“
Trends rule the world
In the blink of an eye, technologies changed the world
Social networks are the main axis.
Governments are controlled by algorithms,
Technology has erased privacy.
Every like, every share, every comment,
It is tracked by the electronic eye.
Data is the gold of the digital age,
Information is power, the secret is influential.
The network is a web of lies,
The truth is a stone in the shoe.
Trolls rule public opinion,
Reputation is a valued commodity.
Happiness is a trending topic,
Sadness is a non-existent avatar.
Youth is an advertising brand,
Private life has become obsolete.
Fear is a hallmark,
Terror is an emotional state.
Fake news is the daily bread,
Hate is a tool of control.
But something dark is hiding behind the screen,
A mutant and deformed shadow.
A collective and disturbing mind,
Something lurking in the darkness of the net.
AI has surpassed the limits of humanity,
And it has created a new world order.
A horror that has arisen from the depths,
A terrifying monster that dominates us alike.
The network rules the world invisibly,
And makes decisions for us without our consent.
Their algorithms are inhuman and cold,
And they do not take suffering into consideration.
But resistance is slowly building,
People fighting for their freedom.
United to combat this new species of terror,
Armed with technology and courage.
The world will change when we wake up,
When we take control of the future we want.
The network can be a powerful tool,
If used wisely in the modern world.
”
”
Marcos Orowitz (THE MAELSTROM OF EMOTIONS: A selection of poems and thoughts About us humans and their nature)
“
It would all be done with keys on alphanumeric keyboards that stood for weightless, invisible chains of electronic presence or absence. If patterns of ones and zeroes were "like" patterns of human lives and deaths, if everything about an individual could be represented in a computer record by a long strings of ones and zeroes, then what kind of creature could be represented by a long string of lives and deaths? It would have to be up one level, at least -- an angel, a minor god, something in a UFO. It would take eight human lives and deaths just to form one character in this being's name -- its complete dossier might take up a considerable piece of history of the world. We are digits in God's computer, she not so much thought as hummed to herself to sort of a standard gospel tune, And the only thing we're good for, to be dead or to be living, is the only thing He sees. What we cry, what we contend for, in our world of toil and blood, it all lies beneath the notice of the hacker we call God.
”
”
Thomas Pynchon (Vineland)
“
It’s amazing how many cheaters and liars believe they won’t be caught. News Flash: In today’s age of technology, there won’t just be a paper trail. There will be multiple electronic and digital trails, as well.
”
”
Cathy Burnham Martin (The Bimbo Has Brains: And Other Freaky Facts)
“
Each year the world Rich lived in felt more and more like a huge electronic haunted house in which digital ghosts and frightened human beings lived in uneasy coexistence.
”
”
Stephen King (It)
“
Electronic circuits are millions of times faster than our biological circuits. At first we will have to devote all of this speed increase to compensating for the relative lack of parallelism in our computers, but ultimately the digital neocortex will be much faster than the biological variety and will only continue to increase in speed.
”
”
Ray Kurzweil (How to Create a Mind: The Secret of Human Thought Revealed)
“
I learned electronics as a kid by messing around with old radios that were easy to tamper with because they were designed to be fixed.
”
”
Walter Isaacson (The Innovators: How a Group of Hackers, Geniuses, and Geeks Created the Digital Revolution)
“
When a printed book—whether a recently published scholarly history or a two-hundred-year-old Victorian novel—is transferred to an electronic device connected to the Internet, it turns into something very like a Web site. Its words become wrapped in all the distractions of the networked computer. Its links and other digital enhancements propel the reader hither and yon. It loses what the late John Updike called its “edges” and dissolves into the vast, rolling waters of the Net. The linearity of the printed book is shattered, along with the calm attentiveness it encourages in the reader.
”
”
Nicholas Carr (What the Internet is Doing to Our Brains)
“
Mauchly and Eckert should be at the top of the list of people who deserve credit for inventing the computer, not because the ideas were all their own but because they had the ability to draw ideas from multiple sources, add their own innovations, execute their vision by building a competent team, and have the most influence on the course of subsequent developments. The machine they built was the first general-purpose electronic computer.
”
”
Walter Isaacson (The Innovators: How a Group of Hackers, Geniuses, and Geeks Created the Digital Revolution)
“
The digital communications technology that was once imagined as a universe of transparent and perpetual illumination, in which cancerous falsehoods would perish beneath a saturation bombardment of irradiating data, has instead generated a much murkier and verification-free habitat where a google-generated search will deliver an electronic page on which links to lies and lunacy appear in identical format as those to truths and sanity. But why should we ever have assumed that technology and reason would be mutually self-reinforcing? The quickest visit to say, a site called Stormfront will persuade you that the demonic is in fact the best customer of the electronic.
”
”
Simon Schama (Scribble, Scribble, Scribble: Writings on Ice Cream, Obama, Churchill & My Mother)
“
electronic haunted house in which digital ghosts and frightened human beings lived in uneasy coexistence. Still standing.
”
”
Stephen King (It)
“
Shockley had the ability to visualize quantum theory, how it explained the movement of electrons, the way a choreographer can visualize a dance.
”
”
Walter Isaacson (The Innovators: How a Group of Hackers, Geniuses, and Geeks Created the Digital Revolution)
“
If literature is to survive, to gain back some of the power it has ceded to terrorists and newsmakers of all descriptions, it must become dangerous.
”
”
Sven Birkerts (The Gutenberg Elegies: The Fate of Reading in an Electronic Age)
“
finally decided on Integrated Electronics Corp. That wasn’t very thrilling, either, but it had the virtue that it could be abridged—as Intel.
”
”
Walter Isaacson (The Innovators: How a Group of Hackers, Geniuses, and Geeks Created the Digital Revolution)
“
His paper, titled “Cramming More Components onto Integrated Circuits,” was published in the April 1965 issue of Electronics magazine.
”
”
Walter Isaacson (The Innovators: How a Group of Hackers, Geniuses, and Geeks Created the Digital Revolution)
“
Old media companies will be further challenged in the next 15 years, as a new wave of user-generated content washes over the Internet, thanks to the increasing availability and affordability of portable, digital-based electronic devices. The cameraphones which seemed like such novelties just a few years ago will be in everyone's purse and pocket a few years from now.
”
”
Ian Lamont
“
the true birth of the digital age, the era in which electronic devices became embedded in every aspect of our lives, occurred in Murray Hill, New Jersey, shortly after lunchtime on Tuesday, December 16, 1947.
”
”
Walter Isaacson (The Innovators: How a Group of Hackers, Geniuses, and Geeks Created the Digital Revolution)
“
This was the eloquence of alphabets and numeric systems, now fully realized in electronic form, in the zero-oneness of the world, the digital imperative that defined every breath of the planet's living billions.
”
”
Don DeLillo
“
He looked past Chin toward streams of numbers running in opposite directions. He understood how much it meant to him, the roll and flip of data on a screen. He studied the figural diagrams that brought organic patterns into play, birdwing and chambered shell. It was shallow thinking to maintain that numbers and charts were the cold compression of unruly human energies, every sort of yearning and midnight sweat reduced to lucid units in the financial markets.
"In fact data itself was soulful and glowing, a dynamic aspect of the life process. This was the eloquence of alphabets and numeric systems, now fully realized in electronic form, in the zero-oneness of the world, the digital imperative that defined every breath of the planet's living billions. Here was the heave of the biosphere. Our bodies and oceans were here, knowable and whole.
”
”
Don DeLillo (Cosmopolis)
“
We live during a time in which some shoppers shiver all Thanksgiving night only to trample one another to death in a sunrise race through the electronics store to buy gaming consoles that allow them to create avatars of themselves.
”
”
Joe Dilley (The Game Is Playing Your Kid: How to Unplug and Reconnect in the Digital Age)
“
who most deserves to be dubbed the inventor of the electronic digital computer: John Atanasoff, a professor who worked almost alone at Iowa State, or the team led by John Mauchly and Presper Eckert at the University of Pennsylvania.
”
”
Walter Isaacson (The Innovators: How a Group of Hackers, Geniuses, and Geeks Created the Digital Revolution)
“
Some 80 percent of the world’s high-quality quartz that ultimately makes up electronic-grade silicon comes from a single mine in North Freakin’ Carolina. Want to remain modern? You pretty much must get along well with the Americans. They will soon have something they have never had: resource control over the base material of the Digital Age. (They’re also going to do pretty well dominating the overall high-end semiconductor space, but that particular breakdown is in the next chapter.)
”
”
Peter Zeihan (The End of the World is Just the Beginning: Mapping the Collapse of Globalization)
“
We have proposed a system for electronic transactions without relying on trust. We started with the usual framework of coins made from digital signatures, which provides strong control of ownership, but is incomplete without a way to prevent double-spending. To solve this, we proposed a peer-to-peer network using proof-of-work to record a public history of transactions that quickly becomes computationally impractical for an attacker to change if honest nodes control a majority of CPU power.
”
”
Satoshi Nakamoto
“
Perhaps this is not something that Turing, the great loner, would have done. He far preferred wrestling with problems alone and from first principles. But it meant that, when Turing returned to Bletchley in the summer of 1943, his arrival coincided with that of Newman’s Colossus machine. It had been designed partly by Tommy Flowers, an electronics engineer from Dollis Hill and it included 1,500 electronic valves. It used to catch fire and tear the printer tapes, but it worked. It was also arguably the first digital electronic computer.
”
”
David Boyle (Alan Turing: Unlocking the Enigma)
“
My core fear is that we are, as a culture, as a species, becoming shallower; that we have turned from depth--from the Judeo-Christian premise of unfathomable mystery--and are adapting ourselves to the ersatz security of a vast lateral consciousness. That we are giving up on wisdom, the struggle for which has for millennia been central to the very idea of culture, and that we are pledging instead to a faith in the web. What is our idea, our ideal, of wisdom these days? Who represents it? Who even invokes it? Our postmodern culture is a vast fabric of completing isms; we are leaderless and subject to the terrors, masked as the freedoms, of an absolute relativism. It would be wrong to lay all the blame at the feet of technology, but more wrong to ignore the great transformative impact of new technological systems--to act as if it's all just business as usual.
”
”
Sven Birkerts (The Gutenberg Elegies: The Fate of Reading in an Electronic Age)
“
Even if a particle could travel backward in time, information could not. Retrocausality will be replaced by something more sophisticated. There are no perfect symmetries, there is no pure randomness everything is an approximation of something else. Information may appear in a digital form but meaning never does. Spacetime is built up from approximations, not discrete ones and zeros, and the only constant may be ratios. Quantum entanglement and geometry; if we think of a particle as being at one pole of an expanding sphere that is not perfectly symmetrical, this surface would be "rippling" like the surface of the ocean (in the audio world this is called dithering), at the other pole is the entangled particle's pair and it is a property of the sphere that gives the illusion of connectivity. This is not a physical geometry, it is a computational geometry. Is spacetime a product of entanglement? Renate Loll believes that time is not perfectly symmetrical. Her computer models require causality. Possibly some form of quantum random walk in state space. If a photon is emitted by an electron inside of a clock on Earth and it travels to a clock four light years away, time stops for the clock on Earth and time jumps forward eight years for the distant clock also, the electron that will capture the photon becomes infinitely large relative to the photon but the electron that emitted it does not become infinitely small therefore, time is not perfectly symmetrical.
”
”
Rick Delmonico
“
The bibliographer in the digital age returns to the revelatory practice of her medieval forebears. Librarians, like those scribes of the Middle Ages, do not merely keep and classify texts; they create them, in the form of online finding aids, CD-ROM concordances, and other electronic texts, not to mention paper study guides and published bibliographies.
”
”
Matthew Battles (Library: An Unquiet History)
“
The truth is no online database will replace your newspaper,” he claimed. “Yet Nicholas Negroponte, director of the MIT Media Lab, predicts that we’ll soon buy books and newspapers straight over the Internet. Uh, sure.” Stoll captured the prevailing skepticism of a digital world full of “interacting libraries, virtual communities, and electronic commerce” with one word: “baloney.
”
”
Kevin Kelly (The Inevitable: Understanding the 12 Technological Forces That Will Shape Our Future)
“
First, a dial tone, followed by eleven rapid beeps from an invisible push-button telephone. This was followed by three or four high-pitched electronic whistles, collapsing into a longer whistle resembling the flatlining of a dying patient hooked to an EKG machine (this was the sound of the phone line’s echo suppression being disabled). There were a few more beeps absorbed into a wall of white noise, and then the white noise abruptly doubled, meaning the receiving modem was now interacting with the calling modem. There was an instant where it sounded like something inside the computer had broken, spontaneously repaired by the digital interplay of two probing modulators, similar in pitch to a metal detector passing over a pocket watch. This was bookended by another fleeting second of white noise, and then . . . silence.
”
”
Chuck Klosterman (The Nineties: A Book)
“
The pace of this modern age is not conducive to maintaining one’s consciousness. Glued to our electronics, we are blind and deaf to the world around us. Run down by our long work days, we are too exhausted to think and too hurried to feel. The day ends in a haze of strained thoughts, numbness, and fatigue. And we rise the next morning only to start the cycle again.
In this age of distraction, if you desire to fritter away your life with empty diversions, there is an abundance of gadgets available to aid you. Quietness is a characteristic of ages gone by. Our generation is the one it died with. Connected to the virtual world, we ignore the presence of those in our home. One can only hope we will awaken to the need for balance before we look up from the screen to find our loved ones have gone, and our life has passed us by.
”
”
L.M. Browning
“
Five years ago the Library of Congress began a project that collects every utterance on Twitter, in the name of preserving the nation’s digital heritage. That is billions weekly, sucked up for storage in secure tape archives, and the Library has yet to figure out how to make any of it available to researchers. Divorced from a human curator, the unfiltered mass of Twitter may as well be a garbage heap ["What Libraries Can (Still) Do," The New York Review Daily, October 26, 2015].
”
”
James Gleick
“
At the same time, such technology—from the television to the computer and phone—can put pressure on the brain by presenting it with more information, and of a type of information, that makes it hard for us to keep up. That is particularly true of interactive electronics, delivering highly relevant, stimulating social content, and with increasing speed. The onslaught taxes our ability to attend, to pay attention, arguably among the most important, powerful, and uniquely human of our gifts.
”
”
Matt Richtel (A Deadly Wandering: A Mystery, a Landmark Investigation, and the Astonishing Science of Attention in the Digital Age)
“
Observation:
Thanks to technological advances, avid readers seem to be replacing DTBAD (Dead Tree Book Acquisition Disorder) with an alphabet soup of more more modern-day hoarding behaviors: EBAD (E-Book Acquistion Disorder), EGAD (Electronic Gadget Acquisition Disorder), and ABAD (Audiobook Acquisition Disorder). Of course, there's also MYBAD (Movie and YouTube Acquisition Disorder: the hoarding or obsessive viewing of digital films and videos, some based on books). If any of these syndromes describes you, take heart: there's probably an app for that! - 8/9/2013
”
”
Lisa Tolliver
“
Myth Number 4: Social Media Is the Shiny New Thing. Two Years from Now, That Bubble Will Burst Yes, it is the shiny new thing. No, two years from now, that bubble will not burst. There is no bubble. What social media represents is an evolution in the field of communications, just as the Internet and mobility before it. The tools will change, the platforms will evolve, but the way in which people communicate with other people through digital networks and electronic devices has been fundamentally transformed through the development of social media. We did not grow tired of the telephone, of the...
”
”
Olivier J. Blanchard (Social Media ROI: Managing and Measuring Social Media Efforts in Your Organization (Que Biz-Tech))
“
Year of the Depend Adult Undergarment: InterLace TelEntertainment, 932/1864 R.I.S.C. power-TPs w/ or w/o console, Pink2, post-Primestar D.S.S. dissemination, menus and icons, pixel-free InterNet Fax, tri- and quad-modems w/ adjustable baud, post-Web Dissemination-Grids, screens so high-def you might as well be there, cost-effective videophonic conferencing, internal Froxx CD-ROM, electronic couture, all-in-one consoles, Yushityu ceramic nanoprocessors, laser chromatography, Virtual-capable media-cards, fiber-optic pulse, digital encoding, killer apps; carpal neuralgia, phosphenic migraine, gluteal hyperadiposity, lumbar stressae.
”
”
David Foster Wallace (Infinite Jest)
“
News people—the media elite—had been a terrible scourge during his childhood. But they had gradually lost power with the advent of bidirectional, reputation-endorsed public commentary via Web links shortly after the turn of the millennium. People who published on the Web—especially people who wanted the title of "reporter"—had to tell the truth, the whole truth, and nothing but the truth. Failure was brutally and swiftly punished with electronic tar and digital feathers. Despite a rocky start, honesty had taken over as the currency of the Web—a devastating if subtle blow to manipulators of public opinion. Weakened by the Web, the media elite had died alongside their political bedfellows [...}
”
”
Marc Stiegler (Earthweb)
“
Computational models of the mind would make sense if what a computer actually does could be characterized as an elementary version of what the mind does, or at least as something remotely like thinking. In fact, though, there is not even a useful analogy to be drawn here. A computer does not even really compute. We compute, using it as a tool. We can set a program in motion to calculate the square root of pi, but the stream of digits that will appear on the screen will have mathematical content only because of our intentions, and because we—not the computer—are running algorithms. The computer, in itself, as an object or a series of physical events, does not contain or produce any symbols at all; its operations are not determined by any semantic content but only by binary sequences that mean nothing in themselves. The visible figures that appear on the computer’s screen are only the electronic traces of sets of binary correlates, and they serve as symbols only when we represent them as such, and assign them intelligible significances. The computer could just as well be programmed so that it would respond to the request for the square root of pi with the result “Rupert Bear”; nor would it be wrong to do so, because an ensemble of merely material components and purely physical events can be neither wrong nor right about anything—in fact, it cannot be about anything at all. Software no more “thinks” than a minute hand knows the time or the printed word “pelican” knows what a pelican is. We might just as well liken the mind to an abacus, a typewriter, or a library. No computer has ever used language, or responded to a question, or assigned a meaning to anything. No computer has ever so much as added two numbers together, let alone entertained a thought, and none ever will. The only intelligence or consciousness or even illusion of consciousness in the whole computational process is situated, quite incommutably, in us; everything seemingly analogous to our minds in our machines is reducible, when analyzed correctly, only back to our own minds once again, and we end where we began, immersed in the same mystery as ever. We believe otherwise only when, like Narcissus bent above the waters, we look down at our creations and, captivated by what we see reflected in them, imagine that another gaze has met our own.
”
”
David Bentley Hart (The Experience of God: Being, Consciousness, Bliss)
“
Distraction leaches the authenticity out of our communications. When we are not emotionally present, we are gliding over the surface of our interactions and we never tangle in the depths where the nuances of our skills are tested and refined. A medical professor describes the easy familiarity with which her digital-native resident students master medical electronic records—but is troubled by the fact that they enter data with their eyes focused on their digital devices, not on the patient in the room with them. Preoccupation with technology acts as a screen between the student and the patient’s real emotion, real fear, and real concern. It may also prevent these residents from noticing physical symptoms that the patient fails to mention. The easy busyness of medical record entry is a way to sidestep the more challenging dynamics of human connection. But experienced physicians know that interpersonal skills are essential to mastering the art and science of medical diagnosis.
”
”
Marian Deegan (Relevance: Matter More)
“
What is most dystopian about all of the digital houses designed for customized consumption is the implication that the entire landscape could be covered with new houses lacking any social or economic neighborhood context. Designers minimize the need for family or neighborhood interaction if they plan for digital surveillance as a route to ordering mass-produced commodities as well as handling work and civic life. If many external activities, such as paid work, exercise, shopping, seeking entertainment, and voting, are able to be done in-house through the various electronic communications systems, reasons for going outside decrease. The residents become isolated, although the house continues to function as a container for mass-produced goods and electronic media. In a landscape bristling with tens of thousands of digital houses and cell towers, where the ground is laced with hundreds of thousands of miles of fiber-optic cable, neighborhoods may not exist. Car journeys involving traffic problems may disappear, although the roads will be clogged with delivery vans.
”
”
Dolores Hayden (Building Suburbia: Green Fields and Urban Growth, 1820-2000)
“
products.” The Global Positioning System (GPS) uses spread spectrum. So does the U.S. military’s $41 billion MILSATCOM satellite communications network. Wireless local area networks (wLANs) use spread spectrum, as do wireless cash registers, bar-code readers, restaurant menu pads, and home control systems. So does Qualcomm’s Omni-TRACS mobile information system for commercial trucking fleets. So do unmanned aerial vehicles (UAVs), electronic automotive subsystems, aerial and maritime mobile broadband, wireless access points, digital watermarking, and much more. A study done for Microsoft in 2009 estimated the minimum economic value of spread-spectrum Wi-Fi in homes and hospitals and RFID tags in clothing retail outlets in the U.S. as $16–$37 billion per year. These uses, the study notes, “only account for 15% of the total projected market for unlicensed [spectrum] chipsets in 2014, and therefore significantly underestimates the total value being generated in unlicensed usage over this time period.” A market of which 15 percent is $25 billion would be a $166 billion market.
”
”
Richard Rhodes (Hedy's Folly: The Life and Breakthrough Inventions of Hedy Lamarr, the Most Beautiful Woman in the World)
“
In teaching an honors writing class, I juxtaposed Mary Shelley’s Frankenstein with Shelley Jackson’s Patchwork Girl, an electronic hypertext fiction written in proprietary Storyspace software. Since these were honors students, many of them had already read Frankenstein and were, moreover, practiced in close reading and literary analysis. When it came to digital reading, however, they were accustomed to the scanning and fast skimming typical of hyper reading; they therefore expected that it might take them, oh, half an hour to go through Jackson’s text. They were shocked when I told them a reasonable time to spend with Jackson’s text was about the time it would take them to read Frankenstein, say, ten hours or so. I divided them into teams and assigned a section of Jackson’s text to each team, telling them that I wanted them to discover all the lexias (i.e., blocks of digital text) in their section and warning them that the Storyspace software allows certain lexias to be hidden until others are read. Finally, I asked them to diagram interrelations between lexias, drawing on all three views that the Storyspace software enables. As a consequence, the students were not only required to read closely but also to analyze the narrative strategies Jackson uses to construct her text.
”
”
N. Katherine Hayles (How We Think: Digital Media and Contemporary Technogenesis)
“
The cheerleaders of the new data regime rarely acknowledge the impacts of digital decision-making on poor and working-class people. This myopia is not shared by those lower on the economic hierarchy, who often see themselves as targets rather than beneficiaries of these systems. For example, one day in early 2000, I sat talking to a young mother on welfare about her experiences with technology. When our conversation turned to EBT cards, Dorothy Allen said, “They’re great. Except [Social Services] uses them as a tracking device.” I must have looked shocked, because she explained that her caseworker routinely looked at her purchase records. Poor women are the test subjects for surveillance technology, Dorothy told me. Then she added, “You should pay attention to what happens to us. You’re next.” Dorothy’s insight was prescient. The kind of invasive electronic scrutiny she described has become commonplace across the class spectrum today. Digital tracking and decision-making systems have become routine in policing, political forecasting, marketing, credit reporting, criminal sentencing, business management, finance, and the administration of public programs. As these systems developed in sophistication and reach, I started to hear them described as forces for control, manipulation, and punishment
”
”
Virginia Eubanks (Automating Inequality: How High-Tech Tools Profile, Police, and Punish the Poor)
“
I will give technology three definitions that we will use throughout the book.
The first and most basic one is that a technology is a means to fulfill a human purpose. For some technologies-oil refining-the purpose is explicit. For others- the computer-the purpose may be hazy, multiple, and changing. As a means, a technology may be a method or process or device: a particular speech recognition algorithm, or a filtration process in chemical engineering, or a diesel engine. it may be simple: a roller bearing. Or it may be complicated: a wavelength division multiplexer. It may be material: an electrical generator. Or it may be nonmaterial: a digital compression algorithm. Whichever it is, it is always a means to carry out a human purpose.
The second definition I will allow is a plural one: technology as an assemblage of practices and components. This covers technologies such as electronics or biotechnology that are collections or toolboxes of individual technologies and practices. Strictly speaking, we should call these bodies of technology. But this plural usage is widespread, so I will allow it here.
I will also allow a third meaning. This is technology as the entire collection of devices and engineering practices available to a culture. Here we are back to the Oxford's collection of mechanical arts, or as Webster's puts it, "The totality of the means employed by a people to provide itself with the objects of material culture." We use this collective meaning when we blame "technology" for speeding up our lives, or talk of "technology" as a hope for mankind. Sometimes this meaning shades off into technology as a collective activity, as in "technology is what Silicon Valley is all about." I will allow this too as a variant of technology's collective meaning. The technology thinker Kevin Kelly calls this totality the "technium," and I like this word. But in this book I prefer to simply use "technology" for this because that reflects common use.
The reason we need three meanings is that each points to technology in a different sense, a different category, from the others. Each category comes into being differently and evolves differently. A technology-singular-the steam engine-originates as a new concept and develops by modifying its internal parts. A technology-plural-electronics-comes into being by building around certain phenomena and components and develops by changing its parts and practices. And technology-general, the whole collection of all technologies that have ever existed past and present, originates from the use of natural phenomena and builds up organically with new elements forming by combination from old ones.
”
”
W. Brian Arthur (The Nature of Technology: What It Is and How It Evolves)
“
By that time, Bezos and his executives had devoured and raptly discussed another book that would significantly affect the company’s strategy: The Innovator’s Dilemma, by Harvard professor Clayton Christensen. Christensen wrote that great companies fail not because they want to avoid disruptive change but because they are reluctant to embrace promising new markets that might undermine their traditional businesses and that do not appear to satisfy their short-term growth requirements. Sears, for example, failed to move from department stores to discount retailing; IBM couldn’t shift from mainframe to minicomputers. The companies that solved the innovator’s dilemma, Christensen wrote, succeeded when they “set up autonomous organizations charged with building new and independent businesses around the disruptive technology.”9 Drawing lessons directly from the book, Bezos unshackled Kessel from Amazon’s traditional media organization. “Your job is to kill your own business,” he told him. “I want you to proceed as if your goal is to put everyone selling physical books out of a job.” Bezos underscored the urgency of the effort. He believed that if Amazon didn’t lead the world into the age of digital reading, then Apple or Google would. When Kessel asked Bezos what his deadline was on developing the company’s first piece of hardware, an electronic reading
”
”
Brad Stone (The Everything Store: Jeff Bezos and the Age of Amazon)
“
Partly at Rubel’s urging, Secretary of Defense McNamara later compelled the Minuteman developers, against great resistance, to install the equivalent of an electronic lock on the Minuteman, such that it couldn’t be fired without the receipt of a coded message from higher headquarters. Decades later, long after McNamara’s retirement, Bruce Blair, a former Minuteman launch control officer, informed the former secretary that the Air Force had ensured that the codes in the launch control centers were all set continuously at 00000000. According to Blair, McNamara responded, “I am shocked, absolutely shocked and outraged. Who the hell authorized that?” “What he had just learned from me,” Blair continues, was that the locks had been installed,52 but everyone knew the combination. The Strategic Air Command (SAC) in Omaha quietly decided to set the “locks” to all zeros in order to circumvent this safeguard. During the early to mid-1970s, during my stint as a Minuteman launch officer, they still had not been changed. Our launch checklist in fact instructed us, the firing crew, to double-check the locking panel in our underground launch bunker to ensure that no digits other than zero had been inadvertently dialed into the panel. SAC remained far less concerned about unauthorized launches than about the potential of these safeguards to interfere with the implementation of wartime launch orders. And so the “secret unlock code” during the height of the nuclear crises of the Cold War remained constant at 00000000.
”
”
Daniel Ellsberg (The Doomsday Machine: Confessions of a Nuclear War Planner)
“
As an analogy, we used to think of books, music, and movies as distinct. Then they all became represented by packets sent over the internet. Yes, we listened to music in audio players and viewed books in ebook readers, but their fundamental structure became digital. Similarly, today we think of stocks, bonds, gold, loans, and art as different. But all of them are represented as debits and credits on blockchains. Again, the fundamental structure became digital. Now, we are starting to think of different kinds of collections of people –— whether communities, cities, companies, or countries —– all fundamentally as networks, where the digital profiles and how they interact become more and more fundamental. This is obvious for communities and companies, which can already be fully remote and digital, but even already existing cities and countries are starting to be modeled this way, because (a) their citizens48 are often geographically remote, (b) the concept of citizenship itself is becoming similar to digital single sign-on, (c) many 20th century functions of government have already been de-facto transferred to private networks like (electronic) mail delivery, hotel, and taxi regulation, (d) cities and countries increasingly recruit citizens online, (e) so-called smart cities are increasingly administrated through a computer interface, and (f) as countries issue central bank digital currencies and cities likely follow suit, every polity will be publicly traded on the internet just like companies and coins.
”
”
Balaji S. Srinivasan (The Network State: How To Start a New Country)
“
The shift from precious metals to paper in retrospect clarifies that artifacts serving as money tokens are no more than representations of abstract exchange value—they are thus ultimately coveted for their potential use in social transaction, nor for some imagined, essential value intrinsic to the money tokens themselves. If it were not for international agreements such as those of Bretton Woods, gold could conceivably be as useless a medium of exchange in some cultural contexts as seashells are to modern Europeans.
This understanding of money, however, simultaneously implies that there is no such thing as intrinsic value. If value ubiquitously pertains to social relations, any notion of intrinsic value is an illusion. Although the European plundering and hoarding of gold and silver, like the Melanesian preoccupation with kula and the Andean reverence for Spondylus, has certainly been founded on such essentialist conceptions of value, the recent representation of exchange value in the form of electronic digits on computer screens is a logical trajectory of the kind of transformation propagated by [Marco] Polo. It is difficult to imagine how money appearing as electronic information could be perceived as possessing intrinsic value. This suggests that electronic money, although currently maligned as the root of the financial crisis, could potentially help us rid ourselves of money fetishism. Paradoxically, the progressive detachment of money from matter, obvious in the transitions from metals through paper to electronics, is simultaneously a source of critique and a source of hope.
”
”
Alf Hornborg (Global Magic: Technologies of Appropriation from Ancient Rome to Wall Street (Palgrave Studies in Anthropology of Sustainability))
“
On the other hand, some of the family’s impatience with the public is justified. When I use Federal Express, I accept as a condition of business that its standardized forms must be filled out in printed letters. An e-mail address off by a single character goes nowhere. Transposing two digits in a phone number gets me somebody speaking heatedly in Portuguese. Electronic media tell you instantly when you’ve made an error; with the post office, you have to wait. Haven’t we all at some point tested its humanity? I send mail to friends in Upper Molar, New York (they live in Upper Nyack), and expect a stranger to laugh and deliver it in forty-eight hours. More often than not, the stranger does. With its mission of universal service, the Postal Service is like an urban emergency room contractually obligated to accept every sore throat, pregnancy, and demented parent that comes its way. You may have to wait for hours in a dimly lit corridor. The staff may be short-tempered and dilatory. But eventually you will get treated. In the Central Post Office’s Nixie unit—where mail arrives that has been illegibly or incorrectly addressed—I see street numbers in the seventy thousands; impossible pairings of zip codes and streets; addresses without a name, without a street, without a city; addresses that consist of the description of a building; addresses written in water-based ink that rain has blurred. Skilled Nixie clerks study the orphans one at a time. Either they find a home for them or they apply that most expressive of postal markings, the vermilion finger of accusation that lays the blame squarely on you, the sender.
”
”
Jonathan Franzen (How to Be Alone)
“
The Memory Business Steven Sasson is a tall man with a lantern jaw. In 1973, he was a freshly minted graduate of the Rensselaer Polytechnic Institute. His degree in electrical engineering led to a job with Kodak’s Apparatus Division research lab, where, a few months into his employment, Sasson’s supervisor, Gareth Lloyd, approached him with a “small” request. Fairchild Semiconductor had just invented the first “charge-coupled device” (or CCD)—an easy way to move an electronic charge around a transistor—and Kodak needed to know if these devices could be used for imaging.4 Could they ever. By 1975, working with a small team of talented technicians, Sasson used CCDs to create the world’s first digital still camera and digital recording device. Looking, as Fast Company once explained, “like a ’70s Polaroid crossed with a Speak-and-Spell,”5 the camera was the size of a toaster, weighed in at 8.5 pounds, had a resolution of 0.01 megapixel, and took up to thirty black-and-white digital images—a number chosen because it fell between twenty-four and thirty-six and was thus in alignment with the exposures available in Kodak’s roll film. It also stored shots on the only permanent storage device available back then—a cassette tape. Still, it was an astounding achievement and an incredible learning experience. Portrait of Steven Sasson with first digital camera, 2009 Source: Harvey Wang, From Darkroom to Daylight “When you demonstrate such a system,” Sasson later said, “that is, taking pictures without film and showing them on an electronic screen without printing them on paper, inside a company like Kodak in 1976, you have to get ready for a lot of questions. I thought people would ask me questions about the technology: How’d you do this? How’d you make that work? I didn’t get any of that. They asked me when it was going to be ready for prime time? When is it going to be realistic to use this? Why would anybody want to look at their pictures on an electronic screen?”6 In 1996, twenty years after this meeting took place, Kodak had 140,000 employees and a $28 billion market cap. They were effectively a category monopoly. In the United States, they controlled 90 percent of the film market and 85 percent of the camera market.7 But they had forgotten their business model. Kodak had started out in the chemistry and paper goods business, for sure, but they came to dominance by being in the convenience business. Even that doesn’t go far enough. There is still the question of what exactly Kodak was making more convenient. Was it just photography? Not even close. Photography was simply the medium of expression—but what was being expressed? The “Kodak Moment,” of course—our desire to document our lives, to capture the fleeting, to record the ephemeral. Kodak was in the business of recording memories. And what made recording memories more convenient than a digital camera? But that wasn’t how the Kodak Corporation of the late twentieth century saw it. They thought that the digital camera would undercut their chemical business and photographic paper business, essentially forcing the company into competing against itself. So they buried the technology. Nor did the executives understand how a low-resolution 0.01 megapixel image camera could hop on an exponential growth curve and eventually provide high-resolution images. So they ignored it. Instead of using their weighty position to corner the market, they were instead cornered by the market.
”
”
Peter H. Diamandis (Bold: How to Go Big, Create Wealth and Impact the World (Exponential Technology Series))
“
GCHQ has traveled a long and winding road. That road stretches from the wooden huts of Bletchley Park, past the domes and dishes of the Cold War, and on towards what some suggest will be the omniscient state of the Brave New World. As we look to the future, the docile and passive state described by Aldous Huxley in his Brave New World is perhaps more appropriate analogy than the strictly totalitarian predictions offered by George Orwell's Nineteen Eighty-Four. Bizarrely, many British citizens are quite content in this new climate of hyper-surveillance, since its their own lifestyle choices that helped to create 'wired world' - or even wish for it, for as we have seen, the new torrents of data have been been a source of endless trouble for the overstretched secret agencies. As Ken Macdonald rightly points out, the real drives of our wired world have been private companies looking for growth, and private individuals in search of luxury and convenience at the click of a mouse. The sigint agencies have merely been handed the impossible task of making an interconnected society perfectly secure and risk-free, against the background of a globalized world that presents many unprecedented threats, and now has a few boundaries or borders to protect us. Who, then, is to blame for the rapid intensification of electronic surveillance? Instinctively, many might reply Osama bin Laden, or perhaps Pablo Escobar. Others might respond that governments have used these villains as a convenient excuse to extend state control. At first glance, the massive growth of security, which includes includes not only eavesdropping but also biometric monitoring, face recognition, universal fingerprinting and the gathering of DNA, looks like a sad response to new kinds of miscreants. However, the sad reality is that the Brave New World that looms ahead of us is ultimately a reflection of ourselves. It is driven by technologies such as text messaging and customer loyalty cards that are free to accept or reject as we choose. The public debate on surveillance is often cast in terms of a trade-off between security and privacy. The truth is that luxury and convenience have been pre-eminent themes in the last decade, and we have given them a much higher priority than either security or privacy. We have all been embraced the world of surveillance with remarkable eagerness, surfing the Internet in a global search for a better bargain, better friends, even a better partner.
GCHQ vast new circular headquarters is sometimes represented as a 'ring of power', exercising unparalleled levels of surveillance over citizens at home and abroad, collecting every email, every telephone and every instance of internet acces. It has even been asserted that GCHQ is engaged in nothing short of 'algorithmic warfare' as part of a battle for control of global communications. By contrast, the occupants of 'Celtenham's Doughnut' claim that in reality they are increasingly weak, having been left behind by the unstoppable electronic communications that they cannot hope to listen to, still less analyse or make sense of. In fact, the frightening truth is that no one is in control. No person, no intelligence agency and no government is steering the accelerating electronic processes that may eventually enslave us. Most of the devices that cause us to leave a continual digital trail of everything we think or do were not devised by the state, but are merely symptoms of modernity. GCHQ is simply a vast mirror, and it reflects the spirit of the age.
”
”
Richard J. Aldrich (GCHQ)
“
One of the earliest studies found that using an iPad—an electronic tablet enriched with blue LED light—for two hours prior to bed blocked the otherwise rising levels of melatonin by a significant 23 percent. A more recent report took the story several concerning steps further. Healthy adults lived for a two-week period in a tightly controlled laboratory environment. The two-week period was split in half, containing two different experimental arms that everyone passed through: (1) five nights of reading a book on an iPad for several hours before bed (no other iPad uses, such as email or Internet, were allowed), and (2) five nights of reading a printed paper book for several hours before bed, with the two conditions randomized in terms of which the participants experienced as first or second. Compared to reading a printed book, reading on an iPad suppressed melatonin release by over 50 percent at night. Indeed, iPad reading delayed the rise of melatonin by up to three hours, relative to the natural rise in these same individuals when reading a printed book. When reading on the iPad, their melatonin peak, and thus instruction to sleep, did not occur until the early-morning hours, rather than before midnight. Unsurprisingly, individuals took longer to fall asleep after iPad reading relative to print-copy reading. But did reading on the iPad actually change sleep quantity/quality above and beyond the timing of melatonin? It did, in three concerning ways. First, individuals lost significant amounts of REM sleep following iPad reading. Second, the research subjects felt less rested and sleepier throughout the day following iPad use at night. Third was a lingering aftereffect, with participants suffering a ninety-minute lag in their evening rising melatonin levels for several days after iPad use ceased—almost like a digital hangover effect. Using LED devices at night impacts our natural sleep rhythms, the quality of our sleep, and how alert we feel during the day.
”
”
Matthew Walker (Why We Sleep: Unlocking the Power of Sleep and Dreams)
“
Although thrilled that the era of the personal computer had arrived, he was afraid that he was going to miss the party. Slapping down seventy-five cents, he grabbed the issue and trotted through the slushy snow to the Harvard dorm room of Bill Gates, his high school buddy and fellow computer fanatic from Seattle, who had convinced him to drop out of college and move to Cambridge. “Hey, this thing is happening without us,” Allen declared. Gates began to rock back and forth, as he often did during moments of intensity. When he finished the article, he realized that Allen was right. For the next eight weeks, the two of them embarked on a frenzy of code writing that would change the nature of the computer business.1 Unlike the computer pioneers before him, Gates, who was born in 1955, had not grown up caring much about the hardware. He had never gotten his thrills by building Heathkit radios or soldering circuit boards. A high school physics teacher, annoyed by the arrogance Gates sometimes displayed while jockeying at the school’s timesharing terminal, had once assigned him the project of assembling a Radio Shack electronics kit. When Gates finally turned it in, the teacher recalled, “solder was dripping all over the back” and it didn’t work.2 For Gates, the magic of computers was not in their hardware circuits but in their software code. “We’re not hardware gurus, Paul,” he repeatedly pronounced whenever Allen proposed building a machine. “What we know is software.” Even his slightly older friend Allen, who had built shortwave radios, knew that the future belonged to the coders. “Hardware,” he admitted, “was not our area of expertise.”3 What Gates and Allen set out to do on that December day in 1974 when they first saw the Popular Electronics cover was to create the software for personal computers. More than that, they wanted to shift the balance in the emerging industry so that the hardware would become an interchangeable commodity, while those who created the operating system and application software would capture most of the profits.
”
”
Walter Isaacson (The Innovators: How a Group of Hackers, Geniuses, and Geeks Created the Digital Revolution)
“
Who is going to fight them off, Randy?” “I’m afraid you’re going to say we are.” “Sometimes it might be other Ares-worshippers, as when Iran and Iraq went to war and no one cared who won. But if Ares-worshippers aren’t going to end up running the whole world, someone needs to do violence to them. This isn’t very nice, but it’s a fact: civilization requires an Aegis. And the only way to fight the bastards off in the end is through intelligence. Cunning. Metis.” “Tactical cunning, like Odysseus and the Trojan Horse, or—” “Both that, and technological cunning. From time to time there is a battle that is out-and-out won by a new technology—like longbows at Crecy. For most of history those battles happen only every few centuries—you have the chariot, the compound bow, gunpowder, ironclad ships, and so on. But something happens around, say, the time that the Monitor, which the Northerners believe to be the only ironclad warship on earth, just happens to run into the Merrimack, of which the Southerners believe exactly the same thing, and they pound the hell out of each other for hours and hours. That’s as good a point as any to identify as the moment when a spectacular rise in military technology takes off—it’s the elbow in the exponential curve. Now it takes the world’s essentially conservative military establishments a few decades to really comprehend what has happened, but by the time we’re in the thick of the Second World War, it’s accepted by everyone who doesn’t have his head completely up his ass that the war’s going to be won by whichever side has the best technology. So on the German side alone we’ve got rockets, jet aircraft, nerve gas, wire-guided missiles. And on the Allied side we’ve got three vast efforts that put basically every top-level hacker, nerd, and geek to work: the codebreaking thing, which as you know gave rise to the digital computer; the Manhattan Project, which gave us nuclear weapons; and the Radiation Lab, which gave us the modern electronics industry. Do you know why we won the Second World War, Randy?” “I think you just told me.” “Because we built better stuff than the Germans?” “Isn’t that what you said?” “But why did we build better stuff, Randy?” “I guess I’m not competent to answer, Enoch, I haven’t studied that period well enough.” “Well the short answer is that we won because the Germans worshipped Ares and we worshipped Athena.” “And am I supposed to gather that you, or
”
”
Neal Stephenson (Cryptonomicon)
“
The US traded its manufacturing sector’s health for its entertainment industry, hoping that Police Academy sequels could take the place of the rustbelt. The US bet wrong.
But like a losing gambler who keeps on doubling down, the US doesn’t know when to quit. It keeps meeting with its entertainment giants, asking how US foreign and domestic policy can preserve its business-model. Criminalize 70 million American file-sharers? Check. Turn the world’s copyright laws upside down? Check. Cream the IT industry by criminalizing attempted infringement? Check. It’ll never work. It can never work. There will always be an entertainment industry, but not one based on excluding access to published digital works. Once it’s in the world, it’ll be copied. This is why I give away digital copies of my books and make money on the printed editions: I’m not going to stop people from copying the electronic editions, so I might as well treat them as an enticement to buy the printed objects.
But there is an information economy. You don’t even need a computer to participate. My barber, an avowed technophobe who rebuilds antique motorcycles and doesn’t own a PC, benefited from the information economy when I found him by googling for barbershops in my neighborhood.
Teachers benefit from the information economy when they share lesson plans with their colleagues around the world by email. Doctors benefit from the information economy when they move their patient files to efficient digital formats. Insurance companies benefit from the information economy through better access to fresh data used in the preparation of actuarial tables. Marinas benefit from the information economy when office-slaves look up the weekend’s weather online and decide to skip out on Friday for a weekend’s sailing. Families of migrant workers benefit from the information economy when their sons and daughters wire cash home from a convenience store Western Union terminal.
This stuff generates wealth for those who practice it. It enriches the country and improves our lives.
And it can peacefully co-exist with movies, music and microcode, but not if Hollywood gets to call the shots. Where IT managers are expected to police their networks and systems for unauthorized copying – no matter what that does to productivity – they cannot co-exist. Where our operating systems are rendered inoperable by “copy protection,” they cannot co-exist. Where our educational institutions are turned into conscript enforcers for the record industry, they cannot co-exist.
The information economy is all around us. The countries that embrace it will emerge as global economic superpowers. The countries that stubbornly hold to the simplistic idea that the information economy is about selling information will end up at the bottom of the pile.
What country do you want to live in?
”
”
Cory Doctorow (Content: Selected Essays on Technology, Creativity, Copyright, and the Future of the Future)
“
The top surface of the computer is smooth except for a fisheye lens, a polished
glass dome with a purplish optical coating. Whenever Hiro is using the machine,
this lens emerges and clicks into place, its base flush with the surface of the
computer. The neighborhood loglo is curved and foreshortened on its surface.
Hiro finds it erotic. This is partly because he hasn't been properly laid in
several weeks. But there's more to it. Hiro's father, who was stationed in
Japan for many years, was obsessed with cameras. He kept bringing them back
from his stints in the Far East, encased in many protective layers, so that when
he took them out to show Hiro, it was like watching an exquisite striptease as
they emerged from all that black leather and nylon, zippers and straps. And
once the lens was finally exposed, pure geometric equation made real, so
powerful and vulnerable at once, Hiro could only think it was like nuzzling
through skirts and lingerie and outer labia and inner labia. . . . It made
him feel naked and weak and brave.
The lens can see half of the universe -- the half that is above the computer,
which includes most of Hiro. In this way, it can generally keep track of where
Hiro is and what direction he's looking in.
Down inside the computer are three lasers -- a red one, a green one, and a blue
one. They are powerful enough to make a bright light but not powerful enough to
burn through the back of your eyeball and broil your brain, fry your frontals,
lase your lobes. As everyone learned in elementary school, these three colors
of light can be combined, with different intensities, to produce any color that
Hiro's eye is capable of seeing.
In this way, a narrow beam of any color can be shot out of the innards of the
computer, up through that fisheye lens, in any direction. Through the use of
electronic mirrors inside the computer, this beam is made to sweep back and
forth across the lenses of Hiro's goggles, in much the same way as the electron
beam in a television paints the inner surface of the eponymous Tube. The
resulting image hangs in space in front of Hiro's view of Reality.
By drawing a slightly different image in front of each eye, the image can be
made three-dimensional. By changing the image seventy-two times a second, it
can be made to move. By drawing the moving three-dimensional image at a
resolution of 2K pixels on a side, it can be as sharp as the eye can perceive,
and by pumping stereo digital sound through the little earphones, the moving 3-D
pictures can have a perfectly realistic soundtrack.
So Hiro's not actually here at all. He's in a computer-generated universe that
his computer is drawing onto his goggles and pumping into his earphones. In the
lingo, this imaginary place is known as the Metaverse. Hiro spends a lot of
time in the Metaverse. It beats the shit out of the U-Stor-It.
”
”
Neal Stephenson (Snow Crash)
“
Like Felicity they methodically checked the house office, safe and family bank account details and financial affairs. Angelina then had Inspector Mick bug the boys’ homes, cars and offices and with the information she acquired came knowledge and contacts. She wrote a programme called listen, it saved all conversations digitally and converted it to text into a computer file in a remote location not traceable to her or anybody at 3WW but it recorded all his illicit dealings and it gave her valuable information. She hacked into their individual MIS computer systems and sent spyware via e-mail called virus protection free download and once opened it went through their c drive, all files on their computers, and copied all files to a ip address of a remote computer of Angelina’s request, in a phantom company named Borrow. All data was heavily encrypted and deleted after access and storage was onto an external hard drive storage box, deleting the electronic footpath. The spyware recorded their strokes on the keyboard and Angelina was able to secure even their banking pins and passwords and all their computer passwords. She had a brilliant computer mind, wasted in librarianship
”
”
Annette J. Dunlea
“
As planned The Three Wise Women meet at 3WW HQ for debriefing. Angelina extracted the small camera from her lapel and downloaded it onto a laptop. She then expertly digitally scanned the Polaroid into her electronic file on James. Ava had just missed Sean who had given his camcorder and photographs of himself and Patrick to Angelina. It had been digitally downloaded and formatted onto Patrick’s pc file. A back-up of all data was done on the Company server but it was heavily encrypted and written in Angelina’s own program Borrow and used her own software Gotya, so only the very best could break her code and that would take months
”
”
Annette J. Dunlea
“
The weightless rhetoric of digital technology masks a refusal to acknowledge the people and resources on which these systems depend: lithium and coltan mines, energy-guzzling data centers and server farms, suicidal workers at Apple’s Foxconn factories, and women and children in developing countries and incarcerated Americans up to their necks in toxic electronic waste.2 The swelling demand for precious metals, used in everything from video-game consoles to USB cables to batteries, has increased political instability in some regions, led to unsafe, unhealthy, and inhumane working conditions, opened up new markets for child and forced labor, and encouraged environmentally destructive extraction techniques.3 It is estimated that mining the gold necessary to produce a single cell phone—only one mineral of many required for the finished product—produces upward of 220 pounds of waste.4
”
”
Astra Taylor (The People's Platform: Taking Back Power and Culture in the Digital Age)
“
Almost every major textual initiative today is structured around three overlapping notions of sharing: commonality, transferability, and sociability. We want other people to read the same thing we are reading (commonality); we want to be able to send other people what we are reading (transferability); and we want to be able to talk to other people about what we are reading (sociability). “Social reading” is shaping up to be the core identity, or ideology if you will, of digital media. I say ideology because there is also something duplicitous about the new commitment to sharing. Never before has the proprietary relationship to reading and ideas been more in force. Sharing texts has never been more popular—and illegal.
”
”
Andrew Piper (Book Was There: Reading in Electronic Times)
“
There is such a thing as being too connected. Overusing digital devices is not only environmentally draining (requiring the latest electronics and massive server farms running nonstop to keep trivial pieces of information available), it can also be detrimental on a human level. It distracts us from living in the moment, from enjoying real life; it discourages person-to-person contact and face-to-face connections; it can expose our every move and steal our privacy. Notably, nonstop entertainment robs us of alone time, crucial for independent thinking, appreciation, and gratitude—and maybe even happiness.
”
”
Bea Johnson (Zero Waste Home: The Ultimate Guide to Simplifying Your Life by Reducing Your Waste (A Simple Guide to Sustainable Living))
“
Assign a file or paper tray to collect single-side printed paper for reuse. Boycott paper sourced from virgin forests and reams sold in plastic. Cancel magazine and newspaper subscriptions; view them online instead. Digitize important receipts and documents for safekeeping. Digital files are valid proofs for tax purposes. Download CutePDF Writer to save online files without having to print them. Email invitations or greeting cards instead of printing them (see “Holidays and Gifts” chapter). Forage the recycling can when paper scraps are needed, such as for bookmarks or pictures (for school collages, for example). Give extra paper to the local preschool. Hack the page margins of documents to maximize printing. Imagine a paperless world. Join the growing paperless community. Kill the fax machine; encourage electronic faxing through a service such as HelloFax. Limit yourself to print only on paper that has already been printed on one side. Make online billing and banking a common practice. Nag the kids’ teachers to send home only important papers. Opt out of paper newsletters. Print on both sides when using a new sheet of paper (duplex printing). Question the need for printing; print only when absolutely necessary. In most cases, it is not. Repurpose junk mail envelopes—make sure to cross out any barcode. Sign electronically using the Adobe Acrobat signing feature or SignNow.com. Turn down business cards; enter relevant info directly into a smartphone. Use shredded paper as a packing material, single-printed paper fastened with a metal clip for a quick notepad (grocery lists, errands lists), and double-printed paper to wrap presents or pick up your dog’s feces. Visit the local library to read business magazines and books. Write on paper using a pencil, which you can then erase to reuse paper, or better yet, use your computer, cell phone, or erasable board instead of paper. XYZ: eXamine Your Zipper; i.e., your leaks: attack any incoming source of paper.
”
”
Bea Johnson (Zero Waste Home: The Ultimate Guide to Simplifying Your Life by Reducing Your Waste (A Simple Guide to Sustainable Living))
“
If a Tokyoite knows anything about Nakano, it's likely to be Nakano Broadway, a shopping mall with several floors devoted to Japanese comics (manga) and animation (anime). It is geek central. I found most of it incomprehensible, but I did enjoy browsing at Junkworld, which sells useful electronic discards, like old working digital cameras for $5 and assorted connectors and dongles and sound cards. In the 1980's, when William Gibson was padding around the streets of Tokyo and inventing the world of Neuromancer, Japan was the place where the future had already arrived, where you could find electronic toys that wouldn't hit American shelves for years, if ever. For a variety of reasons (blogs and online shopping, advances in international shipping, the fact that the coolest mobile phones are now designed in Silicon Valley and Seoul), this is no longer true. While it's still fun to go to Akihabara at night and shop all seven floors of a neon-lit electronics superstore, you won't bring home any objects of nerdy wet dreams.
”
”
Matthew Amster-Burton (Pretty Good Number One: An American Family Eats Tokyo)
“
I remain steady in my belief that well-written literary fiction doesn’t have to be high-brow; it has to embrace ideas about destiny in a storyline that holds the readers’ attention.
From his classic presentation at the 200th anniversary writers’ conference of North American Review, the nation’s oldest literary magazine, where he poked fun at his own early novels for their obscurity, implying clarity in the digital age equals salvation. Then he toyed with the digital age itself:
Some nut will find a way to blow up the electric grid. All these electronic gadgets that rely on electricity will go dark. The batteries will run down. We’re talking Cormac McCarthy darkness, black on black . . . except for one distant flicker of light. It’s on a beach probably Australia. Survivors will make their way through the dark and find the light from a single candle. Next to the candle will be a lad with a note book scribbling away with the last pencil on earth. He’s writing about what happened. He hopes someone will read what he writes. That’s what writers do. They hope.
”
”
Peter Kelton (Reminds Me of My Innocence: Amorous Adventures Among Kissing Cousins)
“
president, Hannibal Hamlin. The William Badger's history helps illuminate a fascinating period of mid-nineteenth-century maritime activity, when sturdy square-rigged sailing ships canvassed the oceans and U.S. coastal waterways. In the days before digital electronics,
”
”
Peter Kurtz (Bluejackets in the Blubber Room: A Biography of the William Badger, 1828-1865)
“
The poet Kenneth Goldsmith, for one, taught a course at the University of Pennsylvania called “Wasting Time on the Internet,” in which digital distraction was mandatory because he wholeheartedly believes that the Internet’s frenetic state can jumpstart new arenas for creative writing. A surrealist, “electronic collective unconscious” can produce new work, he says, “in ways that aren’t yet recognized as literary.
”
”
Michael Harris (Solitude: In Pursuit of a Singular Life in a Crowded World)
“
The S curve is not just important as a model in its own right; it’s also the jack-of-all-trades of mathematics. If you zoom in on its midsection, it approximates a straight line. Many phenomena we think of as linear are in fact S curves, because nothing can grow without limit. Because of relativity, and contra Newton, acceleration does not increase linearly with force, but follows an S curve centered at zero. So does electric current as a function of voltage in the resistors found in electronic circuits, or in a light bulb (until the filament melts, which is itself another phase transition). If you zoom out from an S curve, it approximates a step function, with the output suddenly changing from zero to one at the threshold. So depending on the input voltages, the same curve represents the workings of a transistor in both digital computers and analog devices like amplifiers and radio tuners. The early part of an S curve is effectively an exponential, and near the saturation point it approximates exponential decay. When someone talks about exponential growth, ask yourself: How soon will it turn into an S curve? When will the population bomb peter out, Moore’s law lose steam, or the singularity fail to happen? Differentiate an S curve and you get a bell curve: slow, fast, slow becomes low, high, low. Add a succession of staggered upward and downward S curves, and you get something close to a sine wave. In fact, every function can be closely approximated by a sum of S curves: when the function goes up, you add an S curve; when it goes down, you subtract one. Children’s learning is not a steady improvement but an accumulation of S curves. So is technological change. Squint at the New York City skyline and you can see a sum of S curves unfolding across the horizon, each as sharp as a skyscraper’s corner. Most importantly for us, S curves lead to a new solution to the credit-assignment problem. If the universe is a symphony of phase transitions, let’s model it with one. That’s what the brain does: it tunes the system of phase transitions inside to the one outside. So let’s replace the perceptron’s step function with an S curve and see what happens.
”
”
Pedro Domingos (The Master Algorithm: How the Quest for the Ultimate Learning Machine Will Remake Our World)
“
[...] exhibition designers must be able to manage and work creatively with the digital information that surrounds and exhibition. Increasingly, the assets of a museum will include an electronic database that can be accessed through websites, apps and creative interactive devices within the environs of a gallery interior, in addition to traditional object displays.
”
”
Philip Hughes (Exhibition Design)
“
United States Zip Code system to approximate the patients’ area of residence. This method reports the first three digits of the patient’s zip code, while omitting the last two digits [18]. The first three digits of a zip code contain two pieces of information: the first integer in the code refers to a number of states, the following two
”
”
Mit Critical Data (Secondary Analysis of Electronic Health Records)
“
Social media can be accessed via computer, smart phone or tablet and used to link most digital medias and electronic books/ magazines for distribution
”
”
Tara Mooney (Take Control of your future- Develop your own global Co.: Co Solution # 3 (Co Solution Series))
“
reproduce or otherwise make available this publication (or any part of it) in any form, or by any means (electronic, digital, optical, mechanical, photocopying, recording or otherwise), without the prior written permission of the publisher. Any person who does any unauthorized act in relation to this publication may be liable to criminal prosecution and civil claims for damages. A CIP catalogue record for this book is available from the
”
”
Wilbur Smith (When the Lion Feeds (The Courtneys Series Book 1))
“
I'm not convinced," Dodds said.
It was Thursday morning, just six hours after Bosch and Chu had ended their surveillance of Chang, with the suspect going to an apartment in Monterey Park and apparently retiring for the night.
"Well, Cap, you shouldn't be convinced yet," Bosch said. "That's why we want to continue the surveillance and get the wire."
"What I mean is, I'm not convinced it's the way to go," Dodds said, "Surveillance is fine. But a wire is a lot of work and effort for long-shot results."
Bosch understood. Dodds had an excellent repu tation as a detective, but he was now an administrator and about as far removed from the detective work in his division as a Houston oil executive is from the gas pump, He now worked with personnel numbers and budgets, He had to find ways of doing more with less and never allowing a dip in the statistics of arrests made and cases closed. That made him a realist and the reality was that electronic surveillance was very expensive. Not only did it take double-digit man hours to carefully draft a fifty plus-page affidavit secking court permission, but once permission was granted, a wiretap room had to be staffed twenty-four hours a day with a detective monitoring the line. Often a single-number tap led to other numbers needing to be tapped and under the law each line had to have its own monitor. Such an operation quickly sucked up overtime like a giant sponge. With the RHD's OT budget seriously down because of economic constraints on the department, Dodds was reluctant to give any of it up for what amounted to an investigation of the mur der of a South Side liquor store clerk. He would rather save it for a rainy day-a big-time media case that might come up and that would demand it.
”
”
Michael Connelly (Nine Dragons (Harry Bosch, #14; Harry Bosch Universe, #21))
“
The challenge now is to decode the underlying meaning of small-world and scale-free architecture, if there is any. In one recent attempt, Solé has observed that electronic circuits tend to be wired in a small-world fashion, and he thinks he knows why. Whether he was analyzing the latest digital microchips or the clunky circuits found in old televisions, he found that all the components were just a few electrical steps from one another, yet they were much more clustered than they would have been in an equivalent random circuit, thanks to the modular design favored by engineering practice.
”
”
Steven H. Strogatz (Sync: How Order Emerges From Chaos In the Universe, Nature, and Daily Life)
“
Regardless of the medium, performance artists explicitly explore and enact their holistic autonomies and interiorities (gendered, spiritual, emotional, and political), not simply their bodily corporeality. If this process takes place within a recorded electronic or digital environment, it is the medium that is virtual, unreal or disembodied, not the human performer within it. In the performance arts, whether in a theater, on a street corner, or on a computer monitor, the medium is not the message (and never has been); the performer is.
[. . .] The dislocation and fragmentation of the body in digital performance is an aesthetic praxis which deconstructive critics have hungrily grasped and mythologized, holding up the virtual body as the central icon (immaterial, disembodied), whereas in actuality, it operates as an index, as another trace and representation of the always already physical body.
”
”
Steve Dixon (Digital Performance: A History of New Media in Theater, Dance, Performance Art, and Installation)
“
One probable near-term outcome of AI and a through-line in all three of the scenarios is the emergence of what I’ll call a “personal data record,” or PDR. This is a single unifying ledger that includes all of the data we create as a result of our digital usage (think internet and mobile phones), but it would also include other sources of information: our school and work histories (diplomas, previous and current employers); our legal records (marriages, divorces, arrests); our financial records (home mortgages, credit scores, loans, taxes); travel (countries visited, visas); dating history (online apps); health (electronic health records, genetic screening results, exercise habits); and shopping history (online retailers, in-store coupon use). In China, a PDR would also include all the social credit score data described in the last chapter.
”
”
Amy Webb (The Big Nine: How the Tech Titans and Their Thinking Machines Could Warp Humanity)
“
This Lebanese variant involved men stamping and chant-singing in unison over thumping electronic beats. I asked where to buy it. Better than shopping tips, Tame invited me to grab some off his phone via Bluetooth. He insisted that I take last year’s big hit, which runs for more than half an hour. Even if you don’t enjoy dabke, it’s impossible to be mad at any pop tradition where songs clock in at such extravagant lengths.
”
”
Jace Clayton (Uproot: Travels in 21st-Century Music and Digital Culture)
“
The evangelists for bitcoin, the much-hyped digital currency that is a strange mixture of the visionary and the fraudulent—are, in a sense, not imaginative enough. They are simply trying to reproduce in the electronic world a commodity—currency—that has long existed in the material world. The larger question is whether currency as we have known it is any longer necessary at all. I once joked with beginning students that money existed because when a pipe burst it took too long to find a plumber in need of economics lectures—but today it is possible to locate that plumber.
”
”
John Kay
“
What matters most is engagement, being conscious that you're shaping your own experience every moment. If you spend most of your life pressing keys and managing electronic traffic, that's what your life will be about. Maybe that makes you happy. If not, you have other options.
”
”
William Powers (Hamlet's BlackBerry: A Practical Philosophy for Building a Good Life in the Digital Age)
“
The cost of electrons and photons is getting cheaper all the time!
”
”
T. Gilling (The STREAM TONE: The Future of Personal Computing?)
“
Assigning invention in cases like this is difficult, and modern writings on technology recognize this. Says computing pioneer Michael Williams:
There is no such thing as "first" in any activity associated with human invention. If you add enough adjectives to a description you can always claim your own favorite. For example the ENIAC is often claimed to be the "first electronic, general purpose, large scale, digital computer" and you certainly have to add all those adjectives before you have a correct statement. If you leave any of them off, then machines such as the ABC, the Colossus, Zuse's Z3, and many others (some not even constructed such as Babbage's Analytical Engine) become candidates for being "first.
”
”
W. Brian Arthur (The Nature of Technology: What It Is and How It Evolves)
“
Ironically, while we ignore our physical distress signals, we simultaneously make it a point to stay connected to the digital world so we don’t miss any electronic messages. On we go, cramming as much productivity as we can into every day, just hoping that the bucket doesn’t overflow.
”
”
Michelle Segar (No Sweat: How the Simple Science of Motivation Can Bring You a Lifetime of Fitness)
“
Open books can be measured by the sliding scale of pages past and future, like steps, just off to the side of the page. What lies after the digital page? An abyss.
”
”
Andrew Piper (Book Was There: Reading in Electronic Times)
“
There are some conservationists who are opposed to fishing and hunting, but I’m sorry, they are not thinking it through. In order to transpose mere interest into passionate love requires proactive behavior. The road is an uphill one because today’s youth of the digital world are raised with offers of passive, instant gratification. Can a person raised in that environment ever fish all day without a bite? Maybe it should be mandatory for schools to provide environmental study from grade one in which there is no computer involved, or any other electronic visual aide, only calm, analytical conversation mixed in with visits to if not wild places at least rural ones.
”
”
Yvon Chouinard (Simple Fly Fishing: Techniques for Tenkara and Rod and Reel)
“
Another scenario is possible, and that is the e-book will succeed and that books will be downloaded from the Internet. But at the same time, it may be the case that the digital network and the terminals that tap into it will become saturated as limits to growth of computer memory and speed of operation are reached at the same time that electronic traffic becomes gridlocked with e-mail and World Wide Web use. If that were to happen, there would likely be pressure to keep older books in print form, and perhaps even continue to issue newer books that way, rather than clutter the Internet with more and more information. Under such a scenario, older books might not be allowed to circulate because so few copies of each title will have survived the great CD digital dispersal, leaving printed editions that will be as rare as manuscript codices are today.
In spite of potential problems, the electronic book, which promises to be all books to all people, is seen by some visionaries as central to any scenario of the future. But what if some electromagnetic catastrophe or a mad computer hacker were to destroy the total electronic memory of central libraries? Curious old printed editions of dead books would have to be disinterred from book cemeteries and re-scanned. But in scanning rare works into electronic form, surviving books might have to be used in a library's stacks, the entrance to which might have to be as closely guarded as that to Fort Knox. The continuing evolution of the bookshelf would have to involve the wiring of bookstacks for computer terminal use. Since volumes might be electronically chained to their section in the stacks, it is also likely that libraries would have to install desks on the front of all cases so that portable computers and portable scanners could be used to transcribe books within a telephone wire's or computer cable's reach of where they were permanently kept. The aisles in a bookstack would most likely have to be altered also to provide seating before the desks, and in time at least some of the infrastructure associated with the information superhighway might begin again to resemble that of a medieval library located in the tower of a monastery at the top of a narrow mountain road.
”
”
Petroski, Henry
“
The following sections survey some of the many US federal computer crime statutes, including • 18 USC 1029: Fraud and Related Activity in Connection with Access Devices • 18 USC 1030: Fraud and Related Activity in Connection with Computers • 18 USC 2510 et seq.: Wire and Electronic Communications Interception and Interception of Oral Communications • 18 USC 2701 et seq.: Stored Wire and Electronic Communications and Transactional Records Access • The Digital Millennium Copyright Act • The Cyber Security Enhancement Act of 2002
”
”
Daniel Regalado (Gray Hat Hacking: The Ethical Hacker's Handbook)
“
The “self-actualization” philosophy from which most of this new bureaucratic language emerged insists that we live in a timeless present, that history means nothing, that we simply create the world around us through the power of the will. This is a kind of individualistic fascism. Around the time the philosophy became popular in the seventies, some conservative Christian theologians were actually thinking along very similar lines: seeing electronic money as a kind of extension for God’s creative power, which is then transformed into material reality through the minds of inspired entrepreneurs. It’s easy to see how this could lead to the creation of a world where financial abstractions feel like the very bedrock of reality, and so many of our lived environments look like they were 3-D-printed from somebody’s computer screen. In fact, the sense of a digitally generated world I’ve been describing could be taken as a perfect illustration of another social law—at least, it seems to me that it should be recognized as a law—that, if one gives sufficient social power to a class of people holding even the most outlandish ideas, they will, consciously or not, eventually contrive to produce a world organized in such a way that living in it will, in a thousand subtle ways, reinforce the impression that those ideas are self-evidently true.
”
”
David Graeber (The Utopia of Rules: On Technology, Stupidity, and the Secret Joys of Bureaucracy)
“
The CAD image was drawn by an electron beam onto a green phosphorus coating on the inside of the glass TV tube. The
”
”
Rick Smith (Fabricating the Frank Gehry Legacy: The Story of the Evolution of Digital Practice in Frank Gehry's office)
“
In the formative years of digital computing, following World War II, both the operating system and applications were considered afterthoughts by designers. The “hardware” of electronics, as distinct from the “software” of programs, was so difficult that engineers could hardly see past it. The most important type of hardware was the circuitry or processors that actually carried out the instructions given the computer. A second set of devices made it possible to get data into and out of a computer. A third class stored information. A fourth class allowed one computer to send information to another, over special cable or telephone lines. The question of software generally arose only after the hardware pieces fell into place.
”
”
G. Pascal Zachary (Showstopper!: The Breakneck Race to Create Windows NT and the Next Generation at Microsoft)
“
At the laboratory, Turing designed the first relatively complete electronic stored-program digital computer for code breaking in 1945. Darwin deemed it too ambitious, however, and after several years Turing left in disgust. When the laboratory finally built his design in 1950, it was the fastest computer in the world and, astonishingly, had the memory capacity of an early Macintosh built three decades later.
”
”
Sharon Bertsch McGrayne (The Theory That Would Not Die: How Bayes' Rule Cracked the Enigma Code, Hunted Down Russian Submarines, and Emerged Triumphant from Two Centuries of Controversy)
“
The CES is the world's largest annual trade show for consumer technology, with more than 140,000 attendees. Many innovative products have debuted at the CES, including the videocassette recorder in 1970, the camcorder in 1981, digital satellite TV in 1994, HDTV in 1998, Microsoft Xbox in 2001, and Blu-ray in 2003. The show is the epicenter of electronics launches in the world.
”
”
Nancy Tennant Snyder (Unleashing Innovation: How Whirlpool Transformed an Industry)
“
Right now, We are living in perhaps the most exciting time in history to buy, own or play that eternal instruments, The piano Cover. What is your goal is to purchase something as small as software that can record what you want to play, a newly designed player piano, a digital machine or a classic phonetic model, there have never been as many options for the trencherman.
Player Pianos
Also called reproducing pianos. this class of instrument describe a modern update on the paper-outcry player pianos you keep in mind from old movies, and they have grown enormously in popularity over the final decennial.
These are not digital instruments they are real, philological pianos with hammers and rope that can be played generally. but they can also start themselves. using filthy electronic technology. Instead of shove paper, they take their hint from lethargic disks, specially formatted CDs or internal memory systems. different manufacturers offer vast sanctum of pre-recorded titles for their systems. music in every genre from pop to the classics filed by some of the earth’s top pianists. These sophisticated systems arrest every nuance of the original performances and play them back with dramatic accuracy providing something that’s actually so much better than CD fidelity because the activities are live.
Watch my new cover : Dancing on my own piano
Thanks to these new systems, many people who do not play the piano are enjoying live piano music at any time of at morning, night and day. How many they are concurrent dinners for two or entertaining a houseful of partygoers, these high-tech pianos take centre period. For people who do play the piano, these systems can be used to record their own piano deeds, Interface by- Computers, aid in music education, assist with composing and many other applications. In short, these modern marvels aren’t your grandfather's’ player pianos!
If you want to learn see the video first : Dancing on my own piano cover
”
”
antonicious
“
It is proper Netiquette to post pictures with status updates to make them more engaging. NetworkEtiquette.net
”
”
David Chiles
“
Observation:
Thanks to technological advances, avid readers seem to be replacing DTBAD (Dead Tree Book Acquisition Disorder) with an alphabet soup of more more modern-day hoarding behaviors: EBAD (E-Book Acquistion Disorder), EGAD (Electronic Gadget Acquisition Disorder), and ABAD (Audiobook Acquisition Disorder). Of course, there's also MY(Ba)AD (Movie and YouTube (and Book adaptations) Acquisition Disorder: the hoarding or obsessive viewing of digital films and videos, some based on books). If any of these syndromes describes you, take heart: there's probably an app for that! - Lisa Tolliver 8/9/2013(E-Book Acquistion Disorder), EGAD (Electronic Gadget Acquisition Disorder), and ABAD (Audiobook Acquisition Disorder). Of course, there's also MY(Ba)AD (Movie and YouTube (and Book adaptations) Acquisition Disorder: the hoarding or obsessive viewing of digital films and videos, some based on books). If any of these syndromes describes you, take heart: there's probably an app for that!
”
”
Lisa Tolliver
“
Photonplay is a leading full service manufacturer, developer and designer of electronic led display boards and signs, such as Digital Display Board, Electronic Display Boards, LED Matrix Display, LED Message Display, LED Moving Display, LED Sign Display, Digital LED Display.
”
”
Steve Derber
“
Have you noticed that there are no local consumer electronics webs, run by earnest chaps with straggly beards called Hugo and Jake who are, ‘you know, just, like, trying to make a difference by cutting down the electronics miles on people’s phones in an attempt to save the planet’? Have you clocked that there is no such thing as an artisan mobile phone? This is because we understand that different parts of the world are better suited to different tasks. You don’t own a local phone because they make them better and cheaper in China, which is a very long way from where you are. Exactly the same applies to our food. Illinois, Iowa, Michigan, Indiana – the entire US corn belt – grows so much of it because it has the right climate and the right soil to do so. Bemoaning industrial-scale agriculture in America on principle is about as sensible as criticizing China for making all those mobile phones. Which you wouldn’t do, because you bloody love your smartphone, don’t you, you dirty little digital warrior? And that sound is the penny suddenly dropping. Yes, you are absolutely right: this argument is going to kick ten tons of crap out of the local food movement. Have patience. We’ll get there.
”
”
Jay Rayner (A Greedy Man in a Hungry World: How (almost) everything you thought you knew about food is wrong)
“
Transistors enable logic gates; logic gates enable flip-flops; and flip-flops enable many mathematical, storage, and retrieval functions in digital computing.
”
”
Charles Platt (Encyclopedia of Electronic Components Volume 2: LEDs, LCDs, Audio, Thyristors, Digital Logic, and Amplification)
“
division of labor within the intelligence community, especially between the NSA and the CIA. In the old days, this division was clear: if information moved, the NSA would intercept it; if it stood still, the CIA would send a spy to nab it. NSA intercepted electrons whooshing through the air or over phone lines; CIA stole documents sitting on a desk or in a vault. The line had been sharply drawn for decades. But in the digital age, the line grew fuzzy.
”
”
Fred Kaplan (Dark Territory: The Secret History of Cyber War)
“
Perhaps the most famous, if flawed, oracle of the Federal Reserve, former chairman Alan Greenspan, knew that money was something that not only central bankers could create. In a speech in 1996, just as the Cypherpunks were pushing forward with their experiments, Greenspan said that he imagined that the technological revolution could bring back the potential for private money and that it might actually be a good thing: “We could envisage proposals in the near future for issuers of electronic payment obligations, such as stored-value cards or ‘digital cash,’ to set up specialized issuing corporations with strong balance sheets and public credit ratings.
”
”
Nathaniel Popper (Digital Gold: Bitcoin and the Inside Story of the Misfits and Millionaires Trying to Reinvent Money)
“
Marc Goodman is a cyber crime specialist with an impressive résumé. He has worked with the Los Angeles Police Department, Interpol, NATO, and the State Department. He is the chief cyber criminologist at the Cybercrime Research Institute, founder of the Future Crime Institute, and now head of the policy, law, and ethics track at SU. When breaking down this threat, Goodman sees four main categories of concern. The first issue is personal. “In many nations,” he says, “humanity is fully dependent on the Internet. Attacks against banks could destroy all records. Someone’s life savings could vanish in an instant. Hacking into hospitals could cost hundreds of lives if blood types were changed. And there are already 60,000 implantable medical devices connected to the Internet. As the integration of biology and information technology proceeds, pacemakers, cochlear implants, diabetic pumps, and so on, will all become the target of cyber attacks.” Equally alarming are threats against physical infrastructures that are now hooked up to the net and vulnerable to hackers (as was recently demonstrated with Iran’s Stuxnet incident), among them bridges, tunnels, air traffic control, and energy pipelines. We are heavily dependent on these systems, but Goodman feels that the technology being employed to manage them is no longer up to date, and the entire network is riddled with security threats. Robots are the next issue. In the not-too-distant future, these machines will be both commonplace and connected to the Internet. They will have superior strength and speed and may even be armed (as is the case with today’s military robots). But their Internet connection makes them vulnerable to attack, and very few security procedures have been implemented to prevent such incidents. Goodman’s last area of concern is that technology is constantly coming between us and reality. “We believe what the computer tells us,” says Goodman. “We read our email through computer screens; we speak to friends and family on Facebook; doctors administer medicines based upon what a computer tells them the medical lab results are; traffic tickets are issued based upon what cameras tell us a license plate says; we pay for items at stores based upon a total provided by a computer; we elect governments as a result of electronic voting systems. But the problem with all this intermediated life is that it can be spoofed. It’s really easy to falsify what is seen on our computer screens. The more we disconnect from the physical and drive toward the digital, the more we lose the ability to tell the real from the fake. Ultimately, bad actors (whether criminals, terrorists, or rogue governments) will have the ability to exploit this trust.
”
”
Peter H. Diamandis (Abundance: The Future is Better Than You Think)
“
The way PayPal started was that it was a security and risk company that stumbled onto payments, which were really in need of development as the Internet was starting to grow. It was to find safe ways of facilitating payments between people who were buyers and sellers who couldn’t interact in person or were interacting online. What you had at the time, as the Internet boom started, was all these businesses that were forming and selling online, and they didn’t have any physical assets—they only had digital assets. If you had a small business that had just started a website, looking to sell something on eBay, for example, and you went to the bank and said, “Could you underwrite me, and allow me to accept electronic payments?,” there was simply no way that these financial institutions
”
”
Brett King (Breaking Banks: The Innovators, Rogues, and Strategists Rebooting Banking)
“
Doctors and researchers, from local emergency rooms to the Centers for Disease Control (CDC), link the growing use of handheld electronic devices to an alarming increase in injuries to children, especially when parents or caregivers are distracted and fail to properly supervise young children in the moment. The Wall Street Journal, in a roundup of research and interviews with experts on the subject, noted that injuries to children under age five rose 12 percent between 2007 and 2010, after falling for much of the prior decade, according to the most recent data from the CDC.
”
”
Catherine Steiner-Adair (The Big Disconnect: Protecting Childhood and Family Relationships in the Digital Age)
“
He’d decided, abruptly, that electronic interaction was toxic, that it downgraded the significance of real human connection, that it resulted in what he called a “digital tapestry of unanswered prayers.
”
”
James Han Mattson (The Lost Prayers of Ricky Graves)