Positive Telecommunications Quotes

We've searched our database for all the quotes and captions related to Positive Telecommunications. Here they are! All 9 of them:

Imagine yourself sitting at a computer, about to visit a website. You open a Web browser, type in a URL, and hit Enter. The URL is, in effect, a request, and this request goes out in search of its destination server. Somewhere in the midst of its travels, however, before your request gets to that server, it will have to pass through TURBULENCE, one of the NSA’s most powerful weapons. Specifically, your request passes through a few black servers stacked on top of one another, together about the size of a four-shelf bookcase. These are installed in special rooms at major private telecommunications buildings throughout allied countries, as well as in US embassies and on US military bases, and contain two critical tools. The first, TURMOIL, handles “passive collection,” making a copy of the data coming through. The second, TURBINE, is in charge of “active collection”—that is, actively tampering with the users. You can think of TURMOIL as a guard positioned at an invisible firewall through which Internet traffic must pass. Seeing your request, it checks its metadata for selectors, or criteria, that mark it as deserving of more scrutiny. Those selectors can be whatever the NSA chooses, whatever the NSA finds suspicious: a particular email address, credit card, or phone number; the geographic origin or destination of your Internet activity; or just certain keywords such as “anonymous Internet proxy” or “protest.” If TURMOIL flags your traffic as suspicious, it tips it over to TURBINE, which diverts your request to the NSA’s servers. There, algorithms decide which of the agency’s exploits—malware programs—to use against you. This choice is based on the type of website you’re trying to visit as much as on your computer’s software and Internet connection. These chosen exploits are sent back to TURBINE (by programs of the QUANTUM suite, if you’re wondering), which injects them into the traffic channel and delivers them to you along with whatever website you requested. The end result: you get all the content you want, along with all the surveillance you don’t, and it all happens in less than 686 milliseconds. Completely unbeknownst to you. Once the exploits are on your computer, the NSA can access not just your metadata, but your data as well. Your entire digital life now belongs to them.
Edward Snowden (Permanent Record)
Imagine yourself sitting at a computer, about to visit a website. You open a Web browser, type in a URL, and hit Enter. The URL is, in effect, a request, and this request goes out in search of its destination server. Somewhere in the midst of its travels, however, before your request gets to that server, it will have to pass through TURBULENCE, one of the NSA’s most powerful weapons. Specifically, your request passes through a few black servers stacked on top of one another, together about the size of a four-shelf bookcase. These are installed in special rooms at major private telecommunications buildings throughout allied countries, as well as in US embassies and on US military bases, and contain two critical tools. The first, TURMOIL, handles “passive collection,” making a copy of the data coming through. The second, TURBINE, is in charge of “active collection”—that is, actively tampering with the users. You can think of TURMOIL as a guard positioned at an invisible firewall through which Internet traffic must pass. Seeing your request, it checks its metadata for selectors, or criteria, that mark it as deserving of more scrutiny. Those selectors can be whatever the NSA chooses, whatever the NSA finds suspicious: a particular email address, credit card, or phone number; the geographic origin or destination of your Internet activity; or just certain keywords such as “anonymous Internet proxy” or “protest.” If TURMOIL flags your traffic as suspicious, it tips it over to TURBINE, which diverts your request to the NSA’s servers. There, algorithms decide which of the agency’s exploits—malware programs—to use against you. This choice is based on the type of website you’re trying to visit as much as on your computer’s software and Internet connection. These chosen exploits are sent back to TURBINE (by programs of the QUANTUM suite, if you’re wondering), which injects them into the traffic channel and delivers them to you along with whatever website you requested. The end result: you get all the content you want, along with all the surveillance you don’t, and it all happens in less than 686 milliseconds. Completely unbeknownst to you. Once the exploits are on your computer, the NSA can access not just your metadata, but your data as well. Your entire digital life now belongs to them.
Edward Snowden (Permanent Record)
...the centrality of competitiveness as the key to growth is a recurrent EU motif. Two decades of EC directives on increasing competition in every area, from telecommunications to power generation to collateralizing wholesale funding markets for banks, all bear the same ordoliberal imprint. Similarly, the consistent focus on the periphery states’ loss of competitiveness and the need for deep wage and cost reductions therein, while the role of surplus countries in generating the crisis is utterly ignored, speaks to a deeply ordoliberal understanding of economic management. Savers, after all, cannot be sinners. Similarly, the most recent German innovation of a constitutional debt brake (Schuldenbremse) for all EU countries regardless of their business cycles or structural positions, coupled with a new rules-based fiscal treaty as the solution to the crisis, is simply an ever-tighter ordo by another name. If states have broken the rules, the only possible policy is a diet of strict austerity to bring them back into conformity with the rules, plus automatic sanctions for those who cannot stay within the rules. There are no fallacies of composition, only good and bad policies. And since states, from an ordoliberal viewpoint, cannot be relied upon to provide the necessary austerity because they are prone to capture, we must have rules and an independent monetary authority to ensure that states conform to the ordo imperative; hence, the ECB. Then, and only then, will growth return. In the case of Greece and Italy in 2011, if that meant deposing a few democratically elected governments, then so be it. The most remarkable thing about this ordoliberalization of Europe is how it replicates the same error often attributed to the Anglo-American economies: the insistence that all developing states follow their liberal instruction sheets to get rich, the so-called Washington Consensus approach to development that we shall discuss shortly. The basic objection made by late-developing states, such as the countries of East Asia, to the Washington Consensus/Anglo-American idea “liberalize and then growth follows” was twofold. First, this understanding mistakes the outcomes of growth, stable public finances, low inflation, cost competitiveness, and so on, for the causes of growth. Second, the liberal path to growth only makes sense if you are an early developer, since you have no competitors—pace the United Kingdom in the eighteenth century and the United States in the nineteenth century. Yet in the contemporary world, development is almost always state led.
Mark Blyth (Austerity: The History of a Dangerous Idea)
told my people that I wanted only the best, whatever it took, wherever they came from, whatever it cost. We assembled thirty people, the brightest cybersecurity minds we have. A few are on loan, pursuant to strict confidentiality agreements, from the private sector—software companies, telecommunications giants, cybersecurity firms, military contractors. Two are former hackers themselves, one of them currently serving a thirteen-year sentence in a federal penitentiary. Most are from various agencies of the federal government—Homeland Security, CIA, FBI, NSA. Half our team is devoted to threat mitigation—how to limit the damage to our systems and infrastructure after the virus hits. But right now, I’m concerned with the other half, the threat-response team that Devin and Casey are running. They’re devoted to stopping the virus, something they’ve been unable to do for the last two weeks. “Good morning, Mr. President,” says Devin Wittmer. He comes from NSA. After graduating from Berkeley, he started designing cyberdefense software for clients like Apple before the NSA recruited him away. He has developed federal cybersecurity assessment tools to help industries and governments understand their preparedness against cyberattacks. When the major health-care systems in France were hit with a ransomware virus three years ago, we lent them Devin, who was able to locate and disable it. Nobody in America, I’ve been assured, is better at finding holes in cyberdefense systems or at plugging them. “Mr. President,” says Casey Alvarez. Casey is the daughter of Mexican immigrants who settled in Arizona to start a family and built up a fleet of grocery stores in the Southwest along the way. Casey showed no interest in the business, taking quickly to computers and wanting to join law enforcement. When she was a grad student at Penn, she got turned down for a position at the Department of Justice. So Casey got on her computer and managed to do what state and federal authorities had been unable to do for years—she hacked into an underground child-pornography website and disclosed the identities of all the website’s patrons, basically gift-wrapping a federal prosecution for Justice and shutting down an operation that was believed to be the largest purveyor of kiddie porn in the country. DOJ hired her on the spot, and she stayed there until she went to work for the CIA. She’s been most recently deployed in the Middle East with US Central Command, where she intercepts, decodes, and disrupts cybercommunications among terrorist groups. I’ve been assured that these two are, by far, the best we have. And they are about to meet the person who, so far, has been better. There is a hint of reverence in their expressions as I introduce them to Augie. The Sons of Jihad is the all-star team of cyberterrorists, mythical figures in that world. But I sense some competitive fire, too, which will be a good thing.
Bill Clinton (The President Is Missing)
Just as our view of work affects our real experience of it, so too does our view of leisure. If our mindset conceives of free time, hobby time, or family time as non-productive, then we will, in fact, make it a waste of time. For example, many of the business leaders and Harvard students I work with exhibit the telltale symptoms of the “workaholic’s curse.” They conceive of all the time spent away from actual work to be a hindrance to their productivity, so they squander it. As one CEO of a telecommunications company in Malaysia told me: “I wanted to be productive because that’s what makes me happy, so I tried to maximize the time I spent working. But, as I later realized, I had too narrowly defined what ‘being productive’ was. I started to feel guilty when I did anything that wasn’t work. Nothing else, not exercise or time with my wife or relaxation, was productive. So I never had time to recharge my batteries, which meant that, ironically, the more I worked, the more my productivity plummeted.
Shawn Achor (The Happiness Advantage: The Seven Principles of Positive Psychology That Fuel Success and Performance at Work)
A Role Model for Managers of Managers Gordon runs a technical group with seven managers reporting to him at a major telecommunications company. Now in his late thirties, Gordon was intensely interested in “getting ahead” early in his career but now is more interested in stability and doing meaningful work. It’s worth noting that Gordon has received some of the most positive 360 degree feedback reports from supervisors, direct reports, and peers that we’ve ever seen. This is not because Gordon is a “soft touch” or because he’s easy to work for. In fact, Gordon is extraordinarily demanding and sets high standards both for his team and for individual performance. His people, however, believe Gordon’s demands are fair and that he communicates what he wants clearly and quickly. Gordon is also very clear about the major responsibility of his job: to grow and develop managers. To do so, he provides honest feedback when people do well or poorly. In the latter instance, however, he provides feedback that is specific and constructive. Though his comments may sting at first, he doesn’t turn negative feedback into a personal attack. Gordon knows his people well and tailors his interactions with them to their particular needs and sensitivities. When Gordon talks about his people, you hear the pride in his words and tone of voice. He believes that one of his most significant accomplishments is that a number of his direct reports have been promoted and done well in their new jobs. In fact, people in other parts of the organization want to work for Gordon because he excels in producing future high-level managers and leaders. Gordon also delegates well, providing people with objectives and allowing them the freedom to achieve the objectives in their own ways. He’s also skilled at selection and spends a great deal of time on this issue. For personal reasons (he doesn’t want to relocate his family), Gordon may not advance much further in the organization. At the same time, he’s fulfilling his manager-of-managers role to the hilt, serving as a launching pad for the careers of first-time managers.
Ram Charan (The Leadership Pipeline: How to Build the Leadership Powered Company (Jossey-Bass Leadership Series Book 391))
Everything that human beings are doing to make it easier to operate computer networks is at the same time, but for different reasons, making it easier for computer networks to operate human beings. Symbiosis operates by way of positive rewards. The benefits of telecommunication are so attractive that we are eager to share our world with these machines.
George Dyson (Darwin Among The Machines: The Evolution Of Global Intelligence (Helix Books))
Olga was their spotter team; a two-man group positioned on the roof of a telecommunications mast about a mile west of the monument. One man was armed with a high-powered camera, the other with a decidedly more dangerous Dragunov sniper rifle. At a mile distant, any shot they took would be risky to say the least, but Kamarov had insisted on their presence nonetheless
Will Jordan (Betrayal (Ryan Drake #3))
once been a benefit to those now complaining. Back in the days when there was too much capacity, importers exploited the flexibility of contracts. Their deals obligated carriers to move a minimum number of boxes at a set price. But if the customer opted to move fewer, they did not have to pay a penalty. Now, the dynamic had reversed. Supply was tight, prices were astronomical, and the carriers were behaving like miners unleashed on a gold rush. The niceties of their previous dealings were ditched in the pursuit of a frenzied reach for lucre. “This is arguably the largest driver of the increased cost of consumer goods in our country,” Delves said. “This surpasses any tariff that’s put on anything.” There were certainly other factors behind soaring prices. Governments in major economies had dispensed cash to their citizens to help them manage the economic strains of the pandemic, which had boosted spending power. Decades of consolidation in many industries—from meatpacking to telecommunications—had placed companies in position to exploit disruptions as an opportunity to lift prices.
Peter S. Goodman (How the World Ran Out of Everything: Inside the Global Supply Chain)