petabyte, that's a million gigabytes - that's still very small compared with Google or the Wikipedia and it's a database that you can easily put in a small room, easily transmit from one place to another. And somehow mother nature manages to create this incredible biosphere, to create this incredibly rich environment of animals and plants with this amazingly small amount of data.
Freeman Dyson
From the perspective of the world's national security apparatuses you exist in several locations. You appear on property and income-tax registries, on passport and ID card databases. You show up on passenger manifests and telephone logs . . . You are fingertip swirls, facial ratios, dental records, voice patterns, spending trails, e-mail threads.
Mohsin Hamid (How to Get Filthy Rich in Rising Asia)
JOH! Thank God I found you.” “I have 9022 gods listed in my database. Must I thank all of them?
Maureen A. Miller (Beyond (Beyond #1))
In 2012, the Environmental Protection Agency’s database revealed Koch Industries to be the number one producer of toxic waste in the country.
Jane Mayer (Dark Money: The Hidden History of the Billionaires Behind the Rise of the Radical Right)
I found myself answering the same questions asked frequently of me by different people. It would be so much easier if everyone could just read my database.
Tim Berners-Lee (Weaving the Web: The Original Design and Ultimate Destiny of the World Wide Web)
You have to be careful, Terauchi always warned us, or you'll wind up in some database. Then adults will control you.
Natsuo Kirino (Real World)
There’s an old saying in the relational database world: on a long enough timeline, all fields become optional.
Eric Redmond
Three: Izzy made it sound like Stevie was Wikipedia Holmes, a walking, talking, deducing database that ate true crime and spat out justice.
Maureen Johnson (Nine Liars (Truly Devious, #5))
If our shallow, self-critical culture sometimes seems to lack a sense of the numinous or spiritual it’s only in the same way a fish lacks a sense of the ocean. Because the numinous is everywhere, we need to be reminded of it. We live among wonders. Superhuman cyborgs, we plug into cell phones connecting us to one another and to a constantly updated planetary database, an exo-memory that allows us to fit our complete cultural archive into a jacket pocket. We have camera eyes that speed up, slow down, and even reverse the flow of time, allowing us to see what no one prior to the twentieth century had ever seen — the thermodynamic miracle of broken shards and a puddle gathering themselves up from the floor to assemble a half-full wineglass. We are the hands and eyes and ears, the sensitive probing feelers through which the emergent, intelligent universe comes to know its own form and purpose. We bring the thunderbolt of meaning and significance to unconscious matter, blank paper, the night sky. We are already divine magicians, already supergods. Why shouldn’t we use all our brilliance to leap in as many single bounds as it takes to a world beyond ours, threatened by overpopulation, mass species extinction, environmental degradation, hunger, and exploitation? Superman and his pals would figure a way out of any stupid cul-de-sac we could find ourselves in — and we made Superman, after all.
Grant Morrison (Supergods: What Masked Vigilantes, Miraculous Mutants, and a Sun God from Smallville Can Teach Us About Being Human)
No self-respecting criminal mastermind would be caught dead even using the word lollipops. He really would have to put together a database of witty responses for occasions such as this. It
Eoin Colfer (Artemis Fowl (Artemis Fowl, #1))
The Prophet database (of course, the whole IT—computer geek—world called it the For-Profit database) was well written, but all the programs the mother company tried to sell with it were garbage.
Patricia Briggs (Shifting Shadows: Stories from the World of Mercy Thompson)
Well, when it became obvious that magic was going to wreck the computer networks, people tried to preserve portions of the Internet. They took snapshots of their servers and sent the data to a central database at the Library of Congress. The project became known as the Library of Alexandria, because in ancient times Alexandria's library was said to contain all the human knowledge, before some jackass burned it to the ground.
Ilona Andrews (Gunmetal Magic (World of Kate Daniels, #6 & #6.5; Andrea Nash, #1, Kate Daniels, #5.5))
At 38, I look back at my 32-year-old self and regret that he wasted time. Then I regret wasting my current time regretting regrets about regrets. This is pretty sophisticated regretting I'm doing. That's the sole advantage of ageing: I can now effortlessly consolidate my regrets into one manageable block of misery. Otherwise, by the age of 44, I'd need complex database software just to keep track of precisely how many things I'm regretting at once.
Charlie Brooker (I Can Make You Hate)
What if your company has made a commitment to a certain database, or a certain web server, or a certain framework? A good architect pretends that the decision has not been made, and shapes the system such that those decisions can still be deferred or changed for as long as possible. A good architect maximizes the number of decisions not made.
Robert C. Martin (Clean Architecture)
The Joel Test 1. Do you use source control? 2. Can you make a build in one step? 3. Do you make daily builds? 4. Do you have a bug database? 5. Do you fix bugs before writing new code? 6. Do you have an up-to-date schedule? 7. Do you have a spec? 8. Do programmers have quiet working conditions? 9. Do you use the best tools money can buy? 10. Do you have testers? 11. Do new candidates write code during their interview? 12. Do you do hallway usability testing?
Joel Spolsky (Joel on Software)
An imaginary circle of empathy is drawn by each person. It circumscribes the person at some distance, and corresponds to those things in the world that deserve empathy. I like the term "empathy" because it has spiritual overtones. A term like "sympathy" or "allegiance" might be more precise, but I want the chosen term to be slightly mystical, to suggest that we might not be able to fully understand what goes on between us and others, that we should leave open the possibility that the relationship can't be represented in a digital database. If someone falls within your circle of empathy, you wouldn't want to see him or her killed. Something that is clearly outside the circle is fair game. For instance, most people would place all other people within the circle, but most of us are willing to see bacteria killed when we brush our teeth, and certainly don't worry when we see an inanimate rock tossed aside to keep a trail clear. The tricky part is that some entities reside close to the edge of the circle. The deepest controversies often involve whether something or someone should lie just inside or just outside the circle. For instance, the idea of slavery depends on the placement of the slave outside the circle, to make some people nonhuman. Widening the circle to include all people and end slavery has been one of the epic strands of the human story - and it isn't quite over yet. A great many other controversies fit well in the model. The fight over abortion asks whether a fetus or embryo should be in the circle or not, and the animal rights debate asks the same about animals. When you change the contents of your circle, you change your conception of yourself. The center of the circle shifts as its perimeter is changed. The liberal impulse is to expand the circle, while conservatives tend to want to restrain or even contract the circle. Empathy Inflation and Metaphysical Ambiguity Are there any legitimate reasons not to expand the circle as much as possible? There are. To expand the circle indefinitely can lead to oppression, because the rights of potential entities (as perceived by only some people) can conflict with the rights of indisputably real people. An obvious example of this is found in the abortion debate. If outlawing abortions did not involve commandeering control of the bodies of other people (pregnant women, in this case), then there wouldn't be much controversy. We would find an easy accommodation. Empathy inflation can also lead to the lesser, but still substantial, evils of incompetence, trivialization, dishonesty, and narcissism. You cannot live, for example, without killing bacteria. Wouldn't you be projecting your own fantasies on single-cell organisms that would be indifferent to them at best? Doesn't it really become about you instead of the cause at that point?
Jaron Lanier (You Are Not a Gadget)
Psychic is the new normal.
Chad Mercree
According to Robert Pape, who has created a database of every suicide terrorist attack in the last hundred years, suicide bombing is a nationalist response to military occupation by a culturally alien democratic power.62 It’s a response to boots and tanks on the ground—never to bombs dropped from the air. It’s a response to contamination of the sacred homeland.
Jonathan Haidt (The Righteous Mind: Why Good People are Divided by Politics and Religion)
Never mind that it's not owned by a black person anymore. You can still learn a lot from BET. Primarily, you will learn that black people love reruns, and if you're lucky, you'll catch the Tyler Perry movie! I know the Internet Movie Database says Perry has written over ten films, and there may be several titles and even different casts, but if you've seen one Tyler Perry movie, you've experienced the entire cannon. The man has only made one film, and you can catch it on BET, repeatedly.
Baratunde R. Thurston
I can’t look at a stranger’s face and think, She’s smiling just like Amy. When Amy smiles like that she’s happy, so this person is probably happy, too. Instead, I watch and evaluate, with a slightly anxious feeling. It’s as if I have to build a behavior database for every single person I meet in life. When I encounter someone for the first time, the slate is blank and I don’t know what to expect.
John Elder Robison (Be Different: Adventures of a Free-Range Aspergian with Practical Advice for Aspergians, Misfits, Families & Teachers)
If you are a denier, get on the right side of history and stop being so gullible. Remember, it has been historically and scientifically proven, in a court of law no less, that more than 1.2 million Jews, along with 20,000 gypsies and tens of thousands of Polish and Russian political prisoners, were killed at Auschwitz alone. Beyond that, Yad Vashem’s Central Database of Shoah Victims’ Names has collected 4.5 million Jewish victims’ names (and counting) from various archival sources. How much more evidence could you possibly want?
James Morcan (Debunking Holocaust Denial Theories)
Al Qaeda” didn’t translate to “the base,” as most Western media outlets had so ignorantly reported, but rather, “the database.” It referred to the original computer file of the thousands of mujahideen who were recruited and trained with the help of the CIA to defeat the Russians in Afghanistan.
Brad Thor (The First Commandment (Scot Harvath, #6))
It was a woefully inadequate response, and Artemis was instantly appalled with himself. Pathetic really: I don’t like lollipops. No self-respecting criminal mastermind would be caught dead even using the word lollipops. He really would have to put together a database of witty responses for occasions such as this.
Eoin Colfer (Artemis Fowl (Artemis Fowl, #1))
Harper’s brow furrowed. “Why are you even asking me questions? I know you did your research on me.” “I did,” he admitted unrepentantly. “I learned a lot about you. For instance, I learned that you’re responsible for the breakdown of an ex-boyfriend’s bank account—” “Allegedly.” “—that you hacked a human police database and messed up their filing system when your friend was unjustly arrested—” “Hearsay.” “—that you beat up a male demon who hurt your cousin—” “I have an alibi for that.” “—and that you infected an old teacher’s computer with a virus that caused clips of gay porn to pop up on his screen every thirty seconds.” “Closet gays do the strangest things when the pressure gets too much.
Suzanne Wright (Burn (Dark in You, #1))
Between the otaku and Japan lies the United States.
Hiroki Azuma (Otaku: Japan's Database Animals)
We are more than height, weight, religion, and income. Others judge us on the basis of general subjective and aesthetic attributes, such as our manner of speaking and our sense of humor. We are also a scent, a sparkle of the eye, a sweep of the hand, the sound of a laugh, and the knit of a brow—ineffable qualities that can’t easily be captured in a database.
Dan Ariely (The Upside of Irrationality: The Unexpected Benefits of Defying Logic at Work and at Home)
Since it is all based on statistics, the size of the company’s database is the key to making accurate predictions
Yuval Noah Harari (Homo Deus: A History of Tomorrow)
A database is just a tool: how you use it is up to you.
Martin Kleppmann (Designing Data-Intensive Applications: The Big Ideas Behind Reliable, Scalable, and Maintainable Systems)
Big data is the most disruptive force this industry has seen since the introduction of the relational database.
Jeffrey Needham (Disruptive Possibilities: How Big Data Changes Everything)
However, for the purposes of migrating existing Rails applications to services, the shared database approach may be necessary in the early stages.
Paul Dix
Review Court Records Use Megan’s Law to Check State Databases of Sexual Offenders
Janet Portman (Every Landlord's Legal Guide)
We’ve seen entire companies purchased for millions of dollars solely for their database of leads and customers.
Raymond Fong (Growth Hacking: Silicon Valley's Best Kept Secret)
Apple has a worldwide database of Wi-Fi passwords, including my home network’s, from people backing up their iPhones.
Bruce Schneier (Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World)
NSA analyst touches something in the database,
Bruce Schneier (Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World)
Even when the data has made it into a database, it is not safe... which brings us, finally, to Microsoft Excel.
Matt Parker (Humble Pi: A Comedy of Maths Errors)
database. Another
Marissa Meyer (Cinder (The Lunar Chronicles, #1))
She was designed to look human, her face the replica of a woman whose image Med’s tissue engineer had licensed from an old Facebook database.
Annalee Newitz (Autonomous)
In the case of, RJMetrics built a tool that translates SQL queries to MongoDB syntax (two database technologies). This
Gabriel Weinberg (Traction: How Any Startup Can Achieve Explosive Customer Growth)
generally speaking, no one should be directly logging in to a database.
Laine Campbell (Database Reliability Engineering: Designing and Operating Resilient Database Systems)
The influx of new material from the abandoned station had slowed dramatically, every database and store having been raided and transferred over to the Gilgamesh.
Adrian Tchaikovsky (Children of Time (Children of Time #1))
Search for required Speciality Chemical products and its suppliers, manufacturers or its equivalent brands from the largest database of ChemEqual.
Sophia Jones
The Deliverator had to borrow some money to pay for it. Had to borrow it from the Mafia, in fact. So he's in their database now—retinal patterns, DNA, voice graph, fingerprints, footprints, palm prints, wrist prints, every fucking part of the body that had wrinkles on it—almost—those bastards rolled in ink and made a print and digitized it into their computer.
Neal Stephenson (Snow Crash)
Dear 2600: Tell me how much one of your hackers would charge me to delete my criminal record from the Texas police database. [NAME DELETED] Well, we would start with erasing your latest crime, that of soliciting a minor to commit another crime. (Your request was read by a small child here in the office.) After you’re all paid up on that, we will send out the bill for hiding your identity by not printing your real name, which you sent us like the meathead you apparently are. After that’s all sorted, we can assemble our team of hackers, who sit around the office waiting for such lucrative opportunities as this to come along, and figure out even more ways to shake you down. It’s what we do, after all. Just ask Fox News.
Emmanuel Goldstein (Dear Hacker: Letters to the Editor of 2600)
If you are too lazy to cleanup your database after testing, your filesystem after testing or your memory based system consider moving to a different profession. This isn't a job for you.
Roy Osherove (The Art of Unit Testing: With Examples in .NET)
The Registry is a special database in the computer that contains a multitude (literally thousands) of configuration settings used by Windows and many of the programs installed on the computer
Peter H. Gregory (Computer Viruses For Dummies)
At Hamilton Brothers, not much is self-serve, and I was forced to interact with the guys at the counter. These were all middle-aged men who evidently knew a lot about everything. They would ask me questions about my order that I often couldn't answer. “What size chickenwire?" or “Ardox nails or regular?" or the one that always struck me with fear, “What you doing with all this stuff?" It seemed they were running my order through a vast mental database and determining that there was nothing known to humanity that could be built properly with the list of items I wanted.
Brent Preston (The New Farm: Our Ten Years on the Front Lines of the Good Food Revolution)
There are times when you choose to believe something that would normally be considered absolutely irrational. It doesn’t mean that it is actually irrational, but it surely is not rational. Perhaps there is suprarationality: reason beyond the normal definitions of fact or data-based logic; something that makes sense only if you can see a bigger picture of reality. Maybe that is where faith fits in.
William Paul Young (The Shack)
Over time, managers and executives began using statistics and analysis to forecast the future, relying on databases and spreadsheets in much the same way ancient seers relied on tea leaves and goat entrails.
Josh Kaufman (The Personal MBA: Master the Art of Business)
I'm an oracle of the past. I can accurately predict up to 1 minute in the future, by thoroughly investigating the last 2 years of your life. Also, I look like an old database – flat and full of useless info.
Will Advise (Nothing is here...)
Facebook in particular is the most appalling spying machine that has ever been invented,” Wikileaks founder Julian Assange said in 2011. “Here we have the world’s most comprehensive database about people, their relationships, their names, their addresses, their locations, and the communications with each other, their relatives, all sitting within the United States, all accessible to US intelligence.”37 Assange’s
Sarah Kendzior (They Knew: How a Culture of Conspiracy Keeps America Complacent)
Over time, managers and executives began using statistics and analysis to forecast the future, relying on databases and spreadsheets in much the same way ancient seers relied on tea leaves and goat entrails. The
Josh Kaufman (The Personal MBA: A World-Class Business Education in a Single Volume)
Life is Beautiful? Beyond all the vicissitudes that are presented to us on this short path within this wild planet, we can say that life is beautiful. No one can ever deny that experiencing the whirlwind of emotions inside this body is a marvel, we grow with these life experiences, we strengthen ourselves and stimulate our feelings every day, in this race where the goal is imminent death sometimes we are winners and many other times we lose and the darkness surprises us and our heart is disconnected from this reality halfway and connects us to the server of the matrix once more, debugging and updating our database, erasing all those experiences within this caracara of flesh and blood, waiting to return to earth again. "Life is beautiful gentlemen" is cruel and has unfair behavior about people who looked like a bundle of light and left this platform for no apparent reason, but its nature is not similar to our consciousness and feelings, she has a script for each of us because it was programmed that way, the architects of the game of life they know perfectly well that you must experiment with all the feelings, all the emotions and evolve to go to the next levels. You can't take a quantum leap and get through the game on your own. inventing a heaven and a hell in order to transcend, that comes from our fears of our imagination not knowing what life has in store for us after life is a dilemma "rather said" the best kept secret of those who control us day by day. We are born, we grow up, we are indoctrinated in the classrooms and in the jobs, we pay our taxes, we reproduce, we enjoy the material goods that it offers us the system the marketing of disinformation, Then we get old, get sick and die. I don't like this story! It looks like a parody of Noam Chomsky, Let's go back to the beautiful description of beautiful life, it sounds better! Let's find meaning in all the nonsense that life offers us, 'Cause one way or another we're doomed to imagine that everything will be fine until the end of matter. It is almost always like that. Sometimes life becomes a real nightmare. A heartbreaking horror that we find impossible to overcome. As we grow up, we learn to know the dark side of life. The terrors that lurk in the shadows, the dangers lurking around every corner. We realize that reality is much harsher and ruthless than we ever imagined. And in those moments, when life becomes a real hell, we can do nothing but cling to our own existence, summon all our might and fight with all our might so as not to be dragged into the abyss. But sometimes, even fighting with all our might is not enough. Sometimes fate is cruel and takes away everything we care about, leaving us with nothing but pain and hopelessness. And in that moment, when all seems lost, we realize the terrible truth: life is a death trap, a macabre game in which we are doomed to lose. And so, as we sink deeper and deeper into the abyss, while the shadows envelop us and terror paralyzes us, we remember the words that once seemed to us so hopeful: life is beautiful. A cruel and heartless lie, that leads us directly to the tragic end that death always awaits us.
Marcos Orowitz (THE MAELSTROM OF EMOTIONS: A selection of poems and thoughts About us humans and their nature)
In fact, AI might make centralized systems far more efficient than diffused systems, because machine learning works better the more information it can analyze. If you disregard all privacy concerns and concentrate all the information relating to a billion people in one database, you can train much better algorithms than if you respect individual privacy and have in your database only partial information on a million people.
Yuval Noah Harari (21 Lessons for the 21st Century)
For the next two weeks, WR8TH’s virus kept to its routine—waking up at nine a.m. and systematically nibbling away at ACG’s database. It was a model employee that way. Didn’t take a lunch break and never called in sick.
Matthew FitzSimmons (The Short Drop (Gibson Vaughn, #1))
Things get even messier when linked into networks, which can literally scatter one’s mind even at today’s rudimentary levels of connectivity. The “transactive memory system” called Google is already rewiring the parts of our brains that used to remember facts locally; now those circuits store search protocols for remote access of a distributed database.74 And Google doesn’t come anywhere close to the connectivity of a real hive mind.
Peter Watts (Echopraxia (Firefall, #2))
Many of the gut signals reaching the brain will not only generate gut sensations, such as the fullness after a nice meal, nausea and discomfort, and feelings of well-being, but will also trigger responses of the brain that it sends back to the gut, generating distinct gut reactions. And the brain doesn’t forget about these feelings, either. Gut feelings are stored in vast databases in the brain, which can later be accessed when making decisions.
Emeran Mayer (The Mind-Gut Connection: How the Hidden Conversation Within Our Bodies Impacts Our Mood, Our Choices, and Our Overall Health)
Your attention for a moment. This is Rewind showing you edited footage from my database. I've probably got about naught point eight seconds before game over, so hear me out. I've always been terrified that you'd die before I did. Because you and me apart strikes me as intensely wrong. So promise me something: be brave. Be strong. And keep going without me. And another thing: no more injecting- it will kill you. And remember: you deserve to be happy. The New Institute was the old you. You're a better person now- stubborn and frustrating but wonderful! And to think I will never see you again. One more thing - one last thing - because I don't say it enough: I love you.
James Roberts (Transformers: More Than Meets the Eye (2011-2016) #16 (Transformers: More Than Meets the Eye Ongoing))
Since the Common Rule says that research subjects must be allowed to withdraw from research at any time, these experts have told me that, in theory, the Lacks family might be able to withdraw HeLa cells from all research worldwide. And in fact, there are precedents for such a case, including one in which a woman successfully had her father’s DNA removed from a database in Iceland. Every researcher I’ve mentioned that idea to shudders at the thought of it.
Rebecca Skloot (The Immortal Life of Henrietta Lacks)
Everything is 'smart' now. The library cataloging system is smart, classification and indexing information entered into a uniform online database. People wept and lamented the loss of the old cards, then forgot them. They pretty much forget everything they weep over and lament. Clop-clop of hooves on the street. The humble art of carrying a block of ice up the stairs, pincered by a pair of tongs. Rotary phones and 33 rpm records. Stamp-pad ink and poster paint.
Christopher Sorrentino (The Fugitives)
Database schemas are notoriously volatile, extremely concrete, and highly depended on. This is one reason why the interface between OO applications and databases is so difficult to manage, and why schema updates are generally painful.
Robert C. Martin (Clean Architecture)
Kate wondered what part of the male brain prioritized movie scene storage above all other details in life. Maybe the answer was in the Atlantean research database somewhere. It was all she could do not to launch a query for the answer.
A.G. Riddle (The Atlantis World (The Origin Mystery, #3))
This new science of performance argues that you get better at a skill as you develop more myelin around the relevant neurons, allowing the corresponding circuit to fire more effortlessly and effectively. To be great at something is to be well myelinated. This understanding is important because it provides a neurological foundation for why deliberate practice works. By focusing intensely on a specific skill, you’re forcing the specific relevant circuit to fire, again and again, in isolation. This repetitive use of a specific circuit triggers cells called oligodendrocytes to begin wrapping layers of myelin around the neurons in the circuits—effectively cementing the skill. The reason, therefore, why it’s important to focus intensely on the task at hand while avoiding distraction is because this is the only way to isolate the relevant neural circuit enough to trigger useful myelination. By contrast, if you’re trying to learn a complex new skill (say, SQL database management) in a state of low concentration (perhaps you also have your Facebook feed open), you’re firing too many circuits simultaneously and haphazardly to isolate the group of neurons you actually want to strengthen. In
Cal Newport (Deep Work: Rules for Focused Success in a Distracted World)
People are not so interested,’ Kim Sang-hun, director of the Database Center, told the Christian Science Monitor after his organization published the book. ‘The indifference of South Korean society to the issue of North Korean rights is so awful.
Blaine Harden (Escape from Camp 14: One Man's Remarkable Odyssey from North Korea to Freedom in the West)
When the marketing department needed data from Diane’s database, they could use extremely personal information in their mailings to not only customize a sales pitch to that person but also let them know “we care about you so much that we looked up everything we could find about you in real life.” Customers were often so flattered by this gesture that they would send thank-you notes like “How did you find all this out?” or “Who are you people?” or “I have never told anyone this fact, so how did you know?
Joseph Fink (Welcome to Night Vale (Welcome to Night Vale, #1))
What do you mean “Should we worry about cyber adversaries getting into state voter registration databases?” They’re already in and selling exfiltrated voter registration data on the dark web! Next election cycle black hats will be selling ‘access as service’.
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
This database enabled Johnson to keep in touch with all his customers, at all times, and to keep them all feeling special. He sent them Christmas cards. He sent them birthday cards. He sent them notes of congratulation after they completed a big race or marathon.
Phil Knight (Shoe Dog)
Everybody in the CIMS database has a number, from minus 15 to plus 15. If you’re plus 15, you’re on the right of the political spectrum. If you are minus 15 you are on the left of the political spectrum. You are a pinko, leftie, environmentalist, academic probably,
Mark Bourrie (Kill The Messengers: Stephen Harper's Assault on Your Right to Know)
Pull-heavy, right-handed hitters should also have seen shifts, but rarely did. According to BIS’s database, the first shift employed against a right-handed hitter in the modern era didn’t occur until June 11, 2009, when the Phillies shifted left against Gary Sheffield.
Travis Sawchik (Big Data Baseball: Math, Miracles, and the End of a 20-Year Losing Streak)
Two of the NSA’s internal databases, code-named HAPPYFOOT and FASCIA, contain comprehensive location information of devices worldwide. The NSA uses the databases to track people’s movements, identify people who associate with people of interest, and target drone strikes.
Bruce Schneier (Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World)
Evolution is an enchanted loom of shuttling DNA codes, whose evanescent patterns, as they dance their partners through geological deep time, weave a massive database of ancestral wisdom, a digitally coded description of ancestral worlds and what it took to survive in them.
Richard Dawkins (Climbing Mount Improbable)
We didn’t think of ourselves as participating in the surveillance economy. We weren’t thinking about our role in facilitating and normalizing the creation of unregulated, privately held databases on human behavior. We were just allowing product managers to run better A/B tests.
Anna Wiener (Uncanny Valley)
Quantitative historians who use statistical tools to study big-picture historical trends, created a vast database of research on more than 36,000 slave ship voyages that took place over four hundred years. They found that there was a revolt on at least one in ten of these voyages. That was a much higher number than anyone expected. Revolts were never easy, but revolts on slave ships in the middle of the Atlantic Ocean were basically suicide missions. Nonetheless, many captives chose death over this exceptionally horrid new kind of slavery. This type of resistance was so expensive and time-consuming for the slavers, these historians estimate that it prevented at least a million more people from being captured and entering the slave trade. So why would a revolt happen on one ship and not another? The quantitative historians couldn't find a clear pattern, other than that captives tried to revolt whenever they would. But one thing did stand out: The more women onboard a slave ship, the more likely a revolt. Let me emphasize this point: the more women onboard a slave ship, the more likely a revolt would occur.
Rebecca Hall (Wake: The Hidden History of Women-Led Slave Revolts)
You mentioned earlier that if I wanted to help, Miss Oliviera, I should save the lectures, and help,” Mr. Smith said as he sprayed. “Perhaps that’s exactly what Fates do.” I shook my head, bewildered. “I’m sorry?” “Perhaps Fates are people like us…ordinary souls who’ve found themselves caught up in the battle between good and evil, and have chosen to take a stand and help do what’s right.” Mr. Smith was lecturing again, but this time the speech seemed to be directed at John, too. His tone was kindly, however. “Maybe that’s why John’s fingerprints aren’t in the Isla Heusos Police Department database, and why no one will find his footsteps here. Small things that take just a moment to do, yes, but that could add up, in the end, to make an enormous difference to someone. What do you say to that, Miss Oliviera?” “I…I don’t know,” I said. I was confused. I supposed he was right, though. This could certainly explain how John was able to drift like a ghost in and out of the Isla Heusos Cemetery-and my various schools-leaving behind no trace, except rumors and the faintest images on video, and broken padlocks and chains.
Meg Cabot (Underworld (Abandon, #2))
The man on the other end of the satellite phone looked up when the GPS coordinates flashed on his screen. He copied the location and searched the satellite surveillance database for live feeds. One result. He opened the stream and panned the view to the center of the iceberg, where the dark spots were. He zoomed in several times, and when the image came into focus, he dropped his coffee to the floor, bolted out of his office, and ran down the hall to the director’s office. He barged in, interrupting a gray-haired man who was standing and speaking with both hands held up.
A.G. Riddle (The Atlantis Gene (The Origin Mystery, #1))
I’d just like to point out that I have a serious issue with the fact that we’ve sat here all night watching Eric hack into a hundred different secure and confidential websites and databases—including some really scary federal places—yet he refuses to get us free cable TV.” “That’d be illegal.
Paige Tyler (Wolf Unleashed (SWAT: Special Wolf Alpha Team, #5))
Lampaxa Vorheridine? My Latin was never very good. What does that Translate to?" "Um, nothing. It wasn't named by an Earth scientist. According to the database it was named by a Cheblookan aboard a frieghter when it stopped here looking for fresh food. His friend was killed by one as they searched the swamp for Greppers. After the hunting party killed the creature and determined that it was safe to eat if processed properly, the Cheblookan reportedly named it after his mother-in-law, Lampaxa Vorheridine. he said it sort of reminded him of her, even though they look nothing alike.
Thomas DePrima
The blockchain… is the biggest innovation in computer science—the idea of a distributed database where trust is established through mass collaboration and clever code rather than through a powerful institution that does the authentication and the settlement. —Don Tapscott, author of The Blockchain Revolution[575]
Neel Mehta (Blockchain Bubble or Revolution: The Present and Future of Blockchain and Cryptocurrencies)
THE THING about Fielding was, the other shoe always dropped eventually. Because Fielding was like a database. Nothing you ever said or did, or that anyone else ever said or did in Fielding’s presence, was not noted, scrubbed over carefully, hung out to dry, starched, and redelivered in a clear plastic bag sooner or later.
Eli Easton (Blame It on the Mistletoe (Blame It on the Mistletoe, #1))
Different databases are designed to solve different problems. Using a single database engine for all of the requirements usually leads to non- performant solutions; storing transactional data, caching session information, traversing graph of customers and the products their friends bought are essentially different problems.
Pramod J. Sadalage (NoSQL Distilled: A Brief Guide to the Emerging World of Polyglot Persistence)
Focusing on individual nutrients, their identities, their contents in food, their tissue concentrations, and their biological mechanisms, is like using math and physics to catch balls. It’s not the way nature evolved, and it makes proper nutrition far more difficult than it needs to be. Our bodies use countless mechanisms, strategically placed throughout our digestion, absorption, and transport and metabolic pathways, to effortlessly ensure tissue concentrations consistent with good health—no database consultation required. But as long as we let reductionism guide our research and our understanding of nutrition, good health will remain unattainable.
T. Colin Campbell (Whole: Rethinking the Science of Nutrition)
Database Management System [Origin: Data + Latin basus "low, mean, vile, menial, degrading, ounterfeit."] A complex set of interrelational data structures allowing data to be lost in many convenient sequences while retaining a complete record of the logical relations between the missing items. -- From The Devil's DP Dictionary
Stan Kelly-Bootle
If you want to look at a Detroit Free Press published since 2000," the reference librarian said, "you can use a database." "I'll be right over." "Come ahead. Unless you want to access it from your own computer." "I can do that?" "Certainly." The librarian explained how, and she didn't even sound condescending. Librarians are wonderful people.
JoAnna Carl (The Chocolate Cupid Killings (A Chocoholic Mystery, #9))
we rely upon the voting populace to determine if a candidate’s intellectual abilities “measure up,” an inherently flawed system, as the populace has access only to prepackaged presentations and observations of a candidate in debates and while he or she is giving speeches—hardly an adequate database for accurately gauging intellectual ability.
Bandy X. Lee (The Dangerous Case of Donald Trump: 27 Psychiatrists and Mental Health Experts Assess a President)
With all the latest whiz-bang technology and massive databases and communications pipes at their disposal, there was a constant self-generated pressure to put all the technology to good use, to do something. Unfortunately, that something was the unending creation of timelines, policies, and plans—the embalming fluid of organizational nimbleness.
Pete Blaber (The Mission, The Men, and Me: Lessons from a Former Delta Force Commander)
A distributed system is one in which the failure of a computer you didn’t even know existed can render your own computer unusable. Leslie Lamport
Alex Petrov (Database Internals: A Deep Dive into How Distributed Data Systems Work)
The history of otaku culture is one of adaptation, of how to domesticate American culture.
Hiroki Azuma (Otaku: Japan's Database Animals)
The obsession with Japan in otaku culture did not develop from Japanese tradition, but rather emerged after this tradition disappeared.
Hiroki Azuma (Otaku: Japan's Database Animals)
The image of Japan that obsesses otaku is in fact no more than a U.S. produced imitation.
Hiroki Azuma (Otaku: Japan's Database Animals)
In the mid-1990s, a new employee of Sun Microsystems in California kept disappearing from their database. Every time his details were entered, the system seemed to eat him whole; he would disappear without a trace. No one in HR could work out why poor Steve Null was database kryptonite. The staff in HR were entering the surname as “Null,” but they were blissfully unaware that, in a database, NULL represents a lack of data, so Steve became a non-entry. To computers, his name was Steve Zero or Steve McDoesNotExist. Apparently, it took a while to work out what was going on, as HR would happily reenter his details each time the issue was raised, never stopping to consider why the database was routinely removing him.
Matt Parker (Humble Pi: A Comedy of Maths Errors)
What was shocking were the rewards my father's cousins had gathered in the intervening couple of decades. They farmed now on thousands of acres, not hundreds. They drove fancy pickup trucks, owned lakefront property and second homes. A simple Internet search offered the truth of where their riches had come from: good ol' Uncle Sam. Recently I clicked again on a database of farm subsidy payments, and found that five of my father's first cousins had been paid, all told, $3 million between 1995 and 2005 - and that on top of whatever they'd earned outright for the sale of their corn and soybeans. They worked hard, certainly. They'd saved and scrimped through the lean years. They were good and honorable yeoman, and now they'd come through to their great reward: a prime place at the trough of the welfare state. All that corn syrup guzzled down the gullets of America's overweight children, all that beef inefficiently fattened on cheap feed, all that ethanol being distilled in heartland refineries: all of it underwritten by as wasteful a government program as now exists this side of the defense industry. In the last ten years, the federal government has paid $131 million in subsidies and disaster insurance in just the county [in Minnesota] where I grew up. Corn is subsidized to keep it cheap, and the subsidies encourage overproduction, which encourages a scramble for ever more ways to use corn, and thus bigger subsidies - the perfect feedback loop of government welfare.
Philip Connors
The gathering of information to control people is fundamental to any ruling power. As resistance to land acquisition and the new economic policies spreads across India, in the shadow of outright war in Central India, as a containment technique, India’s government has embarked on a massive biometrics program, perhaps one of the most ambitious and expensive information gathering projects in the world—the Unique Identification Number (UID). People don’t have clean drinking water, or toilets, or food, or money, but they will have election cards and UID numbers. Is it a coincidence that the UID project run by Nandan Nilekani, former CEO of Infosys, ostensibly meant to “deliver services to the poor,” will inject massive amounts of money into a slightly beleaguered IT industry?50 To digitize a country with such a large population of the illegitimate and “illegible”—people who are for the most part slum dwellers, hawkers, Adivasis without land records—will criminalize them, turning them from illegitimate to illegal. The idea is to pull off a digital version of the Enclosure of the Commons and put huge powers into the hands of an increasingly hardening police state. Nilekani’s technocratic obsession with gathering data is consistent with Bill Gates’s obsession with digital databases, numerical targets, and “scorecards of progress” as though it were a lack of information that is the cause of world hunger, and not colonialism, debt, and skewed profit-oriented corporate policy.51
Arundhati Roy (Capitalism: A Ghost Story)
It remains an enduring mystery just which powerful figure(s) caused the world’s two most prestigious scientific journals, The Lancet and the New England Journal of Medicine (NEJM), to publish overtly fraudulent studies from a nonexistent database owned by a previously unknown company. Anthony Fauci and the vaccine cartel celebrated the Lancet and NEJM papers on May 22, 2020
Robert F. Kennedy Jr. (The Real Anthony Fauci: Bill Gates, Big Pharma, and the Global War on Democracy and Public Health)
When copies are free, you need to sell things that cannot be copied. Well, what can’t be copied? Trust, for instance. Trust cannot be reproduced in bulk. You can’t purchase trust wholesale. You can’t download trust and store it in a database or warehouse it. You can’t simply duplicate someone’s else’s trust. Trust must be earned, over time. It cannot be faked. Or counterfeited (at least for long). Since we prefer to deal with someone we can trust, we will often pay a premium for that privilege. We call that branding. Brand companies can command higher prices for similar products and services from companies without brands because they are trusted for what they promise. So trust is an intangible that has increasing value in a copy-saturated world.
Kevin Kelly (The Inevitable: Understanding the 12 Technological Forces That Will Shape Our Future)
When you type an address in your web browser, a group of servers called domain name servers (DNS) match the address to an IP in their database, and send you to the right place. If you typed the IP into your browser’s address bar instead, you’d actually end up in the exact same place without the routing: opens, opens, and so on.
A.G. Riddle (The Atlantis Gene (The Origin Mystery, #1))
the Feds had also found Netcom’s customer database that contained more than 20,000 credit card numbers on my computer, but I had never attempted to use any of them; no prosecutor would ever be able to make a case against me on that score. I have to admit, I had liked the idea that I could use a different credit card every day for the rest of my life without ever running out. But I’d never had any intention of running up charges on them, and never did. That would be wrong. My trophy was a copy of Netcom’s customer database. Why is that so hard to understand? Hackers and gamers get it instinctively. Anyone who loves to play chess knows that it’s enough to defeat your opponent. You don’t have to loot his kingdom or seize his assets to make it worthwhile.
Kevin D. Mitnick (Ghost in the Wires: My Adventures as the World's Most Wanted Hacker)
The president has put in place an organization that contains a kind of database that no one has ever seen before in life that’s going to be very, very powerful... And that database will have information about everything on every individual in ways that it’s never been done before. He’s been very smart,” Waters said of Obama. “I mean it’s very powerful what he’s leaving in place.
Maxine Waters
The truth is no online database will replace your newspaper,” he claimed. “Yet Nicholas Negroponte, director of the MIT Media Lab, predicts that we’ll soon buy books and newspapers straight over the Internet. Uh, sure.” Stoll captured the prevailing skepticism of a digital world full of “interacting libraries, virtual communities, and electronic commerce” with one word: “baloney.
Kevin Kelly (The Inevitable: Understanding the 12 Technological Forces That Will Shape Our Future)
The fact that we did not have a database running for 18 months of development meant that, for 18 months, we did not have schema issues, query issues, database server issues, password issues, connection time issues, and all the other nasty issues that raise their ugly heads when you fire up a database. It also meant that all our tests ran fast, because there was no database to slow them down.
Robert C. Martin (Clean Architecture)
I wake on the fiction couch deeply hungover, my head cracking, with Rachel telling me to get up. She’s holding my eyelids open like she used to do in high school when we’d stayed up all night talking and then slept through the morning alarm. ‘Get. Up. Henry.’ ‘What time is it? I ask, batting off her hands. ‘It’s eleven. The shop’s been open for an hour. There are customers asking for books I can’t find. George is yelling at a guy called Martin Gamble who’s here to help me create the database. And as a separate issue, Amy’s waiting in the reading garden.’ ‘Amy’s here?’ I sit up and mess my hair around. ‘How do I look?’ ‘I decline to answer on the grounds that technically you’re my boss and I don’t want to start my new job by insulting you.’ ‘Thank you,’ I say. ‘I appreciate that.
Cath Crowley (Words in Deep Blue)
What if the decisions have already been made by someone else? What if your company has made a commitment to a certain database, or a certain web server, or a certain framework? A good architect pretends that the decision has not been made, and shapes the system such that those decisions can still be deferred or changed for as long as possible. A good architect maximizes the number of decisions not made.
Robert C. Martin (Clean Architecture)
We believe our eyes capture images from the world like a camera, then relay these images to our brain. Our eyes “photograph,” say, the coffee mug in front of us. It’s a nice model. It is also wrong. Seeing is less like photography and more like language. We don’t see the world so much as converse with it. What is that? Looks like a coffee mug, you say? Let me check my database and get back to you. Yep, it’s a
Eric Weiner (The Socrates Express: In Search of Life Lessons from Dead Philosophers)
In a provocative article in Wired, editor-in-chief Chris Anderson argued that huge databases render scientific theory itself obsolete. Why spend time formulating human-language hypotheses, after all, when you can quickly analyze trillions of bits of data and find the clusters and correlations? He quotes Peter Norvig, Google’s research director: “All models are wrong, and increasingly you can succeed without them.
Eli Pariser (The Filter Bubble)
Most people who refer to an epidemic of permissive parenting just assume that this is true, that everyone knows it, and therefore that there's no need to substantiate that claim. My efforts to track down data -- by combing both scholarly and popular databases as well as sending queries to leading experts in the field -- have yielded absolutely nothing. I'm forced to conclude that no one has any idea how many parents could be considered permissive, how many are punitive, and how many are responsive to their children's needs without being permissive or punitive. (The tendency to overlook that third possibility is a troubling and enduring trend in its own right.) In short, there is absolutely no evidence to support the claim that permissiveness is the dominant style of parenting in our culture, or even that it's particularly common.
Alfie Kohn (The Myth of the Spoiled Child: Coddled Kids, Helicopter Parents, and Other Phony Crises)
Lurking at the foundations of otaku culture is the complex yearning to produce a pseudo Japan once again from American-made material, after the destruction of the "good old Japan" through the defeat in World War II.
Hiroki Azuma (Otaku: Japan's Database Animals)
Since it is all based on statistics, the size of the company's database is the key to make accurate predictions. Hence the first company to build a giant genetic database will provide customers with the best predictions, and will potentially corner the market. US biotech companies are increasingly worried that strict privacy laws in the USA combined with Chinese disregard for individual privacy may hand China the genetic market on a plate.
Yuval Noah Harari (Homo Deus: A History of Tomorrow)
Irritable bowel syndrome is a well-documented, little-publicized aftermath of diarrheal infections—especially severe or repeated bouts. If you talk to people who’ve recently been diagnosed with IBS, about a third of them will say that their symptoms began after a bad attack of food poisoning. Defense Department databases reveal a five-fold higher risk of IBS among men and women who suffered an acute diarrheal infection while deployed in the Middle East.
Mary Roach (Grunt: The Curious Science of Humans at War)
At this risk of being redundant, everything must be checked in to code. This includes the following: DB object migrations Triggers Procedures and functions Views Configurations Sample datasets for functionality Data cleanup scripts
Laine Campbell (Database Reliability Engineering: Designing and Operating Resilient Database Systems)
For the years 1995 to 2004, a search of research awards in the National Institutes of Health database using the term genetics identified 21,956 new grants (including 181 cross-indexed by the term race), while only 44 new grants were indexed by the terms racism or racial discrimination .56 When the NIH launched a new center to study population health, it was originally named the Center for Genomics and Health Disparities—the environmental component was completely missing from the title.
Dorothy Roberts (Fatal Invention: How Science, Politics, and Big Business Re-create Race in the Twenty-First Century)
America's poor and working-class people have long been subject to invasive surveillance, midnight raids, and punitive public policy that increase the stigma and hardship of poverty. During the nineteenth century, they were quarantined in county poorhouses. During the twentieth century, they were investigated by caseworkers, treated like criminals on trial. Today, we have forged what I call a digital poorhouse from databases, algorithms, and risk models. It promises to eclipse the reach and repercussions of everything that came before. Like earlier technological innovations in poverty management, digital tracking and automated decision-making hid poverty from the professional middle-class public and give the nation the ethical distance it needs to make inhuman choices: who gets food and who starves, who has housing and who remains homeless, and which families are broken up by the state. The digital poorhouse is part of a long American tradition. We manage the individual poor in order to escape our shared responsibility for eradicating poverty.
Virginia Eubanks (Automating Inequality: How High-Tech Tools Profile, Police, and Punish the Poor)
Which kinds of decisions are premature? Decisions that have nothing to do with the business requirements—the use cases—of the system. These include decisions about frameworks, databases, web servers, utility libraries, dependency injection, and the like. A good system architecture is one in which decisions like these are rendered ancillary and deferrable. A good system architecture does not depend on those decisions. A good system architecture allows those decisions to be made at the latest possible moment, without significant impact.
Robert C. Martin (Clean Architecture)
However, DROs as a whole really need to keep track of people who have opted out of the entire DRO system, since those people have clearly signaled their intention to go rogue and live “off the grid.” Thus if you cancel your DRO insurance, your name goes into a database available to all DROs. If you sign up with another DRO, no problem, your name is taken out. However, if you do not sign up with any other DRO, red flags pop up all over the system. What happens then? Remember – there is no public property in a stateless society. If you’ve gone rogue, where are you going to go? You can’t take a bus – bus companies will not take rogues, because their DRO will require that they take only DRO-covered passengers, in case of injury or altercation. Want to fill up on gas? No luck, for the same reason. You can try hitchhiking, of course, which might work, but what happens when you get to your destination and try to rent a motel room? No DRO card, no luck. Want to sleep in the park? Parks are privately owned, so keep moving. Getting hungry? No groceries, no restaurants – no food! What are you going to do?
Stefan Molyneux (Practical Anarchy: The Freedom of the Future)
Through the years, I have heard that the average person speaks at about 150-160 words per minute, but can listen at a rate of about 1,000 words per minute. What is going on during all that extra mind time? • Our minds are racing ahead and preparing for the next thing we are going to say. • We are preoccupied with other thoughts, priorities, and distractions. • Our subconscious filters are thumbing through our database of memories, judgments, experiences, perspectives, and opinions to frame how we are going to interpret what we think someone is saying.
Susan C. Young (The Art of Communication: 8 Ways to Confirm Clarity & Understanding for Positive Impact(The Art of First Impressions for Positive Impact, #5))
I spoke off the record to a database consultant who was working with a company in Italy. They had a lot of clients, and their database would generate a client ID for each one by using something like the current year, the first letter of the client company name and then an index number to make sure each ID was unique. For some reason their database was losing companies whose names started with the letter E. It was because they were using Excel and it was converting those client IDs to be a scientific notation number, which was no longer recognized as an ID.
Matt Parker (Humble Pi: When Math Goes Wrong in the Real World)
Big data is based on the feedback economy where the Internet of Things places sensors on more and more equipment. More and more data is being generated as medical records are digitized, more stores have loyalty cards to track consumer purchases, and people are wearing health-tracking devices. Generally, big data is more about looking at behavior, rather than monitoring transactions, which is the domain of traditional relational databases. As the cost of storage is dropping, companies track more and more data to look for patterns and build predictive models".
Neil Dunlop
bought one of the software programs, and worked the system. That particular software covered more than 300,000 available scholarships. She narrowed the database search until she had 1,000 scholarships to apply for. She spent the whole summer filling out applications and writing essays. She literally applied for 1,000 scholarships. Denise was turned down by 970, but she got 30, and those 30 scholarships paid her $38,000. She went to school for free while her next-door neighbor sat and whined that no money was available for school and eventually got a student loan.
Dave Ramsey (The Total Money Makeover: Classic Edition: A Proven Plan for Financial Fitness)
ultimately, most of us would choose a rich and meaningful life over an empty, happy one, if such a thing is even possible. “Misery serves a purpose,” says psychologist David Myers. He’s right. Misery alerts us to dangers. It’s what spurs our imagination. As Iceland proves, misery has its own tasty appeal. A headline on the BBC’s website caught my eye the other day. It read: “Dirt Exposure Boosts Happiness.” Researchers at Bristol University in Britain treated lung-cancer patients with “friendly” bacteria found in soil, otherwise known as dirt. The patients reported feeling happier and had an improved quality of life. The research, while far from conclusive, points to an essential truth: We thrive on messiness. “The good life . . . cannot be mere indulgence. It must contain a measure of grit and truth,” observed geographer Yi-Fu Tuan. Tuan is the great unheralded geographer of our time and a man whose writing has accompanied me throughout my journeys. He called one chapter of his autobiography “Salvation by Geography.” The title is tongue-in-cheek, but only slightly, for geography can be our salvation. We are shaped by our environment and, if you take this Taoist belief one step further, you might say we are our environment. Out there. In here. No difference. Viewed that way, life seems a lot less lonely. The word “utopia” has two meanings. It means both “good place” and “nowhere.” That’s the way it should be. The happiest places, I think, are the ones that reside just this side of paradise. The perfect person would be insufferable to live with; likewise, we wouldn’t want to live in the perfect place, either. “A lifetime of happiness! No man could bear it: It would be hell on Earth,” wrote George Bernard Shaw, in his play Man and Superman. Ruut Veenhoven, keeper of the database, got it right when he said: “Happiness requires livable conditions, but not paradise.” We humans are imminently adaptable. We survived an Ice Age. We can survive anything. We find happiness in a variety of places and, as the residents of frumpy Slough demonstrated, places can change. Any atlas of bliss must be etched in pencil. My passport is tucked into my desk drawer again. I am relearning the pleasures of home. The simple joys of waking up in the same bed each morning. The pleasant realization that familiarity breeds contentment and not only contempt. Every now and then, though, my travels resurface and in unexpected ways. My iPod crashed the other day. I lost my entire music collection, nearly two thousand songs. In the past, I would have gone through the roof with rage. This time, though, my anger dissipated like a summer thunderstorm and, to my surprise, I found the Thai words mai pen lai on my lips. Never mind. Let it go. I am more aware of the corrosive nature of envy and try my best to squelch it before it grows. I don’t take my failures quite so hard anymore. I see beauty in a dark winter sky. I can recognize a genuine smile from twenty yards. I have a newfound appreciation for fresh fruits and vegetables. Of all the places I visited, of all the people I met, one keeps coming back to me again and again: Karma Ura,
Eric Weiner (The Geography of Bliss: One Grump's Search for the Happiest Places in the World)
that was how plenty of people felt in 634 BC in Rome, as well, when they were convinced that the city was destined to collapse after 120 years of existence. It is how people have felt at countless points in history since then. Try searching Google’s library of digitised manuscripts for the phrase ‘these uncertain times’, and you’ll find that it occurs over and over, in hundreds of journals and books, in virtually every decade the database encompasses, reaching back to the seventeenth century. ‘As a matter of fact,’ Watts insisted, ‘our age is no more insecure than any other. Poverty, disease, war, change and death are nothing new.
Oliver Burkeman (The Antidote: Happiness for People Who Can't Stand Positive Thinking)
Here’s a simple definition of ideology: “A set of beliefs about the proper order of society and how it can be achieved.”8 And here’s the most basic of all ideological questions: Preserve the present order, or change it? At the French Assembly of 1789, the delegates who favored preservation sat on the right side of the chamber, while those who favored change sat on the left. The terms right and left have stood for conservatism and liberalism ever since. Political theorists since Marx had long assumed that people chose ideologies to further their self-interest. The rich and powerful want to preserve and conserve; the peasants and workers want to change things (or at least they would if their consciousness could be raised and they could see their self-interest properly, said the Marxists). But even though social class may once have been a good predictor of ideology, that link has been largely broken in modern times, when the rich go both ways (industrialists mostly right, tech billionaires mostly left) and so do the poor (rural poor mostly right, urban poor mostly left). And when political scientists looked into it, they found that self-interest does a remarkably poor job of predicting political attitudes.9 So for most of the late twentieth century, political scientists embraced blank-slate theories in which people soaked up the ideology of their parents or the TV programs they watched.10 Some political scientists even said that most people were so confused about political issues that they had no real ideology at all.11 But then came the studies of twins. In the 1980s, when scientists began analyzing large databases that allowed them to compare identical twins (who share all of their genes, plus, usually, their prenatal and childhood environments) to same-sex fraternal twins (who share half of their genes, plus their prenatal and childhood environments), they found that the identical twins were more similar on just about everything.12 And what’s more, identical twins reared in separate households (because of adoption) usually turn out to be very similar, whereas unrelated children reared together (because of adoption) rarely turn out similar to each other, or to their adoptive parents; they tend to be more similar to their genetic parents. Genes contribute, somehow, to just about every aspect of our personalities.13 We’re not just talking about IQ, mental illness, and basic personality traits such as shyness. We’re talking about the degree to which you like jazz, spicy foods, and abstract art; your likelihood of getting a divorce or dying in a car crash; your degree of religiosity, and your political orientation as an adult. Whether you end up on the right or the left of the political spectrum turns out to be just as heritable as most other traits: genetics explains between a third and a half of the variability among people on their political attitudes.14 Being raised in a liberal or conservative household accounts for much less. How can that be? How can there be a genetic basis for attitudes about nuclear power, progressive taxation, and foreign aid when these issues only emerged in the last century or two? And how can there be a genetic basis for ideology when people sometimes change their political parties as adults? To answer these questions it helps to return to the definition of innate that I gave in chapter 7. Innate does not mean unmalleable; it means organized in advance of experience. The genes guide the construction of the brain in the uterus, but that’s only the first draft, so to speak. The draft gets revised by childhood experiences. To understand the origins of ideology you have to take a developmental perspective, starting with the genes and ending with an adult voting for a particular candidate or joining a political protest. There are three major steps in the process. Step
Jonathan Haidt (The Righteous Mind: Why Good People are Divided by Politics and Religion)
Although whites use drugs in greater numbers than blacks, blacks are far more likely to be arrested for drug offenses—and therefore far more likely to end up in genetic databases. The latest National Survey on Drug Use and Health, released in February 2010, confirms that young blacks aged eighteen to twenty-five years old are less likely to use illegal drugs than the national average.69 Yet black men are twelve times more likely than white men to be sent to prison on drug charges.70 This staggering racial disparity results in part from the deliberate decision of police departments to target their drug enforcement efforts on inner-city neighborhoods where people of color live.
Dorothy Roberts (Fatal Invention: How Science, Politics, and Big Business Re-create Race in the Twenty-First Century)
A similar concern about using the web to provide just-in-time information shows up among physicians arguing the future of medical education. Increasingly, and particularly while making a first diagnosis, physicians rely on handheld databases, what one philosopher calls “E-memory.” The physicians type in symptoms and the digital tool recommends a potential diagnosis and suggested course of treatment. Eighty-nine percent of medical residents regard one of these E-memory tools, UpToDate, as their first choice for answering clinical questions. But will this “just-in-time” and “just enough” information teach young doctors to organize their own ideas and draw their own conclusions?
Sherry Turkle (Reclaiming Conversation: The Power of Talk in a Digital Age)
must be said for the “Latter-day Saints” (these conceited words were added to Smith’s original “Church of Jesus Christ” in 1833) that they have squarely faced one of the great difficulties of revealed religion. This is the problem of what to do about those who were born before the exclusive “revelation,” or who died without ever having the opportunity to share in its wonders. Christians used to resolve this problem by saying that Jesus descended into hell after his crucifixion, where it is thought that he saved or converted the dead. There is indeed a fine passage in Dante’s Inferno where he comes to rescue the spirits of great men like Aristotle, who had presumably been boiling away for centuries until he got around to them. (In another less ecumenical scene from the same book, the Prophet Muhammad is found being disemboweled in revolting detail.) The Mormons have improved on this rather backdated solution with something very literal-minded. They have assembled a gigantic genealogical database at a huge repository in Utah, and are busy filling it with the names of all people whose births, marriages, and deaths have been tabulated since records began. This is very useful if you want to look up your own family tree, and as long as you do not object to having your ancestors becoming Mormons. Every week, at special ceremonies in Mormon temples, the congregations meet and are given a certain quota of names of the departed to “pray in” to their church. This retrospective baptism of the dead seems harmless enough to me, but the American Jewish Committee became incensed when it was discovered that the Mormons had acquired the records of the Nazi “final solution,” and were industriously baptizing what for once could truly be called a “lost tribe”: the murdered Jews of Europe. For all its touching inefficacy, this exercise seemed in poor taste. I sympathize with the American Jewish Committee, but I nonetheless think that the followers of Mr. Smith should be congratulated for hitting upon even the most simpleminded technological solution to a problem that has defied solution ever since man first invented religion.
Christopher Hitchens (God Is Not Great: How Religion Poisons Everything)
Using an example of how this would work in a more relatable scenario. If you were to imagine a hacker accessing the computer system of your bank and transferring all your funds from your own account into his and deleting all evidence of the transaction, existing technology would not be able to pick this up and you would likely be out of pocket. In the case of a blockchain currency like Bitcoin, having one server hacked with a false transaction being inserted into the database would not be consistent with the same record across the other copies of the database. The blockchain would identify the transaction as being illegitimate and would ultimately reject it meaning the money in your account would be kept safe.
Chris Lambert (Cryptocurrency: How I Turned $400 into $100,000 by Trading Cryptocurrency for 6 months (Crypto Trading Secrets))
When the National Transportation Safety Board analyzed its database of major flight accidents, it found that 73 percent occurred on a flight crew’s first day working together. Like surgeries and putts, the best flight is one in which everything goes according to routines long understood and optimized by everyone involved, with no surprises. When the path is unclear—a game of Martian tennis—those same routines no longer suffice. “Some tools work fantastically in certain situations, advancing technology in smaller but important ways, and those tools are well known and well practiced,” Andy Ouderkirk told me. “Those same tools will also pull you away from a breakthrough innovation. In fact, they’ll turn a breakthrough innovation into an incremental one.
David Epstein (Range: Why Generalists Triumph in a Specialized World)
After staring at photographs of very attractive faces, men show less desire to date an average-looking woman. Exposure to extremely beautiful bodies in visual erotica can wreak havoc on some men's judgement. In one study, men shown pictures of women's beautiful bodies in erotica rated a previously attractive nude as less exciting. Some men even claimed to be less in love with their wives! ... We have a chance to calibrate faces against real-life faces all the time. Everyone sees hundreds and even thousands of faces, but most people have not seen hundreds of nude bodies. Given a much smaller database, nude or minimally clothed bodies in the media may get disproportionate representations in our minds and skew our ideas of the possible or even of the average.
Nancy Etcoff
Ana has been pretending it wasn’t there, but now Pearson has stated it baldly: the fundamental incompatibility between Exponential’s goals and hers. They want something that responds like a person, but isn’t owed the same obligations as a person, and that’s something she can’t give them. No one can give it to them, because it’s an impossibility. The years she spent raising Jax didn’t just make him fun to talk to, didn’t just provide him with hobbies and a sense of humor. They were what gave him all the attributes Exponential is looking for: fluency at navigating the real world, creativity at solving new problems, judgment you could entrust with an important decision. Every quality that made a person more valuable than a database was a product of experience.
Ted Chiang (Exhalation)
SHORT NOTE ABOUT SHA-1 A lot of people become concerned at some point that they will, by random happenstance, have two objects in their repository that hash to the same SHA-1 value. What then? If you do happen to commit an object that hashes to the same SHA-1 value as a previous object in your repository, Git will see the previous object already in your Git database and assume it was already written. If you try to check out that object again at some point, you’ll always get the data of the first object. However, you should be aware of how ridiculously unlikely this scenario is. The SHA-1 digest is 20 bytes or 160 bits. The number of randomly hashed objects needed to ensure a 50% probability of a single collision is about 280 (the formula for determining collision probability is p = (n(n-1)/2) * (1/2^160)). 280 is 1.2 x 10^24 or 1 million billion billion. That’s 1,200 times the number of grains of sand on the earth. Here’s an example to give you an idea of what it would take to get a SHA-1 collision. If all 6.5 billion humans on Earth were programming, and every second, each one was producing code that was the equivalent of the entire Linux kernel history (3.6 million Git objects) and pushing it into one enormous Git repository, it would take roughly 2 years until that repository contained enough objects to have a 50% probability of a single SHA-1 object collision. A higher probability exists that every member of your programming team will be attacked and killed by wolves in unrelated incidents on the same night.
Scott Chacon (Pro Git)
The best way to figure out what Perl is used for is to look at the ... Comprehensive Perl Archive Network (the CPAN, for short). ... [Y]ou'll get the impression that Perl has interfaces to almost everything in the world. With a little thought, you may figure out the reason Perl has interfaces to everything is not so much so Perl itself can talk to everything, but so Perl can get everything in the world talking to everything else in the world. The combinatorics are staggering. The very first issue of The Perl Journal ... contained an article entitled 'How Perl Saved the Human Genome Project'. It explains how all the different genome sequencing laboratories used different databases with different formats, and how Perl was used to massage the data into a cohesive whole.
Larry Wall
Swanson saw opportunity. He realized he could make discoveries by connecting information from scientific articles in subspecialty domains that never cited one another and that had no scientists who worked together. For example, by systematically cross-referencing databases of literature from different disciplines, he uncovered “eleven neglected connections” between magnesium deficiency and migraine research, and proposed that they be tested. All of the information he found was in the public domain; it had just never been connected. “Undiscovered public knowledge,” Swanson called it. In 2012, the American Headache Society and the American Academy of Neurology reviewed all the research on migraine prevention and concluded that magnesium should be considered as a common treatment.
David Epstein (Range: Why Generalists Triumph in a Specialized World)
1. No cold calling. Ever. You should attempt to sell only to warm leads. 2. Before you try to sell anything, you must know how much you’re willing to pay to get a new customer. 3. A prospect who “finds” you first is more likely to buy from you than if you find him. 4. You will dramatically enhance your credibility as a salesperson by authoring, speaking, and publishing quality information. 5. Generate leads with information about solving problems, not information about the product itself. 6. You can attain the best negotiating position with customers only when your marketing generates “deal flow” that exceeds your capacity. 7. The most valuable asset you can own is a well-maintained customer database, because people who’ve already bought from you are way easier to sell to than strangers.
Perry Marshall (80/20 Sales and Marketing: The Definitive Guide to Working Less and Making More)
In fact, as these companies offered more and more (simply because they could), they found that demand actually followed supply. The act of vastly increasing choice seemed to unlock demand for that choice. Whether it was latent demand for niche goods that was already there or a creation of new demand, we don't yet know. But what we do know is that the companies for which we have the most complete data - netflix, Amazon, Rhapsody - sales of products not offered by their bricks-and-mortar competitors amounted to between a quarter and nearly half of total revenues - and that percentage is rising each year. in other words, the fastest-growing part of their businesses is sales of products that aren't available in traditional, physical retail stores at all. These infinite-shelf-space businesses have effectively learned a lesson in new math: A very, very big number (the products in the Tail) multiplied by a relatives small number (the sales of each) is still equal to a very, very big number. And, again, that very, very big number is only getting bigger. What's more, these millions of fringe sales are an efficient, cost-effective business. With no shelf space to pay for - and in the case of purely digital services like iTunes, no manufacturing costs and hardly any distribution fees - a niche product sold is just another sale, with the same (or better) margins as a hit. For the first time in history, hits and niches are on equal economic footing, both just entries in a database called up on demand, both equally worthy of being carried. Suddenly, popularity no longer has a monopoly on profitability.
Chris Anderson (The Long Tail: Why the Future of Business is Selling Less of More)
When experimentation is complete, researchers are expected to document and share their data and methodology so they are available for careful scrutiny by other scientists. This allows other researchers the chance to verify results by attempting to reproduce them and allows statistical measures of the reliability of these data to be established. This is called “full disclosure” and is an area that the paranormal field is lacking in. Currently there is no repository of paranormal data or body of evidence that researchers can turn to for comparing data. Television shows and websites that document paranormal activity are really our only outlet. The drawback to not having a database is that researchers cannot identify patterns of activity and therefore can’t derive theories or explanations of the paranormal.
Zak Bagans (Dark World: Into the Shadows with the Lead Investigator of the Ghost Adventures Crew)
For example, it’s widely accepted that paranormal activity increases around areas of high EMF. But why? If we had a database to compare EMF readings of every paranormal investigation, we could identify patterns and when cross-referenced against temperature readings, solar activity, moon phases, proximity to water, and other data, paranormal activity might even be predicted. Now lets add another layer—the surrounding materials of the haunting. It’s widely believed that water and limestone heighten paranormal activity, hence the large number of haunted lighthouses and military forts. Now if we compare our previous data with the number of places built of limestone or in close proximity to water, we can start to form hypotheses to explain the phenomenon. A lack of a central database is hurting the research.
Zak Bagans (Dark World: Into the Shadows with the Lead Investigator of the Ghost Adventures Crew)
Both studies in these respected publications relied on data from the Surgisphere Corporation, an obscure Illinois-based “medical education” company that claimed to somehow control an extraordinary global database boasting access to medical information from 96,000 patients in more than 600 hospitals.87 Founded in 2008, this sketchy enterprise had eleven employees, including a middling science fiction writer and a porn star/events hostess. Surgisphere claimed to have analyzed data from six continents and hundreds of hospitals that had treated patients with HCQ or CQ in real time. Someone persuaded the Lancet and the New England Journal of Medicine to publish two Surgisphere studies in separate articles on May 1 and 22. Like the other Gates-supported studies, the Lancet article portrayed HCQ as ineffective and dangerous.
Robert F. Kennedy Jr. (The Real Anthony Fauci: Bill Gates, Big Pharma, and the Global War on Democracy and Public Health)
If America were a house, they’d be the termites. It’s that bad,” said Georgia Republican and voter database expert Mark Davis about the lawfare engaged in fighting against voting integrity laws. Long before COVID-19, the Democratic Party of Georgia, Democratic Senatorial Campaign Committee, and Democratic Congressional Campaign Committee sued Georgia secretary of state Brad Raffensperger in November 2019 to get him to water down the state’s requirements for checking signatures on mail-in ballots.57 Governor Kemp, under pressure from Democratic groups alleging voter suppression, had already signed a law earlier in 2019 that relaxed signature requirements and made it more difficult to reject ballots for signature mismatch or other ballot problems. Elias, who was leading the lawsuits, wanted the requirements relaxed even more.58
Mollie Ziegler Hemingway (Rigged: How the Media, Big Tech, and the Democrats Seized Our Elections)
The Confederate Air Force planes carried gear that when flown close to a cell phone tower allowed those on board to log in passively and see a real-time record of every phone making a call. Task force personnel could then search for numbers in which they were interested, and the database would tell them if those phones were in use, and if so, where. “We’d pinpoint the location, we’d go hit the target,” said an operator. The cell phone tower info might guide the task force to a particular city block. At that point, the operators would use an “electronic divining rod,” a handheld paddlelike sensor that could be programmed to detect a specific phone and would beep increasingly loudly as it got closer to the device.22 The divining rod could even detect a phone that had been turned off, although not one with the battery and SIM card removed.
Sean Naylor (Relentless Strike: The Secret History of Joint Special Operations Command)
In the late twentieth century democracies usually outperformed dictatorships because democracies were better at data-processing. Democracy diffuses the power to process information and make decisions among many people and institutions, whereas dictatorship concentrates information and power in one place. Given twentieth-century technology, it was inefficient to concentrate too much information and power in one place. Nobody had the ability to process all the information fast enough and make the right decisions. This is part of the reason why the Soviet Union made far worse decisions than the United States, and why the Soviet economy lagged far behind the American economy. However, soon AI might swing the pendulum in the opposite direction. AI makes it possible to process enormous amounts of information centrally. Indeed, AI might make centralised systems far more efficient than diffused systems, because machine learning works better the more information it can analyse. If you concentrate all the information relating to a billion people in one database, disregarding all privacy concerns, you can train much better algorithms than if you respect individual privacy and have in your database only partial information on a million people. For example, if an authoritarian government orders all its citizens to have their DNA scanned and to share all their medical data with some central authority, it would gain an immense advantage in genetics and medical research over societies in which medical data is strictly private. The main handicap of authoritarian regimes in the twentieth century – the attempt to concentrate all information in one place – might become their decisive advantage in the twenty-first century.
Yuval Noah Harari (21 Lessons for the 21st Century)
In the late twentieth century democracies usually outperformed dictatorships because democracies were better at data-processing. Democracy diffuses the power to process information and make decisions among many people and institutions, whereas dictatorship concentrates information and power in one place. Given twentieth-century technology, it was inefficient to concentrate too much information and power in one place. Nobody had the ability to process all the information fast enough and make the right decisions. This is part of the reason why the Soviet Union made far worse decisions than the United States, and why the Soviet economy lagged far behind the American economy. “However, soon AI might swing the pendulum in the opposite direction. AI makes it possible to process enormous amounts of information centrally. Indeed, AI might make centralised systems far more efficient than diffused systems, because machine learning works better the more information it can analyse. If you concentrate all the information relating to a billion people in one database, disregarding all privacy concerns, you can train much better algorithms than if you respect individual privacy and have in your database only partial information on a million people. For example, if an authoritarian government orders all its citizens to have their DNA scanned and to share all their medical data with some central authority, it would gain an immense advantage in genetics and medical research over societies in which medical data is strictly private. The main handicap of authoritarian regimes in the twentieth century – the attempt to concentrate all information in one place – might become their decisive advantage in the twenty-first century.
Yuval Noah Harari (21 Lessons for the 21st Century)
Like many in his generation, Billy had grown up playing first-person-shooter video games. He decided to take that experience a few steps further and resolved to join a SWAT team and shoot bad guys for real. He visited the local police station to find out what requirements and training were necessary to become a SWAT team member. He found out that the process was a lot more involved than he expected. He first needed to attend a police academy and become a police officer. Afterwards he would have to work his way onto a SWAT team over time. There were no guarantees. During his visit to the police station he learned that many SWAT members were former Marine Corps snipers. During that same visit the cops ran Billy’s plates through their criminal database and learned that he had outstanding warrants for speeding tickets. They unceremoniously arrested him and tossed him into jail.
William F. Sine (Guardian Angel: Life and Death Adventures with Pararescue, the World's Most Powerful Commando Rescue Force)
Everything within him went still. “Segonian courtship rituals?” he repeated softly. “Why would you wish to know more about that?” She sighed. “Because I couldn’t find anything about it in your informational databases, and I’ve been wanting to do this for a long time.” Reaching up, she rested her small hands on his stubbled cheeks, then rose onto her toes and drew him down for a kiss. His heart stuttered to a halt, then began to slam against his ribs. The first gentle brush of her lips hit him like an electrical current. His breath caught. Hers did, too. She drew back a fraction to stare up at him with wide eyes that acquired an amber glow. Then Dagon slid his arms around her and locked her against him. Dipping his head, he claimed her lips with greater urgency, letting her feel the heat that had been flaying him inside ever since she had walked onto his bridge, fully recovered from her wounds, and drawn him into a hug.
Dianne Duvall (The Segonian (Aldebarian Alliance, #2))
One of the patterns from domain-driven design is called bounded context. Bounded contexts are used to set the logical boundaries of a domain’s solution space for better managing complexity. It’s important that teams understand which aspects, including data, they can change on their own and which are shared dependencies for which they need to coordinate with other teams to avoid breaking things. Setting boundaries helps teams and developers manage the dependencies more efficiently. The logical boundaries are typically explicit and enforced on areas with clear and higher cohesion. These domain dependencies can sit on different levels, such as specific parts of the application, processes, associated database designs, etc. The bounded context, we can conclude, is polymorphic and can be applied to many different viewpoints. Polymorphic means that the bounded context size and shape can vary based on viewpoint and surroundings. This also means you need to be explicit when using a bounded context; otherwise it remains pretty vague.
Piethein Strengholt (Data Management at Scale: Best Practices for Enterprise Architecture)
With or without 'college' we are able to use our senses by perceiving the world around us, that in turn shapes and creates ones own reality. Perception is reality. My 'reality' is not the same as your 'reality' since we all have a different mental database, life experience, physiology, different characteristics, environments we grew up and people we hang out with, etc. I might fall in love with a certain smell while it triggers bad memories for someone else. Same goes for the other senses while perceiving 'reality'. And how real is this so called 'reality' anyway? Our senses can be quite limited compared to a camera or other living creatures on the planet. There are sounds and colours humans can not detect with their senses. We in fact do not perceive the whole 'picture'. The most important things in life are unseen. My point is that we do not need hierarchic, indoctrinating, and capitalized institution called 'science' to tell us what, when, why, and how to think, experiment, sense, and live our lives. Long before there was any 'science', there was sense first.
Nadja Sam
The business is a simple one. Hiro gets information. It may be gossip, videotape, audiotape, a fragment of a computer disk, a xerox of a document. It can even be a joke based on the latest highly publicized disaster. He uploads it to the CIC database -- the Library, formerly the Library of Congress, but no one calls it that anymore. Most people are not entirely clear on what the word "congress" means. And even the word "library" is getting hazy. It used to be a place full of books, mostly old ones. Then they began to include videotapes, records, and magazines. Then all of the information got converted into machine-readable form, which is to say, ones and zeroes. And as the number of media grew, the material became more up to date, and the methods for searching the Library became more and more sophisticated, it approached the point where there was no substantive difference between the Library of Congress and the Central Intelligence Agency. Fortuitously, this happened just as the government was falling apart anyway. So they merged and kicked out a big fat stock offering.
Neal Stephenson (Snow Crash)
Only years later—as an investigative journalist writing about poor scientific research—did I realize that I had committed statistical malpractice in one section of the thesis that earned me a master’s degree from Columbia University. Like many a grad student, I had a big database and hit a computer button to run a common statistical analysis, never having been taught to think deeply (or at all) about how that statistical analysis even worked. The stat program spit out a number summarily deemed “statistically significant.” Unfortunately, it was almost certainly a false positive, because I did not understand the limitations of the statistical test in the context in which I applied it. Nor did the scientists who reviewed the work. As statistician Doug Altman put it, “Everyone is so busy doing research they don’t have time to stop and think about the way they’re doing it.” I rushed into extremely specialized scientific research without having learned scientific reasoning. (And then I was rewarded for it, with a master’s degree, which made for a very wicked learning environment.) As backward as it sounds, I only began to think broadly about how science should work years after I left it.
David Epstein (Range: Why Generalists Triumph in a Specialized World)
Despite the advancements of systematic experimental pipelines, literature-curated protein-interaction data continue to be the primary data for investigation of focused biological mechanisms. Notwithstanding the variable quality of curated interactions available in public databases, the impact of inspection bias on the ability of literature maps to provide insightful information remains equivocal. The problems posed by inspection bias extend beyond mapping of protein interactions to the development of pharmacological agents and other aspects of modern biomedicine. Essentially the same 10% of the proteome is being investigated today as was being investigated before the announcement of completion of the reference genome sequence. One way forward, at least with regard to interactome mapping, is to continue the transition toward systematic and relatively unbiased experimental interactome mapping. With continued advancement of systematic protein-interaction mapping efforts, the expectation is that interactome 'deserts', the zones of the interactome space where biomedical knowledge researchers simply do not look for interactions owing to the lack of prior knowledge, might eventually become more populated. Efforts at mapping protein interactions will continue to be instrumental for furthering biomedical research.
Joseph Loscalzo (Network Medicine: Complex Systems in Human Disease and Therapeutics)
Religion is therefore well suited to be the handmaiden of groupishness, tribalism, and nationalism. To take one example, religion does not seem to be the cause of suicide bombing. According to Robert Pape, who has created a database of every suicide terrorist attack in the last hundred years, suicide bombing is a nationalist response to military occupation by a culturally alien democratic power.62 It’s a response to boots and tanks on the ground—never to bombs dropped from the air. It’s a response to contamination of the sacred homeland. (Imagine a fist punched into a beehive, and left in for a long time.) Most military occupations don’t lead to suicide bombings. There has to be an ideology in place that can rally young men to martyr themselves for a greater cause. The ideology can be secular (as was the case with the Marxist-Leninist Tamil Tigers of Sri Lanka) or it can be religious (as was the case with the Shiite Muslims who first demonstrated that suicide bombing works, driving the United States out of Lebanon in 1983). Anything that binds people together into a moral matrix that glorifies the in-group while at the same time demonizing another group can lead to moralistic killing, and many religions are well suited for that task. Religion is therefore often an accessory to atrocity, rather than the driving force of the atrocity.
Jonathan Haidt (The Righteous Mind: Why Good People are Divided by Politics and Religion)
2006 interview by Jim Gray, Amazon CTO Werner Vogels recalled another watershed moment: We went through a period of serious introspection and concluded that a service-oriented architecture would give us the level of isolation that would allow us to build many software components rapidly and independently. By the way, this was way before service-oriented was a buzzword. For us service orientation means encapsulating the data with the business logic that operates on the data, with the only access through a published service interface. No direct database access is allowed from outside the service, and there’s no data sharing among the services.3 That’s a lot to unpack for non–software engineers, but the basic idea is this: If multiple teams have direct access to a shared block of software code or some part of a database, they slow each other down. Whether they’re allowed to change the way the code works, change how the data are organized, or merely build something that uses the shared code or data, everybody is at risk if anybody makes a change. Managing that risk requires a lot of time spent in coordination. The solution is to encapsulate, that is, assign ownership of a given block of code or part of a database to one team. Anyone else who wants something from that walled-off area must make a well-documented service request via an API.
Colin Bryar (Working Backwards: Insights, Stories, and Secrets from Inside Amazon)
For almost all astronomical objects, gravitation dominates, and they have the same unexpected behavior. Gravitation reverses the usual relation between energy and temperature. In the domain of astronomy, when heat flows from hotter to cooler objects, the hot objects get hotter and the cool objects get cooler. As a result, temperature differences in the astronomical universe tend to increase rather than decrease as time goes on. There is no final state of uniform temperature, and there is no heat death. Gravitation gives us a universe hospitable to life. Information and order can continue to grow for billions of years in the future, as they have evidently grown in the past. The vision of the future as an infinite playground, with an unending sequence of mysteries to be understood by an unending sequence of players exploring an unending supply of information, is a glorious vision for scientists. Scientists find the vision attractive, since it gives them a purpose for their existence and an unending supply of jobs. The vision is less attractive to artists and writers and ordinary people. Ordinary people are more interested in friends and family than in science. Ordinary people may not welcome a future spent swimming in an unending flood of information. A darker view of the information-dominated universe was described in the famous story “The Library of Babel,” written by Jorge Luis Borges in 1941.§ Borges imagined his library, with an infinite array of books and shelves and mirrors, as a metaphor for the universe. Gleick’s book has an epilogue entitled “The Return of Meaning,” expressing the concerns of people who feel alienated from the prevailing scientific culture. The enormous success of information theory came from Shannon’s decision to separate information from meaning. His central dogma, “Meaning is irrelevant,” declared that information could be handled with greater freedom if it was treated as a mathematical abstraction independent of meaning. The consequence of this freedom is the flood of information in which we are drowning. The immense size of modern databases gives us a feeling of meaninglessness. Information in such quantities reminds us of Borges’s library extending infinitely in all directions. It is our task as humans to bring meaning back into this wasteland. As finite creatures who think and feel, we can create islands of meaning in the sea of information. Gleick ends his book with Borges’s image of the human condition: We walk the corridors, searching the shelves and rearranging them, looking for lines of meaning amid leagues of cacophony and incoherence, reading the history of the past and of the future, collecting our thoughts and collecting the thoughts of others, and every so often glimpsing mirrors, in which we may recognize creatures of the information.
Freeman Dyson (Dreams of Earth and Sky)
A few months following the release of Mapping Police Violence, the Washington Post and the Guardian released their own versions of the database. However, each had certain limitations: the Washington Post, for instance, only included instances of killings by officers who used guns, meaning that if an officer choked someone to death, that death would not be included; the Guardian omitted some off-duty killings. And each of those versions has data going back only as far as 2015, limiting the ability to identify trends and patterns over time. In spite of the challenges, different methodological choices, and the likelihood that a small proportion of police violence incidents slip past media outlets, especially in smaller towns without newspapers or digital media, the overall findings were clear and compelling. We found that police kill twelve hundred people each year in America,* meaning one in every three people killed by a stranger in this country is killed by a police officer.* An additional fifty thousand people are hospitalized each year after being injured by police.* This violence disproportionately impacts black communities. Black people are three times more likely to be killed by police than their white counterparts and are more likely to be unarmed when killed.* Black people are more likely to be stopped, searched, arrested,* and subjected to police use of force.* Police violence is so prevalent in black communities
DeRay Mckesson (On the Other Side of Freedom: The Case for Hope)
Oath of Non-Harm for an Age of Big Data I swear to fulfill, to the best of my ability, the following covenant: I will respect all people for their integrity and wisdom, understanding that they are experts in their own lives, and will gladly share with them all the benefits of my knowledge. I will use my skills and resources to create bridges for human potential, not barriers. I will create tools that remove obstacles between resources and the people who need them. I will not use my technical knowledge to compound the disadvantage created by historic patterns of racism, classism, able-ism, sexism, homophobia, xenophobia, transphobia, religious intolerance, and other forms of oppression. I will design with history in mind. To ignore a four-century-long pattern of punishing the poor is to be complicit in the “unintended” but terribly predictable consequences that arise when equity and good intentions are assumed as initial conditions. I will integrate systems for the needs of people, not data. I will choose system integration as a mechanism to attain human needs, not to facilitate ubiquitous surveillance. I will not collect data for data’s sake, nor keep it just because I can. When informed consent and design convenience come into conflict, informed consent will always prevail. I will design no data-based system that overturns an established legal right of the poor. I will remember that the technologies I design are not aimed at data points, probabilities, or patterns, but at human beings.
Virginia Eubanks (Automating Inequality: How High-Tech Tools Profile, Police, and Punish the Poor)
Probably my favorite method of funding school, other than saving for it, is scholarships. There is a dispute as to how many scholarships go unclaimed every year. Certainly there are people on the Web who will hype you on this subject. However, legitimately there are hundreds of millions of dollars in scholarships given out every year. These scholarships are not academic or athletic scholarships either. They are of small- to medium-sized dollar amounts from organizations like community clubs. The Rotary Club, the Lions Club, or the Jaycees many times have $250 or $500 per year they award to some good young citizen. Some of these scholarships are based on race or sex or religion. For instance, they might be designed to help someone with Native American heritage get an education. The lists of these scholarships can be bought online, and there are even a few software programs you can purchase. Denise, a listener to my show, took my advice, bought one of the software programs, and worked the system. That particular software covered more than 300,000 available scholarships. She narrowed the database search until she had 1,000 scholarships to apply for. She spent the whole summer filling out applications and writing essays. She literally applied for 1,000 scholarships. Denise was turned down by 970, but she got 30, and those 30 scholarships paid her $38,000. She went to school for free while her next-door neighbor sat and whined that no money was available for school and eventually got a student loan.
Dave Ramsey (The Total Money Makeover: Classic Edition: A Proven Plan for Financial Fitness)
Ultimately, the World Top Incomes Database (WTID), which is based on the joint work of some thirty researchers around the world, is the largest historical database available concerning the evolution of income inequality; it is the primary source of data for this book.24 The book’s second most important source of data, on which I will actually draw first, concerns wealth, including both the distribution of wealth and its relation to income. Wealth also generates income and is therefore important on the income study side of things as well. Indeed, income consists of two components: income from labor (wages, salaries, bonuses, earnings from nonwage labor, and other remuneration statutorily classified as labor related) and income from capital (rent, dividends, interest, profits, capital gains, royalties, and other income derived from the mere fact of owning capital in the form of land, real estate, financial instruments, industrial equipment, etc., again regardless of its precise legal classification). The WTID contains a great deal of information about the evolution of income from capital over the course of the twentieth century. It is nevertheless essential to complete this information by looking at sources directly concerned with wealth. Here I rely on three distinct types of historical data and methodology, each of which is complementary to the others.25 In the first place, just as income tax returns allow us to study changes in income inequality, estate tax returns enable us to study changes in the inequality of wealth.26 This
Thomas Piketty (Capital in the Twenty-First Century)
WE ARE THE ONLY TRUE MEDIUMS We the carriers of memory We the conductors and receivers We the stars and suns on earth We the databases of consciousness We the un-system, we the rhythm We the message We the book that’s being written Read spoken and translated Connected across generations with everything living Like planets and seashells in an infinite spiral Where you can’t isolate nothing Where the text is an experience Where borders can’t even be drawn Where lines can’t be drawn because the spiral lasts forever Where the concepts of borders, scripts, divisions, mine, yours The isolation of orthodox science fails Falls We are the true countries We the quantum ur-power stations of nature We the most perfect, most developed technology on Earth Before taxes and birth certificates of fictions This text are the bodies of your ∞ being This text is your body We the transmitters We the books of life The living song Transferrable Open Non-privatizable We the hearts of the earth We the pulse and beat and the harmony of bodies Against the cogs of antediluvian wheels We the trans-national We the divided We the displaced The self-deported and driven further Erased but devious Pagans deported on sunlight and wind Unrealized partisans Wet from the struggle and the fear of lies Of revolutions Whose rotation’s Currency is blood The wealth of nations we are The treasures The brokers of sources of inexhaustible energies Unbuyable Non-privatizable Immortal Because alive We the transmitters We the books of life The living song Transmittable Open Non-privatizable
Tibor Hrs Pandur (Unutrašnji poslovi)
Grabbing my hair and pulling it to the point my skull throbs, I rock back and forth while insanity threatens to destroy my mind completely. Father finally did what Lachlan started. Destroyed my spirit. The angel is gone. The monster has come and killed her. Lachlan Sipping his whiskey, Shon gazes with a bored expression at the one-way mirror as Arson lights the match, grazing the skin of his victim with it as the man convulses in fear. “Show off,” he mutters, and on instinct, I slap the back of his head. He rubs it, spilling the drink. “The fuck? We are wasting time, Lachlan. Tell him to speed up. You know if you let him, he can play for hours.” All in good time, we don’t need just a name. He is saving him for a different kind of information that we write down as Sociopath types furiously on his computer, searching for the location and everything else using FBI databases. “Bingo!” Sociopath mutters, picking up the laptop and showing the screen to me. “It’s seven hours away from New York, in a deserted location in the woods. The land belongs to some guy who is presumed dead and the man accrued the right to build shelters for abused women. They actually live there as a place of new hope or something.” Indeed, the center is advertised as such and has a bunch of stupid reviews about it. Even the approval of a social worker, but then it doesn’t surprise me. Pastor knows how to be convincing. “Kids,” I mutter, fisting my hands. “Most of them probably have kids. He continues to do his fucked-up shit.” And all these years, he has been under my radar. I throw the chair and it bounces off the wall, but no one says anything as they feel the same. “Shon, order a plane. Jaxon—” “Yeah, my brothers will be there with us. But listen, the FBI—” he starts, and I nod. He takes a beat and quickly sends a message to someone on his phone while I bark into the microphone. “Arson, enough with the bullshit. Kill him already.” He is of no use to us anyway. Arson looks at the wall and shrugs. Then pours gas on his victim and lights up the match simultaneously, stepping aside as the man screams and thrashes on the chair, and the smell of burning flesh can be sensed even here. Arson jogs to a hose, splashing water over him. The room is designed security wise for this kind of torture, since fire is one of the first things I taught. After all, I’d learned the hard way how to fight with it. “On the plane, we can adjust the plan. Let’s get moving.” They spring into action as I go to my room to get a specific folder to give to Levi before I go, when Sociopath’s hand stops me, bumping my shoulder. “Is this a suicide mission for you?” he asks, and I smile, although it lacks any humor. My friend knows everything. Instead of answering his question, I grip his shoulder tight, and confide, “Valencia is entrusted to you.” We both know that if I want to destroy Pastor, I have to die with him. This revenge has been twenty-three years in the making, and I never envisioned a different future. This path always leads to death one way or another, and the only reason I valued my life was because I had to kill him. Valencia will be forever free from the evils that destroyed her life. I’ll make sure of it. Once upon a time, there was an angel. Who made the monster’s heart bleed.
V.F. Mason (Lachlan's Protégé: A Billionaire Romance (Dark Protégés Book 1))
I deal in information," he says to the smarmy, toadying pseudojournalist who "interviews" him. He's sitting in his office in Houston, looking slicker than normal. "All television going out to Consumers throughout the world goes through me. Most of the information transmitted to and from the CIC database passes through my networks. The Metaverse -- -the entire Street -- exists by virtue of a network that I own and control. "But that means, if you'll just follow my reasoning for a bit, that when I have a programmer working under me who is working with that information, he is wielding enormous power. Information is going into his brain. And it's staying there. It travels with him when he goes home at night. It gets all tangled up into his dreams, for Christ's sake. He talks to his wife about it. And, goddamn it, he doesn't have any right to that information. If I was running a car factory, I wouldn't let workers drive the cars home or borrow tools. But that's what I do at five o'clock each day, all over the world, when my hackers go home from work. "When they used to hang rustlers in the old days, the last thing they would do is piss their pants. That was the ultimate sign, you see, that they had lost control over their own bodies, that they were about to die. See, it's the first function of any organization to control its own sphincters. We're not even doing that. So we're working on refining our management techniques so that we can control that information no matter where it is -- on our hard disks or even inside the programmers' heads. Now, I can't say more because I got competition to worry about. But it is my fervent hope that in five or ten years, this kind of thing won't even be an issue.
Neal Stephenson (Snow Crash)
Mr. Sulu,” Jim said, “I can’t avoid the impression that you’re counting all the asteroids in this neighborhood.” “Not counting them as such, Captain. We’re building a recognition database, tagging the asteroids with nominal IDs, and noting their masses for future reference. If you know an asteroid’s mass within a couple of significant figures, you can very quickly calculate what kind of forces would need to be applied to it to make it move. Once Khiy and I get them all tagged, or all the ones in this area, we can get the ship’s computer to alert us when an enemy vessel is getting close enough for one of the asteroids to be a threat. Then either Bloodwing or Enterprise gives the necessary rock a pull with a tractor or a push with a pressor …” Jim grinned. In slower-than-light combat, the lightspeedor-faster weapons came into their own, as long as you kept away from the higher, near-relativistic impulse speeds. “You’re concentrating on the asteroids nearer to the processing facility, I see.” “Yes, sir—a sphere about a hundred thousand kilometers in diameter, including almost the entire breadth of the belt in this area. Any ship outside that diameter isn’t going to be a threat to us at subwarp speeds. If they want to engage with us, they’ve got to drop their speed and come inside the sphere.” “‘Come into my parlor, said the spider to the fly…’” Jim said. “Get on with it, Mr. Sulu. In a situation like this, every little bit helps. Are you going to be able to have this ready by the time the ‘flies’ arrive?” “We’ll do our best, Captain. There are some inconsistencies between the ways Bloodwing’s computer handles large amounts of data like this, and the way ours does. We’ve got to solve them on the fly.” And Sulu chuckled.
Diane Duane (The Empty Chair)
So for most of the late twentieth century, political scientists embraced blank-slate theories in which people soaked up the ideology of their parents or the TV programs they watched. Some political scientists even said that most people were so confused about political issues that they had no real ideology at all. But then came the studies of twins. In the 1980s, when scientists began analyzing large databases that allowed them to compare identical twins (who share all of their genes, plus, usually, their prenatal and childhood environments) to same-sex fraternal twins (who share half of their genes, plus their prenatal and childhood environments), they found that the identical twins were more similar on just about everything. And what’s more, identical twins reared in separate households (because of adoption) usually turn out to be very similar, whereas unrelated children reared together (because of adoption) rarely turn out similar to each other, or to their adoptive parents; they tend to be more similar to their genetic parents. Genes contribute, somehow, to just about every aspect of our personalities. We’re not just talking about IQ, mental illness, and basic personality traits such as shyness. We’re talking about the degree to which you like jazz, spicy foods, and abstract art; your likelihood of getting a divorce or dying in a car crash; your degree of religiosity, and your political orientation as an adult. Whether you end up on the right or the left of the political spectrum turns out to be just as heritable as most other traits: genetics explains between a third and a half of the variability among people on their political attitudes. Being raised in a liberal or conservative household accounts for much less.
Jonathan Haidt (The Righteous Mind: Why Good People Are Divided by Politics and Religion)
No-knock entries are dangerous for everyone involved—cops, suspects, bystanders. The raids usually occur before dawn; the residents are usually asleep, and then disoriented by the sudden intrusion. There is no warning, and sleepy residents may not always understand that the men breaking down their door are police. At the same time, police procedures allow terribly little room for error. Stan Goff, a retired Special Forces sergeant and SWAT trainer, says that he teaches cops to “Look at hands. If there’s a weapon in their hands during a dynamic entry, it does not matter what that weapon is doing. If there’s a weapon in their hands, that person dies. It’s automatic.” On September 13, 2000, the DEA, FBI, and local police conducted a series of raids throughout Modesto, California. By the end of the day, they had shot and killed an eleven-year-old boy, Alberto Sepulveda, as he was lying facedown on the floor with his arms outstretched, as ordered by police. In January 2011, police in Farmington, Massachusetts similarly shot Eurie Stamp, a sixty-eight-year-old grandfather, as he lay motionless on the floor according to police instructions. In the course of a May 2014 raid in Cornelia, Georgia, a flash-bang grenade landed in the crib of a nineteen-month-old infant. The explosion blew a hole in the face and chest of Bounkham Phonesavanh (“Baby Bou Bou”), covering his body with third degree burns, and exposing part of his ribcage. No guns or drugs were found in the house, and no arrests were made. Sometimes these raids go wrong before they even begin. Walter and Rose Martin, a perfectly innocent couple, both in their eighties, had their home raided by New York Police more than fifty times between 2002 and 2010. It turned out that their address had been entered as the default in the police database.
Kristian Williams (Our Enemies in Blue: Police and Power in America)
But nothing in my previous work had prepared me for the experience of reinvestigating Cleveland. It is worth — given the passage of time — recalling the basic architecture of the Crisis: 121 children from many different and largely unrelated families had been taken into the care of Cleveland County Council in the three short months of the summer of 1987. (p18) The key to resolving the puzzle of Cleveland was the children. What had actually happened to them? Had they been abused - or had the paediatricians and social workers (as public opinion held) been over-zealous and plain wrong? Curiously — particularly given its high profile, year-long sittings and £5 million cost — this was the one central issue never addressed by the Butler-Sloss judicial testimony and sifting of internal evidence, the inquiry's remit did not require it to answer the main question. Ten years after the crisis, my colleagues and I set about reconstructing the records of the 121 children at its heart to determine exactly what had happened to them... (p19) Eventually, though, we did assemble the data given to the Butler-Sloss Inquiry. This divided into two categories: the confidential material, presented in camera, and the transcripts of public sessions of the hearings. Putting the two together we assembled our own database on the children each identified only by the code-letters assigned to them by Butler-Sloss. When it was finished, this database told a startlingly different story from the public myth. In every case there was some prima fade evidence to suggest the possibility of abuse. Far from the media fiction of parents taking their children to Middlesbrough General Hospital for a tummy ache or a sore thumb and suddenly being presented with a diagnosis of child sexual abuse, the true story was of families known to social services for months or years, histories of physical and sexual abuse of siblings and of prior discussions with parents about these concerns. In several of the cases the children themselves had made detailed disclosures of abuse; many of the pre-verbal children displayed severe emotional or behavioural symptoms consistent with sexual abuse. There were even some families in which a convicted sex offender had moved in with mother and children. (p20)
Sue Richardson (Creative Responses to Child Sexual Abuse: Challenges and Dilemmas)
Give us an idea of…” Noya Baram rubs her temples. “Oh, well.” Augie begins to stroll around again. “The examples are limitless. Small examples: elevators stop working. Grocery-store scanners. Train and bus passes. Televisions. Phones. Radios. Traffic lights. Credit-card scanners. Home alarm systems. Laptop computers will lose all their software, all files, everything erased. Your computer will be nothing but a keyboard and a blank screen. “Electricity would be severely compromised. Which means refrigerators. In some cases, heat. Water—well, we have already seen the effect on water-purification plants. Clean water in America will quickly become a scarcity. “That means health problems on a massive scale. Who will care for the sick? Hospitals? Will they have the necessary resources to treat you? Surgical operations these days are highly computerized. And they will not have access to any of your prior medical records online. “For that matter, will they treat you at all? Do you have health insurance? Says who? A card in your pocket? They won’t be able to look you up and confirm it. Nor will they be able to seek reimbursement from the insurer. And even if they could get in contact with the insurance company, the insurance company won’t know whether you’re its customer. Does it have handwritten lists of its policyholders? No. It’s all on computers. Computers that have been erased. Will the hospitals work for free? “No websites, of course. No e-commerce. Conveyor belts. Sophisticated machinery inside manufacturing plants. Payroll records. “Planes will be grounded. Even trains may not operate in most places. Cars, at least any built since, oh, 2010 or so, will be affected. “Legal records. Welfare records. Law enforcement databases. The ability of local police to identify criminals, to coordinate with other states and the federal government through databases—no more. “Bank records. You think you have ten thousand dollars in your savings account? Fifty thousand dollars in a retirement account? You think you have a pension that allows you to receive a fixed payment every month?” He shakes his head. “Not if computer files and their backups are erased. Do banks have a large wad of cash, wrapped in a rubber band with your name on it, sitting in a vault somewhere? Of course not. It’s all data.” “Mother of God,” says Chancellor Richter, wiping his face with a handkerchief.
Bill Clinton (The President Is Missing)
Similarly, the computers used to run the software on the ground for the mission were borrowed from a previous mission. These machines were so out of date that Bowman had to shop on eBay to find replacement parts to get the machines working. As systems have gone obsolete, JPL no longer uses the software, but Bowman told me that the people on her team continue to use software built by JPL in the 1990s, because they are familiar with it. She said, “Instead of upgrading to the next thing we decided that it was working just fine for us and we would stay on the platform.” They have developed so much over such a long period of time with the old software that they don’t want to switch to a newer system. They must adapt to using these outdated systems for the latest scientific work. Working within these constraints may seem limiting. However, building tools with specific constraints—from outdated technologies and low bitrate radio antennas—can enlighten us. For example, as scientists started to explore what they could learn from the wait times while communicating with deep space probes, they discovered that the time lag was extraordinarily useful information. Wait times, they realized, constitute an essential component for locating a probe in space, calculating its trajectory, and accurately locating a target like Pluto in space. There is no GPS for spacecraft (they aren’t on the globe, after all), so scientists had to find a way to locate the spacecraft in the vast expanse. Before 1960, the location of planets and objects in deep space was established through astronomical observation, placing an object like Pluto against a background of stars to determine its position.15 In 1961, an experiment at the Goldstone Deep Space Communications Complex in California used radar to more accurately define an “astronomical unit” and help measure distances in space much more accurately.16 NASA used this new data as part of creating the trajectories for missions in the following years. Using the data from radio signals across a wide range of missions over the decades, the Deep Space Network maintained an ongoing database that helped further refine the definition of an astronomical unit—a kind of longitudinal study of space distances that now allows missions like New Horizons to create accurate flight trajectories. The Deep Space Network continued to find inventive ways of using the time lag of radio waves to locate objects in space, ultimately finding that certain ways of waiting for a downlink signal from the spacecraft were less accurate than others. It turned to using the antennas from multiple locations, such as Goldstone in California and the antennas in Canberra, Australia, or Madrid, Spain, to time how long the signal took to hit these different locations on Earth. The time it takes to receive these signals from the spacecraft works as a way to locate the probes as they are journeying to their destination. Latency—or the different time lag of receiving radio signals on different locations of Earth—is the key way that deep space objects are located as they journey through space. This discovery was made possible during the wait times for communicating with these craft alongside the decades of data gathered from each space mission. Without the constraint of waiting, the notion of using time as a locating feature wouldn’t have been possible.
Jason Farman (Delayed Response: The Art of Waiting from the Ancient to the Instant World)
We need to be humble enough to recognize that unforeseen things can and do happen that are nobody’s fault. A good example of this occurred during the making of Toy Story 2. Earlier, when I described the evolution of that movie, I explained that our decision to overhaul the film so late in the game led to a meltdown of our workforce. This meltdown was the big unexpected event, and our response to it became part of our mythology. But about ten months before the reboot was ordered, in the winter of 1998, we’d been hit with a series of three smaller, random events—the first of which would threaten the future of Pixar. To understand this first event, you need to know that we rely on Unix and Linux machines to store the thousands of computer files that comprise all the shots of any given film. And on those machines, there is a command—/bin/rm -r -f *—that removes everything on the file system as fast as it can. Hearing that, you can probably anticipate what’s coming: Somehow, by accident, someone used this command on the drives where the Toy Story 2 files were kept. Not just some of the files, either. All of the data that made up the pictures, from objects to backgrounds, from lighting to shading, was dumped out of the system. First, Woody’s hat disappeared. Then his boots. Then he disappeared entirely. One by one, the other characters began to vanish, too: Buzz, Mr. Potato Head, Hamm, Rex. Whole sequences—poof!—were deleted from the drive. Oren Jacobs, one of the lead technical directors on the movie, remembers watching this occur in real time. At first, he couldn’t believe what he was seeing. Then, he was frantically dialing the phone to reach systems. “Pull out the plug on the Toy Story 2 master machine!” he screamed. When the guy on the other end asked, sensibly, why, Oren screamed louder: “Please, God, just pull it out as fast as you can!” The systems guy moved quickly, but still, two years of work—90 percent of the film—had been erased in a matter of seconds. An hour later, Oren and his boss, Galyn Susman, were in my office, trying to figure out what we would do next. “Don’t worry,” we all reassured each other. “We’ll restore the data from the backup system tonight. We’ll only lose half a day of work.” But then came random event number two: The backup system, we discovered, hadn’t been working correctly. The mechanism we had in place specifically to help us recover from data failures had itself failed. Toy Story 2 was gone and, at this point, the urge to panic was quite real. To reassemble the film would have taken thirty people a solid year. I remember the meeting when, as this devastating reality began to sink in, the company’s leaders gathered in a conference room to discuss our options—of which there seemed to be none. Then, about an hour into our discussion, Galyn Susman, the movie’s supervising technical director, remembered something: “Wait,” she said. “I might have a backup on my home computer.” About six months before, Galyn had had her second baby, which required that she spend more of her time working from home. To make that process more convenient, she’d set up a system that copied the entire film database to her home computer, automatically, once a week. This—our third random event—would be our salvation. Within a minute of her epiphany, Galyn and Oren were in her Volvo, speeding to her home in San Anselmo. They got her computer, wrapped it in blankets, and placed it carefully in the backseat. Then they drove in the slow lane all the way back to the office, where the machine was, as Oren describes it, “carried into Pixar like an Egyptian pharaoh.” Thanks to Galyn’s files, Woody was back—along with the rest of the movie.
Ed Catmull (Creativity, Inc.: Overcoming the Unseen Forces That Stand in the Way of True Inspiration)