File System Quotes

We've searched our database for all the quotes and captions related to File System. Here they are! All 199 of them:

Of course Evil's afoot. If it had switched to the metric system it'd be up to a meter by now.
Jim Butcher
I wouldn't burden any decent system of faith by participating in it... I'm not agnostic. Just nonpartisan. Theological Switzerland, that's me.
Jim Butcher (Death Masks (The Dresden Files, #5))
There was a sound like a human yawn, and then the skull turned slightly toward me and asked, "What's up, boss?" "Evil's afoot." "Well, sure," Bob said, "because it refuses to learn the metric system. Otherwise it'd be up to a meter by now.
Jim Butcher (White Night (The Dresden Files, #9))
Idiots emit bogons, causing machinery to malfunction in their presence. System administrators absorb bogons, letting machinery work again.
Charles Stross (The Atrocity Archives (Laundry Files, #1))
Randy Pausch on time management: Here's what I know: Time must be explicitly managed, like money. You can always change your plan, but only if you have one. Ask yourself: Are you spending your time on the right things? Develop a good filing system. Rethink the telephone. Delegate. Take a time out. Time is all you have. And you may find one day that you have less than you think.
Randy Pausch (The Last Lecture)
No, they're contemporary witch hunters, based in Russia." The crease deepened. "Hold on a moment. They sound like assholes?" I blinked, uncertain I'd heard him correctly. "I beg your pardon?" Jesus grimaced and pointed at his head. "It's this tiny human brain-I have to have a filing system for all this information or I can't keep track of it all. It sounds like these guys would be filed under Assholes Who Do Evil Shit in My Name." "Jesus. I mean, wow. That's the name of one of your files?" "One of my largest, unfortunately.
Kevin Hearne (Hammered (The Iron Druid Chronicles, #3))
Pain is subtle. He has cold grey fingers. His voice is horse from crying & screaming... When people try to avoid him, he follows them silently & turns upas the bartender, or the bus driver... Pain has an elaborate filing system for keeping track of everyone... Pain respects people who are willing to take risks. If you... face him directly, he will give you a special ointment so your wounds don't fester.
J. Ruth Gendler (The Book of Qualities)
This wasn’t the way it was supposed to be. I never wanted this. And like you said, I made promises. You remember, Hanna?”  She blinks then. Eyes shining a touch too bright as she whispers, “…I remember.” ...  The wormhole and the Kerenza system waiting beyond it.  “That’s where you’ll find them. Just through there.
Amie Kaufman (Gemina (The Illuminae Files, #2))
The look he shot her was incredulous in the extreme. "You have a filing system for your shoes?
Norah Wilson (Guarding Suzannah (Serve and Protect, #1))
Some people, I am told, have memories like computers, nothing to do but punch the button and wait for the print-out. Mine is more like a Japanese library of the old style, without a card file or an indexing system or any systematic shelf plan. Nobody knows where anything is except the old geezer in felt slippers who has been shuffling up and down those stacks for sixty-nine years. When you hand him a problem he doesn't come back with a cartful and dump it before you, a jackpot of instant retrieval. He finds one thing, which reminds him of another, which leads him off to the annex, which directs him to the east wing, which sends him back two tiers from where he started. Bit by bit he finds you what you want, but like his boss who seems to be under pressure to examine his life, he takes his time.
Wallace Stegner (The Spectator Bird)
Now here's the heavy irony. So I went back to New York to become a librarian. To actually seek out this thing I've been fleeing all my life. and (here it comes): a librarian is just not that easy to become...Apparently there's a whole filing system and annotating system and stamping system and God knows what you have to learn before you qualify.
Elaine Dundy (The Dud Avocado)
I have never seen a more sublime demonstration of the totalitarian mind, a mind which might be linked unto a system of gears where teeth have been filed off at random. Such snaggle-toothed thought machine, driven by a standard or even by a substandard libido, whirls with the jerky, noisy, gaudy pointlessness of a cuckoo clock in Hell. The boss G-man concluded wrongly that there were no teeth on the gears in the mind of Jones. 'You're completely crazy,' he said. Jones wasn't completely crazy. The dismaying thing about classic totalitarian mind is that any given gear, thought mutilated, will have at its circumference unbroken sequences of teeth that are immaculately maintained, that are exquisitely machined. Hence the cuckoo clock in Hell - keeping perfect time for eight minutes and twenty-three seconds, jumping ahead fourteen minutes, keeping perfect time for six seconds, jumping ahead two seconds, keeping perfect time for two hours and one second, then jumping ahead a year. The missing teeth, of course, are simple, obvious truths, truths available and comprehensible even to ten-year-olds, in most cases. The wilful filling off a gear teeth, the wilful doing without certain obvious pieces of information - That was how a household as contradictory as one composed of Jones, Father Keeley, Vice-Bundesfuehrer Krapptauer, and the Black Fuehrer could exist in relative harmony - That was how my father-in-law could contain in one mind an indifference toward slave women and love fora a blue vase - That was how Rudolf Hess, Commandant of Auschwitz, could alternate over the loudspeakers of Auschwitz great music and calls for corpse-carriers - That was how Nazi Germany sense no important difference between civilization and hydrophobia - That is the closest I can come to explaining the legions, the nations of lunatics I've seen in my time.
Kurt Vonnegut Jr. (Mother Night)
Writers often have the cleanest windows, floors, fridges and toilets, the most up-to-date filing system or the best record for returning calls or e-mails because, in the moment, just about any task seems more palatable than sitting down to write.” (p.136)
Mark David Gerson (The Voice of the Muse: Answering the Call to Write)
Mort drove one of those little hybrid cars that, when not running on gasoline, was fueled by idealism. It was made out of crepe paper and duct tape and boasted a computer system that looked like it could have run the NYSE and NORAD, with enough attention left over to play tic-tac-toe. Or possibly Global Thermonuclear War.
Jim Butcher (Ghost Story (The Dresden Files, #13))
The librarian was explaining the benefits of the Dewey decimal system to her junior--benefits that extended to every area of life. It was orderly, like the universe. It had logic. It was dependable. Using it allowed a kind of moral uplift, as one's own chaos was also brought under control. 'Whenever I am troubled,' said the librarian, 'I think about the Dewey decimal system.' 'Then what happens?' asked the junior, rather overawed. 'Then I understand that trouble is just something that has been filed in the wrong place. That is what Jung was explaining of course--as the chaos of our unconscious contents strive to find their rightful place in the index of consciousness.
Jeanette Winterson (Why Be Happy When You Could Be Normal?)
Sarin in Dearborn? Are you shitting me? Jack pounded his desk; his morning coffee spilled all over the burglary file he had been studying.
Mark M. Bello (Betrayal In Blue (Zachary Blake Legal Thriller, #3))
That --ing zombie is going to end up on the end of a couple of --ing handy and versatile kebab skewers,' said Mr Tulip. 'An' then I'm gonna put an edge on this --ing spatula. An' then... then I'm gonna get medieval on his arse.' There were more pressing problems, but this one intrigued Mr Pin. 'How, exactly?' he said. 'I thought maybe a maypole,' said Mr Tulip reflectively. 'An' then a display of country dancing, land tillage under the three-filed system, several plagues and, if my --ing hand ain't too tired, the invention of the --ing horse collar.
Terry Pratchett (The Truth: Stage Adaptation)
There’s this tendency for people to see any fight against the system as a fight for progress. As if the people before them couldn’t possibly have gotten anything right. If you’re using bombs instead of words, that means you’re banking on people giving you what you want out of fear instead of reason. That’s never a good sign.
Sylvain Neuvel (Only Human (Themis Files, #3))
Proper storage is about creating a home for something so that minimal effort is required to find it and put it away.
Geralin Thomas (Decluttering Your Home: Tips, Techniques and Trade Secrets)
People are compliant because they don't expect the system to be fair.
Sylvain Neuvel (Only Human (Themis Files, #3))
Her real passion in life was the perfection of a filing system beside which all other filing systems should sink into oblivion. She dreamed of such a system at night.
Agatha Christie (How Does Your Garden Grow?: a Hercule Poirot Short Story (Hercule Poirot, #SS-31))
Evil’s afoot.” “Well, sure,” Bob said, “because it refuses to learn the metric system. Otherwise it’d be up to a meter by now.
Jim Butcher (White Night (The Dresden Files, #9))
It's easier to invade a small country than to file a court document.
Melody A. Kramer (Why Lawyers Suck! Hacking the Legal System, Part 1)
They're saying the system is rigged against them. I'm saying they're not even a part of it, not in a meaningful sense anyway. They've been sold an illusion of democracy. And they bought it! They really bought it. They don't want to get rid of the system. They're asking for more representation in it. They don't even realize that the whole thing is built to keep them out.
Sylvain Neuvel (Only Human (Themis Files, #3))
We conquer the Independence Day aliens by having a Macintosh laptop computer upload a software virus to the mothership (which happens to be one-fifth the mass of the Moon), thus disarming its protective force field. I don’t know about you, but back in 1996 I had trouble just uploading files to other computers within my own department, especially when the operating systems were different. There is only one solution: the entire defense system for the alien mothership must have been powered by the same release of Apple Computer’s system software as the laptop computer that delivered the virus.
Neil deGrasse Tyson (Space Chronicles: Facing the Ultimate Frontier)
They may have used alien technology in these things,” she said. “But the software they installed to run it all was clearly created by humans—overworked, underpaid programmers like me who take all kinds of shortcuts. The security protocols on the file-sharing system are a total joke. It only took me about five minutes to jailbreak this thing.
Ernest Cline (Armada)
The sorting we do to ourselves and to one another is at best, unintentional and reflexive; at worst, it's stereotyping that dehumanizes. The paradox is that we all love the ready made filing system. It's so handy when we want to quickly characterize people. But, yet we resent it when we're the ones getting filed away.
Brené Brown (Braving the Wilderness: The Quest for True Belonging and the Courage to Stand Alone)
Graydon: “Where are those files you wanted me to look at? I can never figure out the new system on the shared drive, and you promised you’d show me. Call me back when you can.” No, son. You can figure it out on your own. I have faith in you.
Thea Harrison (Serpent's Kiss (Elder Races, #3))
The important question isn't how to keep bad physicians from harming patient; it's how to keep good physicians from harming patients. Medical malpractice suits are a remarkably ineffective remedy. (In reference to a Harvard Medical Practice Study)... fewer than 2 percent of the patients who had received substandard care ever filed suit. Conversely, only a small minority among patients who did sue had in fact been victims of negligent care. And a patient's likelihood of winning a suit depended primarily on how poor his or her outcome was, regardless of whether that outcome was caused by disease or unavoidable risks of care. The deeper problem with medical malpractice is that by demonizing errors they prevent doctors from acknowledging & discussing them publicly. The tort system makes adversaries of patient & physician, and pushes each other to offer a heavily slanted version of events.
Atul Gawande (Complications: A Surgeon's Notes on an Imperfect Science)
Note to self: When causing the sewer system of Manhattan to explode, do not stand underneath it.-
Rick Riordan (The Demigod Files (Percy Jackson and the Olympians))
Not all roots are buried down in the ground, some are at the top of a tree.
Jinvirle
I'm like a computer with its hard drive wiped clean. You can reboot it and the operating system works fine. But when you look for a document or file to open, nothing's there.
Gordon Korman (Restart)
The Google File System
Martin Kleppmann (Designing Data-Intensive Applications: The Big Ideas Behind Reliable, Scalable, and Maintainable Systems)
When I first learned about the Dewey decimal system, I assumed it was an impartial way of defining and filing the breadth of knowable information. I came to understand that the intention of the filer and the perspective that they carry play a huge role in how Dewey, and any other system, is employed.
R. Eric Thomas (Here for It; Or, How to Save Your Soul in America: Essays)
You’re just mad because I came up with a better filing system for your books than you could,” said Sumi, sounding unruffled. “Anyway, you didn’t mean it. I am the sunshine in your sky, and you’d miss me if I was gone.
Seanan McGuire (Every Heart a Doorway (Wayward Children, #1))
What meaning our lives may seem to have is the work of a relatively well-constituted emotional system. As consciousness gives us the sense of being persons, our psychophysiology is responsible for making us into personalities who believe the existential game to be worth playing. We may have memories that are unlike those of anyone else, but without the proper emotions to liven those memories they might as well reside in a computer file as disconnected bits of data that never unite into a tailor-made individual for whom things seem to mean something. You can conceptualize that your life has meaning, but if you do not feel that meaning then your conceptualization is meaningless and you are nobody. The only matters of weight in our lives are colored by rainbows or auroras of regulated emotion which give one a sense of that “old self.” But a major depression causes your emotions to evaporate, reducing you to a shell of a person standing alone in a drab landscape. Emotions are the substrate for the illusion of being a somebody among somebodies as well as for the substance we see, or think we see, in the world. Not knowing this ground-level truth of human existence is the equivalent of knowing nothing at all.
Thomas Ligotti (The Conspiracy Against the Human Race: A Contrivance of Horror)
What meaning our lives seem to have is the work of a relatively well-constituted emotional system. As consciousness gives us the sense of being persons, our psychophysiology is responsible for making us into personalities who believe the existential game to be worth playing. We may have memories that are unlike those of anyone else, but without the proper emotions to liven those memories they might as well reside in a computer file as disconnected bits of data that never unite into a tailor-made individual for whom things seem to mean something. You can conceptualize that your life has meaning, but if you do not feel that meaning then your conceptualization is meaningless and you are nobody.
Thomas Ligotti (The Conspiracy Against the Human Race)
Here's what I think: when you're born, you're assigned a brain like you're assigned a desk, a nice desk, with plenty of pigeonholes and drawers and secret compartments. At the start, it's empty, and then you spend your life filling it up. You're the only one who understands the filing system, you amass some clutter, sure, but somehow it works: you're asked the capital of Oregon, and you say Salem; you want to remember your first-grade teacher's name, and there it is, Miss Fox. Then suddenly you're old, and though everything's still in your brain, it's crammed so tight that when you try to remember the name of the guy who does the upkeep on your lawn, your first childhood crush comes fluttering out, or the persistent smell of tomato soup in a certain Des Moines neighborhood.
Elizabeth McCracken (Niagara Falls All Over Again)
Part of what impelled him was stubbornness; resentment, even. The system had filed him among the rejects, and what he was studying was considered—at the decision-making levels, the levels of real power—an archaic waste of time. Well then, he would pursue the superfluous as an end in itself. He would be its champion, its defender and preserver. Who was it who’d said that all art was completely useless? Jimmy couldn’t recall, but hooray for him, whoever he was. The more obsolete a book was, the more eagerly Jimmy would add it to his inner collection.
Margaret Atwood (Oryx and Crake (MaddAddam, #1))
I'm as vulnerable as anybody to the toxicity of the American nuclear family. But I wouldn't call it disease or moral failure as much as I would point the finger at a system that grinds people down like a metal file. Who doesn't need a drink? Who isn't going to crack and lash out at the people they love?
Susie Bright (Big Sex Little Death: A Memoir)
Research from Microsoft shows that the average US employee spends 76 hours per year looking for misplaced notes, items, or files.3 And a report from the International Data Corporation found that 26 percent of a typical knowledge worker’s day is spent looking for and consolidating information spread across a variety of systems.4 Incredibly, only 56 percent of the time are they able to find the information required to do their jobs. In other words, we go to work five days per week, but spend more than one of those days on average just looking for the information we need to do our work. Half the time, we don’t even succeed in doing that.
Tiago Forte (Building a Second Brain: A Proven Method to Organize Your Digital Life and Unlock Your Creative Potential)
Mort drove one of those little hybrid cars that, when not running on gasoline, was fueled by idealism. It was made out of crepe paper and duct tape and boasted a computer system that looked like it could have run the NYSE and NORAD, with enough attention left over to play tic-tac-toe. Or possibly Global Thermonuclear War.
Jim Butcher (Ghost Story (The Dresden Files, #13))
By 2005, Monsanto had filed ninety lawsuits against U.S. farmers for patent infringement, meaning GM genes found in the fields of farmers that had not paid for the right, and Monsanto had been awarded over $15 million. I’ll tell you here and now: We have a screwed-up justice system. These lawsuits and seeds are nothing less than corporate extortion of American farmers, said Andrew Kimbrell, director of the Center for Food Safety, as reported in the Seed Savers Summer Edition 2005.
Janisse Ray (The Seed Underground: A Growing Revolution to Save Food)
Harper’s brow furrowed. “Why are you even asking me questions? I know you did your research on me.” “I did,” he admitted unrepentantly. “I learned a lot about you. For instance, I learned that you’re responsible for the breakdown of an ex-boyfriend’s bank account—” “Allegedly.” “—that you hacked a human police database and messed up their filing system when your friend was unjustly arrested—” “Hearsay.” “—that you beat up a male demon who hurt your cousin—” “I have an alibi for that.” “—and that you infected an old teacher’s computer with a virus that caused clips of gay porn to pop up on his screen every thirty seconds.” “Closet gays do the strangest things when the pressure gets too much.
Suzanne Wright (Burn (Dark in You, #1))
You don’t get to tell me I’m doing it the wrong way when it’s your damn filing system that’s wrong.
Kathryn Ormsbee (Lucky Few)
Genealogy is the study of the dead---but it's not a dead study!!!
Paul Hackley (Untangled Roots: Family History Filing System)
the perfection of a filing system beside which all other filing systems should sink into oblivion. She dreamed of such a system at night.
Agatha Christie (Hercule Poirot: The Complete Short Stories)
60 percent of the nearly one million personal bankruptcies filed in the United States last year resulted from medical bills.
Steven Brill (America's Bitter Pill: Money, Politics, Backroom Deals, and the Fight to Fix Our Broken Healthcare System)
As a result, we receive panicked calls from police chiefs, government ministers, members of the aristocracy, military officers, councillors, intelligence agents, churchmen, surgeons, diplomats, hospital administrators, etc. We also have people placed in key organizations who keep us abreast of significant developments. Still, despite all these connections, we maintain our secrecy. Our name does not appear on any piece of paper outside of our organization. In fact, very few on the outside know that we exist. People are given a phone number to call, and information comes to us through twisty channels. Our computer network is not connected to any external system. If you try to track us down, you will not find us, but we will find you.
Daniel O'Malley (The Rook (The Checquy Files, #1))
To understand this first event, you need to know that we rely on Unix and Linux machines to store the thousands of computer files that comprise all the shots of any given film. And on those machines, there is a command—/bin/rm -r -f *—that removes everything on the file system as fast as it can. Hearing that, you can probably anticipate what’s coming: Somehow, by accident, someone used this command on the drives where the Toy Story 2 files were kept. Not just some of the files, either. All of the data that made up the pictures, from objects to backgrounds, from lighting to shading, was dumped out of the system. First, Woody’s hat disappeared. Then his boots. Then he disappeared entirely. One by one, the other characters began to vanish, too: Buzz, Mr. Potato Head, Hamm, Rex. Whole sequences—poof!—were deleted from the drive. Oren
Ed Catmull (Creativity, Inc.: Overcoming the Unseen Forces That Stand in the Way of True Inspiration)
Within the fair’s buildings visitors encountered devices and concepts new to them and to the world. They heard live music played by an orchestra in New York and transmitted to the fair by long-distance telephone. They saw the first moving pictures on Edison’s Kinetoscope, and they watched, stunned, as lightning chattered from Nikola Tesla’s body. They saw even more ungodly things—the first zipper; the first-ever all-electric kitchen, which included an automatic dishwasher; and a box purporting to contain everything a cook would need to make pancakes, under the brand name Aunt Jemima’s. They sampled a new, oddly flavored gum called Juicy Fruit, and caramel-coated popcorn called Cracker Jack. A new cereal, Shredded Wheat, seemed unlikely to succeed—“shredded doormat,” some called it—but a new beer did well, winning the exposition’s top beer award. Forever afterward, its brewer called it Pabst Blue Ribbon. Visitors also encountered the latest and arguably most important organizational invention of the century, the vertical file, created by Melvil Dewey, inventor of the Dewey Decimal System. Sprinkled among these exhibits were novelties of all kinds. A locomotive made of spooled silk. A suspension bridge built out of Kirk’s Soap. A giant map of the United States made of pickles. Prune makers sent along a full-scale knight on horseback sculpted out of prunes, and the Avery Salt Mines of Louisiana displayed a copy of the Statue of Liberty carved from a block of salt. Visitors dubbed it “Lot’s Wife.
Erik Larson (The Devil in the White City)
[I]f he had to guess, he would say that the reason he doesn't want to loan the book out, to Ethan or anyone else, is because of the part of his personality that is one gigantic record-keeping system, a complex sifting and filing scheme that dictates what goes here and what goes there, turning his life into so many marks on a tablet. His mind would busy itself with the book's whereabouts every second it was away. He knows it would.
Kevin Brockmeier (A Few Seconds of Radiant Filmstrip: A Memoir of Seventh Grade)
..I began speaking.. First, I took issue with the media's characterization of the post-Katrina New Orleans as resembling the third world as its poor citizens clamored for a way out. I suggested that my experience in New Orleans working with the city's poorest people in the years before the storm had reflected the reality of third-world conditions in New Orleans, and that Katrina had not turned New Orleans into a third-world city but had only revealed it to the world as such. I explained that my work, running Reprieve, a charity that brought lawyers and volunteers to the Deep South from abroad to work on death penalty issues, had made it clear to me that much of the world had perceived this third-world reality, even if it was unnoticed by our own citizens. To try answer Ryan's question, I attempted to use my own experience to explain that for many people in New Orleans, and in poor communities across the country, the government was merely an antagonist, a terrible landlord, a jailer, and a prosecutor. As a lawyer assigned to indigent people under sentence of death and paid with tax dollars, I explained the difficulty of working with clients who stand to be executed and who are provided my services by the state, not because they deserve them, but because the Constitution requires that certain appeals to be filed before these people can be killed. The state is providing my clients with my assistance, maybe the first real assistance they have ever received from the state, so that the state can kill them. I explained my view that the country had grown complacent before Hurricane Katrina, believing that the civil rights struggle had been fought and won, as though having a national holiday for Martin Luther King, or an annual march by politicians over the bridge in Selma, Alabama, or a prosecution - forty years too late - of Edgar Ray Killen for the murder of civil rights workers in Philadelphia, Mississippi, were any more than gestures. Even though President Bush celebrates his birthday, wouldn't Dr. King cry if he could see how little things have changed since his death? If politicians or journalists went to Selma any other day of the year, they would see that it is a crumbling city suffering from all of the woes of the era before civil rights were won as well as new woes that have come about since. And does anyone really think that the Mississippi criminal justice system could possibly be a vessel of social change when it incarcerates a greater percentage of its population than almost any place in the world, other than Louisiana and Texas, and then compels these prisoners, most of whom are black, to work prison farms that their ancestors worked as chattel of other men? ... I hoped, out loud, that the post-Katrina experience could be a similar moment [to the Triangle Shirtwaist factory fiasco], in which the American people could act like the children in the story and declare that the emperor has no clothes, and hasn't for a long time. That, in light of Katrina, we could be visionary and bold about what people deserve. We could say straight out that there are people in this country who are racist, that minorities are still not getting a fair shake, and that Republican policies heartlessly disregard the needs of individual citizens and betray the common good. As I stood there, exhausted, in front of the thinning audience of New Yorkers, it seemed possible that New Orleans's destruction and the suffering of its citizens hadn't been in vain.
Billy Sothern (Down in New Orleans: Reflections from a Drowned City)
Explaining his filing system to capo George Zappola, Casso noted that he catalogued top-notch car thieves under the letter C. Gaspipe’s sharp wit deflated Zappola when he asked for his classification. “Under U for useless.
Selwyn Raab (Five Families: The Rise, Decline, and Resurgence of America's Most Powerful Mafia Empires)
You build a revolution on ideas. If the population doesn't buy your ideas, it means they're not ready, or you're wrong. There's this tendency for people to see any fight against the system as a fight for progress. As if the people before them couldn't possibly have gotten anything right. If you're using bombs instead of words, that means you're banking on people giving you what you want out of fear instead of reason. That's never a good sign.
Sylvain Neuvel (Only Human (Themis Files, #3))
A good architecture will allow a system to be born as a monolith, deployed in a single file, but then to grow into a set of independently deployable units, and then all the way to independent services and/or micro-services.
Robert C. Martin (Clean Architecture)
I couldn’t understand why people keep voting for the very people they loathe. They’ll protest a war, but the everyday stuff, small injustices, they just let them slide. Friends making a fortune off government contracts, paying a hundred dollars for a pencil, that type of thing, people complain about it, everyone does, but they won’t do a thing. I remember how floored I was when he told me that was a good thing, how we need a certain level of cynicism for society to function properly. If people thought they had real power to change things, if they truly believed in democracy, everyone would take to the streets, advocate, militate for everything. It happens from time to time. Thirty thousand people will block traffic to march for a cause, but they do it believing that the other side couldn’t possibly feel justified in doing the same thing. What if they did? What if thirty thousand people who believe in one thing marched at the very same time as those who believe in the exact opposite? What if it happened every single day? People who care about other things would also want to be heard. They’d need to scream louder. They’d need their disruption to be more…disruptive. People are compliant because they don’t expect the system to be fair. If they did, if they thought that was even possible, we’d live in chaos, anarchy. We need apathy, he said, or we’ll end up killing each other on the streets.
Sylvain Neuvel (Only Human (Themis Files, #3))
The Guardian’s Jonathan Freedland observes that Britain ‘has a fundamentally different conception of power to, say, the United States’. It doesn’t have a Bill of Rights or a written constitution, or the American idea that ‘we the people’ are sovereign. Rather, the British system still bears the ‘imprint of its origins in monarchy’, with power emanating from the top and flowing downwards. Britons remain subjects rather than citizens. Hence their lack of response towards government intrusion.
Luke Harding (The Snowden Files: The Inside Story of the World's Most Wanted Man)
In a mass society where obtaining credit is as easy as it is, there’s probably no way to efficiently collect on delinquent accounts by writing real affidavits, filing legitimate, error-free lawsuits, and serving legitimate summonses in each and every individual case. Without the shortcuts, it doesn’t work. So techniques like robo-signing and sewer service are essential to the profitability of the business. Plenty of people—consumers and merchants both—are probably glad that so much credit is available, but they don’t realize that systematic fraud is part of what makes it available. Legally, there’s absolutely no difference between a woman on welfare who falsely declares that her boyfriend no longer lives in the home and a bank that uses a robo-signer to cook up a document swearing that he has kept regular records of your credit card account. But morally and politically, they’re worlds apart. When the state brings a fraud case against a welfare mom, it brings it with disgust, with rage, because in addition to committing the legal crime, she’s committed the political crime of being needy and an eyesore. Banks commit the legal crime of fraud wholesale; they do so out in the open, have entire departments committed to it, and have employees who’ve spent years literally doing nothing but commit, over and over again, the same legal crime that some welfare mothers go to jail for doing once. But they’re not charged, because there’s no political crime. The system is not disgusted by the organized, mechanized search for profit. It’s more like it’s impressed by it.
Matt Taibbi (The Divide: American Injustice in the Age of the Wealth Gap)
In those ancient rooms near the center of Belaire all our wisdom originates, born in the gossip's mind as she sits to watch the Filing System or think on the saints. Things come together, and the saint or the System reveals a new thing not thought before to be there, but which once born spirals out like Path along the cords, being changed by them as it goes. As I got older, the stories of the saints which Painted Red told absorbed me more and more; when one day I stayed after everyone else had gone, hoping to hear more, Painted Red said to me: 'Remember, Rush, there's no one who would not rather be happy than be a saint.' I nodded, but I didn't know what she meant. It seemed to me that anyone who was a saint would have to be happy. I wanted to be a saint, though I told no one, and the thought gave me nothing but joy.
John Crowley (Engine Summer)
—so much more opportunity now." Her voice trails off. "Hurrah for women's lib, eh?" "The lib?" Impatiently she leans forward and tugs the serape straight. "Oh, that's doomed." The apocalyptic word jars my attention. "What do you mean, doomed?" She glances at me as if I weren't hanging straight either and says vaguely, "Oh …" "Come on, why doomed? Didn't they get that equal rights bill?" Long hesitation. When she speaks again her voice is different. "Women have no rights, Don, except what men allow us. Men are more aggressive and powerful, and they run the world. When the next real crisis upsets them, our so-called rights will vanish like—like that smoke. We'll be back where we always were: property. And whatever has gone wrong will be blamed on our freedom, like the fall of Rome was. You'll see." Now all this is delivered in a gray tone of total conviction. The last time I heard that tone, the speaker was explaining why he had to keep his file drawers full of dead pigeons. "Oh, come on. You and your friends are the backbone of the system; if you quit, the country would come to a screeching halt before lunch." No answering smile. "That's fantasy." Her voice is still quiet. "Women don't work that way. We're a—a toothless world." She looks around as if she wanted to stop talking. "What women do is survive. We live by ones and twos in the chinks of your world-machine." "Sounds like a guerrilla operation." I'm not really joking, here in the 'gator den. In fact, I'm wondering if I spent too much thought on mahogany logs. "Guerrillas have something to hope for." Suddenly she switches on a jolly smile. "Think of us as opossums, Don. Did you know there are opossums living all over? Even in New York City." I smile back with my neck prickling. I thought I was the paranoid one. "Men and women aren't different species, Ruth. Women do everything men do." "Do they?" Our eyes meet, but she seems to be seeing ghosts between us in the rain. She mutters something that could be "My Lai" and looks away. "All the endless wars …" Her voice is a whisper. "All the huge authoritarian organizations for doing unreal things. Men live to struggle against each other; we're just part of the battlefield. It'll never change unless you change the whole world. I dream sometimes of—of going away—" She checks and abruptly changes voice. "Forgive me, Don, it's so stupid saying all this." "Men hate wars too, Ruth," I say as gently as I can. "I know." She shrugs and climbs to her feet. "But that's your problem, isn't it?" End of communication. Mrs. Ruth Parsons isn't even living in the same world with me.
James Tiptree Jr.
Didn’t they know that the only unhackable computer is one that’s running a secure operating system, welded inside a steel safe, buried under a ton of concrete at the bottom of a coal mine guarded by the SAS and a couple of armoured divisions, and switched off? What did they think they were doing?
Charles Stross (The Atrocity Archives (Laundry Files, #1))
The sorting we do to ourselves and to one another is, at best, unintentional and reflexive. At worst, it is stereotyping that dehumanizes. The paradox is that we all love the ready-made filing system, so handy when we want to quickly characterize people, but we resent it when we’re the ones getting filed away.
Brené Brown (Braving the Wilderness: The Quest for True Belonging and the Courage to Stand Alone)
To increase density in a rat population and maintain healthy specimens, put them in boxes so they can't see each other, clean their cages, and give them enough to eat. You can pile the boxes up as many stories as you wish. Unfortunately, caged animals become stupid, which is a very heavy price to pay for a super filing system!
Edward T. Hall (The Hidden Dimension)
I have completed and uncompleted screenplays, but they both fall into the category of “unsold.” I’ve seen quite a few movies where the screenplays seemed to be in the “uncompleted” category yet still got sold and made into movies, so I generally refer too all screenplays as “sold” or “unsold.” But that’s just my own filing system.
Gary Reilly (Ticket To Hollywood (Asphalt Warrior, #2))
Over the years, completely out of channels, a classification system for cases had grown up among sector-level inspectors. The Ministry often sent down memos warning against the use of this unsanctioned system, only reinforcing suspicions that it was pretty close to accurate. Category one cases were simple enough - those we were expected to investigate and, where possible, solve. Category two cases were those we were expected to be seen as investigating but not to solve. Category three cases were those we were to avoid - leave every stone unturned. In fact, for a category three case, it was best not even to record that there were any stones. No records, no files, no nothing.
James Church (Hidden Moon (Inspector O, #2))
Gator lifted the needle and dabbed at the decorated flesh, frowning. The cases on the Mimosa generally had terrible skin, but they were docile enough to make a good filing system, considering you could usually find them where you left them – they didn’t move around much on their own, and unlike other kinds of hardcopy, they seldom got stolen.
Pat Cadigan
In order to function, the people who operate such a system of drawers must be reprogrammed to stop thinking as humans and to start thinking as clerks and accountants. As everyone from ancient times till today knows, clerks and accountants think in a non-human fashion. They think like filing cabinets. This is not their fault. If they don’t think that way their drawers will all get mixed up and they won’t be able to provide the services their government, company or organisation requires. The most important impact of script on human history is precisely this: it has gradually changed the way humans think and view the world. Free association and holistic thought have given way to compartmentalisation and bureaucracy.
Yuval Noah Harari (Sapiens: A Brief History of Humankind)
This wasn’t the only mistake they made. They also botched the cleanup operation on the servers they could access. They had created a script called LogWiper.sh to erase activity logs on the servers to prevent anyone from seeing the actions they had taken on the systems. Once the script finished its job, it was also supposed to erase itself, like an Ouroboros serpent consuming its own tail. But the attackers bungled the delete command inside the script by identifying the script file by the wrong name. Instead of commanding the script to delete LogWiper.sh, they commanded it to delete logging.sh. As a result, the LogWiper script couldn’t find itself and got left behind on servers for Kaspersky to find. Also left behind by the attackers were the names or nicknames of the programmers who had written the scripts and developed the encryption algorithms and other infrastructure used by Flame. The names appeared in the source code for some of the tools they developed. It was the kind of mistake inexperienced hackers would make, so the researchers were surprised to see it in a nation-state operation. One, named Hikaru, appeared to be the team leader who created a lot of the server code,
Kim Zetter (Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon)
they’ve taught them that the police are responsible for their safety. That’s a bigger lie than the welfare system. In the best of times, all a police officer can do is come file a report after the crime has already been committed. Sometimes they can catch the guy who did it, but even if they do, the damage is already done. I hope folks have figured out that they’re responsible for their own security.
Mark Goodwin (American Meltdown (The Economic Collapse, #2))
/1404er/ was born from video. His way into the threads. His eyes translating light from a stream. Before his eyes translated light from a stream he was only a person. Before the stream was a stream, it was a file. AVCHD, and prior to that just light reflected and refracted through systems of lenses. A copy of a living thing. Three living things and a fourth, all massed of matter and invisible crackle.
B.R. Yeager (Amygdalatropolis)
So what are people actually referring to when they talk about "deregulation"? In ordinary usage, the word seems to mean "changing the regulatory structure in a way that I like." In practice this can refer to almost anything. In the case of airlines or telecommunications in the seventies and eighties, it meant changing the system of regulation from one that encouraged a few large firms to one that fostered carefully supervised competition between midsize firms. In the case of banking, "deregulation" has usually meant exactly the opposite: moving away from a situation of managed competition between mid-sized firms to one where a handful of financial conglomerates are allowed to completely dominate the market. This is what makes the term so handy. Simply by labeling a new regulatory measure "deregulation," you can frame it in the public mind as a way to reduce bureaucracy and set individual initiative free, even if the result is a fivefold increase in the actual number of forms to be filled in, reports to be filed, rules and regulations for lawyers to interpret, and officious people in offices whose entire job seems to be to provide convoluted explanations for why you're not allowed to do things. (p. 17)
David Graeber (The Utopia of Rules: On Technology, Stupidity, and the Secret Joys of Bureaucracy)
I have stored these memories the way any child stores memory--a haphazard collection of sharp, bright objects socked away on the darkest shelves in the dustiest corners of our mental filing systems. They stay there, those memories, rattling in the dark. Scratching at the walls. Disrupting our careful ordering of what we think is true. And injuring us when we forget how dangerous they are, and we grasp too hard.
Kelly Barnhill (When Women Were Dragons)
According to the Department of Justice’s investigation of the Missoula County Attorney’s Office, from January 2008 through April 2012 the Missoula Police Department referred 114 reports of sexual assault of adult women to the MCAO for prosecution. A “referral” indicated that the police department had completed its investigation of the case in question, determined that there was probable cause to charge the individual accused of sexual assault, and recommended that the case be prosecuted. Of the 114 sexual assaults referred for prosecution, however, the MCAO filed charges in only 14 of those cases. The reasons most often given for declining to prosecute were “insufficient evidence” or “insufficient corroboration”—that is, lack of probable cause. Kirsten Pabst was in charge of sexual assault cases for all but the final two months of the fifty-two-month period investigated by the DOJ.
Jon Krakauer (Missoula: Rape and the Justice System in a College Town)
In a common lesson about electromagnetic forces, students are given an exercise in which a bar magnet is placed on a table surrounded by scattered iron filings. The invisible field surrounding the magnet will draw the filings into alignment with it, until the swirling starburst shape of the field becomes visible. The capital relation is a kind of social magnet, with capital at one end and labor at the other, that tends to align all other social hierarchies with the master hierarchy based on money. Hence the hierarchy of athletic ability is translated into a hierarchy of payment for performing professionally. And yet the magnetism of capital is not so strong that it can perfectly align all the systems. Fame, for example, may in general be translatable into money (as when Kim Kardashian releases a smartphone game that becomes wildly successful), but the conversion is not an exact or uniform one.
Peter Frase (Four Futures: Life After Capitalism)
The Soviets, at least some of them, believed in what they were doing. After all, they did it themselves and recorded what they did, in clear language, in official documents, filed in orderly archives. They could associate themselves with their deeds, because true responsibility rested with the communist party. The Nazis used grand phrases of racial superiority, and Himmler spoke of the moral sublimity involved in killing others for the sake of the race. But when the time came, Germans acted without plans and without precision, and with no sense of responsibility. In the Nazi worldview, what happened was simply what happened, the stronger should win; but nothing was certain, and certainly not the relationship between past, present and future. The Soviets believed that History was on their side and acted accordingly. The Nazis were afraid of everything except the disorder they themselves created. The systems and the mentalities were different, profoundly and interestingly so.
Timothy Snyder (Black Earth: The Holocaust as History and Warning)
As he looked around the computer, he realized the PC was acting as the back-end system for the point-of-sale terminals at the restaurant—it collected the day’s credit card transactions and sent them in a single batch every night to the credit card processor. Max found that day’s batch stored as a plain text file, with the full magstripe of every customer card recorded inside. Even better, the system was still storing all the previous batch files, dating back to when the pizza parlor had installed the system about three years earlier.
Kevin Poulsen (Kingpin: The true story of Max Butler, the master hacker who ran a billion dollar cyber crime network)
Estimates suggest that $7.6 trillion of wealth is hidden in tax havens all over the world. The international finance sector acts as a 'circulation system for criminal money acquired through drug trafficking, terrorism, piracy, human trafficking, proliferation and tax evasion.' When we look at the international financial system, we don't find a free-market paradise. Instead, we find incredibly powerful institutions in both the public and private sector shaping the conditions faced by everyone else. Financial institutions 'dress themselves up in liberal trappings of the market, yet capture the old sovereignty of the state all the better to squeeze the social body to feed their own profits.' Yet all this power is held without any democratic accountability. Politicians, technocrats, and financiers work together to decide everything from the interest rates we pay on our loans to who gets what when a state files for bankruptcy. If everyone had a say in determining how these rules were made and enforced, rather than just a privileged few, we'd live in a very different world.
Grace Blakeley (Vulture Capitalism: Corporate Crimes, Backdoor Bailouts, and the Death of Freedom)
Meanwhile, people are busy using fractals to explain any system that has defied other, more reductionist approaches. Since they were successfully applied by IBM's Benoit Mandlebrot to the problem of seemingly random, intermittent interference on the phone lines, fractals have been used to identify underlying patterns in weather systems, computer files, and bacteria cultures. Sometimes fractal enthusiasts go a bit too far, however, using these nonlinear equations to mine for patterns in systems where none exist. Applied to the stock market to consumer behavior, fractals may tell less about those systems than about the people searching for patterns within them. There is a dual nature to fractals: They orient us while at the same time challenging our sense of scale and appropriateness. They offer us access to the underlying patterns of complex systems while at the same time tempting us to look for patterns where none exist. This makes them a terrific icon for the sort of pattern recognition associated with present shock—a syndrome we'll call factalnoia. Like the robots on Mystery Science Theater 3000, we engage by relating one thing to another, even when the relationship is forced or imagined. The tsunami makes sense once it is connected to chemtrails, which make sense when they are connected to HAARP. It's not just conspiracy theorists drawing fractalnoid connections between things. In a world without time, any and all sense making must occur on the fly. Simultaneity often seems like all we have. That's why anyone contending with present shock will have a propensity to make connections between things happening in the same moment—as if there had to be an underlying logic.
Douglas Rushkoff (Present Shock: When Everything Happens Now)
This page is related to that page. You're reading something constructed using a rhetorical practice, something informed both directly and indirectly by the entire history of composition up until this point, from the Sophists to Derrida. But you're navigating it using pure logical statements, using spans of text or images that, when clicked or selected, get other files and display them on your screen. The text is based in the rhetorical tradition; the links are based in the logical tradition; and somewhere in there is something worth figuring out. ...the entire history of Western pedagogy [is] an oscillation between these two traditions, between the tradition of rhetoric as a means for obtaining power — language as just a collection of interconnected signifiers co-relating, without a grounding in "truth," and the tradition of seeking truth, of searching for a fundamental, logical underpinning for the universe, using ideas like the platonic solids or Boolean logic, or tools like expert systems and particle accelerators ... what is the relationship between narratives and logic? What is sprezzatura for the web? Hell if I know. My way of figuring it all out is to build the system and write inside it, because I'm too dense to work out theories.
Paul Ford
More raiders came down the stairs prodding the Reverend Dr. Lionel J. D. Jones, the Black Fuehrer, and Father Keeley before them. Dr. Jones stopped halfway down the stairs, confronted his tormentors. 'All I've done, 'he said majestically, 'is do what you people should be doing.' 'What should we be doing?' said a G-man. He was obviously in command of the raid. 'Protecting the Republic,' said Jones. 'Why bother us? Everything we do is to make the country stronger! Join with us, and let's go after the people who are trying to make it weaker!' 'Who's that?' said the G-man. 'I have to tell you?' said Jones. 'Haven't you even found that in the course of your work? The Jews! The Catholics! The Negroes! The Orientals! The Unitarians! The foreign-born, who don't have any understanding of democracy, who play right into the hands of the socialists, the communists, the anarchists, the anti-Christs and the Jews!' 'For your information,' said the G-man in cool triumph, 'I am a Jew.' 'That proves what I've just been saying!' said Jones. 'How's that?', said the G-man. 'The Jews have infiltrated everything!' said Jones, smiling the smile of a logician who could never be topped. 'You talk about the Catholics and the Negroes-' said the G-man, 'and yet your two best friends are a Catholic and a Negro.' 'What's so mysterious about that?' said Jones. 'Don't you hate them?', said the G-man. 'Certainly not,' said Jones. 'We all believe the same basic thing.' 'What's that?' said the G-man. 'This once-proud country of ours is falling into the hands of wrong people,' said Jones. He nodded, and so did Father Keeley and the Black Fuehrer. 'And, before it gets back on the right track,' said Jones, 'some heads are going to roll.' I have never seen a more sublime demonstration of the totalitarian mind, a mind which might be linked unto a system of gears where teeth have been filed off at random.
Kurt Vonnegut Jr. (Mother Night)
Security is a big and serious deal, but it’s also largely a solved problem. That’s why the average person is quite willing to do their banking online and why nobody is afraid of entering their credit card number on Amazon. At 37signals, we’ve devised a simple security checklist all employees must follow: 1. All computers must use hard drive encryption, like the built-in FileVault feature in Apple’s OS X operating system. This ensures that a lost laptop is merely an inconvenience and an insurance claim, not a company-wide emergency and a scramble to change passwords and worry about what documents might be leaked. 2. Disable automatic login, require a password when waking from sleep, and set the computer to automatically lock after ten inactive minutes. 3. Turn on encryption for all sites you visit, especially critical services like Gmail. These days all sites use something called HTTPS or SSL. Look for the little lock icon in front of the Internet address. (We forced all 37signals products onto SSL a few years back to help with this.) 4. Make sure all smartphones and tablets use lock codes and can be wiped remotely. On the iPhone, you can do this through the “Find iPhone” application. This rule is easily forgotten as we tend to think of these tools as something for the home, but inevitably you’ll check your work email or log into Basecamp using your tablet. A smartphone or tablet needs to be treated with as much respect as your laptop. 5. Use a unique, generated, long-form password for each site you visit, kept by password-managing software, such as 1Password.§ We’re sorry to say, “secretmonkey” is not going to fool anyone. And even if you manage to remember UM6vDjwidQE9C28Z, it’s no good if it’s used on every site and one of them is hacked. (It happens all the time!) 6. Turn on two-factor authentication when using Gmail, so you can’t log in without having access to your cell phone for a login code (this means that someone who gets hold of your login and password also needs to get hold of your phone to login). And keep in mind: if your email security fails, all other online services will fail too, since an intruder can use the “password reset” from any other site to have a new password sent to the email account they now have access to. Creating security protocols and algorithms is the computer equivalent of rocket science, but taking advantage of them isn’t. Take the time to learn the basics and they’ll cease being scary voodoo that you can’t trust. These days, security for your devices is just simple good sense, like putting on your seat belt.
Jason Fried (Remote: Office Not Required)
Our REM sleep in 90-minute bursts, in a 24 hour cycle "digests" trauma that is experienced on a daily basis. In dreaming, the brain compares the trauma with early memory traces of similar experience, and files the memories of the day's events according to an affect-based associative system for further use and potential survival value. Comforting figures may appear in the dream to give care, advice, counsel, and relief, if necessary. The nightly dream process helps the dreamer receive positive resolution of his or her experience, and the dreamer moves on to the next day's activities restored, refreshed, and prepared for survival-based action.
Marion F. Solomon (Healing Trauma: Attachment, Mind, Body and Brain (Norton Series on Interpersonal Neurobiology))
AT THE VOIR dire the judge asks all the potential jurors to swear that even if they regularly watch CSI, Law & Order, Cold Case Files, or any other television show featuring forensic science and criminal justice, that they have a firm grasp on the difference between television—even reality television—and reality itself, in which we are presumably now mired. One potential juror with several small children says that won’t be a problem for her, because she mostly watches the Cartoon Network; the judge quips that an afternoon spent with the Cartoon Network provides as much or more information about the criminal justice system as a full season of Law & Order.
Maggie Nelson (The Red Parts: Autobiography of a Trial)
Rumours crop in the short summer nights. Dawn finds them like mushrooms in the damp grass. Members of Thomas Cromwell's household have been seeking a midwife in the small hours of the morning. He is hiding a woman at some country house of his, a foreign woman who has given him a daughter. Whatever you do, he says to Rafe, don't defend my honour. I have women like that all over the place. They will believe it, Rafe says. The word in the city is that Thomas Cromwell has a prodigious… Memory, he says. I have a very large ledger. A huge filing system, in which are recorded (under their name, and also under their offence) the details of people who have cut across me.
Hilary Mantel (Wolf Hall (Thomas Cromwell, #1))
Take one famous example: arguments about property destruction after Seattle. Most of these, I think, were really arguments about capitalism. Those who decried window-breaking did so mainly because they wished to appeal to middle-class consumers to move towards global exchange-style green consumerism, and to ally with labor bureaucracies and social democrats abroad. This was not a path designed to provoke a direct confrontation with capitalism, and most of those who urged us to take this route were at least skeptical about the possibility that capitalism could ever really be defeated. Many were in fact in favor of capitalism, if in a significantly humanized form. Those who did break windows, on the other hand, didn't care if they offended suburban homeowners, because they did not figure that suburban homeowners were likely to ever become a significant element in any future revolutionary anticapitalist coalition. They were trying, in effect, to hijack the media to send a message that the system was vulnerable -- hoping to inspire similar insurrectionary acts on the part of those who might be considering entering a genuinely revolutionary alliance; alienated teenagers, oppressed people of color, undocumented workers, rank-and-file laborers impatient with union bureaucrats, the homeless, the unemployed, the criminalized, the radically discontent. If a militant anticapitalist movement was to begin, in America, it would have to start with people like these: people who don't need to be convinced that the system is rotten, only, that there's something they can do about it. And at any rate, even if it were possible to have an anticapitalist revolution without gun-battles in the streets -- which most of us are hoping it is, since let's face it, if we come up against the US army, we will lose -- there's no possible way we could have an anticapitalist revolution while at the same time scrupulously respecting property rights. Yes, that will probably mean the suburban middle class will be the last to come on board. But they would probably be the last to come on board anyway.
David Graeber (Revolutions in Reverse: Essays on Politics, Violence, Art, and Imagination)
We lessen the sin of the world by joining the Lamb of God in bearing sin and pardoning sinners. But as the church as become a powerful institution, a consort with kings and queens, a confidante of presidents and prime ministers, our dispensing of grace has become distorted. We show grace to the institutions of systematic sin while condemning the individual sinner. It should be the other way around. It was never the “rank and file” sinners who gnashed their teeth at Jesus, but those for whom the present arrangement of systematic sin was advantageous. Jesus condemned the systematic sin that preserved the status quo for the Herodians and the Sadducees, but showed compassion to publicans and prostitutes. This is grace. But the church, courting the favor of the powerful, has forgotten this kind of grace. We coddle the mighty whose ire we fear and condemn the sin of the weak who pose no threat. We enthusiastically endorse the systems of greed that run Wall Street while condemning personal greed in the life of the individual working for the minimum wage. We will gladly preach a sermon against the sin of personal greed, but we dare not offer a prophetic critique of the golden calf of unfettered capitalism. Jesus and Saint Francis and Dorothy Day did the opposite. They shamed the principalities and powers, but offered pardon to the people. This is the grace of God the church is to embody.
Brian Zahnd (Water To Wine: Some of My Story)
Say you live five miles from the grocery store. When you need food, you hop in your car, and fifteen minutes later you’re buying groceries. One day on your way to the grocery store you get stopped by a train. You’re delayed five additional minutes. The whole time you’re waiting for the train to pass, you’re irritated by the delay. You forget the fact that before cars were invented, a five-mile trip to the store could take a whole day. “Or how about the student who’s working on a research paper for a class assignment. Because of a slow internet connection, it takes him thirty more minutes to look up and download the necessary information for his paper. He’s peeved by the delay. He’s forgotten that before the Internet, he would’ve had to motor over to the library, look up books in an archaic card file system, find the books in the library stacks, then search through the books for his information. A process that could take hours. “But the quintessential example of this phenomenon is the microwave. Whereas in the past it might take twenty to thirty minutes to cook or heat food in a conventional oven, the same outcome can be derived with a microwave oven in less than two minutes. Yet we stand at the microwave tapping our toe impatiently waiting for those two minutes to conclude, frustrated by how long it’s taking. “Which is why I say today’s world suffers from a serious case of the Microwave Syndrome.
McMillian Moody (The Old Man and the Tea (Elmo Jenkins, #3))
Nothing proves better the irreparable decay of the party system than the great efforts after this war to revive it on the Continent, their pitiful results, the enhanced appeal of movements after the defeat of Nazism, and the obvious threat of Bolshevism to national independence. The result of all efforts to restore the status quo has been only the restoration of a political situation in which the destructive movements are the only "parties" that function properly. Their leadership has maintained authority under the most trying circumstances and in spite of constantly changing party lines. In order to gauge correctly the chances for survival of the European nation-state, it would be wise not to pay too much attention to nationalist slogans which the movements occasionally adopt for purposes of hiding their true intentions, but rather to consider that by now everybody knows that they are regional branches of international organizations, that the rank and file is not disturbed in the least when it becomes obvious that their policy serves foreign-policy interests of another and even hostile power, and that denunciations of their leader as fifth columnists, traitors to the country, etc., do not impress their members to any considerable degree. In contrast to the old parties, the movements have survived the last war and are today the only "parties" which have remained alive and meaningful to their adherents.
Hannah Arendt (The Origins of Totalitarianism)
[N]o one has more power in the criminal justice system that prosecutors. Few rules constrain the exercise of prosecutorial discretion. The prosecutor is free to dismiss a case for any reason or no reason at all, regardless of the strength of the evidence. The prosecutor is also free to file more charges against the defendepant the can realistically be proven in court, so long as probable cause arguable exists. Whether a good plea deal is offered to a defendant is entirely up to the prosecutor. And if the mood strikes, the prosecutor can transfer drug defendants to the federal system, where penalties are far more severe. Juveniles, for their part, cam be transferred to adult court, where they can be sent to adult prison.
Michelle Alexander (The New Jim Crow: Mass Incarceration in the Age of Colorblindness)
So they're supposed to be God's emanations, these angels, and God delegates most earthly action to them—sort of like how the mediaeval Cathars and other Gnostic-influenced sects claimed the Devil was 'king of this world,' with God's complicity. It's a system that leaves room for a whole lot of animistic deities, spirits of place or concept—the kind you get in ancient Greek, Roman, Aryan-Indian, and Slavic beliefs, or even Chinese Shenism and Japanese Shinto. And these things could be good, could be bad, could be beneficial or malign, but since they all had God behind them, you couldn't really get rid of 'em, not completely. The best you could do is, um . . . stop paying attention. Ignore them, walk away. Don't eve give them what they want.
Gemma Files (Experimental Film)
Soon, said the artists, ignoring him, there would be nothing left but a series of long subterranean tubes covering the surface of the planet. The air and light inside them would be artificial, the ozone and oxygen layers of Planet Earth having been totally destroyed. People would creep along through this tubing, single file, stark naked, their only view the asshole of the one before them in the line, their urine and excrement flowing down through vents in the floor, until they were randomly selected by a digitalized mechanism, at which point they would be sucked into a side tunnel, ground up, and fed to the others through a series of nipple-shaped appendages on the inside of the tube. The system would be self-sustaining and perpetual, and would serve everybody right.
Margaret Atwood (Oryx and Crake (MaddAddam, #1))
A very important function of the nervous system, and, as we have said, a function equally in demand for computing machines, is that of memory, the ability to preserve the results of past operations for use in the future. It will be seen that the uses of the memory are highly various, and it is improbable that any single mechanism can satisfy the demands of all of them. There is first the memory which is necessary for the carrying out of a current process, such as a multiplication, in which the intermediate results are of no value once the process is completed, and in which the operating apparatus should then be released for further use. Such a memory should record quickly, be read quickly, and be erased quickly. On the other hand, there is the memory which is intended to be part of the files, the permanent record, of the machine or the brain, and to contribute to the basis of all its future behavior, at least during a single run of the machine. Let it be remarked parenthetically that an important difference between the way in which we use the brain and the machine is that the machine is intended for many successive runs, either with no reference to each other, or with a minimal, limited reference, and that it can be cleared between such runs; while the brain, in the course of nature, never even approximately clears out its past records. Thus the brain, under normal circumstances, is not the complete analogue of the computing machine but rather the analogue of a single run on such a machine. We shall see later that this remark has a deep significance in psychopathology and in psychiatry.
Norbert Wiener (Cybernetics: or the Control and Communication in the Animal and the Machine)
A regulator's greatest fear is the sequential collapse of hedge funds, banks, and brokerages. That process is hard to spot and even harder to stop. ... There are two sides to every trade. In a crash there can be just as many winners as losers. The problem arises when the losers go out of business. At that point the winners can't collect so they become losers too. It's as if you were a big winner at roulette and went to the cashier to collect your winnings only to find the cashier window closed and the casino had just filed for bankruptcy. All you have left is a pocketful of worthless chips. At that point, even the market winners can fall into financial distress. Because of leverage, total losses can exceed the size of the market itself. It's like a minefield. Banks running from panic start stepping on mines.
James Rickards (MoneyGPT: AI and the Threat to the Global Economy)
Until now. You and I are a mis-Match, Ellie, because I hacked into your servers to manipulate our results.” “Rubbish,” Ellie said, secretly balking at the notion. She folded her arms indignantly. “Our servers are more secure than almost every major international company across the world. We receive so many hacking attempts, yet no one gets in. We have the best software and team money can buy to protect us against people like you.” “You’re right about some of that. But what your system didn’t take into account was your own vanity. Do you remember receiving an email some time ago with the subject ‘Businesswoman of the Year Award’? You couldn’t help but open it.” Ellie vaguely remembered reading the email as it had been sent to her private account, which only a few people had knowledge of. “Attached to it was a link you clicked on and that opened to nothing, didn’t it?” Matthew continued. “Well, it wasn’t nothing to me, because your click released a tiny, undetectable piece of tailor-made malware that allowed me to remotely access your network and work my way around your files. Everything you had access to, I had access to. Then I simply replicated my strand of DNA to mirror image yours, sat back and waited for you to get in touch. That’s why I came for a job interview, to learn a little more about the programming and systems you use. Please thank your head of personnel for leaving me alone in the room for a few moments with her laptop while she searched for a working camera to take my head shot. That was a huge help in accessing your network. Oh, and tell her to frisk interviewees for lens deflectors next time—they’re pocket-sized gadgets that render digital cameras useless.
John Marrs (The One (Dark Future #1))
Paper wallets can be generated easily using a tool such as the client-side JavaScript generator at bitaddress.org. This page contains all the code necessary to generate keys and paper wallets, even while completely disconnected from the internet. To use it, save the HTML page on your local drive or on an external USB flash drive. Disconnect from the internet and open the file in a browser. Even better, boot your computer using a pristine operating system, such as a CD-ROM bootable Linux OS. Any keys generated with this tool while offline can be printed on a local printer over a USB cable (not wirelessly), thereby creating paper wallets whose keys exist only on the paper and have never been stored on any online system. Put these paper wallets in a fireproof safe and “send” bitcoin to their bitcoin address, to implement a simple yet highly effective “cold storage” solution. Figure 4-8 shows a paper wallet generated from the bitaddress.org site.
Andreas M. Antonopoulos (Mastering Bitcoin: Programming the Open Blockchain)
What’s more, AI researchers have begun to realize that emotions may be a key to consciousness. Neuroscientists like Dr. Antonio Damasio have found that when the link between the prefrontal lobe (which governs rational thought) and the emotional centers (e.g., the limbic system) is damaged, patients cannot make value judgments. They are paralyzed when making the simplest of decisions (what things to buy, when to set an appointment, which color pen to use) because everything has the same value to them. Hence, emotions are not a luxury; they are absolutely essential, and without them a robot will have difficulty determining what is important and what is not. So emotions, instead of being peripheral to the progress of artificial intelligence, are now assuming central importance. If a robot encounters a raging fire, it might rescue the computer files first, not the people, since its programming might say that valuable documents cannot be replaced but workers always can be. It is crucial that robots be programmed to distinguish between what is important and what is not, and emotions are shortcuts the brain uses to rapidly determine this. Robots would thus have to be programmed to have a value system—that human life is more important than material objects, that children should be rescued first in an emergency, that objects with a higher price are more valuable than objects with a lower price, etc. Since robots do not come equipped with values, a huge list of value judgments must be uploaded into them. The problem with emotions, however, is that they are sometimes irrational, while robots are mathematically precise. So silicon consciousness may differ from human consciousness in key ways. For example, humans have little control over emotions, since they happen so rapidly and because they originate in the limbic system, not the prefrontal cortex of the brain. Furthermore, our emotions are often biased.
Michio Kaku (The Future of the Mind: The Scientific Quest to Understand, Enhance, and Empower the Mind)
Lynum had plenty of information to share. The FBI's files on Mario Savio, the brilliant philosophy student who was the spokesman for the Free Speech Movement, were especially detailed. Savio had a debilitating stutter when speaking to people in small groups, but when standing before a crowd and condemning his administration's latest injustice he spoke with divine fire. His words had inspired students to stage what was the largest campus protest in American history. Newspapers and magazines depicted him as the archetypal "angry young man," and it was true that he embodied a student movement fueled by anger at injustice, impatience for change, and a burning desire for personal freedom. Hoover ordered his agents to gather intelligence they could use to ruin his reputation or otherwise "neutralize" him, impatiently ordering them to expedite their efforts. Hoover's agents had also compiled a bulging dossier on the man Savio saw as his enemy: Clark Kerr. As campus dissent mounted, Hoover came to blame the university president more than anyone else for not putting an end to it. Kerr had led UC to new academic heights, and he had played a key role in establishing the system that guaranteed all Californians access to higher education, a model adopted nationally and internationally. But in Hoover's eyes, Kerr confused academic freedom with academic license, coddled Communist faculty members, and failed to crack down on "young punks" like Savio. Hoover directed his agents to undermine the esteemed educator in myriad ways. He wanted Kerr removed from his post as university president. As he bluntly put it in a memo to his top aides, Kerr was "no good." Reagan listened intently to Lynum's presentation, but he wanted more--much more. He asked for additional information on Kerr, for reports on liberal members of the Board of Regents who might oppose his policies, and for intelligence reports about any upcoming student protests. Just the week before, he had proposed charging tuition for the first time in the university's history, setting off a new wave of protests up and down the state. He told Lynum he feared subversives and liberals would attempt to misrepresent his efforts to establish fiscal responsibility, and that he hoped the FBI would share information about any upcoming demonstrations against him, whether on campus or at his press conferences. It was Reagan's fear, according to Lynum's subsequent report, "that some of his press conferences could be stacked with 'left wingers' who might make an attempt to embarrass him and the state government." Lynum said he understood his concerns, but following Hoover's instructions he made no promises. Then he and Harter wished the ailing governor a speedy recovery, departed the mansion, slipped into their dark four-door Ford, and drove back to the San Francisco field office, where Lynum sent an urgent report to the director. The bedside meeting was extraordinary, but so was the relationship between Reagan and Hoover. It had begun decades earlier, when the actor became an informer in the FBI's investigation of Hollywood Communists. When Reagan was elected president of the Screen Actors Guild, he secretly continued to help the FBI purge fellow actors from the union's rolls. Reagan's informing proved helpful to the House Un-American Activities Committee as well, since the bureau covertly passed along information that could help HUAC hold the hearings that wracked Hollywood and led to the blacklisting and ruin of many people in the film industry. Reagan took great satisfaction from his work with the FBI, which gave him a sense of security and mission during a period when his marriage to Jane Wyman was failing, his acting career faltering, and his faith in the Democratic Party of his father crumbling. In the following years, Reagan and FBI officials courted each other through a series of confidential contacts. (7-8)
Seth Rosenfeld (Subversives: The FBI's War on Student Radicals, and Reagan's Rise to Power)
we need a certain level of cynicism for society to function properly. If people thought they had real power to change things, if they truly believed in democracy, everyone would take to the streets, advocate, militate for everything. It happens from time to time. Thirty thousand people will block traffic to march for a cause, but they do it believing that the other side couldn’t possibly feel justified in doing the same thing. What if they did? What if thirty thousand people who believe in one thing marched at the very same time as those who believe in the exact opposite? What if it happened every single day? People who care about other things would also want to be heard. They’d need to scream louder. They’d need their disruption to be more…disruptive. People are compliant because they don’t expect the system to be fair. If they did, if they thought that was even possible, we’d live in chaos, anarchy. We need apathy, he said, or we’ll end up killing each other on the streets
Sylvain Neuvel (Only Human (Themis Files, #3))
After a few months, I decided to do one more leg of the Le Noise tour and film the last show with Jonathan Demme in Toronto's Massey Hall/ It turned out to be a great night. Everyone was very happy because we had captured it. During a review of the digital files, we realized that the resolution was not full, it was a stepped down quality, not the best it could be. My own team's excuses were not adequate, because I was not informed of the decision to go to a lesser quality. Lesser quality is so accepted as normal now that even I had used it unknowingly. I went back to Massey Hall and set up a PA system like the one I used at the show, played back the mixes through the PA, and rerecorded the house sound at the highest resolution. I did the best I could with a bad situation. It does sound great now. Thankfully, the PA mix was only one step down from the highest resolution, so when it resonated in the hall and was rerecorded at the highest level, a high resolution hall sound was captured.
Neil Young (Waging Heavy Peace: A Hippie Dream)
Here’s how I’ve always pictured mitigated free will: There’s the brain—neurons, synapses, neurotransmitters, receptors, brainspecific transcription factors, epigenetic effects, gene transpositions during neurogenesis. Aspects of brain function can be influenced by someone’s prenatal environment, genes, and hormones, whether their parents were authoritative or their culture egalitarian, whether they witnessed violence in childhood, when they had breakfast. It’s the whole shebang, all of this book. And then, separate from that, in a concrete bunker tucked away in the brain, sits a little man (or woman, or agendered individual), a homunculus at a control panel. The homunculus is made of a mixture of nanochips, old vacuum tubes, crinkly ancient parchment, stalactites of your mother’s admonishing voice, streaks of brimstone, rivets made out of gumption. In other words, not squishy biological brain yuck. And the homunculus sits there controlling behavior. There are some things outside its purview—seizures blow the homunculus’s fuses, requiring it to reboot the system and check for damaged files. Same with alcohol, Alzheimer’s disease, a severed spinal cord, hypoglycemic shock. There are domains where the homunculus and that brain biology stuff have worked out a détente—for example, biology is usually automatically regulating your respiration, unless you must take a deep breath before singing an aria, in which case the homunculus briefly overrides the automatic pilot. But other than that, the homunculus makes decisions. Sure, it takes careful note of all the inputs and information from the brain, checks your hormone levels, skims the neurobiology journals, takes it all under advisement, and then, after reflecting and deliberating, decides what you do. A homunculus in your brain, but not of it, operating independently of the material rules of the universe that constitute modern science. That’s what mitigated free will is about. I see incredibly smart people recoil from this and attempt to argue against the extremity of this picture rather than accept its basic validity: “You’re setting up a straw homunculus, suggesting that I think that other than the likes of seizures or brain injuries, we are making all our decisions freely. No, no, my free will is much softer and lurks around the edges of biology, like when I freely decide which socks to wear.” But the frequency or significance with which free will exerts itself doesn’t matter. Even if 99.99 percent of your actions are biologically determined (in the broadest sense of this book), and it is only once a decade that you claim to have chosen out of “free will” to floss your teeth from left to right instead of the reverse, you’ve tacitly invoked a homunculus operating outside the rules of science. This is how most people accommodate the supposed coexistence of free will and biological influences on behavior. For them, nearly all discussions come down to figuring what our putative homunculus should and shouldn’t be expected to be capable of.
Robert M. Sapolsky (Behave: The Biology of Humans at Our Best and Worst)
Rather, productivity is about making certain choices in certain ways. The way we choose to see ourselves and frame daily decisions; the stories we tell ourselves, and the easy goals we ignore; the sense of community we build among teammates; the creative cultures we establish as leaders: These are the things that separate the merely busy from the genuinely productive. We now exist in a world where we can communicate with coworkers at any hour, access vital documents over smartphones, learn any fact within seconds, and have almost any product delivered to our doorstep within twenty-four hours. Companies can design gadgets in California, collect orders from customers in Barcelona, email blueprints to Shenzhen, and track deliveries from anywhere on earth. Parents can auto-sync the family’s schedules, pay bills online while lying in bed, and locate the kids’ phones one minute after curfew. We are living through an economic and social revolution that is as profound, in many ways, as the agrarian and industrial revolutions of previous eras. These advances in communications and technology are supposed to make our lives easier. Instead, they often seem to fill our days with more work and stress. In part, that’s because we’ve been paying attention to the wrong innovations. We’ve been staring at the tools of productivity—the gadgets and apps and complicated filing systems for keeping track of various to-do lists—rather than the lessons those technologies are trying to teach us. There are some people, however, who have figured out how to master this changing world. There are some companies that have discovered how to find advantages amid these rapid shifts. We now know how productivity really functions. We know which choices matter most and bring success within closer reach. We know how to set goals that make the audacious achievable; how to reframe situations so that instead of seeing problems, we notice hidden opportunities; how to open our minds to new, creative connections; and how to learn faster by slowing down the data that is speeding past us.
Charles Duhigg (Smarter Faster Better: The Secrets of Being Productive in Life and Business)
Ford and General Motors executives made a big deal of the occasion by driving to Washington in their hybrid vehicles. Mulally of Ford came in an Escape SUV hybrid. Wagoner of General Motors was chauffeured in a Chevy Malibu hybrid. Poor Bob Nardelli of Chrysler. The pickings were slim. Chrysler, known more for the styling of it's bodies than for its technological savvy, sent Nardelli to Washington in an Aspen Hybrid SUV, about the only "green" thing Chrysler had to offer. Problem is, it was a terrible vehicle and unreliable. Despite being partially powered by a battery, the Aspen ran on a V-8 Hemi and got less than twenty miles to the gallon. The charging system was flawed and difficult to service. His driver was Mike Carlisle, the homicide detective who had retired from the Detroit Police Department just a month earlier. The media was invited to snap bon voyage photographs in Detroit, which they dutifully filed. What they did not see -and what Carlisle later told me- was that there were two engineers tailing Nardelli at a discreet three-mile buffer, carrying laptops and a trunk full of tolls in case the Aspen broke down. Even Chrysler didn't trust their products.
Charlie LeDuff (Detroit: An American Autopsy)
Scrolling through the rest of the 3,500 documents in Michelle’s hard drive, one comes upon a file titled “RecentDNAresults,” which features the EAR’s Y-STR markers (short tandem repeats on the Y chromosome that establish male-line ancestry), including the elusive rare PGM marker. Having the Golden State Killer’s DNA was always the one ace up this investigation’s sleeve. But a killer’s DNA is only as good as the databases we can compare it to. There was no match in CODIS. And there was no match in the California penal system’s Y-STR database. If the killer’s father, brothers, or uncles had been convicted of a felony in the past sixteen years, an alert would have gone to Paul Holes or Erika Hutchcraft (the current lead investigator in Orange County). They would have looked into the man’s family, zeroed in on a member who was in the area of the crimes, and launched an investigation. But they had nothing. There are public databases that the DNA profile could be used to match, filled not with convicted criminals but with genealogical buffs. You can enter the STR markers on the Y chromosome of the killer into these public databases and try to find a match, or at least a surname that could help you with the search.
Michelle McNamara (I'll Be Gone in the Dark: One Woman's Obsessive Search for the Golden State Killer)
WHODUNIT BY BRUCE TIERNEY | 838 words A slippery situation in the Gulf Black Horizon (Harper, $25.99, 384 pages, ISBN 9780062109880), the 11th book in James Grippando's popular series featuring Florida attorney Jack Swyteck, opens with the two most important words of the lawyer's life: "I do." (Ha, ha—you thought I was going to say, "Not guilty.") The beach wedding in scenic Key Largo goes wildly awry when an epic storm arises in the Gulf, launching manifold repercussions for Swyteck and his new bride. One of the victims of the storm is a young Cuban oil rig worker whose wife emigrated to the U.S. ahead of him. He had planned to follow, but the deadly combination of high winds and an explosive oil spill have put paid to those plans forever. Now his wife would like Swyteck to file a wrongful death suit against the Chinese/Russian/Venezuelan/Cuban consortium that owns the oil rig. This is no easy feat, since the rig is in Cuban waters, and the only tenuous tie to the U.S. legal system is the wife's residency in Key West. The situation is volatile; the adversaries are lethal; and the backdrop is a toxic oil slick poised to slime the Florida coast. Black Horizon is timely, relentlessly paced and a thrill ride of the first
Anonymous
Paperwork management was provisional and makeshift. Rochefort and his principal analysts knew they ought to devise a proper filing system, with cross-indexing of archived messages, but they never found the time for that. Somehow, through the blizzard of decrypts and IBM cards, order prevailed over chaos. “This is one reason why these people are mostly crazy,” Rochefort later recalled. “We’d have no problem at all.” You’d mention something and you’d say, “Now wait a minute. Back here when they were around Halmahera on their way down to a landing at Port Something-or-other, there was a message like this. Let’s have it.” And they’d look in this pile of junk and they were able to locate it. . . . And then of course, you’d get a new one here and this leads to another thing over here and this leads to another thing and this is how you fill the whole works up. One letter leads to another and that leads to a third one and so on. Then that’s when your memory comes in very handy. Holmes added that a cryptanalyst “needs only time, patience, an infinite capacity for work, a mind that can focus on one problem to the exclusion of everything else, a photographic memory, the inability to drop an unsolved problem, and a large volume of traffic.
Ian W. Toll (Pacific Crucible: War at Sea in the Pacific, 1941–1942)
My assignment as the post’s adjutant and personnel officer (I ended the war a captain) put me in close contact with the civilian bureaucrats and it didn’t take long for me to decide I didn’t think much of the inefficiency, empire building, and business-as-usual attitude that existed in wartime under the civil service system. If I suggested that an employee might be expendable, his supervisor would look at me as if I were crazy. He didn’t want to reduce the size of his department; his salary was based to a large extent on the number of people he supervised. He wanted to increase it, not decrease it. I discovered it was almost impossible to remove an incompetent or lazy worker and that one of the most popular methods supervisors used in dealing with an incompetent was to transfer him or her out of his department to a higher-paying job in another department. We had a warehouse filled with cabinets containing old records that had no use or historic value. They were totally obsolete. Well, with a war on, there was a need for the warehouse and the filing cabinets, so a request was sent up through channels requesting permission to destroy the obsolete papers. Back came a reply—permission granted provided copies are made of each paper destroyed.
Ronald Reagan (An American Life: The Autobiography)
Modern society is incredibly complex, complex even beyond human comprehension, if we grant its premises—property, "production for the sake of production," competition, capital accumulation, exploitation, finance, centralization, coercion, bureaucracy and the domination of man by man. Linked to every one of these premises are the institutions that actualize it—offices, millions of "personnel," forms, immense tons of paper, desks, typewriters, telephones, and, of course, rows upon rows of filing cabinets. As in Kafka's novels, these things are real but strangely dreamlike, indefinable shadows on the social landscape. The economy has a greater reality to it and is easily mastered by the mind and senses, but it too is highly intricate—if we grant that buttons must be styled in a thousand different forms, textiles varied endlessly in kind and pattern to create the illusion of innovation and novelty, bathrooms filled to overflowing with a dazzling variety of pharmaceuticals and lotions, and kitchens cluttered with an endless number of imbecile appliances. If we single out of this odious garbage one or two goods of high quality in the more useful categories and if we eliminate the money economy, the state power, the credit system, the paperwork and the policework required to hold society in an enforced state of want, insecurity and domination, society would not only become reasonably human but also fairly simple.
Murray Bookchin (Post-Scarcity Anarchism (Working Classics))
All airplanes must carry two black boxes, one of which records instructions sent to all on-board electronic systems. The other is a cockpit voice recorder, enabling investigators to get into the minds of the pilots in the moments leading up to an accident. Instead of concealing failure, or skirting around it, aviation has a system where failure is data rich. In the event of an accident, investigators, who are independent of the airlines, the pilots’ union, and the regulators, are given full rein to explore the wreckage and to interrogate all other evidence. Mistakes are not stigmatized, but regarded as learning opportunities. The interested parties are given every reason to cooperate, since the evidence compiled by the accident investigation branch is inadmissible in court proceedings. This increases the likelihood of full disclosure. In the aftermath of the investigation the report is made available to everyone. Airlines have a legal responsibility to implement the recommendations. Every pilot in the world has free access to the data. This practice enables everyone—rather than just a single crew, or a single airline, or a single nation—to learn from the mistake. This turbocharges the power of learning. As Eleanor Roosevelt put it: “Learn from the mistakes of others. You can’t live long enough to make them all yourself.” And it is not just accidents that drive learning; so, too, do “small” errors. When pilots experience a near miss with another aircraft, or have been flying at the wrong altitude, they file a report. Providing that it is submitted within ten days, pilots enjoy immunity. Many planes are also fitted with data systems that automatically send reports when parameters have been exceeded. Once again, these reports are de-identified by the time they proceed through the report sequence.*
Matthew Syed (Black Box Thinking: Why Some People Never Learn from Their Mistakes - But Some Do)
We need to be humble enough to recognize that unforeseen things can and do happen that are nobody’s fault. A good example of this occurred during the making of Toy Story 2. Earlier, when I described the evolution of that movie, I explained that our decision to overhaul the film so late in the game led to a meltdown of our workforce. This meltdown was the big unexpected event, and our response to it became part of our mythology. But about ten months before the reboot was ordered, in the winter of 1998, we’d been hit with a series of three smaller, random events—the first of which would threaten the future of Pixar. To understand this first event, you need to know that we rely on Unix and Linux machines to store the thousands of computer files that comprise all the shots of any given film. And on those machines, there is a command—/bin/rm -r -f *—that removes everything on the file system as fast as it can. Hearing that, you can probably anticipate what’s coming: Somehow, by accident, someone used this command on the drives where the Toy Story 2 files were kept. Not just some of the files, either. All of the data that made up the pictures, from objects to backgrounds, from lighting to shading, was dumped out of the system. First, Woody’s hat disappeared. Then his boots. Then he disappeared entirely. One by one, the other characters began to vanish, too: Buzz, Mr. Potato Head, Hamm, Rex. Whole sequences—poof!—were deleted from the drive. Oren Jacobs, one of the lead technical directors on the movie, remembers watching this occur in real time. At first, he couldn’t believe what he was seeing. Then, he was frantically dialing the phone to reach systems. “Pull out the plug on the Toy Story 2 master machine!” he screamed. When the guy on the other end asked, sensibly, why, Oren screamed louder: “Please, God, just pull it out as fast as you can!” The systems guy moved quickly, but still, two years of work—90 percent of the film—had been erased in a matter of seconds. An hour later, Oren and his boss, Galyn Susman, were in my office, trying to figure out what we would do next. “Don’t worry,” we all reassured each other. “We’ll restore the data from the backup system tonight. We’ll only lose half a day of work.” But then came random event number two: The backup system, we discovered, hadn’t been working correctly. The mechanism we had in place specifically to help us recover from data failures had itself failed. Toy Story 2 was gone and, at this point, the urge to panic was quite real. To reassemble the film would have taken thirty people a solid year. I remember the meeting when, as this devastating reality began to sink in, the company’s leaders gathered in a conference room to discuss our options—of which there seemed to be none. Then, about an hour into our discussion, Galyn Susman, the movie’s supervising technical director, remembered something: “Wait,” she said. “I might have a backup on my home computer.” About six months before, Galyn had had her second baby, which required that she spend more of her time working from home. To make that process more convenient, she’d set up a system that copied the entire film database to her home computer, automatically, once a week. This—our third random event—would be our salvation. Within a minute of her epiphany, Galyn and Oren were in her Volvo, speeding to her home in San Anselmo. They got her computer, wrapped it in blankets, and placed it carefully in the backseat. Then they drove in the slow lane all the way back to the office, where the machine was, as Oren describes it, “carried into Pixar like an Egyptian pharaoh.” Thanks to Galyn’s files, Woody was back—along with the rest of the movie.
Ed Catmull (Creativity, Inc.: Overcoming the Unseen Forces That Stand in the Way of True Inspiration)
Though Hoover conceded that some might deem him a “fanatic,” he reacted with fury to any violations of the rules. In the spring of 1925, when White was still based in Houston, Hoover expressed outrage to him that several agents in the San Francisco field office were drinking liquor. He immediately fired these agents and ordered White—who, unlike his brother Doc and many of the other Cowboys, wasn’t much of a drinker—to inform all of his personnel that they would meet a similar fate if caught using intoxicants. He told White, “I believe that when a man becomes a part of the forces of this Bureau he must so conduct himself as to remove the slightest possibility of causing criticism or attack upon the Bureau.” The new policies, which were collected into a thick manual, the bible of Hoover’s bureau, went beyond codes of conduct. They dictated how agents gathered and processed information. In the past, agents had filed reports by phone or telegram, or by briefing a superior in person. As a result, critical information, including entire case files, was often lost. Before joining the Justice Department, Hoover had been a clerk at the Library of Congress—“ I’m sure he would be the Chief Librarian if he’d stayed with us,” a co-worker said—and Hoover had mastered how to classify reams of data using its Dewey decimal–like system. Hoover adopted a similar model, with its classifications and numbered subdivisions, to organize the bureau’s Central Files and General Indices. (Hoover’s “Personal File,” which included information that could be used to blackmail politicians, would be stored separately, in his secretary’s office.) Agents were now expected to standardize the way they filed their case reports, on single sheets of paper. This cut down not only on paperwork—another statistical measurement of efficiency—but also on the time it took for a prosecutor to assess whether a case should be pursued.
David Grann (Killers of the Flower Moon: The Osage Murders and the Birth of the FBI)
This once-proud country of ours is falling Into the hands of the wrong people,' said Jones. He nodded, and so did Father Keeley and the Black Fuehrer. 'And, before it gets back on the right track,' said Jones, 'some heads are going to roll.' I have never seen a more sublime demonstration of the totalitarian mind, a mind which might be likened unto a system of gears whose teeth have been filed off at random. Such a snaggle-toothed thought machine, driven by a standard or even a substandard libido, whirls with the jerky, noisy, gaudy pointlessness of a cuckoo clock in Hell. The boss G-man concluded wrongly that there were no teeth on the gears in the mind of Jones. 'You're completely crazy,' he said. Jones wasn't completely crazy. The dismaying thing about the classic totalitarian mind is that any given gear, though mutilated, will have at its circumference unbroken sequences of teeth that are immaculately maintained, that are exquisitely machined. Hence the cuckoo clock in Hell — keeping perfect time for eight minutes and thirty-three seconds, jumping ahead fourteen minutes, keeping perfect time for six seconds, jumping ahead two seconds, keeping perfect time for two hours and one second, then jumping ahead a year. The missing teeth, of course, are simple, obvious truths, truths available and comprehensible even to ten-year-olds, in most cases. The willful filing off of gear teeth, the willful doing without certain obvious pieces of information — That was how a household as contradictory as one composed of Jones, Father Keeley, Vice-Bundesfuebrer Krapptauer, and the Black Fuehrer could exist in relative harmony — That was how my father-in-law could contain in one mind an indifference toward slave women and love for a blue vase — That was how Rudolf Hoess, Commandant of Auschwitz, could alternate over the loudspeakers of Auschwitz great music and calls for corpse-carriers — That was how Nazi Germany could sense no important differences between civilization and hydrophobia —
Kurt Vonnegut Jr. (Mother Night)
Universities are fueled in large measure by what's called overhead of the grant...so if you get a million dollar grant, half or more will go to your university, right? So that's what builds the buildings and fuels the place. So the university has an incentive to get as many people to file grant applications as they can, and they have an incentive to hire people whose grant applications will be large rather than small. So this, for example, is one of the reasons that science has taken up arms against theory –that is to say, proper scientific theoreticians like me – and it has instead hired people who run big expensive experiments: Because big expensive experiments have big grants, and those big grants bring in money. But if you were a university and what you wanted was to have people writing big expensive grants who were capable of getting them, then what you would want to do is...you would want to free those people from teaching, and you would want to get people who weren't so expensive to do the work of the university...and the way you do that is: you bring them on as graduate students; and you pay them an appalling wage; you claim that they are not actually workers, that they are students; and they do most of the teaching, and they do a lot of the work of the university, for incredibly low amounts of money; they live under poor conditions; and increasingly they have to come from abroad where they are in some sense getting a deal that still makes sense. But this means that we overproduce PhDs. We give people degrees instead of money to do the work of the university, in order that people who are capable of getting the grants spend almost full time doing that job. And it's a racket. The person who knows the most about this is actually Eric, my brother. So...what he unearthed was actually that there was an explicit conspiracy to game the visa system in order to keep this system running...that effectively a fake shortage of science students was created to allow the universities to basically flood the market, to drive the wages down.
Bret Weinstein
Give us an idea of…” Noya Baram rubs her temples. “Oh, well.” Augie begins to stroll around again. “The examples are limitless. Small examples: elevators stop working. Grocery-store scanners. Train and bus passes. Televisions. Phones. Radios. Traffic lights. Credit-card scanners. Home alarm systems. Laptop computers will lose all their software, all files, everything erased. Your computer will be nothing but a keyboard and a blank screen. “Electricity would be severely compromised. Which means refrigerators. In some cases, heat. Water—well, we have already seen the effect on water-purification plants. Clean water in America will quickly become a scarcity. “That means health problems on a massive scale. Who will care for the sick? Hospitals? Will they have the necessary resources to treat you? Surgical operations these days are highly computerized. And they will not have access to any of your prior medical records online. “For that matter, will they treat you at all? Do you have health insurance? Says who? A card in your pocket? They won’t be able to look you up and confirm it. Nor will they be able to seek reimbursement from the insurer. And even if they could get in contact with the insurance company, the insurance company won’t know whether you’re its customer. Does it have handwritten lists of its policyholders? No. It’s all on computers. Computers that have been erased. Will the hospitals work for free? “No websites, of course. No e-commerce. Conveyor belts. Sophisticated machinery inside manufacturing plants. Payroll records. “Planes will be grounded. Even trains may not operate in most places. Cars, at least any built since, oh, 2010 or so, will be affected. “Legal records. Welfare records. Law enforcement databases. The ability of local police to identify criminals, to coordinate with other states and the federal government through databases—no more. “Bank records. You think you have ten thousand dollars in your savings account? Fifty thousand dollars in a retirement account? You think you have a pension that allows you to receive a fixed payment every month?” He shakes his head. “Not if computer files and their backups are erased. Do banks have a large wad of cash, wrapped in a rubber band with your name on it, sitting in a vault somewhere? Of course not. It’s all data.” “Mother of God,” says Chancellor Richter, wiping his face with a handkerchief.
Bill Clinton (The President Is Missing)
The US traded its manufacturing sector’s health for its entertainment industry, hoping that Police Academy sequels could take the place of the rustbelt. The US bet wrong. But like a losing gambler who keeps on doubling down, the US doesn’t know when to quit. It keeps meeting with its entertainment giants, asking how US foreign and domestic policy can preserve its business-model. Criminalize 70 million American file-sharers? Check. Turn the world’s copyright laws upside down? Check. Cream the IT industry by criminalizing attempted infringement? Check. It’ll never work. It can never work. There will always be an entertainment industry, but not one based on excluding access to published digital works. Once it’s in the world, it’ll be copied. This is why I give away digital copies of my books and make money on the printed editions: I’m not going to stop people from copying the electronic editions, so I might as well treat them as an enticement to buy the printed objects. But there is an information economy. You don’t even need a computer to participate. My barber, an avowed technophobe who rebuilds antique motorcycles and doesn’t own a PC, benefited from the information economy when I found him by googling for barbershops in my neighborhood. Teachers benefit from the information economy when they share lesson plans with their colleagues around the world by email. Doctors benefit from the information economy when they move their patient files to efficient digital formats. Insurance companies benefit from the information economy through better access to fresh data used in the preparation of actuarial tables. Marinas benefit from the information economy when office-slaves look up the weekend’s weather online and decide to skip out on Friday for a weekend’s sailing. Families of migrant workers benefit from the information economy when their sons and daughters wire cash home from a convenience store Western Union terminal. This stuff generates wealth for those who practice it. It enriches the country and improves our lives. And it can peacefully co-exist with movies, music and microcode, but not if Hollywood gets to call the shots. Where IT managers are expected to police their networks and systems for unauthorized copying – no matter what that does to productivity – they cannot co-exist. Where our operating systems are rendered inoperable by “copy protection,” they cannot co-exist. Where our educational institutions are turned into conscript enforcers for the record industry, they cannot co-exist. The information economy is all around us. The countries that embrace it will emerge as global economic superpowers. The countries that stubbornly hold to the simplistic idea that the information economy is about selling information will end up at the bottom of the pile. What country do you want to live in?
Cory Doctorow (Content: Selected Essays on Technology, Creativity, Copyright, and the Future of the Future)
This once-proud country of ours is falling into the hands of the wrong people,” said Jones. He nodded, and so did Father Keeley and the Black Fuehrer. “And, before it gets back on the right track,” said Jones, “some heads are going to roll.” I have never seen a more sublime demonstration of the totalitarian mind, a mind which might be likened unto a system of gears whose teeth have been filed off at random. Such a snaggle-toothed thought machine, driven by a standard or even a substandard libido, whirls with the jerky, noisy, gaudy pointlessness of a cuckoo clock in Hell. The boss G-man concluded wrongly that there were no teeth on the gears in the mind of Jones. “You’re completely crazy,” he said. Jones wasn’t completely crazy. The dismaying thing about the classic totalitarian mind is that any given gear, though mutilated, will have at its circumference unbroken sequences of teeth that are immaculately maintained, that are exquisitely machined. Hence the cuckoo clock in Hell—keeping perfect time for eight minutes and thirty-three seconds, jumping ahead fourteen minutes, keeping perfect time for six seconds, jumping ahead two seconds, keeping perfect time for two hours and one second, then jumping ahead a year. The missing teeth, of course, are simple, obvious truths, truths available and comprehensible even to ten-year-olds, in most cases. The willful filing off of gear teeth, the willful doing without certain obvious pieces of information— That was how a household as contradictory as one composed of Jones, Father Keeley, Vice-Bundesfuehrer Krapptauer, and the Black Fuehrer could exist in relative harmony— That was how my father-in-law could contain in one mind an indifference toward slave women and love for a blue vase— That was how Rudolf Hoess, Commandant of Auschwitz, could alternate over the loudspeakers of Auschwitz great music and calls for corpse-carriers— That was how Nazi Germany could sense no important differences between civilization and hydrophobia— That is the closest I can come to explaining the legions, the nations of lunatics I’ve seen in my time. And for me to attempt such a mechanical explanation is perhaps a reflection of the father whose son I was. Am. When I pause to think about it, which is rarely, I am, after all, the son of an engineer. Since there is no one else to praise me, I will praise myself—will say that I have never tampered with a single tooth in my thought machine, such as it is. There are teeth missing, God knows—some I was born without, teeth that will never grow. And other teeth have been stripped by the clutchless shifts of history— But never have I willfully destroyed a tooth on a gear of my thinking machine. Never have I said to myself, “This fact I can do without.” Howard W. Campbell, Jr., praises himself. There’s life in the old boy yet! And, where there’s life— There is life.
Kurt Vonnegut Jr. (Mother Night)
When I hung up the phone that night I had a wet face and a broken heart. The lack of compassion I witnessed every day had finally exhausted me. I looked around my crowded office, at the stacks of records and papers, each pile filled with tragic stories, and I suddenly didn’t want to be surrounded by all this anguish and misery. As I sat there, I thought myself a fool for having tried to fix situations that were so fatally broken. It’s time to stop. I can’t do this anymore. For the first time I realized my life was just full of brokenness. I worked in a broken system of justice. My clients were broken by mental illness, poverty, and racism. They were torn apart by disease, drugs and alcohol, pride, fear, and anger. I thought of Joe Sullivan and of Trina, Antonio, Ian, and dozens of other broken children we worked with, struggling to survive in prison. I thought of people broken by war, like Herbert Richardson; people broken by poverty, like Marsha Colbey; people broken by disability, like Avery Jenkins. In their broken state, they were judged and condemned by people whose commitment to fairness had been broken by cynicism, hopelessness, and prejudice. I looked at my computer and at the calendar on the wall. I looked again around my office at the stacks of files. I saw the list of our staff, which had grown to nearly forty people. And before I knew it, I was talking to myself aloud: “I can just leave. Why am I doing this?” It took me a while to sort it out, but I realized something sitting there while Jimmy Dill was being killed at Holman prison. After working for more than twenty-five years, I understood that I don’t do what I do because it’s required or necessary or important. I don’t do it because I have no choice. I do what I do because I’m broken, too. My years of struggling against inequality, abusive power, poverty, oppression, and injustice had finally revealed something to me about myself. Being close to suffering, death, executions, and cruel punishments didn’t just illuminate the brokenness of others; in a moment of anguish and heartbreak, it also exposed my own brokenness. You can’t effectively fight abusive power, poverty, inequality, illness, oppression, or injustice and not be broken by it. We are all broken by something. We have all hurt someone and have been hurt. We all share the condition of brokenness even if our brokenness is not equivalent. I desperately wanted mercy for Jimmy Dill and would have done anything to create justice for him, but I couldn’t pretend that his struggle was disconnected from my own. The ways in which I have been hurt––and have hurt others––are different from the ways Jimmy Dill suffered and caused suffering. But our shared brokenness connected us. Paul Farmer, the renowned physician who has spent his life trying to cure the world’s sickest and poorest people, once quoted me something that the writer Thomas Merton said: We are bodies of broken bones. I guess I’d always known but never fully considered that being broken is what makes us human. We all have our reasons. Sometimes we’re fractured by the choices we make; sometimes we’re shattered by things we would never have chosen. But our brokenness is also the source of our common humanity, the basis for our shared search for comfort, meaning, and healing. Our shared vulnerability and imperfection nurtures and sustains our capacity for compassion. We have a choice. We can embrace our humanness, which means embracing our broken natures and the compassion that remains our best hope for healing. Or we can deny our brokenness, forswear compassion, and, as a result, deny our own humanity.
Bryan Stevenson (Just Mercy)
Otherwise, his desk is immaculate. In accordance with the four Ds of his system, everything that has not been done, delegated, or dropped has been deferred to a half dozen two-drawer file cabinets, which contain his alphabetized plastic folders with labels printed by the little machine next to his computer. You might dismiss this all as evidence of dreary anal-retentiveness, but Allen could not be less dour or more relaxed.
Roy F. Baumeister (Willpower: Rediscovering the Greatest Human Strength)
Version control is a system that records changes to a file or set of files over time so that you can recall specific versions later. For the examples in this book you will use software source code as the files being version controlled, though in reality you can do this with nearly any type of file on a computer.
Scott Chacon (Pro Git)
A recent survey of private US health care facilities estimated that the support staff of hospital physicians spends nineteen hours a week interacting with insurance providers in prior authorizations, while clerical staff spend thirty-six hours a week filing claims. The cost of interactions between private health care providers and private insurance providers was estimated to be $68,000 per physician per year, totaling a whopping $31 billion per year—equivalent to the GDP of the Dominican Republic in 2005.22 The interaction costs in 1999 for the entire health care system, including private and public, were estimated on the low end to be $31 billion and on the high end to be $294 billion—which is comparable to the present day GDP of Singapore or Chile.
César A. Hidalgo (Why Information Grows: The Evolution of Order, from Atoms to Economies)
Version control is a system that records changes to a file or set of files over time so that you can recall specific versions later.
Scott Chacon (Pro Git)
Managers handle parallel projects all the time. They juggle with people, work tasks, and goals to ensure the success of every project process. However, managing projects, by design, is not an easy task. Since there are plenty of moving parts, it can easily become disorganized and chaotic. It is vital to use an efficient project management system to stay organized at work while designing and executing projects. Project Management Online Master's Programs From XLRI offers unique insights into project management software tools and make teams more efficient in meeting deadlines. How can project management software help you? Project management tools are equipped with core features that streamline different processes including managing available resources, responding to problems, and keeping all the stakeholders involved. Having the best project management software can make a significant influence on the operational and strategic aspects of the company. Here is a list of 5 key benefits to project professionals and organizations in using project management software: 1. Enhanced planning and scheduling Project planning and scheduling is an important component of project management. With project management systems, the previous performance of the team relevant to the present project can be accessed easily. Project managers can enroll in an online project management course to develop a consistent management plan and prioritize tasks. Critical tasks like resource allocation, identification of dependencies, and project deliverables can be completed comfortably using project management software. 2. Better collaboration Project teams sometimes have to handle cross-functional projects along with their day to day responsibilities. Communication between different team members is critical to avoid expensive delays and precludes the waste of precious resources. A key upside of project management software is that it makes effectual collaboration extremely simple. All project communication is stored in a universally accessible place. The project management online master's program offers unique insights to project managers on timeline and status updates which leads to a synergy between the team’s functions and project outcomes. 3. Effective task delegation Assigning tasks to team members in a fair way is a challenging proposition for most project managers. With a project management program, the delegation of project tasks can be easily done. In most instances, these programs send out automatic reminders when deadlines are approaching to ensure a smooth and efficient project workflow. 4. Easier File access and sharing Important documents should be safely accessed and shared among team members. Project management tools provide cloud-based storage which enables users to make changes, leave feedback and annotate easily. PM software logs any user changes to ensure project transparency within the team. 5. Easier integration of new members Project managers are responsible to get new members up to speed on the important project parameters within a short time. Project management online master's programs from XLRI Jamshedpuroffer vital learning to management professionals in maintaining a project log and in simplistically visualizing the complete project. Takeaway Choosing the perfect PM software for your organization helps you to effectively collaborate to achieve project success. Simple and intuitive PM tools are useful to enhance productivity in remote-working employees.
Talentedge
I wouldn’t burden any decent system of faith by participating in it.
Jim Butcher (Death Masks (The Dresden Files, #5))
…and his religion no longer had any authority … other than as an organizer of his daily life and conduct as a filing system for his perceptions. From The Waterworks.
E.L. Doctorow
Microsoft has filed a patent4 for adding a biometric data sensor system to HoloLens to monitor and respond to stress levels, using the wearer’s heart rate, perspiration production, brainwave activity, and other body signals.
Helen Papagiannis (Augmented Human: How Technology Is Shaping the New Reality)
As the next page loaded with another set of 25 emails, his eyes were drawn to the bottom of the screen, where for the first time previously-read messages stood out beneath the bold-type unread ones.  There was something powerfully sentimental, almost tangible, about the realization that his dad had sat before a computer somewhere ten years earlier and had clicked on these same messages.  The most recent one, received just hours before his parents’ death, was from his mom with the subject line, “re: Li’l Ryan’s Bday”. With a lump developing in his throat, he clicked on the message.  His mom had written: “That’s something dads should talk to their sons about ;)”  Hmm.  Didn’t make sense without context. Below the end of the message he found the option to “show quoted text,”  which he clicked on to reveal the entire exchange in reverse chronological order.  She had been responding to his dad’s message: “I’m sure he’ll get it.  I like the idea, but you better be prepared to have a discussion about the birds and bees.  You know how his mind works.  He’ll want to know how that baby got in there.” Ryan’s palms grew sweaty as he began to infer what was coming next.  Not entirely sure he wanted to continue, but certain he couldn’t stop, he scrolled to the end. The thread had started with his mother’s message, “I’m already showing big-time.  Sweaters only get so baggy, and it’s going to be warming up soon.  I think tonight would be the perfect time to tell Ryan.  I wrapped up a T-shirt for him in one of his presents that says ‘Big Brother’ on it.  A birthday surprise!  You think he’ll get it?” Having trouble taking in a deep breath, he rose to a stand and slowly backed away from his computer.  It wasn’t his nature to ask fate “Why?” or to dwell on whether or not something was “fair.”  But this was utterly overwhelming – a knife wound on top of an old scar that had never sufficiently healed. ~~~ Corbett Hermanson peered around the edge of Bradford’s half-open door and knocked gently on the frame.  Bradford was sitting at his desk, leafing through a thick binder.  He had to have heard the knock, Corbett thought, peeking in, but his attention to the material in the binder remained unbroken. Now regretting his timid first knock, Corbett anxiously debated whether he should knock again, which could be perceived as rude, or try something else to get Bradford’s attention.  Ultimately he decided to clear his throat loudly, while standing more prominently in the doorway. Still, Bradford kept his nose buried in the files in front of him. Finally, Corbett knocked more confidently on the door itself. “What!” Bradford demanded.  “If you’ve got something to say, just say it!” “Sorry, sir.  Wasn’t sure you heard me,” Corbett said, with a nervous chuckle. “Do you think I’m deaf and blind?” Bradford sneered.  “Just get on with it already.” “Well sir, I’m sure you recall our conversation a few days back about the potential unauthorized user in our system?  It turns out...” “Close the door!” Bradford whispered emphatically, waving his arms wildly for Corbett to stop talking and come all the way into his office. “Sorry, sir,” Corbett said, his cheeks glowing an orange-red hue to match his hair.  After self-consciously closing the door behind him, he picked up where he’d left off.  “It turns out, he’s quite good at keeping himself hidden.  I was right about his not being in Indiana, but behind that location, his IP address bounces
Dan Koontz (The I.P.O.)
Ninety feet directly beneath the center courtyard café in the middle of the Pentagon—previously known as the Ground Zero Cafe, because when the bomb dropped that was where it would most likely detonate—there is a deep subbasement office with ferroconcrete walls and a filtered air supply, accessible by discreet elevators and staircases from all five wings of the main building. It was designed as a deep command bunker back when the worst threats were raids by long-range Luftwaffe bombers bearing conventional explosives. Obsolescent since the morning of July 16, 1945—it won’t withstand a direct ground burst from an atom bomb, much less more modern munitions—it still possesses certain uses. Being deep underground and equidistant from all the other wings, it was well suited as a switch for SCAN, the Army’s automatic switched communications system, and later for AUTOVON. AUTOVON led to ARPANET, the predecessor of the internet, and the secure exchange in the basement played host to one of the first IMPs—Interface Message Processors—outside of academia. By the early 1980s a lack of rackspace led the DoD to relocate their hardened exchanges to a site closer to the 1950s-sized mainframe halls. And it was then that the empty bunker was taken over by a shadowy affiliate of the National Security Agency, tasked with waging occult warfare against the enemies of the nation. The past six months have brought some changes. There is a pentagonal main room inside the bunker, and within it there is a ceremonial maze, inscribed in blood and silver that glows with a soft fluorescence, converging on a dais at the heart of the design. The labyrinth takes the shape of a pentacle aligned with the building overhead: at each corner stands a motionless sentinel clad head to toe in occlusive silver fabric. Robed in black and crimson silk and shod in slippers of disturbingly pale leather, the Deputy Director paces her way through the maze. In her left hand she bears a jewel-capped scepter carved from the femur of a dead pope, and in her right hand she bears a gold-plated chalice made from a skull that once served Josef Stalin as an ashtray. As she walks she recites a prayer of allegiance and propitiation, its cadences and grammar those of a variant dialect of Old Enochian.
Charles Stross (The Labyrinth Index (Laundry Files, #9))
little hybrid cars that, when not running on gasoline, was fueled by idealism. It was made out of crepe paper and duct tape and boasted a computer system that looked like it could have run the NYSE and NORAD, with enough attention left over to play tic-tac-toe. Or possibly Global Thermonuclear War.
Jim Butcher (Ghost Story (The Dresden Files, #13))
One of the crucial documents for the Ordine dei Medici, it turned out, was an Italian passport. Until then nobody had bothered to mention this potentially insurmountable obstacle. It happened I did have a right to citizenship, but since it would be bestowed on me automatically by my Italian husband (Italian husbands are less powerful nowadays), the passport logically hung on Italian recognition of our American marriage, which was in turn predicated on Italian recognition of my husband’s American divorce from a prior marriage. The divorce certification, based on various Byzantine legal fictions, was a long time coming. One time there was a false sighting of his Italian divorce, and I optimistically went down to the Anagrafe or Central Registry to see whether I could get my citizenship papers. At the end of the forty-five-minute line a small man with slicked-down hair took my documents with a yawn and disappeared into the dark forest of files. When the clerk emerged, the bored look was gone from his face. He invited me to follow him along the long bank of teller windows, he on his side me on mine, and then pass through a little gate to the employee side. He sat me down, then paced between piled-up dossiers for a minute, no grille window to screen him off, before speaking. “Ms. Levenstein,” he said kindly, “You have applied for Italian citizenship on the grounds of being married to a certain Andrea Di Vecchia.” I admitted that was true. He paced a little more, lit a cigarette. “Ms. Levenstein,” he said again, even more gently, and I should have caught on from the way he repeated it. “I must tell you something. This Mr. Di Vecchia—he is already married to another woman!” His hand was already out to give a comforting squeeze to my shoulder, but it dropped when I laughed and explained that the problem was red tape, not bigamy. I thought later, high drama must be rare behind the certificate window, and he had risen to its call. How many American file clerks would have been so ready for their unexpected moment of glory? Another problem involved my residence papers, a crucial component in any pile of documents. All residents in Italy must communicate changes of address to the State within three months, and when we left my mother-in-law’s for our own place eight months earlier we had duly registered the move. But when I went to pick up an identity document I was told it couldn’t be issued because I was still listed at my old address. I slyly told the clerk in the cage to hold on, scurried over from his Identity Card window to the Certificate window three paces away, had the printer spit out a Residence Certificate bearing my name and the new address, and carried it back in triumph. He wasn’t impressed. “Oh, that certificate. That’s from the computer, it’s not worth anything. Your address has been changed in the computer, but the computerized part of the system doesn’t count.
Susan Levenstein (Dottoressa: An American Doctor in Rome)
The cognitive state of dream sleep is a perfect breeding ground for trying out new connections. Our frontal lobes—the brain’s logic centers—go dark, and at the same time, we lose access to the hippocampus, where new memories are stored. Instead of just replaying recent experiences, the dreaming brain reaches back into the memory storage system, where it’s apt to land on far-flung files.
Alice Robb (Why We Dream: The Transformative Power of Our Nightly Journey)
I seriously wondered, for example, whether Lisa McElhaney had ever been to Leningrad, or Ulster, or North Waghi. Then again, I couldn’t even figure out what she really died of. Her seventeen-year-old body was found in a plastic bag in Columbus, Ohio, in April 1987. Her father was an alcoholic, her mother had tried to get an abortion when pregnant with Lisa, but couldn’t afford it. Lisa was raped as a child, became pregnant and miscarried at age fifteen, was thrown out by her family, became addicted to drugs, and worked in pornography and prostitution to support her habit. Each time she ran afoul of the law and was incarcerated in a home for delinquents, social workers noted on her file that she displayed an eagerness for relationships and was “‘starved for affection.”’ But the system was set up to rehabilitate, not to provide relationships or affection, so Lisa withdrew and “would sit for hours and hours, staring into space.”’ When photographs of her performing sexual acts were discovered by the police, she was subpoenaed to testify in a child-pornography case against Larry Miller, the pornographer. Although Miller was a suspect in her murder, police believed the killer was a client of hers, Rob Roy Baker, a thirty-four-year-old truck driver who had been linked to similar attacks on other prostitutes. When police came to question him, Baker shot himself to death in a house filled with pictures of nude women cut from pornographic magazines. So I would ask myself, did Lisa die of assault? Which assault? The lack of affordable abortion for her mother? The beating from her john? Did she die of the disease called "family" or the disease called "rehabilitation," of poverty or drugs or pornography, of economics or sexual slavery or a broken body? Or a broken spirit? When she stared into space for hours was it because she knew she was in here but had no way of trying to reach anyone in the neighboring cell? Perhaps she died on unknown causes.
Robin Morgan (The Demon Lover)
When Elizebeth sent them a decrypt, the FBI placed it in their own SIS filing system, with a new four-digit identifying number, and the FBI invented new names for the radio networks that Elizebeth had already named. This is how the history of the Invisible War would become distorted; these are the small decisions that erased Elizebeth from the record and later allowed J. Edgar Hoover to take credit for her achievements.
Jason Fagone (The Woman Who Smashed Codes)
What kinds of Work will You do in Freelancing? What kind of work will you do in Freelancing? And to understand the type of work in freelancing, You need to have a clear idea of what freelancing is. There is no specific type of freelancing, it can be of many types, such as - Freelance Photography, Freelance Journalism, Freelance Writer, Freelance Data Entry, Freelance Logo Designer, Freelance Graphics Designer etc. There's no end to the amount of work you can do with freelancing. The most interesting thing is that you are everything in this process. There is no one to twirl over your head, you are the boss here. Even here there is no obligation to work from 9-5. Today I discuss some freelancing tasks that are popular in the freelancing sector or are done by many freelancers. For example: Data Entry: It wouldn't be too much of a mistake to say that data entry is the easiest job. Rather, it can be said without a doubt that data entry is more difficult than any other job. Data entry work basically means typing. This work is usually provided as a PDF file and is described as a 'Word type work'. Any employee can take a data entry job as a part-time job for extra income at the end of his work. Graphics Design: One of the most popular jobs in the freelancing world is graphic design. The main reasons for the popularity of this work are its attractiveness and simplicity. Everything we see online is contributed by graphics. For example, Cover pages, Newspaper, Book cover pages, advertisements and Photographs, Editing or changing the background of a picture or photo, Creating banners for advertising, Creating visiting cards, Business cards or leaflets, Designed for webpages known as (PhD), T-shirt designing, Logo designing, Making cartoons and many more. Web Design and Development: 'Web design' or 'Site design' are used interchangeably. The most important job of freelancing is web design. From the simplest to the most difficult aspects of this work, almost all types of work are done by freelancers. There are many other themes like WordPress, Elementor, Joomla, and DV that can be used to create entire sites. Sometimes coding is required to create some sites. If the web designer has coding experience or skills then there is no problem, and if not then the site creation should be done by programmers. Programming: Programming means writing some signals, codes, or symbols into a specific system. And its job is to give different types of commands or orders to the computer. If you give some command to the computer in Bengali or English, the computer will not understand it. For that want binary code or number. Just as any book is written in English, Hindi, Japanese Bengali, etc. every program is written in some particular programming language like C++, Java, etc. The written form of the program is called source code. A person who writes source code is called a programmer, coder, or developer. While writing the program, the programmer has to follow the syntax or grammar of that particular programming language. Other work: Apart from the above jobs, there are various other types of jobs that are in high demand in the freelancing sector or market. The tasks are: Writing, Article or blog post writing SEO Marketing, Digital marketing, Photo, Audio, Video Editing, Admin jobs, Software development, Translation, Affiliate marketing, IT and Networking etc. Please Visit Our Blogging Website to read more Articles related to Freelancing and Outsourcing, Thank You.
Bhairab IT Zone
This once-proud country of ours is falling into the hands of the wrong people,” said Jones. He nodded, and so did Father Keeley and the Black Fuehrer. “And, before it gets back on the right track,” said Jones, “some heads are going to roll.” I have never seen a more sublime demonstration of the totalitarian mind, a mind which might be likened unto a system of gears whose teeth have been filed off at random. Such a snaggle-toothed thought machine, driven by a standard or even a substandard libido, whirls with the jerky, noisy, gaudy pointlessness of a cuckoo clock in Hell.
Kurt Vonnegut Jr. (Mother Night)
What kinds of Work will You do in Freelancing? What kind of work will you do in Freelancing? And to understand the type of work in freelancing, You need to have a clear idea of what freelancing is. There is no specific type of freelancing, it can be of many types, such as - Freelance Photography, Freelance Journalism, Freelance Writer, Freelance Data Entry, Freelance Logo Designer, Freelance Graphics Designer etc. There's no end to the amount of work you can do with freelancing. The most interesting thing is that you are everything in this process. There is no one to twirl over your head, you are the boss here. Even here there is no obligation to work from 9-5. Today I discuss some freelancing tasks that are popular in the freelancing sector or are done by many freelancers. For example: Data Entry: It wouldn't be too much of a mistake to say that data entry is the easiest job. Rather, it can be said without a doubt that data entry is more difficult than any other job. Data entry work basically means typing. This work is usually provided as a PDF file and is described as a 'Word type work'. Any employee can take a data entry job as a part-time job for extra income at the end of his work. Graphics Design: One of the most popular jobs in the freelancing world is graphic design. The main reasons for the popularity of this work are its attractiveness and simplicity. Everything we see online is contributed by graphics. For example, Cover pages, Newspaper, Book cover pages, advertisements and Photographs, Editing or changing the background of a picture or photo, Creating banners for advertising, Creating visiting cards, Business cards or leaflets, Designed for webpages known as (PhD), T-shirt designing, Logo designing, Making cartoons and many more. Web Design and Development: 'Web design' or 'Site design' are used interchangeably. The most important job of freelancing is web design. From the simplest to the most difficult aspects of this work, almost all types of work are done by freelancers. There are many other themes like WordPress, Elementor, Joomla, and DV that can be used to create entire sites. Sometimes coding is required to create some sites. If the web designer has coding experience or skills then there is no problem, and if not then the site creation should be done by programmers. Programming: Programming means writing some signals, codes, or symbols into a specific system. And its job is to give different types of commands or orders to the computer. If you give some command to the computer in Bengali or English, the computer will not understand it. For that want binary code or number. Just as any book is written in English, Hindi, Japanese Bengali, etc. every program is written in some particular programming language like C++, Java, etc. The written form of the program is called source code. A person who writes source code is called a programmer, coder, or developer. While writing the program, the programmer has to follow the syntax or grammar of that particular programming language. Other work: Apart from the above jobs, there are various other types of jobs that are in high demand in the freelancing sector or market. The tasks are: Writing, Article or blog post writing SEO Marketing, Digital marketing, Photo, Audio, Video Editing, Admin jobs, Software development, Translation, Affiliate marketing, IT and Networking etc.
Bhairab IT Zone
It divides the Bible into sections fitted to the days of the year, and compels the Christian to read according to rule. No matter what the Holy Spirit may be trying to say to a man, still he goes on reading where the card tells him, dutifully checking it off each day. Every Spirit-led saint knows that there are times when he is held by an inward pressure to one chapter, or even one verse, for days at a time while he wrestles with God till some truth does its work within him. To leave that present passage to follow a pre-arranged reading schedule is for him wholly impossible. He is in the hand of the free Spirit, and reality is appearing before him to break and humble and lift and liberate and cheer. But only the free soul can know the glory of this. To this the heart bound by system will be forever a stranger. The slave to the file card soon finds that his prayers lose their freedom and become less spontaneous, less effective.
A.W. Tozer (The Best Of A. W. Tozer)
The main focus areas of reconnaissance are: Network information: Details about the type of network, security weaknesses, domain name, and shared files, among others. Host information: Details about the devices connected to a network, including their IP addresses, Mac addresses, operating system, open ports, and running services, among others. Security infrastructure: Details about the security policies, security mechanisms employed, weaknesses in the security tools, and policies, among others.
Yuri Diogenes (Cybersecurity - Attack and Defense Strategies: Counter modern threats and employ state-of-the-art tools and techniques to protect your organization against cybercriminals)
Children caught up in this system are the most vulnerable and yet are the least likely to be represented by counsel. In 1967, the U.S. Supreme Court ruled in In re Gault that children under the age of eighteen have the right to legal assistance with any criminal charges filed against them. In practice, however, children routinely “waive” their right to counsel in juvenile proceedings. In some states, such as Ohio, as many as 90 percent of children charged with criminal wrongdoing are not represented by a lawyer. As one public defender explained, “The kids come in with their parents, who want to get this dealt with as quickly as possible, and they say, ‘You did it, admit it.’ If people were informed about what could be done, they might actually ask for help.”69
Michelle Alexander (The New Jim Crow: Mass Incarceration in the Age of Colorblindness)
Contrary to the idea that anyone with even remotely German descent would be recognized as ethnically German, German ancestry at times counted for very little compared with language skills in the family. This can be seen in the case of Barbara and Marko K. from Komletinci in Croatian Syrmia. Their first application, filed in 1963, to relocate to West Germany with their four sons was rejected even though both partners had German mothers and Barbara even spoke German quite well. Over a year after the family had filed their application for the second time in 1968, they received a letter from the BVA explaining that they were in fact not German Volkszugehörige, because this required a Bekenntnis. And the “most reliable evidence” for this Bekenntnis—according to the BVA—was the use of the German language in the family. Since the consulate in Zagreb had revealed that the family spoke Croatian at home, they had to be considered ethnically Croatian and were therefore denied permission to immigrate.40 This outright identification of language and Bekenntnis, which was not covered by section 6 of the BVFG, had become common administrative practice for Germans from Yugoslavia. In the overall system of co-ethnic immigration to the FRG, it was not until the large-scale Russian German immigration of the 1990s that language skills obtained such an important status.
Jannis Panagiotidis (The Unchosen Ones: Diaspora, Nation, and Migration in Israel and Germany)
Sure, there's a system in place to care for orphans, but it's far from perfect and it is, after all, a system.
Jim Butcher (Proven Guilty (The Dresden Files, #8))
commands for deleting a block of text and placing it elsewhere in a file are called “cut” and “paste”—because Ginn’s editors, the first non-engineers ever to use such a system, were thinking about the scissors and paste pots they used to rearrange manuscripts on paper.
Michael A. Hiltzik (Dealers of Lightning: Xerox PARC and the Dawn of the Computer Age)
which a drawing imported into a text document can no longer be altered, but must be changed in the original graphics program and reintroduced into the text document.) Out of the box the Star was multilingual, offering typefaces and keyboard configurations that could be implemented in the blink of an eye for writing in Russian, French, Spanish, and Swedish through the use of “virtual keyboards”—graphic representations of keyboards that appeared on screen to show the user where to find the unique characters in whatever language he or she was using. In 1982 an internal library of 6,000 Japanese kanji characters was added; eventually Star users were able to draft documents in almost every modern language, from Arabic and Bengali to Amharic and Cambodian. As the term implied, the user’s view of the screen resembled the surface of a desk. Thumbnail-sized icons representing documents were lined up on one side of the screen and those representing peripheral devices—printers, file servers, e-mail boxes—on the other. The display image could be infinitely personalized to be tidy or cluttered, obsessively organized or hopelessly confused, alphabetized or random, as dictated by the user’s personality and taste. The icons themselves had been painstakingly drafted and redrafted so they would be instantaneously recognized by the user as document pages (with a distinctive dog-eared upper right corner), file folders, in and out baskets, a clock, and a wastebasket. Thanks to the system’s object-oriented software, the Star’s user could launch any application simply by clicking on the pertinent icon; the machine automatically “knew” that a text document required it to launch a text editor or a drawing to launch a graphics program. No system has ever equaled the consistency of the Star’s set of generic commands, in which “move,” “copy,” and “delete” performed similar operations across the entire spectrum of software applications. The Star was the epitome of PARC’s user-friendly machine. No secretary had to learn about programming or code to use the machine, any more than she had to understand the servomechanism driving the dancing golf ball to type on an IBM Selectric typewriter. Changing a font, or a margin, or the space between typed lines in most cases required a keystroke or two or a couple of intuitive mouse clicks. The user understood what was happening entirely from watching the icons or documents move or change on the screen. This was no accident: “When everything in a computer system is visible on the screen,” wrote David Smith, a designer of the Star interface, “the display becomes reality. Objects and actions can be understood purely in terms of their effects on the display.
Michael A. Hiltzik (Dealers of Lightning: Xerox PARC and the Dawn of the Computer Age)
The covers of both files had distinctive orange borders and were labeled top secret//sci, indicating they contained sensitive compartmented information, the highest level of classification in the American system.
Daniel Silva (The Collector (Gabriel Allon, #23))
What is Directed Energy Deposition in 3D Printing Directed Energy Deposition (DED) is a term that encompasses technologies involving semi-automated powder spraying and wire welding for manufacturing. When applied to 3D shapes, DED is considered an additive manufacturing process. It typically results in a rougher surface compared to Powder Bed Fusion, due to the larger bead sizes and coarser powder used, which often necessitates additional machining. DED systems generally fall into two categories: deposition systems and hybrid systems that combine a DED head with traditional machining equipment. The main advantages of DED include faster deposition compared to powder bed fusion 3D printing and the ability to create functionally graded material structures, especially when using powder. Additionally, since the feedstock and energy source move together, DED systems can manufacture very large structures, unrestricted by the size limitations of a build box. In some cases, DED can be more effective than traditional manufacturing methods or powder bed fusion. Most DED systems consist of a deposition head that uses either wire or powder and is mounted on a robot or CNC system. Common energy sources include Arc, Laser, or Electron Beam, with lasers being the most frequently used for powder feedstock. The process involves offline programming to generate a tool path from a sliced CAD file. The motion system then follows this path, depositing material in layers to build the desired shape. DED is compatible with a variety of weldable alloys, such as aluminum, steel, nickel, and titanium. Depending on the chosen alloy and process, shielding gas may be applied locally or within an enclosed environment.
Locanam 3D Printing
Benzer and I talked one afternoon in the spring of 1971, at Caltech, where he had moved six years before. His office was small, bright with daylight, crowded with bookshelves and files all stowed with a mariner’s sort of compulsive comfortable neatness. On a shelf was a photograph, enormously enlarged, of nerve connections in the eye of a fly. Benzer was medium dark, medium short, as neat and compact as the room. He was wearing a lightweight tan cardigan over a shirt and tie. The photo, he said, was an electron micrograph: he was presently mapping the genetics of mutations that affected the nervous systems—the behavior—of fruit flies. Half a dozen of the early molecular biologists were then moving into neurobiology; Benzer brought out a cartoon that one of them had sketched, a jokey ancestral tree with the faces of molecular neurobiologists pasted in according to the organisms they were working with. “It’s a new phase,” he said. “I feel that, y’know, when I came into molecular biology it was a pioneering science. But when a science becomes a discipline, which is essentially true of molecular biology now, when you can buy a textbook, take a course— There’s no question there are many surprises left … but a field to work in, to me personally, when it becomes a discipline, becomes less attractive. I find it more fun to be striking out in something which is more on the amorphous side. Which was true of molecular biology when I started. Another thing that becomes unpleasant is the redundancy of effort, a number of people doing the same thing—so that even when you make a discovery, six different guys discover it in the same week. You begin to feel that if it’s five guys instead of six guys it doesn’t make any difference. But still, my change was not so much to escape from that, as just following my own interests; I’ve got interested in behavior and I want to look at it.
Horace Freeland Judson (The Eighth Day of Creation: Makers of the Revolution in Biology)
Mental File Cabinet Starter Set: Why do you want to be a firefighter? ☐ What have you done to prepare? ☐ Conflict Resolution Customer Service x2 Diversity Best and Worst Trait Leadership Mental wellness Physical wellness Problem Solving City Specific Time Management Future Goals Education Teamwork Hardship Positive Attitude Work Ethic Support System Honesty Integrity Trust
Brendon Trayner (Fire Interview: The Storyteller Method)
NEVER file an insurance claim for a stolen air conditioner, stolen tools, stolen supplies, stolen carpet, stolen pipes, stolen furnaces, vandalism, or stolen anything. Pay for this out of your pocket. You do not want to jeopardize your insurance record from these puny claims.
Mike Butler (Landlording on AutoPilot: A Simple, No-Brainer System for Higher Profits, Less Work and More Fun (Do It All from Your Smartphone or Tablet!))
After all, these systems do not do a very good job of gathering trust. They lose files and they crash, oftentimes for no apparent reason. Moreover, they express no shame, no blame. They don’t apologize or say they are sorry. Worse, they appear to blame us, the poor unwitting users. Who is “they”? Why does it matter? We are angered, and appropriately so.
Donald A. Norman (Emotional Design: Why We Love (or Hate) Everyday Things)
The ruling elites grasp that the twin forces of deindustrialization and climate change make the future precarious. They sweep up our email correspondence, tweets, web searches, phone records, file transfers, live chats, financial data, medical data, criminal and civil court records, and information on dissident movements. They store this information in sophisticated computer systems. Surveillance cameras, biosensors, scanners, and face recognition technologies track our movements. When a government watches you twenty-four hours a day you cannot use the word “liberty.” This is the relationship between a master and a slave. Full surveillance, as political philosopher Hannah Arendt wrote, is not a means to discover or prevent crimes, but a device to have “on hand when the government decides to arrest a certain category of the population.
Chris Hedges (America: The Farewell Tour)
You know when you hear stories about people freezing when a tiger roars? That’s infrasound, having an effect on the parasympathetic nervous system.
Jim Butcher (Peace Talks (The Dresden Files, #16))
Before he could start writing Kilby’s application, though, Mosher had to resolve a fundamental tactical question. Anyone who applies for a patent has to decide whether he needs it for offensive or for defensive purposes—whether, to use lawyers’ favorite metaphor, he wants his patent to be a sword or a shield. The decision usually turns on the novelty of the invention. If somebody has a genuinely revolutionary idea, a breakthrough that his competitors are almost sure to copy, his lawyers will write a patent application they can use as a sword; they will describe the invention in such broad and encompassing terms that they can take it into court for an injunction against any competitor who tries to sell a product that is even remotely related. In contrast, an inventor whose idea is basically an extension of or an improvement on an earlier idea needs a patent application that will work as a shield—a defense against legal action by the sword wielders. Such a defensive patent is usually written in much narrower terms, emphasizing a specific improvement or a particular application of the idea that is not covered clearly in earlier patents. Probably the most famous sword in the history of the patent system was the sweeping application filed on February 14, 1876, by a teacher and part-time inventor named Alexander Graham Bell. That first telephone patent (No. 174,465) was so broad and inclusive that it became the cornerstone—after Bell and his partners had fought some 600 lawsuits against scores of competitors—of the largest corporate family in the world. In the nature of things, though, few inventions are so completely new that they don’t build on something from the past. The majority of patent applications, therefore, are written as shields—as improvements on some earlier invention. Some of the most important patents in American history fall into this category, including No. 586,193, “New and Useful Improvements in Transmitting Electrical Impulses,” granted to Guglielmo Marconi in 1898; No. 621,195, “Improvements in and Relating to Navigable Balloons,” granted to Ferdinand Zeppelin in 1899; No. 686,046, “New and Useful Improvements in Motor Carriages,” granted to Henry Ford in 1901; and No. 821,393, “New and Useful Improvements in Flying Machines,” granted to Orville and Wilbur Wright in 1906.
T.R. Reid (The Chip: How Two Americans Invented the Microchip and Launched a Revolution)
Even if a bit too rosy, this was not an outlandish proposition: in 1910, a more senior figure had also blasphemed when he said, ‘We have much to learn from Native States.’ Yes, many presented ‘a loose despotic system’ but given their strong local roots, these governments did not ‘press hard on the daily lives of the people’. On the other hand, the British machinery, though ‘scientific’, was rigid and not particularly better given the procedural harassment it inflicted.118 Yet another colonial officer observed that where the princes were one up on the Raj was in their ‘claim on the general regard of the people’. The idea of a maharajah, he believed, ‘strikes [the Indian] imagination’ in a way impossible for the file-bearing civil servant.
Manu S. Pillai (False Allies: India's Maharajahs in The Age of Ravi Varma)
All he wanted was to bury a memory in a new one not clouded by expectations that would never amount to anything and fuck Liam out of his system.
Hailey Turner (In the Solace (Metahuman Files #6))
One thing Tesla elected not to do when preparing for public ownership, which would have ramifications years later, was introduce a dual-class stock system. This was what allowed Larry Page and Sergey Brin at Google (or Mark Zuckerberg at Facebook two years later) to keep control of their company, even as they held a small fraction of its total stock. It’s unclear why Tesla’s IPO paperwork, which it filed in January 2010, contained no such provision
Tim Higgins (Power Play: Tesla, Elon Musk, and the Bet of the Century)
If men knew how often women are filled with white-hot rage when we cry, they would be staggered, I remember someone saying the other day, through the groaning static of my house's ancient intercom system. We self-objectify and lose the ability to even recognize the physiological changes that indicate anger. Mainly, though, we get sick. And oh, how true that is: We sicken, we are consumed, laughing wild amidst severest woe. We flourish with illnesses that have no cure and a thousand different names. Hysteria, the lung, wandering womb syndrome. Our own immune systems turn against us, fight us as if we ourselves were diseases, infestations. We wither, we swell, miscarry, grow phantom pregnancies, ingest our babies and turn them to stone. Our wounds fester, turn inside-out. Our equipment rusts and degenerates from over-use or lack of use or potential for use alike, decays within us, sliming blackly over the rest of our pulsing, stuttering interiors. Things get lost inside us: penises, forceps, scalpels. No maps to the interior. And every once in a while, we simply flush our systems without adequate warning, drooling blood in clots from inconvenient areas, dropping squalling flesh-lumps everywhere—in trash-cans, in bathrooms, shoved under beds and swaddled in bloodied plastic, buried shallowly, immured behind walls that bulge with black mould-stains, pumping out flies.
Gemma Files (Hymns of Abomination)
You are at your desk, you have set the book among your business papers as if by chance; at a certain moment you shift the file and you find the book before your eyes, you open it absently, you rest your elbows on the desk, you rest your temples against your hands, curled into fists, you seem to be concentrating on an examination of the papers and instead you are exploring the first pages of the novel. Gradually you settle back in the chair, you raise the book to the level of your nose, you tilt your chair, poised on its rear legs, you pull out a side drawer of the desk to prop your feet on it: the position of the feet during reading is of maximum importance, you stretch your legs out on the top of the desk, on the files to be expedited. But doesn’t this seem to show a lack of respect? Of respect that is, not for your job (nobody claims to pass judgment on your professional capacities: we assume that your duties are a normal element n the system of unproductive activities that occupies such a large part of the national and international economy), but for the book. Worse still if you belong—willingly or unwillingly—to the number of those for whom working means really working, performing, whether deliberately or without premeditation, something necessary or at least not useless for others as well as for oneself; then the book you have brought with you to your place of employment like a kind of amulet or talisman exposes you to intermittent temptations, a few seconds at a time subtracted from the principal object of your attention, whether it is the perforations of electronic cards, the burners of a kitchen stove, the controls of a bulldozer, a patient stretched out on the operating table with his guts exposed. In other words, it’s better for you to restrain your impatience and wait to open the book at home.
Italo Calvino (If on a Winter's Night a Traveler)
You are at your desk, you have set the book among your business papers as if by chance; at a certain moment you shift the file and you find the book before your eyes, you open it absently, you rest your elbows on the desk, you rest your temples against your hands, curled into fists, you seem to be concentrating on an examination of the papers and instead you are exploring the first pages of the novel. Gradually you settle back in the chair, you raise the book to the level of your nose, you tilt your chair, poised on its rear legs, you pull out a side drawer of the desk to prop your feet on it: the position of the feet during reading is of maximum importance, you stretch your legs out on the top of the desk, on the files to be expedited. But doesn’t this seem to show a lack of respect? Of respect that is, not for your job (nobody claims to pass judgment on your professional capacities: we assume that your duties are a normal element in the system of unproductive activities that occupies such a large part of the national and international economy), but for the book. Worse still if you belong—willingly or unwillingly—to the number of those for whom working means really working, performing, whether deliberately or without premeditation, something necessary or at least not useless for others as well as for oneself; then the book you have brought with you to your place of employment like a kind of amulet or talisman exposes you to intermittent temptations, a few seconds at a time subtracted from the principal object of your attention, whether it is the perforations of electronic cards, the burners of a kitchen stove, the controls of a bulldozer, a patient stretched out on the operating table with his guts exposed. In other words, it’s better for you to restrain your impatience and wait to open the book at home.
Italo Calvino (If on a Winter's Night a Traveler)
Randy and Amy had spent a full hour talking to Scott and Laura last night; they were the only people who made any effort to make Amy feel welcome. Randy hadn’t the faintest idea what these people thought of him and what he had done, but he could sense right away that, essentially that was not the issue because even if they thought he had done something evil, they at least had a framework, a sort of procedure manual, for dealing with transgressions. To translate it into UNIX system administration terms (Randy’s fundamental metaphor for just about everything), the post- modern, politically correct atheists were like people who had suddenly found themselves in charge of a big and unfathomably complex computer system (viz. society) with no documentation or instructions of any kind, and so whose only way to keep the thing running was to invent and enforce certain rules with a kind of neo-Puritanical rigor, because they were at a loss to deal with any deviations from what they saw as the norm. Whereas people who were wired into a church were like UNIX system administrators who, while they might not understand everything, at least had some documentation, some FAQs and How-tos and README files, providing some guidance on what to do when things got out of whack. They were, in other words, capable of displaying adaptability.
Neal Stephenson (Cryptonomicon)
Time itself has weight. It bears upon the mind—every joy, every regret, every minute of every day adding to the total—until the system by which we sort and file the data
Justin Cronin (The Ferryman)
Terminal Guides is a comprehensive online resource designed for both new and experienced users of Unix-like operating systems. It offers a range of tutorials, tips, and guides on using the terminal, managing files, and performing system tasks efficiently.
Terminal Guides
The Importance of an Accountant for Doctors Managing the financial side of a medical practice can be challenging for doctors who already have demanding schedules. This is why having a specialized accountant is essential for doctors. A qualified accountant can help doctors efficiently manage their financial records, optimize tax strategies, and ensure the overall financial health of the practice, allowing physicians to concentrate on patient care. Unique Financial Challenges for Doctors Doctors face unique financial challenges that are specific to the healthcare industry. These include managing income from multiple sources, handling billing systems for patient care, dealing with insurance reimbursements, and navigating complex healthcare regulations. Additionally, doctors often need to invest in high-cost medical equipment and balance personal and business financial planning. Without professional guidance, these financial aspects can become overwhelming. Accountants with expertise in the medical field understand these complexities and can offer valuable support. The Role of an Accountant in a Medical Practice A specialized accountant for doctors provides services that go beyond traditional bookkeeping. They help with financial planning, ensuring that the practice’s income and expenses are balanced effectively. Additionally, they manage payroll, tax filing, and compliance with healthcare regulations. Furthermore, an accountant can provide strategic advice on reducing costs and optimizing cash flow, making the practice more efficient and profitable. Doctors also benefit from tax planning services, ensuring that deductions specific to healthcare professionals are maximized while keeping the practice compliant with tax laws. Benefits of Hiring a Specialized Accountant By hiring an accountant who specializes in working with doctors, medical professionals can streamline their financial operations and reduce the risk of costly errors. This partnership allows doctors to focus on patient care, knowing that the financial side of their practice is being handled efficiently. Moreover, an accountant can provide financial insights that help doctors plan for the future, such as retirement planning or business expansion. Conclusion In conclusion, a specialized accountant is invaluable for doctors who want to ensure the financial success of their practice. With expertise in the unique financial challenges doctors face, accountants provide essential services that allow medical professionals to focus on their patients while maintaining a healthy financial standing.
sddm
having set broad parameters, she was faced with prioritizing nearly six hundred files EPIC had unearthed overnight. Fortunately, this, in microcosm, was the feat for which the system had been designed—to parse oceans of data into something manageable. Or as Atticus carelessly termed it, to cut through the “byte noise.
Ward Larsen (Deep Fake)
Imagine it like a magnet. You can see the effect it has on the iron filings, but you can’t see the magnetic field that’s at work.
John Whittington (Systemic Coaching and Constellations: The Principles, Practices and Application for Individuals, Teams and Groups)
http://hrweb.mit.edu/system/files/Ski...
Anonymous
I've got a system." He reached under a stack on the left corner of his desk, pulled out a file. "It's like the magician's tablecloth trick," she commented. "Nicely done." "Want to see me pull a rabbit out of my hat?
Nora Roberts (The Villa)
locate and slocate consult database files about the system (usually compiled and updated by a cron job) to find files or commands almost instantly. The location of the actual database files, what is indexed therein, and how often it is checked, may vary from system to system.
Anonymous
But now I also understand, firsthand, the meaning of what the caregivers who work in that system do every day. They do achieve amazing things, and when it’s your life or your child’s life or your mother’s life on the receiving end of those amazing things, there is no such thing as a runaway cost. You’ll pay anything, and if you don’t have the money, you’ll borrow at any mortgage rate or from any payday lender to come up with the cash. Which is why 60 percent of the nearly one million personal bankruptcies filed in the United States last year resulted from medical bills.
Steven Brill (America's Bitter Pill: Money, Politics, Backroom Deals, and the Fight to Fix Our Broken Healthcare System)
In the November 2010 issue of Rolling Stone, Matt Taibbi reported on the special courts established around the country for the express purpose of streamlining and accelerating foreclosure actions. Presided over by retired judges who were unfamiliar with the complexities involved in the mortgage fraud, these courts were not set up “to decide right and wrong, but to clear cases and blast human beings out of their homes with ultimate velocity.” The whole process was designed to transfer the property of ordinary citizens to the nation’s largest banks regardless of entitlement. As Taibbi wrote: The judges, in fact, openly admit that their primary mission is not justice but speed. One Jacksonville [Florida] judge, the Honorable A. C. Soud, even told a local newspaper that his goal is to resolve 25 cases per hour. Given the way the system is rigged, that means His Honor could well be throwing one ass on the street every 2.4 minutes. The following month, the Washington Post reported that similar courts in Virginia were “making it easier for lenders to defend themselves when accused of giving homeowners too little warning of impending foreclosures.” Indeed, “the process moves so quickly in Virginia…that homeowners can receive less than two weeks’ notice that their house is about to be sold on the courthouse steps.” The design of the courts guaranteed that even banks with no legal foreclosure entitlement had an almost insurmountable advantage. In the very short time they were accorded, homeowners seeking to stop foreclosure had to “gather evidence, file a lawsuit and potentially post a bond with the court that could total thousands of dollars.” These arduous requirements, combined with the near-impossible deadlines, meant that many borrowers simply ran out of time when trying to fight invalid foreclosure proceedings. It
Glenn Greenwald (With Liberty and Justice for Some: How the Law is Used To Destroy Equality and Protect the Powerful)
Jacksonville [Florida] judge, the Honorable A. C. Soud, even told a local newspaper that his goal is to resolve 25 cases per hour. Given the way the system is rigged, that means His Honor could well be throwing one ass on the street every 2.4 minutes. The following month, the Washington Post reported that similar courts in Virginia were “making it easier for lenders to defend themselves when accused of giving homeowners too little warning of impending foreclosures.” Indeed, “the process moves so quickly in Virginia…that homeowners can receive less than two weeks’ notice that their house is about to be sold on the courthouse steps.” The design of the courts guaranteed that even banks with no legal foreclosure entitlement had an almost insurmountable advantage. In the very short time they were accorded, homeowners seeking to stop foreclosure had to “gather evidence, file a lawsuit and potentially post a bond with the court that could total thousands of dollars.” These arduous requirements, combined with the near-impossible deadlines, meant that many borrowers simply ran out of time when trying to fight invalid foreclosure proceedings. It is hard to imagine a purer expression of two-tiered justice than special courts created for the sole purpose of helping large banks take people’s homes more expeditiously. Such courts show that the legal system not only fails to protect Americans from societal injustice and inequality, but also serves as a tool of injustice and inequality in its own right. Prisons
Glenn Greenwald (With Liberty and Justice for Some: How the Law is Used To Destroy Equality and Protect the Powerful)
Skeuomorphic is the technical term for incorporating old, familiar ideas into new technologies, even though they no longer play a functional role. Skeuomorphic designs are often comfortable for traditionalists, and indeed the history of technology shows that new technologies and materials often slavishly imitate the old for no apparent reason except that is what people know how to do. Early automobiles looked like horse-driven carriages without the horses (which is also why they were called horseless carriages); early plastics were designed to look like wood; folders in computer file systems often look the same as paper folders, complete with tabs. One
Donald A. Norman (The Design of Everyday Things)
Snowden was alert to the possibility that foreign intelligence services would seek his files, and was determined to prevent this. As a spy, one of his jobs had been to defend American secrets from Chinese attack. He knew the capabilities of America’s foes. Snowden made clear repeatedly that he didn’t want to damage US intelligence operations abroad. ‘I had access to full rosters of anybody working at the NSA. The entire intelligence community and undercover assets around the world. The locations of every station we have, all of their missions … If I just wanted to damage the US I could have shut down the surveillance system in an afternoon. That was never my intention,’ he said. He
Luke Harding (The Snowden Files: The Inside Story of the World's Most Wanted Man)
Take that and go play. I don’t care if it takes a year. Get the boy out of your system and then get back here. We’ve got work to do.” At the time, I thought Saul meant I needed to take some time to grow up. Get the boy out of my system and come back a man. But thinking back on that conversation a few years later, I’m pretty sure Saul believed there was something going on between me and Kier. I seriously doubt Saul ever had a relationship with anyone unless it would bring him sex or power. I’m not sure he understood anything else. But it wasn’t ever like that with Kiernan, no matter what Saul thought. I had all kinds of half-siblings, full-siblings, too, maybe, but I never thought of them as family. None of them ever stood up for me in the play yard, although I guess many of them were actually younger than me, so maybe that wasn't a fair expectation. None of them played “kick the cones” with me, none of them taught me about baseball. That’s the kind of thing brothers do. There was a whole big world out there to explore, and it would be a lot more fun exploring it together.
Rysa Walker (Simon Says: Tips for the Intrepid Time Traveler (The Chronos Files, #3.5))
Warning messages are surprisingly ineffective against mistakes (even nice requests, such as the one shown in Chapter 4, Figure 4.6, page 143). Was this a mistake or a slip? Both. Issuing the “close” command while the wrong window was active is a memory-lapse slip. But deciding not to read the dialog box and accepting it without saving the contents is a mistake (two mistakes, actually). What can a designer do? Several things:        •  Make the item being acted upon more prominent. That is, change the appearance of the actual object being acted upon to be more visible: enlarge it, or perhaps change its color.        •  Make the operation reversible. If the person saves the content, no harm is done except the annoyance of having to reopen the file. If the person elects Don’t Save, the system could secretly save the contents, and the next time the person opened the file, it could ask whether it should restore it to the latest condition.
Donald A. Norman (The Design of Everyday Things)
I know you don’t care about how the filing system works in government offices but you need to pretend to care Miss Scales,” he would say to me secretly. “The more you feign interest, the more they trust you. And why would we want their trust?” he’d ask rhetorically. “Because their trust in us will be our strongest weapon. Always remember, false friends are much more dangerous than true enemies.
Amelia Warren (Amba Scales and the Wings of Justice)
Forensic DNA Expert Anil Gupta offer a variety of DNA forensic testing systems including STR, Y-STR, and mitochondrial DNA. The DNA Sample in Forensic Analysis can be collected from blood, saliva, perspiration, hair, teeth, mucus, finger nails, semon and these can be found almost anywhere at crime scence. Anil Gupta is here to help make sense of this complex scientific issue and to testify before the court on these issues when necessary. Initial Consultation is FREE – If you send us the report we will lend you our expertise to help you understand your situation. Written Reports and Affidavits Discovery Documents – free by request, all you need to obtain the entire laboratory case file Mike is a leading forensic DNA expert with considerable experience in forensic biology. He is a clear and balanced expert opinion highly qualified provider to help lawyers, attorneys and lawyers support their clients and the criminal justice system. He is a very experienced scientist, whose career has focused on developing the ability to DNA analysis, defining standards, interpreting results, explaining evidence and providing advice to help both the defense and Processing equipment. Mike has a great depth of technical knowledge. As the chief DNA scientist (head of discipline) with the former Forensic Science Service (FSS), he established technical standards for DNA analytical processes, staff competencies and training. He was head of the Specialist Unit at FSS DNA and led the creation of the first dedicated facility of ultra-clean low template DNA. He has led the validation and implementation of several important new DNA processes. Through audit and process review, it can provide an effective and risk-based quality assurance, as it has for many years to the FSS, to the National DNA Database and to the courts.
Anil Gupta
At GovReports, our solution enables you to meet compliance reporting easier and faster. Those in the Building & Construction Industry need to prepare and lodge Taxable Payment Annual Reports (TPAR) to ATO as part of the contractor reports they must complete yearly. At GovReports, you can either upload the TPAR back up file for lodgement direct to ATO. Our system also accepts CSV file upload and or online form if you do not keep records in spreadsheet. For more information, call us at: 1300 65 25 90
Taxable Payment Annual Report Online Lodgments | Gov Reports
Biological databases impose particular limitations on how biological objects can be related to one another. In other words, the structure of a database predetermines the sorts of biological relationships that can be 'discovered'. To use the language of Bowker and Star, the database 'torques,' or twists, objects into particular conformations with respect to one another. The creation of a database generates a particular and rigid structure of relationships between biological objects, and these relationships guide biologists in thinking about how living systems work. The evolution of GenBank from flat-file to relational to federated database paralleled biologists' moves from gene-centric to alignment-centric to multielement views of biological action.
Hallam Stevens (Life Out of Sequence: A Data-Driven History of Bioinformatics)
I have never seen a more sublime demonstration of the totalitarian mind, a mind which might be likened unto a system of gears whose teeth have been filed off at random. Such a snaggle-toothed thought machine, driven by a standard or even a substandard libido, whirls with the jerky, noisy, gaudy pointlessness of a cuckoo clock in Hell.
Kurt Vonnegut Jr. (Mother Night)
In the current business scenario, it is imperative for all the business persons to take efficient Backup Thunderbird Mac so that they don’t have to lose their precious data permanently due to various security hazards. So, if you are also looking for an alternative for doing so, then Inventpure’s Mail Backup X is the best solution for you. This tool has an incremental backup system which means that it is smart enough to skip those files whose backup has been taken in the previous mail backup proceedings. Moreover, there will be no repetition of the data and users can locate them with complete ease. Also, the tool works independently as it is based on high-level automation which can accomplish the entire task automatically by itself. Users don’t have to participate in the software while backup proceedings are going on. Some Advanced Features Of Mail Backup X Are As Listed Below: • The Users Do Not Know How To Backup Thunderbird Email Can Also Use Mail Backup X, Effectively: This tool is designed for everybody to use it. In simple words, users having basic knowledge of computers can also Backup Thunderbird Mac without any hassles. The system generates on-screen wizards at every step to assist the users. Such instructions are written in a simplified and lucid form so that professionals, as well as the novice users, can understand them with ease. • Download The Free Demo Of Mail Backup X Take Unlimited Thunderbird Backup Without Paying Any Cost: The company has launched the 15 days free demo trial for those users who have doubts relating to its performance. The company has not locked any of its features so that users can have a bright idea about its performance. During the free trial period, Users can export up to 10 files in one process. Limited exportation of files is the only constraint of free demo version; if you want to break this restriction, you should buy its paid license package for a lifetime. • Mail Backup X Can Also Play The Role Of Email Conversion Tool With Great Perfection: This email backup software has advanced data conversion engine that is mostly used by professional conversion tools. Through this, users can convert any mail to any file format that is supported by almost all the major email clients. It will come up with complete, appropriate and 100% accurate results with zero file damages. Thus, users do not need to purchase additional data converter; Mail Backup X can flawlessly restore their email archives in the format of their choice without any compatibility issues. • Mail Backup X Come Up With Advanced Emailing Services Which Makes Your Thunderbird Email Backup Process A Piece Of Cake: Inventpure’s Mail Backup X not only takes mail backups from all the major email clients like Outlook, Thunderbird, Apple Mail, etc. but also supports IMAP and POP services by directly operating on your Mac system. More than that, it can save your emails in PDF format for quick conversion from soft copies into hard copies.
Maddy Roby
Abrams voice cut in over the comm. “My God, this place is breath-taking!” “It is a palace for the gods,” added Brock. The group stood gawking at the magnificence of the hall surrounding them. Delanda went to the table, placed her helmet and pack on it, and began pulling tablets, scanners, and other accessories out. She wrestled off her gloves, but had trouble with the suit torso so Wilson had to intervene and help. Without a thought to the revealing fit of the white stretch suit liner, she escaped the spacesuit bottom and placed it on the table. Then, with still no self-consciousness at all, she stripped the suit liner off down to athletic bra and slim panties and pulled her pink, rolled up vacuum-packed flight coveralls and cloth boots from the suit pack. After excitedly dressing, she hurriedly grabbed a scanner from her pack and began investigating the hall. Show over, one by one we all removed our suits and became visitors in white suit liners. Wilson gave his fatherly warning. “Everyone be very careful removing and folding those liners. If you tear or damage the thermal control system in any way you could have an unpleasant trip back to the ship. Also, be careful to tuck in your suit communicator since we’ll all be using wrist coms from now on. That is if they actually work here.” Delanda ignored his comments and headed for the far end of the hall. Wilson pulled on black coveralls, R.J.’s were farmhouse blue, Brock and Wen light green, Abrams in hospital scrubs green, and Sharma’s and Ansara’s in tan. Mine were captain’s blue. As we studied our celestial surroundings, Delanda returned and spoke in a commanding voice. “Gentlemen, if you would grab your tablets and gather around me here at this magnificent table we should get started.” For the first time there was a unanimous look of annoyance, although everyone quickly complied. R.J. and I stood opposite her feeling like two school kids being ushered around on a field trip. Delanda checked to be sure everyone was paying attention. “Okay, I’m assuming our intranet will work in here even though we’re out of contact with the ship. Let’s try it. All of you use your tablets to access mine and copy the file titled: Translations. Let me know if anyone has trouble.” Delanda’s tablet appeared on our screens. As she had guessed, there were no problems getting in. Once copied, I opened the file and found dozens of Altair symbols, some highlighted, most grayed-out. “Okay, everyone got in? Right? Okay, the symbols you see highlighted are the ones I believe I have a rudimentary translation for. Those that are in gray, your guess is as good as mine.” “How do you propose we proceed?” asked Brock. “Speaking as an experienced field researcher, I would suggest one of us photographs and documents this first chamber thoroughly while the rest of us split up and do the same with other chambers, periodically reporting back here after each excursion. We should have one central person remain here to monitor the progress of everyone in the event they get into trouble. I would think that would be you, Commander Mirtos, since you are the best at rescue. Does anyone have any objections?” R.J. leaned over. “I believe this is a non-hostile takeover. Are you going to step in?” “Not until she says something I disagree with.” Delanda continued. “So, if no one has any objections the first order of business will be to photograph every wall symbol we find along with any artifacts possibly associated
E.R. Mason (Mu Arae (Adrian Tarn Book 5))
subscribing to a JFK assassination conspiracy theory amounts to a conviction that, in a moment of extreme crisis, the American political system failed. The people most invested in the capital’s way of life — the political and media classes — are prone to reject the notion out of hand.
Jefferson Morley (CIA & JFK: The Secret Assassination Files)
A college student who wants to file a complaint of sexual assault within the campus disciplinary system informs a university employee such as an assistant dean for student life, or perhaps the Title IX coordinator. That person eventually forwards the complaint to a university disciplinary panel that may be composed of, for example, an associate dean with a master's degree in English literature, a professor of chemistry, and a senior majoring in anthropology. Unlike criminal prosecutors, members of the disciplinary panels do not have access to subpoena powers or to crime labs. They often have no experience in fact-finding, arbitration, conflict resolution, or any other relevant skill set. There is, to put it mildly, little reason to expect such panels to have the experience, expertise, and resources necessary to adjudicate a contested claim of sexual assault. Making matters worse, most campus tribunals ban attorneys for the parties (even in an advisory capacity), rules of procedure and evidence are typically ad hoc, and no one can consult precedents because records of previous disputes are sealed due to privacy considerations. Campus "courts" therefore have an inherently kangoorish nature. Even trained police officers and prosecutors too often mishandle sexual assault cases, so it's not surprising that the amateurs running the show at universities tend to have a poor record. And indeed, some victims' advocacy groups, such as the Rape, Abuse and Incest National Network (RAINN), oppose having the government further encourage the campus judicial system to primarily handle campus sexual assault claims, because that means not treating rape as a serious crime. A logical solution, if federal intervention is indeed necessary, would be for OCR [US Department of Education's Office of Civil Rights] to mandate that universities encourage students who complain of sexual assault to report the assault immediately to the police, and that universities develop procedures to cooperate with police investigations. Concerns about victims' well-being when prosecutors decline to pursue a case could also be adjudicated in a real court, as a student could seek a civil protective order against her alleged assailant. OCR could have mandated or encouraged universities to cooperate with those civil proceedings, which in some cases might warrant excluding an alleged assailant from campus.
David E. Bernstein (Lawless: The Obama Administration's Unprecedented Assault on the Constitution and the Rule of Law)
CLS, or Chronic Lycanthropy Syndrome, seemed to be the latest step in the evolution of impulsivity disorders, and it soon became the new diagnostic darling of the pediatrician and child psychiatrists’ offices. Children displayed the full range of symptoms by early adolescence, and often those that couldn’t be cured or drugged into submission would just disappear or end up in the correctional system.
Cecilia Dominic (The Mountain's Shadow (The Lycanthropy Files #1))
It was indeed the transcendent force of modernization that accounts for the unparalleled strength of Know-Nothingism in Massachusetts. The political fallout from the pressures of modernization, however, included more than the backlash of the native-born majority against immigrants, Catholics, and the South that most historians perceive as the essence of Know-Nothingism. Explosive urban and industrial growth had thrust the Commonwealth into the forefront of the industrial states in the antebellum period, creating, in the process, wrenching social and economic dislocations. The failure of the established parties to mount a significant response to the myriad issues and problems spawned in the matrix of modernization weakened partisan attachments and set the rank and file of the established parties on a quest for a political vehicle that would make a difference in their lives. In 1854, such a vehicle materialized in the form of an antiparty, antipolitician populist movement that promised to cleanse the statehouse of corrupt old parties and self-serving political careerists and turn the government over to the people so that they might right the wrongs that had for so long afflicted them. Among the afflictions, it is true, were the many social problems associated with mass immigration; but there were other troubling and pervasive concerns endemic to an unharnessed, rapidly expanding urban, industrial order, including the tyrannical factory system, the decline in the status of labor, the widening gulf between rich and poor, and the deteriorating quality of urban life.
John R. Mulkern (The Know-Nothing Party In Massachusetts: The Rise And Fall Of A People's Movement)
There are thousands of names for them, in every culture—mana, psychic energy, totem, juju, chi, bioethereal power, the Force, the soul. It’s an incredibly complex system of interweaving energy that influences good old Mother Earth around us, but it all boils down to a fairly simple concept: Shit happens.
Jim Butcher (Blood Rites (The Dresden Files, #6))
My host, GitHub’s CEO, Chris Wanstrath, began by telling me how the “Git” got into GitHub. Git, he explained, is a “distributed version control system” that was invented in 2005 by Linus Torvalds, one of the great and somewhat unsung innovators of our time. Torvalds is the open-source evangelist who created Linux, the first open-source operating system that competed head-to-head with Microsoft Windows. Torvalds’s Git program allowed a team of coders to work together, all using the same files, by letting each programmer build on top of, or alongside, the work of others, while also allowing each to see who made what changes—and to save them, undo them, improve them, and experiment with them.
Thomas L. Friedman (Thank You for Being Late: An Optimist's Guide to Thriving in the Age of Accelerations)
Not all roots are buried down in the ground some are at the top of the tree.
Jinvirle
60 percent of the nearly one million personal bankruptcies filed in the United States last year resulted from medical bills. Even
Steven Brill (America's Bitter Pill: Money, Politics, Backroom Deals, and the Fight to Fix Our Broken Healthcare System)
There is only one code stream. You can develop in a temporary branch, but never let it live longer than a few hours. Multiple code streams are an enormous source of waste in software development. I fix a defect in the currently deployed software. Then I have to retrofit the fix to all the other deployed versions and the active development branch. Then you find that my fix broke something you were working on and you interrupt me to fix my fix. And on and on. There are legitimate reasons for having multiple versions of the source code active at one time. Sometimes, though, all that is at work is simple expedience, a micro-optimization taken without a view to the macro-consequences. If you have multiple code bases, put a plan in place for reducing them gradually. You can improve the build system to create several products from a single code base. You can move the variation into configuration files. Whatever you have to do, improve your process until you no longer need multiple versions of the code.
Kent Beck (Extreme Programming Explained: Embrace Change (The XP Series))
I have never seen a more sublime demonstration of the totalitarian mind, a mind which might be likened unto a system of gears whose teeth have been filed off at random. Such a snaggle-toothed thought machine, driven by a standard or even a substandard libido, whirls with the jerky, noisy, gaudy pointlessness of a cuckoo clock in Hell. The
Kurt Vonnegut Jr. (Mother Night)
intrusion: someone had accessed and exfiltrated 19.7 million security clearance applications. Not only was the applicant information stolen, but the applications themselves revealed information about 1.8 million nonapplicants referenced in the applications, mostly family members. Even worse, they got transcripts of interviews conducted by background investigators, along with the usernames and passwords that applicants had used to fill out forms online, and 5.6 million fingerprint files. We all but knew from the start that Chinese intelligence was responsible for the theft, and the counterintelligence implications were staggering, not just from what they had, but from what they didn’t have. OPM didn’t conduct security clearance investigations for all of the IC elements, and whoever had the wherewithal to penetrate its systems would certainly know which agencies and departments OPM conducted investigations for and which they didn’t. They could therefore also start making assumptions about cover for cleared people whose files they didn’t have.
James R. Clapper (Facts and Fears: Hard Truths from a Life in Intelligence)
How Individual License Package of OLM Converter Pro Helpful in OLM to MBOX Conversion! Most of the companies, do not bother about user’s problems they only want to make money either fair or unfair means. It’s very difficult o finds a user-friendly company which performs their social responsibilities also. Gladwev is the only one IT company which cares about users and provides the high-grade product. Nowadays it in the limelight for its excellent innovation “OLM Converter Pro” the admirable migration tool can Convert Outlook for Mac to Apple Mail. Gladwev launched Individual License Package, which composes of many advantages. Let's look at various features of the Individual version of OLM Converter Pro: 1. Individual License Package can be very helpful to an individual or single user those have limited files for to convert Outlook Mac to Mac Mail. It can merge multiple files of Contact and calendar into .vcf and .ical respectively. 2. This software is capable to converts single user Email’s Accounts along with their attached documents, audio, video, pictures, drafts, etc. it ensures the complete and accurate OLM to MBOX Conversion. 3. An individual version of this software application can install on TWO Mac devices; it is compatible with all version of Mac system. This software provides high-performance speed as compared to other migration tools. 4. Gladwev offers this License Package for both Mac and Windows systems. The user can buy it according to their necessity of conversion. 5. Moreover, it is under the budget of the user. The user can purchase at only US$ 39. 6. Gladwev also provides easiness for locating this conversion software on the Web as highlighting the option, “Download Now.” 7. The best part of Individual License Package is that Gladwev has provided A to Z proper instruction or guidance that makes the user comfortable with this migration application. 8. This version of OLM Converter Pro satisfies all the conversion requirement and expectations of an individual. 9. Gladwev always readily available to provide day and night customer support services that resolve the problems of users and make Export Mail from Outlook for Mac to Apple Mail. 10. If the user wants more details about company or product. All the information and privacy policy have briefly explained in very simple and understandable language. 11. Gladwev also best in the matter of keeping privacy. It never reveals user’s private information to outsiders or any other.
Email Conversion
( O1O'2920'8855 )PCASH( O1O'2920'8855 ) After the Commission launched the program, it expanded the operation to listen to the difficulties of the people onsite and provide timely solutions. To this end, it created an exclusive division and ran a regularly operated system using the total human resource pool of the ACRC investigators. In addition, the complaints filed during the onsite outreach program were monitored with special attention, in order
pcash
You’ll always have discontents in any system, Kate. Some people feel they’re being oppressed or held back, even if they have everything they need or everything that a reasonable person could want. Some people always want more.
Rysa Walker (Time's Edge (The Chronos Files, #2))
From a nitty-gritty, practical standpoint, here is the drill that can get you there:   Loose Papers Pull out all miscellaneous scraps of paper, business cards, receipts, and so on that have crept into the crevices of your desk, clothing, and accessories. Put it all into your in-basket for processing.   Process Your Notes Review any journal entries, meeting notes, or miscellaneous notes scribbled on notebook paper. List action items, projects, waiting-fors, calendar events, and someday/ maybes, as appropriate. File any reference notes and materials. Stage your “Read/Review” material. Be ruthless with yourself, processing all notes and thoughts relative to interactions, projects, new initiatives, and input that have come your way since your last download, and purging those not needed.   Previous Calendar Data Review past calendar dates in detail for remaining action items, reference information, and so on, and transfer that data into the active system. Be able to archive your last week’s calendar with nothing left uncaptured.   Upcoming Calendar Look at future calendar events (long- and short-term). Capture actions about arrangements and preparations for any upcoming events.   Empty Your Head Put in writing (in appropriate categories) any new projects, action items, waiting-fors, someday/maybes, and so forth that you haven’t yet captured.   Review “Projects” (and Larger Outcome) Lists Evaluate the status of projects, goals, and outcomes one by one, ensuring that at least one current kick-start action for each is in your system.   Review “Next Actions” Lists Mark off completed actions. Review for reminders of further action steps to capture.   Review “Waiting For” List Record appropriate actions for any needed follow-up. Check off received items.   Review Any Relevant Checklists Is there anything you haven’t done that you need to do?   Review “Someday/Maybe” List Check for any projects that may have become active and transfer them to “Projects.” Delete items no longer of interest.   Review “Pending” and Support Files Browse through all work-in-progress support material to trigger new actions, completions, and waiting-fors.   Be Creative and Courageous Are there any new, wonderful, hare-brained, creative, thought-provoking, risk-taking ideas you can add to your system?
David Allen (Getting Things Done: The Art of Stress-Free Productivity)
She leaned forward and placed her chin on her fist. 'So. Can you tell me in a sentence or two how I can fix my life using vaastu shastra techniques?' He smiled. 'You'll be surprised to hear that I can. These things may be complex on the surface, but they are built on very simple truths.' He leaned back and joined his fingertips together, looking up and thinking for a few seconds. 'Let me put it like this. Consider your desk, whether it is an office desk, or a table at home where you receive and write letters. What happens at that desk? Answer: every day, a number of letters are received. Or faxes. Or advertisements. These are all items with potential energy applications. They are all bits of paper urging you to react in some way—to buy a product, or respond with a phone call, or change the way you do something. Now what we should do is to react to that potential energy transaction in some way—and thus burn up the energy in it. We should either fulfill it, by doing what it says, or we should make a decision that we are not going to fulfill it, but instead throw the paper away. But, instead, we take that piece of paper and we balance it on our desk, unwilling to make an immediate decision. This happens to a number of pieces of paper every day, and then before we know it, there is a huge pile of pieces of paper on the desk. When it gets too high, we take the pile of paper and we tuck it into a drawer. When the drawer gets so full it cannot close, we tuck the paper into a cardboard box and stick it under the desk. Soon our desks are jammed with paper—underneath, inside & on top.' 'Good God! You've been spying on me!' 'Alas, it is what most people's desks look like.' 'What's the effect of all these unfulfilled bits of paper? What did you call it—potential energy transactions?' 'I shall tell you. The day comes when you arrive at your desk, and you have lots of work to do, but you can't do it. You feel an incredible amount of inertia. You can't get started. And you have no idea why.' 'You peeping Tom! You've been staring at me through my office window.' 'The reason why you can't get started is that your desk is swamped with frozen energy. It is lying there, waiting to be handled. But the inertia infects everything you do, so that you end up unable to do anything.' She shook her head. 'It's awful, but it all rings true. What about computers? I use mostly email these days.' 'They're just the same. The only difference is that instead of physical letters arriving at your desk, emails arrive in your inbox. Again, each of them is a potential energy transaction. And again, the right thing to do would be to delete each one, or reply to each one—and then delete it. But that's not what we do, is it?' 'It is not.' 'We leave them there in our inboxes.' She nodded guiltily. 'And soon there are 600 emails in our inboxes.' '800.' 'And eventually, we select them all and stick them in a file called "archive"—which is simply the computer equivalent of the cardboard box under the desk. And the result is the same. Our email systems become full of frozen energy, & inertia spreads out of it. We find ourselves unable to do any useful work.' 'I've often wondered why I feel like I am walking in treacle. So what should one do about all this?' Sinha waved a bony index finger at her. 'This is what I recommend. Divide all your paperwork into 2 piles. One of stuff that is useless and should be thrown away. And one of stuff which you think may be of use one day. Then you throw both piles away.' 'Both piles?' 'Both piles. By that stage, you will have started to feel the benefits that clarity can bring.' 'And I suppose one should delete all one's emails as well.' 'Exactly. Even if you don’t, that nice Mr. Gates has arranged for the computer to crash every few years, so that all your stuff gets wiped out anyway.
Nury Vittachi (MR Wong Goes West: A Feng Shui Detective Novel)
Lastly the corporate office design Gauteng will also require to be planned with particular furniture and tools requirements in mind. It is also important to consideration on sufficient working spaces. Interior office design has turned a little more complex as compare than interior design for residential assignments. This article is all about corporate interiors and project management Gauteng. Interior Office design Floor plans The interior floor plan for an office is first task for space planning. It require skill as well as good creativity for problem solving ability but also special facts of building sets as well as information of the company's needs who will dwell there, normally known as the client as well as tenant. Here the floor plan layout requires to meet all the companies obligations such as how many offices, meeting rooms and storage areas among others and also forces with the applicable regulations as well as standards. The floor plan will also include office designs for different technical and engineering services which include: • Electrical plans for lighting and power • Services designs for Emergency such as exit signs, emergency lighting and mass departure warning methods • Designs related to communications services including phones and computers • Designs related to Fire sprinklers of fire recognition systems and also flames hose reels • Air conditioning Designs • Plumbing services Designs • Designs for safety and entry control systems The corporate interiors and project management needs to be planned with keeping in mind not only all the standards necessary but also the needs of the client's requirements. Office re fit is a general good design perform for work flow and helpful working environments. • Finding the amount of offices, conference rooms and release plan workstations obligatory by the client. • Finding sufficient normal facilities which include storage areas, filing areas, printing areas, and staff facilities including kitchens and toilet facilities. • Office layout for right sitting of offices and workstation work areas to take full advantage of entry to natural light. • Concern of main workflow spaces and flow corridors. • Site of public areas including the reception as well as meeting rooms to keep away from disturbance to the common office work areas. • Area of heavy load luggage compartment systems to make sure structural uprightness of the floor. • Right area for break out as well as staff relaxation areas. • Correct furniture and tools planning
Interior Office Design Planning beforehand is Important
On a UNIX system, everything is a file; if something is not a file, it is a process.
Machtelt Garrels (Introduction to Linux: A Hands on Guide)
Confidentiality - seeks to prevent the unauthorized disclosure of information: it keeps data secret • Integrity - seeks to prevent unauthorized modification of information. In other words, integrity seeks to prevent unauthorized write access to data. Integrity also seeks to ensure data that is written in an authorized manner is complete and accurate. • Availability - ensures that information is available when needed • Subject - An active entity on an information system • Object - A passive data file • Annualized Loss Expectancy—the cost of loss due to a risk over a year • Threat—a potentially negative occurrence • Vulnerability—a weakness in a system • Risk—a matched threat and vulnerability • Safeguard—a measure taken to reduce risk • Total Cost of Ownership—the cost of a safeguard • Return on Investment—money saved by deploying a safeguard
Eric Conrad (CISSP Study Guide)