Storing Data Quotes

We've searched our database for all the quotes and captions related to Storing Data. Here they are! All 100 of them:

In a non-traditional culture such as ours, dominated by technology, we value information far more than we do wisdom. But there is a difference between the two. Information involves the acquisition, organization, and dissemination of facts; a storing-up of physical data. But wisdom involves another equally crucial function: the emptying and quieting of the mind, the application of the heart, and the alchemy of reason and feeling.
Ram Dass (Still Here: Embracing Aging, Changing, and Dying)
In the first study, Grant and his colleagues analyzed data from one of the five biggest pizza chains in the United States. They discovered that the weekly profits of the stores managed by extroverts were 16 percent higher than the profits of those led by introverts—but only when the employees were passive types who tended to do their job without exercising initiative. Introverted leaders had the exact opposite results. When they worked with employees who actively tried to improve work procedures, their stores outperformed those led by extroverts by more than 14 percent.
Susan Cain (Quiet: The Power of Introverts in a World That Can't Stop Talking)
In order for a digital neocortex to learn a new skill, it will still require many iterations of education, just as a biological neocortex does, but once a single digital neocortex somewhere and at some time learns something, it can share that knowledge with every other digital neocortex without delay. We can each have our own private neocortex extenders in the cloud, just as we have our own private stores of personal data today.
Ray Kurzweil (How to Create a Mind: The Secret of Human Thought Revealed)
Diana: Theo, if you had access to one of those computers, could you find a way to, I don't know-- Theo: Infiltrate Jason's network and decimate his data stores, corrupting every bit of information he's gathered and rendering his research worthless? Diana: Um, yes that.
Leigh Bardugo (Wonder Woman: Warbringer)
On a scale ranging from very little to too much, Merkin could just about categorize the amount of personal data stored in Master Loo’s computer as a shitload.
Sorin Suciu (The Scriptlings)
When the heart breaks, the part of the brain that stores data on past dates works perfectly
Chetan Bhagat (The Girl in Room 105)
In a few decades, perhaps people will get attached to social media profiles just like you are attached to your body mind now. Then Gurus will have to remind them, “Profile is nothing but some pictures and data stored in servers owned by social media companies. You don’t own it. You just access it. Don’t bother about likes and followers. You are not a profile. you are a body-mind!
Shunya
It’s not accurate that your memory works like a container, cup, or hard drive in that once it’s full of data no more can fit. It’s more like a muscle in that the more you train it, the stronger it gets and the more you can store.
Jim Kwik (Limitless: Upgrade Your Brain, Learn Anything Faster, and Unlock Your Exceptional Life)
At what point will I be able to write an e-mail to my grandson in Bahrain merely by thinking it?" "Thinking it?" Alif smiled contemptuously. "I expect never. Quantum computing will be the next thing, but I don't think it will be capable of transcribing thought." "Quantum? Oh dear, I've never heard of that." It will use qubits instead of-well, that's kind of complicated. Regular computers use a binary language to figure things out and talk to each other-ones and zeroes. Quantum computers could use ones and zeroes in an unlimited number of states, so in theory, they could store massive amounts of data and perform tasks that regular computers can't perform." "States?" "Positions in space and time. Ways of being." "Now it is you who are metaphysical. Let me rephrase what I think you have said in language from my own field of study: they say that each word in the Quran has seven thousand layers of meaning, each of which, though some might seem contrary or simply unfathomable to us, exist equally at all times without cosmological contradiction. Is this similar to what you mean?" "Yes," he said. "That is exactly what I mean. I've never heard anybody make that comparison.
G. Willow Wilson (Alif the Unseen)
And there was a wonderful thing that tended to happen, something that felt like poetic justice: every time someone started shouting about the supposed monopoly of the Circle, or the Circle’s unfair monetization of the personal data of its users, or some other paranoid and demonstrably false claim, soon enough it was revealed that that person was a criminal or deviant of the highest order. One was connected to a terror network in Iran. One was a buyer of child porn. Every time, it seemed, they would end up on the news, footage of investigators leaving their homes with computers, on which any number of unspeakable searches had been executed and where reams of illegal and inappropriate materials were stored. And it made sense. Who but a fringe character would try to impede the unimpeachable improvement of the world?
Dave Eggers (The Circle (The Circle, #1))
The best means we have for keeping our keys safe is called “zero knowledge,” a method that ensures that any data you try to store externally—say, for instance, on a company’s cloud platform—is encrypted by an algorithm running on your device before it is uploaded, and the key is never shared. In the zero knowledge scheme, the keys are in the users’ hands—and only in the users’ hands. No company, no agency, no enemy can touch them.
Edward Snowden (Permanent Record)
For years, well before consumer tracking became the norm, Radio Shack stores would routinely ask their customers for their addresses and phone numbers. For a while I just refused, but that was socially awkward. Instead, I got in the habit of replying with “9800 Savage Road, Columbia, MD, 20755”: the address of the NSA.
Bruce Schneier (Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World)
Worldwide, Google has the capacity to store 15 exabytes.
Bruce Schneier (Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World)
Retail store surveillance systems register our presence, even if we are doing nothing but browsing and even if we pay for everything in cash.
Bruce Schneier (Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World)
If data is stored in an environment that replicates data, the application should take care not to do its own data replication
John Belamaric (OpenStack Cloud Application Development)
All sensory input received by their brain is digitized and stored as a .oni (dot-oh-en-eye) file on an external data drive attached to their headset.
Ernest Cline (Ready Player Two (Ready Player One #2))
When knowledge becomes data it is no longer the indefinable matter of minds, but a commodity that can be transferred, stored, bought, or sold.
Will Buckingham (The Philosophy Book: Big Ideas Simply Explained (DK Big Ideas))
Our impulse to store and access data through coding languages predates computers by thousands of years, and that’s really all magic is.
G. Willow Wilson (Alif the Unseen)
Brash souls made jokes about what must be mountains of unread spy-eye data stored who knew where and how.
James Tiptree Jr. (Her Smoke Rose Up Forever)
In the modern economy, to control information is to control the world. This is seen in the ever-growing influence of tech behemoths like Google and Facebook, constantly accumulating data that’s pertinent to who we are and how we interact with each other. In this twenty-first-century economy, power is defined by whoever has authority to collect, store, and share data.
Michael J. Casey (The Truth Machine: The Blockchain and the Future of Everything)
As long as research data is stored as tacit knowledge in people’s minds or buried in interview transcripts, teams will experience difficulty synthesizing what has been observed and learned.
Bella Martin (Universal Methods of Design: 100 Ways to Research Complex Problems, Develop Innovative Ideas, and Design Effective Solutions)
We need to be the company that manages your relationship with the cloud—streams your music and videos from the cloud, stores your pictures and information, and maybe even your medical data.
Walter Isaacson (Steve Jobs)
By some estimates, the data-storage curve is rocketing upward at the rate of 800 percent per year. Organizations are collecting so much data they're overwhelmed. Families are no different; we have more things on disk, more photos, more items stored than we'll ever have to allocate time for. "Since Kodachrome made way for jpeg, pictures accumulate on hard drives like wet leaves in a gutter." (Jim Lewis, author of "The King is Dead")
Jeff Davidson (The Complete Idiot's Guide to Getting Things Done)
Even in utero and after birth, for every moment of every day, our brain is processing the nonstop set of incoming signals from our senses. Sight, sound, touch, smell, taste—all of the raw sensory data that will result in these sensations enter the lower parts of the brain and begin a multistage process of being categorized, compared to previously stored patterns, and ultimately, if necessary, acted upon. In many cases the pattern of incoming signals is so repetitive, so familiar, so safe and the memory template that this pattern matches is so deeply engrained, that your brain essentially ignores them. This is a form of tolerance called habituation.
Bruce D. Perry (The Boy Who Was Raised As a Dog: And Other Stories from a Child Psychiatrist's Notebook)
Between the years 3500 BC and 3000 BC, some unknown Sumerian geniuses invented a system for storing and processing information outside their brains, one that was custom-built to handle large amounts of mathematical data. The Sumerians
Yuval Noah Harari (Sapiens: A Brief History of Humankind)
Every computing device today has five basic components: (1) the integrated circuits that do the computing; (2) the memory units that store and retrieve information; (3) the networking systems that enable communications within and across computers; (4) the software applications that enable different computers to perform myriad tasks individually and collectively; and (5) the sensors—cameras and other miniature devices that can detect movement, language, light, heat, moisture, and sound and transform any of them into digitized data that can be mined for insights.
Thomas L. Friedman (Thank You for Being Late: An Optimist's Guide to Thriving in the Age of Accelerations)
But a workplace predicated on the assumption that a worker can come into work every day, at times and locations that are wholly unrelated to the location or opening hours of schools, childcare centres, doctors and grocery stores, simply doesn’t work for women. It hasn’t been designed to.
Caroline Criado Pérez (Invisible Women: Data Bias in a World Designed for Men)
The 112 chakras are sophisticated quantum information processing centers. They exchange information within the body and with the higher realms. They use superposition states of photons or atoms to process, store, and transmit data between different areas of the brain, the rest of the body, and the higher worlds.
Amit Ray (72000 Nadis and 114 Chakras in Human Body for Healing and Meditation)
PRISM enabled the NSA to routinely collect data from Microsoft, Yahoo!, Google, Facebook, Paltalk, YouTube, Skype, AOL, and Apple, including email, photos, video and audio chats, Web-browsing content, search engine queries, and all other data stored on their clouds, transforming the companies into witting coconspirators.
Edward Snowden (Permanent Record)
Different databases are designed to solve different problems. Using a single database engine for all of the requirements usually leads to non- performant solutions; storing transactional data, caching session information, traversing graph of customers and the products their friends bought are essentially different problems.
Pramod J. Sadalage (NoSQL Distilled: A Brief Guide to the Emerging World of Polyglot Persistence)
Digital dictatorships are not the only danger awaiting us. Alongside liberty, liberal order has also set great store by the value of equality. Liberalism always cherished political equality, and it gradually came to realise that economic equality is almost as important. For without a social safety net and a modicum of economic equality, liberty is meaningless. But just as Big Data algorithms might extinguish liberty, they might simultaneously create the most unequal societies that ever existed. All wealth and power might be concentrated in the hands of a tiny elite, while most people will suffer not from exploitation, but from something far worse – irrelevance.
Yuval Noah Harari (21 Lessons for the 21st Century)
Then, after many weeks, Citra had an epiphany. If everything uploaded to the Thunderhead was stored in the backbrain, then not just public records were there, but personal as well. She couldn’t access other people’s private records, but anything she uploaded would be available to her. Which meant she could seed the search with data of her own.…
Neal Shusterman (Scythe (Arc of a Scythe, #1))
As a thought experiment, von Neumann's analysis was simplicity itself. He was saying that the genetic material of any self-reproducing system, whether natural or artificial, must function very much like a stored program in a computer: on the one hand, it had to serve as live, executable machine code, a kind of algorithm that could be carried out to guide the construction of the system's offspring; on the other hand, it had to serve as passive data, a description that could be duplicated and passed along to the offspring. As a scientific prediction, that same analysis was breathtaking: in 1953, when James Watson and Francis Crick finally determined the molecular structure of DNA, it would fulfill von Neumann's two requirements exactly. As a genetic program, DNA encodes the instructions for making all the enzymes and structural proteins that the cell needs in order to function. And as a repository of genetic data, the DNA double helix unwinds and makes a copy of itself every time the cell divides in two. Nature thus built the dual role of the genetic material into the structure of the DNA molecule itself.
M. Mitchell Waldrop (The Dream Machine: J.C.R. Licklider and the Revolution That Made Computing Personal)
Jake eyed his brother. "I never forget. All data is stored in my memory banks. And one day, candy pig, you will pay." "You 're such a geek." "Thesbo." "That's Jack's latest insult." Seth gestured with his wine-glass. "A play on thespian, since Kev's into that." "Rhymes with lesbo," Jake explained helpfully while Anna stifled a groan. "It's a slick way of calling him a girl.
Nora Roberts (Chesapeake Blue (Chesapeake Bay Saga, #4))
BC, some unknown Sumerian geniuses invented a system for storing and processing information outside their brains, one that was custom-built to handle large amounts of mathematical data. The Sumerians thereby released their social order from the limitations of the human brain, opening the way for the appearance of cities, kingdoms and empires. The data-processing system invented by the Sumerians is called ‘writing’.
Yuval Noah Harari (Sapiens: A Brief History of Humankind)
To understand this first event, you need to know that we rely on Unix and Linux machines to store the thousands of computer files that comprise all the shots of any given film. And on those machines, there is a command—/bin/rm -r -f *—that removes everything on the file system as fast as it can. Hearing that, you can probably anticipate what’s coming: Somehow, by accident, someone used this command on the drives where the Toy Story 2 files were kept. Not just some of the files, either. All of the data that made up the pictures, from objects to backgrounds, from lighting to shading, was dumped out of the system. First, Woody’s hat disappeared. Then his boots. Then he disappeared entirely. One by one, the other characters began to vanish, too: Buzz, Mr. Potato Head, Hamm, Rex. Whole sequences—poof!—were deleted from the drive. Oren
Ed Catmull (Creativity, Inc.: Overcoming the Unseen Forces That Stand in the Way of True Inspiration)
Between the years 3500 BC and 3000 BC, some unknown Sumerian geniuses invented a system for storing and processing information outside their brains, one that was custom-built to handle large amounts of mathematical data. The Sumerians thereby released their social order from the limitations of the human brain, opening the way for the appearance of cities, kingdoms and empires. The data-processing system invented by the Sumerians is called ‘writing’.
Yuval Noah Harari (Sapiens: A Brief History of Humankind)
Each of us, actually every animal, is a data scientist. We collect data from our sensors, and then we process the data to get abstract rules to perceive our environment and control our actions in that environment to minimize pain and/or maximize pleasure. We have memory to store those rules in our brains, and then we recall and use them when needed. Learning is lifelong; we forget rules when they no longer apply or revise them when the environment changes. Learning
Ethem Alpaydin (Machine Learning)
Especially for the younger generation, the Internet is not some standalone, separate domain where a few of life’s functions are carried out. It is not merely our post office and our telephone. Rather, it is the epicenter of our world, the place where virtually everything is done. It is where friends are made, where books and films are chosen, where political activism is organized, where the most private data is created and stored. It is where we develop and express our very personality and sense of self.
Anonymous
Grant had a theory about which kinds of circumstances would call for introverted leadership. His hypothesis was that extroverted leaders enhance group performance when employees are passive, but that introverted leaders are more effective with proactive employees. To test his idea, he and two colleagues, professors Francesca Gino of Harvard Business School and David Hofman of the Kenan-Flagler Business School at the University of North Carolina, carried out a pair of studies of their own. In the first study, Grant and his colleagues analyzed data from one of the five biggest pizza chains in the United States. They discovered that the weekly profits of the stores managed by extroverts were 16 percent higher than the profits of those led by introverts—but only when the employees were passive types who tended to do their job without exercising initiative. Introverted leaders had the exact opposite results. When they worked with employees who actively tried to improve work procedures, their stores outperformed those led by extroverts by more than 14 percent. In
Susan Cain (Quiet: The Power of Introverts in a World That Can't Stop Talking)
In fact, as these companies offered more and more (simply because they could), they found that demand actually followed supply. The act of vastly increasing choice seemed to unlock demand for that choice. Whether it was latent demand for niche goods that was already there or a creation of new demand, we don't yet know. But what we do know is that the companies for which we have the most complete data - netflix, Amazon, Rhapsody - sales of products not offered by their bricks-and-mortar competitors amounted to between a quarter and nearly half of total revenues - and that percentage is rising each year. in other words, the fastest-growing part of their businesses is sales of products that aren't available in traditional, physical retail stores at all. These infinite-shelf-space businesses have effectively learned a lesson in new math: A very, very big number (the products in the Tail) multiplied by a relatives small number (the sales of each) is still equal to a very, very big number. And, again, that very, very big number is only getting bigger. What's more, these millions of fringe sales are an efficient, cost-effective business. With no shelf space to pay for - and in the case of purely digital services like iTunes, no manufacturing costs and hardly any distribution fees - a niche product sold is just another sale, with the same (or better) margins as a hit. For the first time in history, hits and niches are on equal economic footing, both just entries in a database called up on demand, both equally worthy of being carried. Suddenly, popularity no longer has a monopoly on profitability.
Chris Anderson (The Long Tail: Why the Future of Business is Selling Less of More)
Even at that early date, the basic building blocks of web search had been already set in stone. Search was a four-step process. First came a sweeping scan of all the world’s web pages, via a spider. Second was indexing the information drawn from the spider’s crawl and storing the data on racks of computers known as servers. The third step, triggered by a user’s request, identified the pages that seemed best suited to answer that query. That result was known as search quality. The final step involved formatting and delivering the results to the user.
Steven Levy (In the Plex: How Google Thinks, Works, and Shapes Our Lives)
Grant and his colleagues analyzed data from one of the five biggest pizza chains in the United States. They discovered that the weekly profits of the stores managed by extroverts were 16 percent higher than the profits of those led by introverts—but only when the employees were passive types who tended to do their job without exercising initiative. Introverted leaders had the exact opposite results. When they worked with employees who actively tried to improve work procedures, their stores outperformed those led by extroverts by more than 14 percent.
Susan Cain (Quiet: The Power of Introverts in a World That Can't Stop Talking)
As the number of inhabitants grew, so did the amount of information required to coordinate their affairs. Between the years 3500 BC and 3000 BC, some unknown Sumerian geniuses invented a system for storing and processing information outside their brains, one that was custom-built to handle large amounts of mathematical data. The Sumerians thereby released their social order from the limitations of the human brain, opening the way for the appearance of cities, kingdoms and empires. The data-processing system invented by the Sumerians is called ‘writing’.
Yuval Noah Harari (Sapiens: A Brief History of Humankind)
The fourth article, which ran as planned on Saturday, was about BOUNDLESS INFORMANT, the NSA’s data-tracking program, and it described the reports showing that the NSA was collecting, analyzing, and storing billions of telephone calls and emails sent across the American telecommunications infrastructure. It also raised the question of whether NSA officials had lied to Congress when they had refused to answer senators about the number of domestic communications intercepted, claiming that they did not keep such records and could not assemble such data. After
Glenn Greenwald (No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State)
Big data is based on the feedback economy where the Internet of Things places sensors on more and more equipment. More and more data is being generated as medical records are digitized, more stores have loyalty cards to track consumer purchases, and people are wearing health-tracking devices. Generally, big data is more about looking at behavior, rather than monitoring transactions, which is the domain of traditional relational databases. As the cost of storage is dropping, companies track more and more data to look for patterns and build predictive models".
Neil Dunlop
He – and it implicitly is a he – doesn’t need to concern himself with taking care of children and elderly relatives, of cooking, of cleaning, of doctor’s appointments, and grocery shopping, and grazed knees, and bullies, and homework, and bath-time and bedtime, and starting it all again tomorrow. His life is simply and easily divided into two parts: work and leisure. But a workplace predicated on the assumption that a worker can come into work every day, at times and locations that are wholly unrelated to the location or opening hours of schools, childcare centres, doctors and grocery stores, simply doesn’t work for women.
Caroline Criado Pérez (Invisible Women: Data Bias in a World Designed for Men)
PRISM enabled the NSA to routinely collect data from Microsoft, Yahoo!, Google, Facebook, Paltalk, YouTube, Skype, AOL, and Apple, including email, photos, video and audio chats, Web-browsing content, search engine queries, and all other data stored on their clouds, transforming the companies into witting coconspirators. Upstream collection, meanwhile, was arguably even more invasive. It enabled the routine capturing of data directly from private-sector Internet infrastructure—the switches and routers that shunt Internet traffic worldwide, via the satellites in orbit and the high-capacity fiber-optic cables that run under the ocean.
Edward Snowden (Permanent Record)
A critical step was made sometime before the ninth century AD, when a new partial script was invented, one that could store and process mathematical data with unprecedented efficiency. This partial script was composed of ten signs, representing the numbers from 0 to 9. Confusingly, these signs are known as Arabic numerals even though they were first invented by the Hindus (even more confusingly, modern Arabs use a set of digits that look quite different from Western ones). But the Arabs get the credit because when they invaded India they encountered the system, understood its usefulness, refined it, and spread it through the Middle East and then to Europe.
Yuval Noah Harari (Sapiens: A Brief History of Humankind)
- we no longer live in the Age of Reason. We don’t have reason we have computation. We don’t have a tree of knowledge; we have an information superhighway. We don’t have real intelligence; we have artificial intelligence. We no longer pursue truth, we seek data and signals. We no longer have philosophers, we have thinking pragmatists. We no longer have morals, we have lifestyles. We no longer have brains which serve as the seat of our thinking minds; we have neural sites, which remember, store body signals, control genes, generate dreams, anxieties and neuroses, quite independent of whether they think rationally or not. So starting from reason, where did we get?
Malcolm Bradbury (To the Hermitage)
Von Neumann saw great promise in a redesign of the ENIAC computer’s memory. He believed there was a way to turn the computer into an “electronic brain” capable of storing not just data and instructions, as was the case with ENIAC, but additional information that would allow the computer to perform a myriad of computational functions on its own. This was called a stored-program computer, and it “broke the distinction between numbers that mean things and numbers that do things,” writes von Neumann’s biographer George Dyson, adding, “Our universe would never be the same.” These “instructions” that von Neumann imagined were the prototype of what the world now knows as software.
Annie Jacobsen (The Pentagon's Brain: An Uncensored History of DARPA, America's Top-Secret Military Research Agency)
Since the first satellites had been orbited, almost fifty years earlier, trillions and quadrillions of pulses of information had been pouring down from space, to be stored against the day when they might contribute to the advance of knowledge. Only a minute fraction of all this raw material would ever be processed; but there was no way of telling what observation some scientist might wish to consult, ten, or fifty, or a hundred years from now. So everything had to be kept on file, stacked in endless airconditioned galleries, triplicated at the [data] centers against the possibility of accidental loss. It was part of the real treasure of mankind, more valuable than all the gold locked uselessly away in bank vaults.
Arthur C. Clarke
The first to overcome the problem were the ancient Sumerians, who lived in southern Mesopotamia. There, a scorching sun beating upon rich muddy plains produced plentiful harvests and prosperous towns. As the number of inhabitants grew, so did the amount of information required to coordinate their affairs. Between the years 3500 BC and 3000 BC, some unknown Sumerian geniuses invented a system for storing and processing information outside their brains, one that was custom-built to handle large amounts of mathematical data. The Sumerians thereby released their social order from the limitations of the human brain, opening the way for the appearance of cities, kingdoms and empires. The data-processing system invented by the Sumerians is called ‘writing’.
Yuval Noah Harari (Sapiens: A Brief History of Humankind)
On the other hand, irrational fears are difficult, if not impossible, to quantify. Here’s an example: when 152 people were infected with swine flu in Mexico in 2009, people around the world, prodded by the media’s manufactured hysteria, erupted in fear of an epidemic. We were warned that the threat was everywhere—that everyone was potentially at risk; however, the data showed these fears to be completely unwarranted. Weeks into the “outbreak,” there were around 1,000 reported cases of the virus in 20 countries. The number of fatalities stood at 26—25 in Mexico, and one in the United States (a boy who had just traveled to Texas from Mexico). Yet schools were closed, travel was restricted, emergency rooms were flooded, hundreds of thousands of pigs were killed, hand sanitizer and face masks disappeared from store shelves, and network news stories about swine flu consumed 43% of airtime.9 “There is too much hysteria in the country and so far, there hasn’t been that great a danger,” commented Congressman Ron Paul in response. “It’s overblown, grossly so.”10 He should know. During Paul’s first session in Congress in 1976, a swine flu outbreak led Congress to vote to vaccinate the entire country. (He voted against it.) Twenty-five people died from the vaccination itself, while only one person was killed from the actual virus; hundreds, if not more, contracted Guillain-Barre syndrome, a paralyzing neurological illness, as a result of the vaccine. Nearly 25 percent of the population was vaccinated before the effort was cancelled due to safety concerns.
Connor Boyack (Feardom: How Politicians Exploit Your Emotions and What You Can Do to Stop Them)
A critical step was made sometime before the ninth century AD, when a new partial script was invented, one that could store and process mathematical data with unprecedented efficiency. This partial script was composed of ten signs, representing the numbers from 0 to 9. Confusingly, these signs are known as Arabic numerals even though they were first invented by the Hindus (even more confusingly, modern Arabs use a set of digits that look quite different from Western ones). But the Arabs get the credit because when they invaded India they encountered the system, understood its usefulness, refined it, and spread it through the Middle East and then to Europe. When several other signs were later added to the Arab numerals (such as the signs for addition, subtraction and multiplication), the basis of modern mathematical notation came into being.
Yuval Noah Harari (Sapiens: A Brief History of Humankind)
Ubiquitous surveillance means that anyone could be convicted of lawbreaking, once the police set their minds to it. It is incredibly dangerous to live in a world where everything you do can be stored and brought forward as evidence against you at some later date. There is significant danger in allowing the police to dig into these large data sets and find “evidence” of wrongdoing, especially in a country like the US with so many vague and punitive laws, which give prosecutors discretion over whom to charge with what, and with overly broad material witness laws. This is especially true given the expansion of the legally loaded terms “terrorism,” to include conventional criminals, and “weapons of mass destruction,” to include almost anything, including a sawed-off shotgun. The US terminology is so broad that someone who donates $10 to Hamas’s humanitarian arm could be considered a terrorist.
Bruce Schneier (Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World)
This is how it works. The exomemory stores data – all data – that the Oubliette gathers, the environment, senses, thoughts, everything. The gevulot keeps track of who can access what, in real time. It’s not just one public/private key pair, it’s a crazy nested hierarchy, a tree of nodes where each branch can only be unlocked by the root node. You meet someone and agree what you can share, what they can know about you, what you can remember afterwards.’ ‘Sounds complicated.’ ‘It is. The Martians have a dedicated organ for it.’ I tap my head. ‘A privacy sense. They feel what they are sharing, what is private and what isn’t. They also do something called co-remembering, sharing memories with others just by sharing the appropriate key with them. We just have the baby version. They give the visitors a bit of exomemory and an interface to it, reasonably well-defined. But there is no way we can appreciate the subtleties.
Hannu Rajaniemi (The Quantum Thief (Jean le Flambeur #1))
Now, describe, in a single written sentence, your intended successful outcome for this problem or situation. In other words, what would need to happen for you to check this project off as “done”? It could be as simple as “Take the Hawaii vacation,” “Handle situation with customer X,” “Resolve college situation with Susan,” “Clarify new divisional management structure,” “Implement new investment strategy,” or “Research options for dealing with Manuel’s reading issue.” All clear? Great. Now write down the very next physical action required to move the situation forward. If you had nothing else to do in your life but get closure on this, what visible action would you take right now? Would you call or text someone? Write an e-mail? Take pen and paper and brainstorm about it? Surf the Web for data? Buy nails at the hardware store? Talk about it face-to-face with your partner, your assistant, your attorney, or your boss? What? Got the answer to that?
David Allen (Getting Things Done: The Art of Stress-Free Productivity)
Concepts of memory tend to reflect the technology of the times. Plato and Aristotle saw memories as thoughts inscribed on wax tablets that could be erased easily and used again. These days, we tend to think of memory as a camera or a video recorder, filming, storing, and recycling the vast troves of data we accumulate throughout our lives. In practice, though, every memory we retain depends upon a chain of chemical interactions that connect millions of neurons to one another. Those neurons never touch; instead, they communicate through tiny gaps, or synapses, that surround each of them. Every neuron has branching filaments, called dendrites, that receive chemical signals from other nerve cells and send the information across the synapse to the body of the next cell. The typical human brain has trillions of these connections. When we learn something, chemicals in the brain strengthen the synapses that connect neurons. Long-term memories, built from new proteins, change those synaptic networks constantly; inevitably, some grow weaker and others, as they absorb new information, grow more powerful.
Michael Specter
The word “collect” has a very special definition, according to the Department of Defense. It doesn’t mean collect; it means that a person looks at, or analyzes, the data. In 2013, Director of National Intelligence James Clapper likened the NSA’s trove of accumulated data to a library. All those books are stored on the shelves, but very few are actually read. “So the task for us in the interest of preserving security and preserving civil liberties and privacy is to be as precise as we possibly can be when we go in that library and look for the books that we need to open up and actually read.” Think of that friend of yours who has thousands of books in his house. According to this ridiculous definition, the only books he can claim to have collected are the ones he’s read. This is why Clapper asserts he didn’t lie in a Senate hearing when he replied “no” to the question “Does the NSA collect any type of data at all on millions or hundreds of millions of Americans?” From the military’s perspective, it’s not surveillance until a human being looks at the data, even if algorithms developed and implemented by defense personnel or contractors have analyzed it many times over.
Bruce Schneier (Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World)
The best entrepreneurs don’t just follow Moore’s Law; they anticipate it. Consider Reed Hastings, the cofounder and CEO of Netflix. When he started Netflix, his long-term vision was to provide television on demand, delivered via the Internet. But back in 1997, the technology simply wasn’t ready for his vision—remember, this was during the era of dial-up Internet access. One hour of high-definition video requires transmitting 40 GB of compressed data (over 400 GB without compression). A standard 28.8K modem from that era would have taken over four months to transmit a single episode of Stranger Things. However, there was a technological innovation that would allow Netflix to get partway to Hastings’s ultimate vision—the DVD. Hastings realized that movie DVDs, then selling for around $ 20, were both compact and durable. This made them perfect for running a movie-rental-by-mail business. Hastings has said that he got the idea from a computer science class in which one of the assignments was to calculate the bandwidth of a station wagon full of backup tapes driving across the country! This was truly a case of technological innovation enabling business model innovation. Blockbuster Video had built a successful business around buying VHS tapes for around $ 100 and renting them out from physical stores, but the bulky, expensive, fragile tapes would never have supported a rental-by-mail business.
Reid Hoffman (Blitzscaling: The Lightning-Fast Path to Building Massively Valuable Companies)
Though Hoover conceded that some might deem him a “fanatic,” he reacted with fury to any violations of the rules. In the spring of 1925, when White was still based in Houston, Hoover expressed outrage to him that several agents in the San Francisco field office were drinking liquor. He immediately fired these agents and ordered White—who, unlike his brother Doc and many of the other Cowboys, wasn’t much of a drinker—to inform all of his personnel that they would meet a similar fate if caught using intoxicants. He told White, “I believe that when a man becomes a part of the forces of this Bureau he must so conduct himself as to remove the slightest possibility of causing criticism or attack upon the Bureau.” The new policies, which were collected into a thick manual, the bible of Hoover’s bureau, went beyond codes of conduct. They dictated how agents gathered and processed information. In the past, agents had filed reports by phone or telegram, or by briefing a superior in person. As a result, critical information, including entire case files, was often lost. Before joining the Justice Department, Hoover had been a clerk at the Library of Congress—“ I’m sure he would be the Chief Librarian if he’d stayed with us,” a co-worker said—and Hoover had mastered how to classify reams of data using its Dewey decimal–like system. Hoover adopted a similar model, with its classifications and numbered subdivisions, to organize the bureau’s Central Files and General Indices. (Hoover’s “Personal File,” which included information that could be used to blackmail politicians, would be stored separately, in his secretary’s office.) Agents were now expected to standardize the way they filed their case reports, on single sheets of paper. This cut down not only on paperwork—another statistical measurement of efficiency—but also on the time it took for a prosecutor to assess whether a case should be pursued.
David Grann (Killers of the Flower Moon: The Osage Murders and the Birth of the FBI)
Two observations take us across the finish line. The Second Law ensures that entropy increases throughout the entire process, and so the information hidden within the hard drives, Kindles, old-fashioned paper books, and everything else you packed into the region is less than that hidden in the black hole. From the results of Bekenstein and Hawking, we know that the black hole's hidden information content is given by the area of its event horizon. Moreover, because you were careful not to overspill the original region of space, the black hole's event horizon coincides with the region's boundary, so the black hole's entropy equals the area of this surrounding surface. We thus learn an important lesson. The amount of information contained within a region of space, stored in any objects of any design, is always less than the area of the surface that surrounds the region (measured in square Planck units). This is the conclusion we've been chasing. Notice that although black holes are central to the reasoning, the analysis applies to any region of space, whether or not a black hole is actually present. If you max out a region's storage capacity, you'll create a black hole, but as long as you stay under the limit, no black hole will form. I hasten to add that in any practical sense, the information storage limit is of no concern. Compared with today's rudimentary storage devices, the potential storage capacity on the surface of a spatial region is humongous. A stack of five off-the-shelf terabyte hard drives fits comfortable within a sphere of radius 50 centimeters, whose surface is covered by about 10^70 Planck cells. The surface's storage capacity is thus about 10^70 bits, which is about a billion, trillion, trillion, trillion, trillion terabytes, and so enormously exceeds anything you can buy. No one in Silicon Valley cares much about these theoretical constraints. Yet as a guide to how the universe works, the storage limitations are telling. Think of any region of space, such as the room in which I'm writing or the one in which you're reading. Take a Wheelerian perspective and imagine that whatever happens in the region amounts to information processing-information regarding how things are right now is transformed by the laws of physics into information regarding how they will be in a second or a minute or an hour. Since the physical processes we witness, as well as those by which we're governed, seemingly take place within the region, it's natural to expect that the information those processes carry is also found within the region. But the results just derived suggest an alternative view. For black holes, we found that the link between information and surface area goes beyond mere numerical accounting; there's a concrete sense in which information is stored on their surfaces. Susskind and 'tHooft stressed that the lesson should be general: since the information required to describe physical phenomena within any given region of space can be fully encoded by data on a surface that surrounds the region, then there's reason to think that the surface is where the fundamental physical processes actually happen. Our familiar three-dimensional reality, these bold thinkers suggested, would then be likened to a holographic projection of those distant two-dimensional physical processes. If this line of reasoning is correct, then there are physical processes taking place on some distant surface that, much like a puppeteer pulls strings, are fully linked to the processes taking place in my fingers, arms, and brain as I type these words at my desk. Our experiences here, and that distant reality there, would form the most interlocked of parallel worlds. Phenomena in the two-I'll call them Holographic Parallel Universes-would be so fully joined that their respective evolutions would be as connected as me and my shadow.
Brian Greene (The Hidden Reality: Parallel Universes and the Deep Laws of the Cosmos)
Starting a little over a decade ago, Target began building a vast data warehouse that assigned every shopper an identification code—known internally as the “Guest ID number”—that kept tabs on how each person shopped. When a customer used a Target-issued credit card, handed over a frequent-buyer tag at the register, redeemed a coupon that was mailed to their house, filled out a survey, mailed in a refund, phoned the customer help line, opened an email from Target, visited Target.com, or purchased anything online, the company’s computers took note. A record of each purchase was linked to that shopper’s Guest ID number along with information on everything else they’d ever bought. Also linked to that Guest ID number was demographic information that Target collected or purchased from other firms, including the shopper’s age, whether they were married and had kids, which part of town they lived in, how long it took them to drive to the store, an estimate of how much money they earned, if they’d moved recently, which websites they visited, the credit cards they carried in their wallet, and their home and mobile phone numbers. Target can purchase data that indicates a shopper’s ethnicity, their job history, what magazines they read, if they have ever declared bankruptcy, the year they bought (or lost) their house, where they went to college or graduate school, and whether they prefer certain brands of coffee, toilet paper, cereal, or applesauce. There are data peddlers such as InfiniGraph that “listen” to shoppers’ online conversations on message boards and Internet forums, and track which products people mention favorably. A firm named Rapleaf sells information on shoppers’ political leanings, reading habits, charitable giving, the number of cars they own, and whether they prefer religious news or deals on cigarettes. Other companies analyze photos that consumers post online, cataloging if they are obese or skinny, short or tall, hairy or bald, and what kinds of products they might want to buy as a result.
Charles Duhigg (The Power of Habit: Why We Do What We Do in Life and Business)
Give us an idea of…” Noya Baram rubs her temples. “Oh, well.” Augie begins to stroll around again. “The examples are limitless. Small examples: elevators stop working. Grocery-store scanners. Train and bus passes. Televisions. Phones. Radios. Traffic lights. Credit-card scanners. Home alarm systems. Laptop computers will lose all their software, all files, everything erased. Your computer will be nothing but a keyboard and a blank screen. “Electricity would be severely compromised. Which means refrigerators. In some cases, heat. Water—well, we have already seen the effect on water-purification plants. Clean water in America will quickly become a scarcity. “That means health problems on a massive scale. Who will care for the sick? Hospitals? Will they have the necessary resources to treat you? Surgical operations these days are highly computerized. And they will not have access to any of your prior medical records online. “For that matter, will they treat you at all? Do you have health insurance? Says who? A card in your pocket? They won’t be able to look you up and confirm it. Nor will they be able to seek reimbursement from the insurer. And even if they could get in contact with the insurance company, the insurance company won’t know whether you’re its customer. Does it have handwritten lists of its policyholders? No. It’s all on computers. Computers that have been erased. Will the hospitals work for free? “No websites, of course. No e-commerce. Conveyor belts. Sophisticated machinery inside manufacturing plants. Payroll records. “Planes will be grounded. Even trains may not operate in most places. Cars, at least any built since, oh, 2010 or so, will be affected. “Legal records. Welfare records. Law enforcement databases. The ability of local police to identify criminals, to coordinate with other states and the federal government through databases—no more. “Bank records. You think you have ten thousand dollars in your savings account? Fifty thousand dollars in a retirement account? You think you have a pension that allows you to receive a fixed payment every month?” He shakes his head. “Not if computer files and their backups are erased. Do banks have a large wad of cash, wrapped in a rubber band with your name on it, sitting in a vault somewhere? Of course not. It’s all data.” “Mother of God,” says Chancellor Richter, wiping his face with a handkerchief.
Bill Clinton (The President Is Missing)
The tendency to want what has been banned and therefore to presume that it is more worthwhile is not limited to such commodities as laundry soap. In fact, the tendency is not limited to commodities at all but extends to restrictions on information. In an age when the ability to acquire, store, and manage information is becoming increasingly the determinant of wealth and power, it is important to understand how we typically react to attempts to censor or otherwise constrain our access to information. Although much data exist on our reactions to various kinds of potentially censorable material—media violence, pornography, radical political rhetoric—there is surprisingly little evidence as to our reactions to the act of censoring them. Fortunately, the results of the few studies that have been done on the topic are highly consistent. Almost invariably, our response to the banning of information is a greater desire to receive that information and a more favorable attitude toward it than before the ban.112 The intriguing thing about the effects of censoring information is not that audience members want to have the information more than they did before; that seems natural. Rather, it is that they come to believe in the information more, even though they haven’t received it. For example, when University of North Carolina students learned that a speech opposing coed dorms on campus would be banned, they became more opposed to the idea of coed dorms. Thus, without ever hearing the speech, they became more sympathetic to its argument. This raises the worrisome possibility that especially clever individuals holding a weak or unpopular position can get us to agree with that position by arranging to have their message restricted. The irony is that for such people—members of fringe political groups, for example—the most effective strategy may not be to publicize their unpopular views, but to get those views officially censored and then to publicize the censorship. Perhaps the authors of this country’s Constitution were acting as much as sophisticated social psychologists as staunch civil libertarians when they wrote the remarkably permissive free-speech provision of the First Amendment. By refusing to restrain freedom of speech, they may have been attempting to minimize the chance that new political notions would win support via the irrational course of psychological reactance.
Robert B. Cialdini (Influence: The Psychology of Persuasion (Collins Business Essentials))
The US traded its manufacturing sector’s health for its entertainment industry, hoping that Police Academy sequels could take the place of the rustbelt. The US bet wrong. But like a losing gambler who keeps on doubling down, the US doesn’t know when to quit. It keeps meeting with its entertainment giants, asking how US foreign and domestic policy can preserve its business-model. Criminalize 70 million American file-sharers? Check. Turn the world’s copyright laws upside down? Check. Cream the IT industry by criminalizing attempted infringement? Check. It’ll never work. It can never work. There will always be an entertainment industry, but not one based on excluding access to published digital works. Once it’s in the world, it’ll be copied. This is why I give away digital copies of my books and make money on the printed editions: I’m not going to stop people from copying the electronic editions, so I might as well treat them as an enticement to buy the printed objects. But there is an information economy. You don’t even need a computer to participate. My barber, an avowed technophobe who rebuilds antique motorcycles and doesn’t own a PC, benefited from the information economy when I found him by googling for barbershops in my neighborhood. Teachers benefit from the information economy when they share lesson plans with their colleagues around the world by email. Doctors benefit from the information economy when they move their patient files to efficient digital formats. Insurance companies benefit from the information economy through better access to fresh data used in the preparation of actuarial tables. Marinas benefit from the information economy when office-slaves look up the weekend’s weather online and decide to skip out on Friday for a weekend’s sailing. Families of migrant workers benefit from the information economy when their sons and daughters wire cash home from a convenience store Western Union terminal. This stuff generates wealth for those who practice it. It enriches the country and improves our lives. And it can peacefully co-exist with movies, music and microcode, but not if Hollywood gets to call the shots. Where IT managers are expected to police their networks and systems for unauthorized copying – no matter what that does to productivity – they cannot co-exist. Where our operating systems are rendered inoperable by “copy protection,” they cannot co-exist. Where our educational institutions are turned into conscript enforcers for the record industry, they cannot co-exist. The information economy is all around us. The countries that embrace it will emerge as global economic superpowers. The countries that stubbornly hold to the simplistic idea that the information economy is about selling information will end up at the bottom of the pile. What country do you want to live in?
Cory Doctorow (Content: Selected Essays on Technology, Creativity, Copyright, and the Future of the Future)
To give you a sense of the sheer volume of unprocessed information that comes up the spinal cord into the thalamus, let’s consider just one aspect: vision, since many of our memories are encoded this way. There are roughly 130 million cells in the eye’s retina, called cones and rods; they process and record 100 million bits of information from the landscape at any time. This vast amount of data is then collected and sent down the optic nerve, which transports 9 million bits of information per second, and on to the thalamus. From there, the information reaches the occipital lobe, at the very back of the brain. This visual cortex, in turn, begins the arduous process of analyzing this mountain of data. The visual cortex consists of several patches at the back of the brain, each of which is designed for a specific task. They are labeled V1 to V8. Remarkably, the area called V1 is like a screen; it actually creates a pattern on the back of your brain very similar in shape and form to the original image. This image bears a striking resemblance to the original, except that the very center of your eye, the fovea, occupies a much larger area in V1 (since the fovea has the highest concentration of neurons). The image cast on V1 is therefore not a perfect replica of the landscape but is distorted, with the central region of the image taking up most of the space. Besides V1, other areas of the occipital lobe process different aspects of the image, including: •  Stereo vision. These neurons compare the images coming in from each eye. This is done in area V2. •  Distance. These neurons calculate the distance to an object, using shadows and other information from both eyes. This is done in area V3. •  Colors are processed in area V4. •  Motion. Different circuits can pick out different classes of motion, including straight-line, spiral, and expanding motion. This is done in area V5. More than thirty different neural circuits involved with vision have been identified, but there are probably many more. From the occipital lobe, the information is sent to the prefrontal cortex, where you finally “see” the image and form your short-term memory. The information is then sent to the hippocampus, which processes it and stores it for up to twenty-four hours. The memory is then chopped up and scattered among the various cortices. The point here is that vision, which we think happens effortlessly, requires billions of neurons firing in sequence, transmitting millions of bits of information per second. And remember that we have signals from five sense organs, plus emotions associated with each image. All this information is processed by the hippocampus to create a simple memory of an image. At present, no machine can match the sophistication of this process, so replicating it presents an enormous challenge for scientists who want to create an artificial hippocampus for the human brain.
Michio Kaku (The Future of the Mind: The Scientific Quest to Understand, Enhance, and Empower the Mind)
Babel led to an explosion in the number of languages. That was part of Enki's plan. Monocultures, like a field of corn, are susceptible to infections, but genetically diverse cultures, like a prairie, are extremely robust. After a few thousand years, one new language developed - Hebrew - that possessed exceptional flexibility and power. The deuteronomists, a group of radical monotheists in the sixth and seventh centuries B.C., were the first to take advantage of it. They lived in a time of extreme nationalism and xenophobia, which made it easier for them to reject foreign ideas like Asherah worship. They formalized their old stories into the Torah and implanted within it a law that insured its propagation throughout history - a law that said, in effect, 'make an exact copy of me and read it every day.' And they encouraged a sort of informational hygiene, a belief in copying things strictly and taking great care with information, which as they understood, is potentially dangerous. They made data a controlled substance... [and] gone beyond that. There is evidence of carefully planned biological warfare against the army of Sennacherib when he tried to conquer Jerusalem. So the deuteronomists may have had an en of their very own. Or maybe they just understood viruses well enough that they knew how to take advantage of naturally occurring strains. The skills cultivated by these people were passed down in secret from one generation to the next and manifested themselves two thousand years later, in Europe, among the Kabbalistic sorcerers, ba'al shems, masters of the divine name. In any case, this was the birth of rational religion. All of the subsequent monotheistic religions - known by Muslims, appropriately, as religions of the Book - incorporated those ideas to some extent. For example, the Koran states over and over again that it is a transcript, an exact copy, of a book in Heaven. Naturally, anyone who believes that will not dare to alter the text in any way! Ideas such as these were so effective in preventing the spread of Asherah that, eventually, every square inch of the territory where the viral cult had once thrived was under the sway of Islam, Christianity, or Judaism. But because of its latency - coiled about the brainstem of those it infects, passed from one generation to the next - it always finds ways to resurface. In the case of Judaism, it came in the form of the Pharisees, who imposed a rigid legalistic theocracy on the Hebrews. With its rigid adherence to laws stored in a temple, administered by priestly types vested with civil authority, it resembled the old Sumerian system, and was just as stifling. The ministry of Jesus Christ was an effort to break Judaism out of this condition... an echo of what Enki did. Christ's gospel is a new namshub, an attempt to take religion out of the temple, out of the hands of the priesthood, and bring the Kingdom of God to everyone. That is the message explicitly spelled out by his sermons, and it is the message symbolically embodied in the empty tomb. After the crucifixion, the apostles went to his tomb hoping to find his body and instead found nothing. The message was clear enough; We are not to idolize Jesus, because his ideas stand alone, his church is no longer centralized in one person but dispersed among all the people.
Neal Stephenson (Snow Crash)
We need to be humble enough to recognize that unforeseen things can and do happen that are nobody’s fault. A good example of this occurred during the making of Toy Story 2. Earlier, when I described the evolution of that movie, I explained that our decision to overhaul the film so late in the game led to a meltdown of our workforce. This meltdown was the big unexpected event, and our response to it became part of our mythology. But about ten months before the reboot was ordered, in the winter of 1998, we’d been hit with a series of three smaller, random events—the first of which would threaten the future of Pixar. To understand this first event, you need to know that we rely on Unix and Linux machines to store the thousands of computer files that comprise all the shots of any given film. And on those machines, there is a command—/bin/rm -r -f *—that removes everything on the file system as fast as it can. Hearing that, you can probably anticipate what’s coming: Somehow, by accident, someone used this command on the drives where the Toy Story 2 files were kept. Not just some of the files, either. All of the data that made up the pictures, from objects to backgrounds, from lighting to shading, was dumped out of the system. First, Woody’s hat disappeared. Then his boots. Then he disappeared entirely. One by one, the other characters began to vanish, too: Buzz, Mr. Potato Head, Hamm, Rex. Whole sequences—poof!—were deleted from the drive. Oren Jacobs, one of the lead technical directors on the movie, remembers watching this occur in real time. At first, he couldn’t believe what he was seeing. Then, he was frantically dialing the phone to reach systems. “Pull out the plug on the Toy Story 2 master machine!” he screamed. When the guy on the other end asked, sensibly, why, Oren screamed louder: “Please, God, just pull it out as fast as you can!” The systems guy moved quickly, but still, two years of work—90 percent of the film—had been erased in a matter of seconds. An hour later, Oren and his boss, Galyn Susman, were in my office, trying to figure out what we would do next. “Don’t worry,” we all reassured each other. “We’ll restore the data from the backup system tonight. We’ll only lose half a day of work.” But then came random event number two: The backup system, we discovered, hadn’t been working correctly. The mechanism we had in place specifically to help us recover from data failures had itself failed. Toy Story 2 was gone and, at this point, the urge to panic was quite real. To reassemble the film would have taken thirty people a solid year. I remember the meeting when, as this devastating reality began to sink in, the company’s leaders gathered in a conference room to discuss our options—of which there seemed to be none. Then, about an hour into our discussion, Galyn Susman, the movie’s supervising technical director, remembered something: “Wait,” she said. “I might have a backup on my home computer.” About six months before, Galyn had had her second baby, which required that she spend more of her time working from home. To make that process more convenient, she’d set up a system that copied the entire film database to her home computer, automatically, once a week. This—our third random event—would be our salvation. Within a minute of her epiphany, Galyn and Oren were in her Volvo, speeding to her home in San Anselmo. They got her computer, wrapped it in blankets, and placed it carefully in the backseat. Then they drove in the slow lane all the way back to the office, where the machine was, as Oren describes it, “carried into Pixar like an Egyptian pharaoh.” Thanks to Galyn’s files, Woody was back—along with the rest of the movie.
Ed Catmull (Creativity, Inc.: Overcoming the Unseen Forces That Stand in the Way of True Inspiration)
Duties were allocated and their meeting was adjourned until after the second honey trap by Ava. Angelina and Felicity would stay at base HQ and download data and run the company and thoroughly go through all accounts retrieved from the husband’s computers. It would be put into separate files for each husband, heavily encrypted and stored on a remote hard drive and a back up made daily on the company server. All figures would be inputted into excel spreadsheets and final figures would determine of each mans financial worth
Annette J. Dunlea
So in 2013 the amount of stored information in the world is estimated to be around 1,200 exabytes, of which less than 2 percent is non-digital.
Viktor Mayer-Schönberger (Big Data: A Revolution That Will Transform How We Live, Work and Think)
Being able to sync the same content among multiple devices provides a very convenient backup for Dropbox data. If your Mac laptop gets dropped in your backyard swimming pool, as long as it’s been recently synced, you’ll still be able to quickly access all of the files and folders stored in Dropbox folder on the desktop PC.
Ian Lamont (Dropbox In 30 Minutes)
Nowadays it seemed like half the technical data on the planet were being stored genetically. Try sequencing a lung fluke and it was even money whether the base pairs you read would code for protein or the technical specs on the Denver sewer system.
Peter Watts (Echopraxia (Firefall, #2))
For example, consider a stack (which is a first-in, last-out list). You might have a program that requires three different types of stacks. One stack is used for integer values, one for floating-point values, and one for characters. In this case, the algorithm that implements each stack is the same, even though the data being stored differs. In a non-object-oriented language, you would be required to create three different sets of stack routines, with each set using different names. However, because of polymorphism, in Java you can create one general set of stack routines that works for all three specific situations. This way, once you know how to use one stack, you can use them all. More generally, the concept of polymorphism is often expressed by the phrase “one interface, multiple methods.” This means that it is possible to design a generic interface to a group of related activities. Polymorphism helps reduce complexity by allowing the same interface to be used to specify a general class of action.
Herbert Schildt (Java: A Beginner's Guide)
Walmart uses data from sales in all their stores to know what products to shelve. Before Hurricane Frances, a destructive storm that hit the Southeast in 2004, Walmart suspected—correctly—that people’s shopping habits may change when a city is about to be pummeled by a storm. They pored through sales data from previous hurricanes to see what people might want to buy. A major answer? Strawberry Pop-Tarts. This product sells seven times faster than normal in the days leading up to a hurricane. Based on their analysis, Walmart had trucks loaded with strawberry Pop-Tarts heading down Interstate 95 toward stores in the path of the hurricane. And indeed, these Pop-Tarts sold well. Why Pop-Tarts? Probably because they don’t require refrigeration or cooking. Why strawberry? No clue. But when hurricanes hit, people turn to strawberry Pop-Tarts apparently. So in the days before a hurricane, Walmart now regularly stocks its shelves with boxes upon boxes of strawberry Pop-Tarts. The reason for the relationship doesn’t matter. But the relationship itself does. Maybe one day food scientists will figure out the association between hurricanes and toaster pastries filled with strawberry jam. But, while waiting for some such explanation, Walmart still needs to stock its shelves with strawberry Pop-Tarts when hurricanes are approaching and save the Rice Krispies treats for sunnier days.
Seth Stephens-Davidowitz (Everybody Lies: Big Data, New Data, and What the Internet Can Tell Us About Who We Really Are)
To understand this first event, you need to know that we rely on Unix and Linux machines to store the thousands of computer files that comprise all the shots of any given film. And on those machines, there is a command—/bin/rm -r -f *—that removes everything on the file system as fast as it can. Hearing that, you can probably anticipate what’s coming: Somehow, by accident, someone used this command on the drives where the Toy Story 2 files were kept. Not just some of the files, either. All of the data that made up the pictures, from objects to backgrounds, from lighting to shading, was dumped out of the system. First, Woody’s hat disappeared. Then his boots. Then he disappeared entirely. One by one, the other characters began to vanish, too: Buzz, Mr. Potato Head, Hamm, Rex. Whole sequences—poof!—were deleted from the drive.
Ed Catmull (Creativity, Inc.: Overcoming the Unseen Forces That Stand in the Way of True Inspiration)
We recommend evaluating business systems and your approach to data security and how data is managed across your organisation.  We consider data access and IT policy with regards to data storage devices fixed and external.  We also give consideration to data backups and data retention within your organisation, and any external 3rd party services that store data from your organisation.  In detailing all these vital topics, we relate to the individual Articles and Recitals of the GDPR Regulation.
Alistair Dickinson (The Essential Business Guide to GDPR: A business owner’s perspective to understanding & implementing GDPR)
Furthermore, we noted additional changes that now include all data held on individuals; this no longer is just top-level data like names, addresses, email or phone.  Now special areas of interests are covered including health, payroll, payment details, political or sexual orientation and consideration will need to be given to who this and why this data is stored and what it is to be used for in your business.
Alistair Dickinson (The Essential Business Guide to GDPR: A business owner’s perspective to understanding & implementing GDPR)
Chinese and American companies have already kick-started this process, leaping out to massive leads over the rest of the world. Canada, the United Kingdom, France, and a few other countries play host to top-notch talent and research labs, but they often lack the other ingredients needed to become true AI superpowers: a large base of users and a vibrant entrepreneurial and venture-capital ecosystem. Other than London’s DeepMind, we have yet to see groundbreaking AI companies emerge from these countries. All of the seven AI giants and an overwhelming portion of the best AI engineers are already concentrated in the United States and China. They are building huge stores of data that are feeding into a variety of different product verticals, such as self-driving cars, language translation, autonomous drones, facial recognition, natural-language processing, and much more. The more data these companies accumulate, the harder it will be for companies in any other countries to ever compete.
Kai-Fu Lee (AI Superpowers: China, Silicon Valley, and the New World Order)
On battery technology, other automakers have a long way to catch up to Tesla, which has its own battery production facility and a development head start of at least four years. Then, what do other automakers know about delivering software updates to their customers over the air? GM has said it will bring over-the-air updates to its general fleet “before 2020.” But what advantages have the incumbents ceded to Tesla while it has been collecting and learning from fleet data since the Model S hit the roads in 2012? No electric all-wheel-drive car has been put into production by any company other than Tesla. No car company has a charging network that comes close to being as extensive as the one Tesla has been working on since 2o12. In the United States, no automaker has been able to sell directly to consumers or establish its own Apple-like retail stores.
Hamish McKenzie (Insane Mode: How Elon Musk's Tesla Sparked an Electric Revolution to End the Age of Oil)
strictly stores data in several different data types, called ‘classes’: Numeric – e.g.
Mit Critical Data (Secondary Analysis of Electronic Health Records)
As prevalent as disks once were, they are now a dying breed. Soon they will have gone the way of tape drives, floppy drives, and CDs. They are being replaced by RAM. Ask yourself this question: When all the disks are gone, and all your data is stored in RAM, how will you organize that data? Will you organize it into tables and access it with SQL? Will you organize it into files and access it through a directory? Of course not. You’ll organize it into linked lists, trees, hash tables, stacks, queues, or any of the other myriad data structures, and you’ll access it using pointers or references—because that’s what programmers do.
Robert C. Martin (Clean Architecture)
Information blindness occurs because of the way our brain’s capacity for learning has evolved. Humans are exceptionally good at absorbing information—as long as we can break data into a series of smaller and smaller pieces. This process is known as “winnowing” or “scaffolding.” Mental scaffolds are like file cabinets filled with folders that help us store and access information when the need arises.
Charles Duhigg (Smarter Faster Better: The Secrets of Being Productive in Life and Business)
A blockchain is a fully-distributed, peer-to-peer software network which makes use of cryptography to securely host applications, store data, and easily transfer digital instruments of value that represent real-world money.
Chris Dannen (Introducing Ethereum and Solidity: Foundations of Cryptocurrency and Blockchain Programming for Beginners)
MRU Consulting is IT Service Company who specializes in Crystal reports, Stored Procedures and Data integration.
mruconsulting
The rate of time flow perceived by an observer in the simulated universe is completely independent of the rate at which a computer runs the simulation, a point emphasized in Greg Egan's science-fiction novel Permutation City. Moreover, as we discussed in the last chapter and as stressed by Einstein, it's arguably more natural to view our Universe not from the frog perspective as a three-dimensional space where things happen, but from the bird perspective as a four-dimensional spacetime that merely is. There should therefore be no need for the computer to compute anything at all-it could simply store all the four-dimensional data, that is, encode all properties of the mathematical structure that is our Universe. Individual time slices could then be read out sequentially if desired, and the "simulated" world should still feel as real to its inhabitants as in the case where only three-dimensional data is stored and evolved. In conclusion: the role of the simulating computer isn't to compute the history of our Universe, but to specify it. How specify it? The way in which the data are stored (the type of computer, the data format, etc.) should be irrelevant, so the extent to which the inhabitants of the simulated universe perceive themselves as real should be independent of whatever method is used for data compression. The physical laws that we've discovered provide great means of data compression, since they make it sufficient to store the initial data at some time together with the equations and a program computing the future from these initial data. As emphasized on pages 340-344, the initial data might be extremely simple: popular initial states from quantum field theory with intimidating names such as the Hawking-Hartle wavefunction or the inflationary Bunch-Davies vacuum have very low algorithmic complexity, since they can be defined in brief physics papers, yet simulating their time evolution would simulate not merely one universe like ours, but a vast decohering collection of parallel ones. It's therefore plausible that our Universe (and even the whole Level III multiverse) could be simulated by quite a short computer program.
Max Tegmark (Our Mathematical Universe: My Quest for the Ultimate Nature of Reality)
The circuitry of a modern CPU is housed in a single integrated circuit or chip, millions of miniature circuits manufactured in a sliver of silicon. A processor's current instruction and data values are stored temporarily inside the CPU in special high-speed memory locations called registers. Some multiprocessor computers have multiple CPU chips or a multi-core processor (a single chip containing multiple CPUs). These computers are capable of faster speeds because they can process different sets of instructions at the same time.
Elliot B. Koffman (Problem Solving and Program Design in C)
Many of today's personal computers are equipped with optical drives for storing and retrieving data on compact discs (CDs) or digital versatile disks (DVDs) that can be removed from the drive. A CD is a silvery plastic platter on which a laser records data as a sequence of tiny pits in a spiral track on one side of the disk. One CD can hold 680 MB of data. A DVD uses smaller pits packed in a tighter spiral. Some Blu-ray disks (high-density optical disks read with a blue-violet laser) can hold multiple layers of data-for a total capacity of 200GB, sufficient storage for many hours of studio-quality video and multi-channel audio.
Elliot B. Koffman (Problem Solving and Program Design in C)
Table 5.4 Top 70 branded manufacturers’ turnover vs. profitability average for 2009/2010 Source: Compiled from various company data, annual reports and specialised financial websites. Sales turnover Number of companies Average net margin > $20 billion 12 11.3% $10–20 billion 18 7.8% $5–10 billion 16 7.4% < $5 billion 24 2.8%
Greg Thain (Store Wars: The Worldwide Battle for Mindspace and Shelfspace, Online and In-store)
manufacturers do play a role in category planning because they can synthesise their experiences across the different chains they serve, both nationally and internationally. They have the critical mass to make it worthwhile to conduct research on different segments and in-store buying behaviour. In particular, it is worthwhile for a manufacturer to analyse the retailer’s scanner data for the category, even when it is not economic for the retailer to do so for each of its many categories.
Greg Thain (Store Wars: The Worldwide Battle for Mindspace and Shelfspace, Online and In-store)
Retailers have four advantages over manufacturers when it comes to influencing consumers: the cost-effectiveness of their branding model, direct contact with shoppers, control of ‘point of purchase’ marketing variables and access to data on buying behaviour. Together, these make a potent mix.
Greg Thain (Store Wars: The Worldwide Battle for Mindspace and Shelfspace, Online and In-store)
One of the most surprising findings to emerge from neuroscience in recent years is that rather than responding in real time to the vast amount of incoming sensory data, the brain tries to keep one step ahead by constantly predicting what will happen next. It simulates a model of the immediate future based on what has just happened. When its predictions turn out to be wrong—for example, we’re feeling just fine then suddenly experience a stab of anxiety about a romantic date—this mismatch creates an unpleasant sense of dissatisfaction that we can either try to resolve by ruminating and then doing something to alleviate the anxiety (canceling the date, perhaps) or by updating the brain’s model of reality (investigating and accepting the new sensation). These alternative strategies employ the “narrative” and “being” modes of thought I described earlier in this chapter. Of course, both strategies have their place according to the situation, but an overreliance on avoidance behavior rather than acceptance stores up problems for the future because there are many things in life that cannot be changed and therefore need to be faced. Mindfulness through interoception is all about accepting the way things are. When we are mindful, the insula continually updates its representation of our internal world to improve its accuracy by reducing discrepancies between expectation and reality. As we’ve seen in previous chapters, this reality check—the focusing of dispassionate attention on unpleasant sensations such as pain or anxiety—loosens the hold that they have over us. So the structural changes in the brains of highly experienced meditators of Siddhārtha’s caliber, in particular in their insula and ACC, may be responsible for the imperturbable calm and acceptance that is the ultimate goal of contemplative practice, sometimes described as enlightenment or nirvana.
James Kingsland (Siddhartha's Brain: Unlocking the Ancient Science of Enlightenment)
Since the retailers have the data, and since both benefit from its analysis, but only the manufacturer has the specialisation to make it worthwhile, cooperation is necessary.
Greg Thain (Store Wars: The Worldwide Battle for Mindspace and Shelfspace, Online and In-store)
However, despite the enormous digital territory and huge number of Internet users, only a few users of what is called the “Surface Web” are aware of or actively observe what goes on in quite a different layer of the Internet. The data stored in another layer are not accessible to the majority of users. This is called “The Deep Web,” which is data traffic not picked up by the algorithms of search engines. Then, there is the “Dark Web,” where sites are intentionally encrypted and usually accessed by someone knowledgeable about how to find and get onto such sites. Typically, these sites are engaging in forbidden activities ranging from drug sales to weapons or hitman transactions. In order to see the sites on the “Dark Web,” a user must have a specialized browser like Tor, The Onion Router.
Malcolm W. Nance (Hacking ISIS: How to Destroy the Cyber Jihad)
The augs turn the products of his sensorium into data and then store it all, building a database for that impossible endgame of full personality upload.
Corey J. White (Killing Gravity (The Voidwitch Saga, #1))
In 1985, then-General Secretary of the Communist Party of the Soviet Union, Mikhail Gorbachev, cut back on nationwide vodka production and passed a law prohibiting stores from selling liquor before noon. Consumption and overall death rates both dropped. When communism fell, vodka became available again, and rates of consumption and alcohol-related deaths rose accordingly. Russian women aren’t teetotalers by any means, but the average life expectancy for Russian men today is around 64, the lowest of any country in the world outside African nations. Less
Martin Lindstrom (Small Data: The Tiny Clues That Uncover Huge Trends)
Shelfspace, number of facings, position, local promotion, advertising, information from scanning data and choice of new products are all key assets for retailers. Selling
Greg Thain (Store Wars: The Worldwide Battle for Mindspace and Shelfspace, Online and In-store)
Tesco uses its data-collecting loyalty card (the Clubcard) to track which stores customers visit, what they buy, and how they pay. This information has helped Tesco tailor merchandise to local tastes and customize offerings at the individual level across a variety of store formats—from
Harvard Business Publishing (HBR's 10 Must Reads on Strategic Marketing (with featured article "Marketing Myopia," by Theodore Levitt))
the Apple logo hangs from an unseen thread in many Apple Stores like a Bethlehem star?
Martin Lindstrom (Small Data: The Tiny Clues That Uncover Huge Trends)