Technology Infrastructure Quotes

We've searched our database for all the quotes and captions related to Technology Infrastructure. Here they are! All 100 of them:

...[D]ivision of labor, in my mind, is one of the dangers of work-based technology. Modern IT infrastructure allows us to break projects into very small, discrete parts and assign each person to do only one of the many parts. In so doing, companies run the risk of taking away employees' sense of the big picture, purpose, and sense of completion.
Dan Ariely (The Upside of Irrationality: The Unexpected Benefits of Defying Logic at Work and at Home)
Every conceivable layer of the election process is completely riddled with vulnerabilities, so yes, hacking elections is easy!
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
The application of Blockchain technology is rapidly becoming a core component of our infrastructure!
Kevin Coleman
Man is to technology what the bee is to the flower. It’s man’s intervention that allows technology to expand and evolve itself and in return, technology offers man convenience, wealth and the lessening burden of physical labor via its automated systems.
James Scott, co-founder, Institute for Critical Infrastructure Technology
Your ideas are bound to forces of which you have no control due to the fact that you've voluntarily submitted your freedom of though to the perception steering censorship of Google, Facebook and other dragnet surveillance capitalists.
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
Consider all tabulation systems infected by bad actors until a third party, not affiliated with the manufacturer or election officials, proves they are secure.
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
Cities require connectivity rather than territory in order to drive their economic stability and growth.
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
He (Comings) has in the past performed successful energy-converting experiments, creating a ringing resonance by injecting certain frequencies into piezo-electric crystals. When the crystal was in resonance with the plenum of space, the power output rose significantly higher than the input. He concluded that, if allowed politically, such discoveries could guide humankind in building a completely clean energy infrastructure -- resonant technologies that allow us to live in harmony with the universal energy field and the Earth.
Jeane Manning (Breakthrough Power: How Quantum-leap New Energy Inventions Can Transform Our World (Second Edition))
Ransomware is more about manipulating vulnerabilities in human psychology than the adversary's technological sophistication
James Scott
You think an Air Gap is a defense? Sofacy, Stuxnet, Uroburos, AirHopper, BitWhisperer and ProjectSauron…enough said!
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
In this digital age, we're experiencing the weaponization of everything.
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
In this business, I find more value in working with hackers who abstract new realities from cast aside code and concepts than academics who regurgitate other people’s work and try to pawn it off as their own.
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
Hackers find more success with organizations where employees are under appreciated, over worked and under paid. Why would anyone in an organization like that care enough to think twice before clicking on a phishing email?
James Scott
The security theater we are witnessing in our election system boasting the illusion of security via ‘clunky as heck’ and air gap defense will do nothing against the real and sophisticated adversarial landscape that is zeroing in on our democracy
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
In today’s hypercompetitive environment enabled by technology, ownership of infrastructure no longer provides a defensible advantage. Instead, flexibility provides the crucial competitive edge, competition is perpetual motion, and advantage is evanescent.
Geoffrey G. Parker (Platform Revolution: How Networked Markets Are Transforming the Economy and How to Make Them Work for You: How Networked Markets Are Transforming the Economy―and How to Make Them Work for You)
A Nation State or Cyber-Mercenary won’t hack e-voting machines one by one. This takes too long and will have minimal impact. Instead, they’ll take an easier approach like spear phishing the manufacturer with malware and poison the voting machine update pre-election and allow the manufacturer to update each individual machine with a self-deleting payload that will target the tabulation process.
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
Hacking a national election is simple. Exploit a vulnerability in the manufacturer's network, poison the tabulation software update with self-deleting malware and let the manufacturer send to their field reps and election consultants who update the election systems.
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
To achieve such intense strategic focus the organizations had instituted comprehensive, transformational change. They redefined their relationships with the customer, reengineered fundamental business processes, taught their workforces new skills, and deployed a new technology infrastructure.
Robert S. Kaplan (The Strategy-Focused Organization: How Balanced Scorecard Companies Thrive in the New Business Environment)
This next president is going to inherit the most sophisticated and persistent cyber espionage cultures the world has ever seen, He needs to surround himself with experts that can expedite the allocation of potent layers of next generation defenses around our targeted critical infrastructure silos.
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
The health sector continuously get’s pummeled by malicious actors and hackers because their cyber-kinetic security is being managed by “Participation Trophy” winning wimps!
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
Wannacry is the Stuxnet of Ransomware
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
A vulnerability in an organization's IoT microcosm is a "taunt" to exploit by malicious hackers
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
The biggest center of attention needs to be the Secretaries of State. They're the ones that manage the elections. At the end of the day, they're the ones that need to be held accountable.
James Scott, co-founder, Institute for Critical Infrastructure Technology
As for relegated/delegated responsibility to ensure organizational software licensing compliance, management is still accountable when intellectual property rights are violated. If the safeguarding responsibility is assigned to an ineffective and/or inefficient unit within an organization, IT audit should recommend an alternative arrangement after the risks are substantiated.
Robert E. Davis
Even the Internet, which was supposed to deliver unprecedented cultural diversity ad democratic communication, has become an echo chamber where people see and hear what they already believe.
Eric Klinenberg (Palaces for the People: How Social Infrastructure Can Help Fight Inequality, Polarization, and the Decline of Civic Life)
invest simultaneously in the agricultural sector, in education, in productivity-enhancing technology and its dissemination, and in infrastructure that enables connectivity to the rest of the economy.
Michael Spence (The Next Convergence: The Future of Economic Growth in a Multispeed World)
If you don’t feel ordained by the Universe to do this job, do something else. The intelligence community has to shut down the gaping wound that is the insider threat epidemic we are experiencing right now.
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
Epstein came up with an elaborate plan, including TV ads, and presented it to the board. The board rejected it. “It really came down to this,” McCaffrey later said. “We have a limited budget. Do we want to put that money into the technology, into the infrastructure, into hiring really great people? Or do we want to blow it on a marketing campaign that we can’t measure?” Larry and Sergey told Epstein that his interim stint was over
Steven Levy (In the Plex: How Google Thinks, Works, and Shapes Our Lives)
This cyberwar will be a continuous marathon war that will only compound and hyper-evolve in stealth, sophistication and easy entry due to the accelerated evolution of “as a service” attack strategies for sale on the dark web.
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
Look at the stealth and sophistication of foreign nation state APTs who break through even the most sophisticated layers of security daily and tell me why they would just give our completely unprotected election systems a pass
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
Dragnet surveillance capitalists such as Facebook, Comcast, AT&T and Google, unfortunately, supply these manipulating forces with an endless supply of metadata for this information war against the American and European public.
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
You'll have the right to be angry about Vault 7 only after you boycott dragnet surveillance data providers like Google, Microsoft, Skype, Facebook and LinkedIn. The true threat is coming from the private sector surveillance profiteers.
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
We shall have to stop thinking of technology as something invulnerable that is merely used by humans, and view it as part of a greater cybernetic ecology all around us. The key distinction in an environment is not between ‘natural’ and ‘artificial’, but between semantic and dynamic: intention and behaviour. Biology has already drawn these lines, and through us, it will integrate the inanimate with the animate in information systems, until we no longer see a pertinent difference between the two.
Mark Burgess (In Search of Certainty: The Science of Our Information Infrastructure)
New media don’t succeed because they’re like the old media, only better: they succeed because they’re worse than the old media at the stuff the old media is good at, and better at the stuff the old media are bad at. Books are good at being paperwhite, high-resolution, low-infrastructure, cheap and disposable. Ebooks are good at being everywhere in the world at the same time for free in a form that is so malleable that you can just pastebomb it into your IM session or turn it into a page-a-day mailing list.
Cory Doctorow (Content: Selected Essays on Technology, Creativity, Copyright, and the Future of the Future)
What do you mean “Should we worry about cyber adversaries getting into state voter registration databases?” They’re already in and selling exfiltrated voter registration data on the dark web! Next election cycle black hats will be selling ‘access as service’.
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
I see the impossible work being done by of my friends at the federal agencies, the Pentagon, NATO, Five Eyes and the intelligence community. They are doing the impossible, for the ungrateful and with a fraction of the budgets required to render a viable defense.
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
The collaboration between secretaries of state, election officials and the voting system manufacturers on the matter of enforcing this black box proprietary code secrecy with election systems, is nothing less than the commoditization and monetization of American Democracy
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
In an advanced industrial society it becomes almost impossible to seek, even to imagine, unemployment as a condition for autonomous, useful work. The infrastructure of society is arranged so that only the job gives access to the tools of production...Housework, handicrafts, subsistence agriculture, radical technology, learning exchanges, and the like are degraded into activities for the idle, the unproductive, the very poor, or the very rich. A society that fosters intense dependence on commodities thus turns its unemployed into either its poor or its dependents.
Ivan Illich
A single spear-phishing email carrying a slightly altered malware can bypass multi-million dollar enterprise security solutions if an adversary deceives a cyber-hygienically apathetic employee into opening the attachment or clicking a malicious link and thereby compromising the entire network.
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
What is the most helpful thing we can do for the earth and her people, Kuan Yin?” “Kuan Yin is changing shape in response to your question, Hope. I’m not sure what this particular shape-shifting means, if it is an answer in itself or if she is adjusting to the question” Lena contemplates. “I’ll just watch for a moment and try to understand.” “Loving people is the most helpful thing anyone can do,” Kuan Yin answers after a short while. “Your society has the resources, at this very moment, to fashion industries and lifestyles conducive to a non-harmful environment. There is a popular belief that over-population is the threat to the earth’s environment. However, for many places upon the earth it is also very much a question of resource availability and distribution. There is a real need for creating a holistic infrastructure that can support everyone. A helpful mindset is simple-living and high-thinking”, continues Kuan Yin. “Science is constantly evolving. There are now recyclable batteries, ink cartridges, etc. Keep up to date on the latest technologies. Be aware, set examples and create trends that will positively influence people’s lives and the environment. As I said earlier, however, this is also a discussion about love and developing a greater capacity to love. It can help everyone. We’re all one huge family, a great continuum. Don’t underestimate the power of the love created in your homes and families. This love has an immense potency, the power to influence others lives in a positive way.
Hope Bradford (Oracle of Compassion: The Living Word of Kuan Yin)
We’re talking about the fate of our economy and the questionable resiliency of our Nation’s critical infrastructure. Why are experts so polite, patient, and forgiving when talking about cybersecurity and National Security? The drama of each script kiddie botnet attack and Nation State pilfering of our IP has been turned into a soap opera through press releases, sound bites and enforced absurdity of mainstream media. It’s time for a cybersecurity zeitgeist in the West where cyber hygiene is a meme that is aggressively distributed by those who have mastered it and encouraged to be imitated by those who have experienced it.
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
Exfiltrated metadata from internet service providers and social media platforms can be plugged into big data analytics and once the right algorithm is applied, can allow an adversary surgically precise psychographic targeting of critical infrastructure executives with elevated privileges. Why is no one talking about this?
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
Real cybersecurity means that your Security Operations team is consistently pen testing your network with the same stealth and sophistication as the Russian nation state, the same desperation as China’s 13th Five Year Plan, the same inexhaustible energy of the Cyber Caliphate and the same greed and ambition for monetary payoff as a seasoned cyber-criminal gang.
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
More than developing confidence in the reliability of new energy technologies, and even more of a challenge than the admittedly complex task of designing and constructing an infrastructure that will allow consumer access to them, what stands in the way of our apparent will to wean ourselves from conventional energy sources is the reluctance to wean ourselves from old ways of thinking.
Jane Hoffman (Green: Your Place in the New Energy Revolution)
You are a product to dragnet surveillance capitalists like Google, Facebook, Comcast and Verizon. Your ideas are rarely your own, rather you are little more than a pawn to their perception steering initiatives to get you to read, believe and buy what they put in front of you. The first step to breaking out of this faux reality matrix is to stop using Google, Bing, Yahoo, Comcast and Facebook.
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
Our current understanding of entrepreneurship is deeply saturated in power-hungry capitalist greed, leading to undemocratic control of the technological infrastructure that underpins our lives — not to mention massively wasteful economic inequality. Whatever merits the existing system of private entrepreneurship may have had, we’re now brushing up against its limits, and it’s time to consider something new.
Wendy Liu (Abolish Silicon Valley: How to Liberate Technology from Capitalism)
they set out to acquire—steal—our industrial secrets. “Curiously our free-world media fail dismally to point out that all Soviet advances are based originally on one of our stolen inventions or techniques, that without our grain they starve, and without our vast and ever-growing financial assistance and credits to buy our grains and technology they cannot fuel and refuel their whole military-industrial infrastructure which keeps their empire and people enthralled.
James Clavell (Noble House (Asian Saga Book 5))
During the globalization wave, Amazon had lost the battle for e-commerce to Ebay, the battle for digital media to Apple, and the battle for technology innovation to Google. Bezos was hungry to re-invent Amazon over a decade after it was founded. The two masterstrokes of Bezos that created new revenue streams by renting out Amazon’s infrastructure – Amazon Prime and Amazon Web Services (AWS) – were at the time, shots in the dark. They would end up turning things around.
Kashyap Deorah (The Golden Tap: The Inside Story of Hyper-Funded Indian Startups)
The coming wave of automation will move way beyond the factory or public infrastructure and into our very biological processes such as aging and even giving birth. Used as we are to the gradual societal shifts brought about by previous change waves, often allowing decades to adjust and respond, I ask if we as a tribe are ready to abdicate our human sovereignty to the faceless forces of technology? Are you ready for the biggest loss of free will and individual human control in history?
Gerd Leonhard (Technology vs. Humanity: The coming clash between man and machine (FutureScapes))
The railroads that delivered goods to market were the same that delivered soldiers to battle — but they had no destructive potential. Nuclear technologies are often dual-use and may generate tremendous destructive capacity, but their complicated infrastructure enables relatively secure governmental control. A hunting rifle may be in widespread use and possess both military and civilian applications, but its limited capacity prevents its wielder from inflicting destruction on a strategic level.
Henry Kissinger (The Age of A.I. and Our Human Future)
It was the combination of EC2 and S3 - storage and compute, two primitives linked together - that transformed both AWS and the technology world. Startups no longer needed to spend their venture capital on buying servers and hiring specialized engineers to run them. Infrastructure costs were variable instead of fixed, and they could grow in direct proportion to revenues. It freed companies to experiment, to change their business models with a minimum of pain, and to keep up with the rapidly growing audiences of erupting social networks like Facebook and Twitter.
Brad Stone (The Everything Store: Jeff Bezos and the Age of Amazon)
Many believe that the end of COVID-19 will simply arrive with the development of a vaccine. Yet a closer look at one of the central vaccine success stories of the 20th century shows that technological solutions rarely offer resolution to pandemics on their own. Contrary to our expectations, vaccines are not universal technologies. Vaccination practices and the infrastructures in place to deliver them are as diverse as the epidemic management strategies national governments follow. They are always deployed locally, with variable resources and commitments to scientific expertise.
Hal Brands (COVID-19 and World Order: The Future of Conflict, Competition, and Cooperation)
The weakness of ‘learning to code’ alone might be argued in the opposite direction too: you should be able to understand technological systems without having to learn to code at all, just as one should not need to be a plumber to take a shit, nor to live without fear that your plumbing system might be trying to kill you. The possibility that your plumbing system is indeed trying to kill you should not be discounted either: complex computational systems provide much of the infrastructure of contemporary society, and if they are not safe for people to use, no amount of education in just how bad they are will save us in the long run.
James Bridle (New Dark Age: Technology and the End of the Future)
Now imagine if, instead of accidentally leaving open a loophole, the hackers behind WannaCry had designed the program to systematically learn about its own vulnerabilities and repeatedly patch them. Imagine if, as it attacked, the program evolved to exploit further weaknesses. Imagine that it then started moving through every hospital, every office, every home, constantly mutating, learning. It could hit life-support systems, military infrastructure, transport signaling, the energy grid, financial databases. As it spread, imagine the program learning to detect and stop further attempts to shut it down. A weapon like this is on the
Mustafa Suleyman (The Coming Wave: Technology, Power, and the Twenty-first Century's Greatest Dilemma)
Currency is the email of blockchains. Payments are the fundamental infrastructure that will enable density of adoption. It’s very, very enticing to say, "This is about more than money!" It absolutely is, in the long term. The vision of this technology is far beyond money, but you can’t build that unless you first build the money part. That’s what creates the security. That’s what creates the velocity, the liquidity, the infrastructure. That’s what funds the entire ecosystem. In the end, when we do deliver these services to people, it won’t be so they can open a bank account. This isn’t about banking the unbanked; it’s about unbanking all of us.
Andreas M. Antonopoulos (The Internet of Money Volume Two)
. . . one of the lessons of a UBI is that our policy outcomes are not inevitabilities but choices. The United States would be significantly richer right now if it had passed more fiscal stimulus at the onset of the Great Recession. It would be richer if it invested in infrastructure. It would be richer if it chose to ensure that no child grew up in poverty. It would be richer if it had worked to make black and white Americans, as well as men and women, true equals. . . poverty in the United States is a choice. Stagnant middle-class incomes are a choice. Technology-fueled mass unemployment is a choice. Racism is a choice. The patriarchy is a choice. This is not to discount how deeply entrenched existing policies, interests, and tendencies are—but to recognize that while they might be entrenched, they are not immutable.
Annie Lowrey (Give People Money: The Simple Idea to Solve Inequality and Revolutionise Our Lives)
Bertrand Russell famously said: “It is undesirable to believe a proposition when there is no ground whatsoever for supposing it is true.” [but] Russell’s maxim is the luxury of a technologically advanced society with science, history, journalism, and their infrastructure of truth-seeking, including archival records, digital datasets, high-tech instruments, and communities of editing, fact-checking, and peer review. We children of the Enlightenment embrace the radical creed of universal realism: we hold that all our beliefs should fall within the reality mindset. We care about whether our creation story, our founding legends, our theories of invisible nutrients and germs and forces, our conceptions of the powerful, our suspicions about our enemies, are true or false. That’s because we have the tools to get answers to these questions, or at least to assign them warranted degrees of credence. And we have a technocratic state that should, in theory, put these beliefs into practice. But as desirable as that creed is, it is not the natural human way of believing. In granting an imperialistic mandate to the reality mindset to conquer the universe of belief and push mythology to the margins, we are the weird ones—or, as evolutionary social scientists like to say, the WEIRD ones: Western, Educated, Industrialized, Rich, Democratic. At least, the highly educated among us are, in our best moments. The human mind is adapted to understanding remote spheres of existence through a mythology mindset. It’s not because we descended from Pleistocene hunter-gatherers specifically, but because we descended from people who could not or did not sign on to the Enlightenment ideal of universal realism. Submitting all of one’s beliefs to the trials of reason and evidence is an unnatural skill, like literacy and numeracy, and must be instilled and cultivated.
Pinker Steven (Rationality: What It Is, Why It Seems Scarce, Why It Matters)
One further complication in the link between self-sufficiency and simplicity is worth noting. Self-sufficiency may be part of the traditional notion and the Romantic ideal of simple living, but in fairly obvious ways using technology can simplify our lives considerably. Which is simpler, washing all your clothes and sheets by hand, or using a washing machine? Collecting and chopping wood to make a fire to cook over, or turning on the gas burner and pushing the electric ignition button? Walking across town and back to deliver a message, or making a phone call? The point here is that the concept of simple living contains crosscurrents. Reducing our dependence on infrastructure and technology may bring us closer to simple living in one sense—we are more self-sufficient—but takes us away from it in other ways since it makes basic tasks much more difficult, arduous, and time-consuming. And in some ways technology can even help us to be more self-sufficient, as when we use a washing machine to do our own laundry instead of using servants or sending it out.
Emrys Westacott (The Wisdom of Frugality: Why Less Is More - More or Less)
Of course, culture is an oppressive structure. It’s always been that way. It’s a fundamental, universal existential reality. The tyrannical king is a symbolic truth; an archetypal constant. What we inherit from the past is willfully blind, and out of date. It’s a ghost, a machine, and a monster. It must be rescued, repaired and kept at bay by the attention and effort of the living. It crushes, as it hammers us into socially acceptable shape, and it wastes great potential. But it offers great gain, too. Every word we speak is a gift from our ancestors. Every thought we think was thought previously by someone smarter. The highly functional infrastructure that surrounds us, particularly in the West, is a gift from our ancestors: the comparatively uncorrupt political and economic systems, the technology, the wealth, the lifespan, the freedom, the luxury, and the opportunity. Culture takes with one hand, but in some fortunate places it gives more with the other. To think about culture only as oppressive is ignorant and ungrateful, as well as dangerous. This is not to say (as I am hoping the content of this book has made abundantly clear, so far) that culture should not be subject to criticism.
Jordan B. Peterson
RENEWABLE ENERGY REVOLUTION: SOLAR + WIND + BATTERIES In addition to AI, we are on the cusp of another important technological revolution—renewable energy. Together, solar photovoltaic, wind power, and lithium-ion battery storage technologies will create the capability of replacing most if not all of our energy infrastructure with renewable clean energy. By 2041, much of the developed world and some developing countries will be primarily powered by solar and wind. The cost of solar energy dropped 82 percent from 2010 to 2020, while the cost of wind energy dropped 46 percent. Solar and onshore wind are now the cheapest sources of electricity. In addition, lithium-ion battery storage cost has dropped 87 percent from 2010 to 2020. It will drop further thanks to the massive production of batteries for electrical vehicles. This rapid drop in the price of battery storage will make it possible to store the solar/wind energy from sunny and windy days for future use. Think tank RethinkX estimates that with a $2 trillion investment through 2030, the cost of energy in the United States will drop to 3 cents per kilowatt-hour, less than one-quarter of today’s cost. By 2041, it should be even lower, as the prices of these three components continue to descend. What happens on days when a given area’s battery energy storage is full—will any generated energy left unused be wasted? RethinkX predicts that these circumstances will create a new class of energy called “super power” at essentially zero cost, usually during the sunniest or most windy days. With intelligent scheduling, this “super power” can be used for non-time-sensitive applications such as charging batteries of idle cars, water desalination and treatment, waste recycling, metal refining, carbon removal, blockchain consensus algorithms, AI drug discovery, and manufacturing activities whose costs are energy-driven. Such a system would not only dramatically decrease energy cost, but also power new applications and inventions that were previously too expensive to pursue. As the cost of energy plummets, the cost of water, materials, manufacturing, computation, and anything that has a major energy component will drop, too. The solar + wind + batteries approach to new energy will also be 100-percent clean energy. Switching to this form of energy can eliminate more than 50 percent of all greenhouse gas emissions, which is by far the largest culprit of climate change.
Kai-Fu Lee (AI 2041: Ten Visions for Our Future)
Bitcoin was in theory and in practice inseparable from the process of computation run on cheap, powerful hardware: the system could not have existed without markets for digital moving images; especially video games, driving down the price of microchips that could handle the onerous business of guessing. It also had a voracious appetite for electricity, which had to come from somewhere - burning coal or natural gas, spinning turbines, decaying uranium - and which wasn't being used for something arguably more constructive than this discovery of meaningless hashes. The whole apparatus of the early twenty-first century's most complex and refined infrastructures and technologies was turned to the conquest of the useless. It resembled John Maynard Keynes's satirical response to criticisms of his capital injection proposal by proponents of the gold standard: just put banknotes in bottles, he suggested, and bury them in disused coal mines for people to dig up - a useless task to slow the dispersal of the new money and get people to work for it. 'It would, indeed, be more sensible to build houses and the like; but if there are political and practical difficulties in the way of this, the above would be better than nothing.
Finn Brunton (Digital Cash: The Unknown History of the Anarchists, Utopians, and Technologists Who Created Cryptocurrency)
It is a truism today, in this highly technologically-developed culture, that students need technical computer skills. Equally truistic (and, not incidentally, true) is that the workplace has become highly technological. Even more truistic – and far more disturbing – are the shifts in education over the last two decades as public elementary schools, public and private high schools, and colleges and universities have invested scores of billions of dollars on “digital infrastructure,” computers, monitors and printers, “smart classrooms,” all to “meet the demands” of this new technological workplace. "We won’t dwell on the fact – an inconvenient truth? – that those technological investments have coincided with a decline in American reading behaviors, in reading and reading comprehension scores, in overall academic achievement, in the phenomenon – all too familiar to us in academia – of “grade inflation,” in an alarming collapse of our students’ understanding of their own history (to say nothing of the history of the rest of the world), rising ignorance of world and American geography, with an abandonment of the idea of objectivity, and with an increasingly subjective, even solipsistic, emphasis on personal experience. Ignore all this. Or, if we find it impossible to ignore, then let’s blame the teachers...
Peter K. Fallon (Cultural Defiance, Cultural Deviance)
While the technosphere concept stresses that most humans lack the potential to influence the behavior of large technological systems, the ergosphere concept makes this possibility dependent on the existence of appropriate social and political structures and knowledge systems, and also on the individual perspectives of human actors. One cause for hope is that a knowledge economy produces and distributes not only the knowledge needs for its functioning (and often less) but, to varying degrees, an excess of knowledge (an 'epistemic spillover') that may trigger unexpected developments. Humans must certainly maintain and preserve their tools, technologies, and infrastructures, but they also change them with each implementation. The material world of the ergosphere consists of borderline objects between nature and culture that may trigger innovations as well as unpredictable consequences. The ergosphere has a plasticity and porousness in which materials and functions are not so tightly interwoven as to exclude the repurposing of existing tools for new applications. In principle, each aspect of the ergosphere can be transformed from an end into a means, which is then available to emerging intentions and functions. Repurposing a given tool is, however, a double-edged sword - it may have disastrous consequences. Thus, the responsibility for using and developing technical systems must always be assumed anew.
Jürgen Renn (The Evolution of Knowledge: Rethinking Science for the Anthropocene)
Key Points: ● Transparency - Blockchain offers significant improvements in transparency compared to existing record keeping and ledgers for many industries. ● Removal of Intermediaries – Blockchain-based systems allow for the removal of intermediaries involved in the record keeping and transfer of assets. ● Decentralization – Blockchain-based systems can run on a decentralized network of computers, reducing the risk of hacking, server downtime and loss of data. ● Trust – Blockchain-based systems increase trust between parties involved in a transaction through improved transparency and decentralized networks along with removal of third-party intermediaries in countries where trust in the intermediaries doesn’t exist. ● Security – Data entered on the blockchain is immutable, preventing against fraud through manipulating transactions and the history of data. Transactions entered on the blockchain provide a clear trail to the very start of the blockchain allowing any transaction to be easily investigated and audited. ● Wide range of uses - Almost anything of value can be recorded on the blockchain and there are many companies and industries already developing blockchain-based systems. These examples are covered later in the book. ● Easily accessible technology – Along with the wide range of uses, blockchain technology makes it easy to create applications without significant investment in infrastructure with recent innovations like the Ethereum platform. Decentralized apps, smart contracts and the Ethereum platform are covered later in the book. ● Reduced costs – Blockchain-based ledgers allow for removal of intermediaries and layers of confirmation involved in transactions. Transactions that may take multiple individual ledgers, could be settled on one shared ledger, reducing the costs of validating, confirming and auditing each transaction across multiple organizations. ● Increased transaction speed – The removal of intermediaries and settlement on distributed ledgers, allows for dramatically increased transaction speeds compared to a wide range of existing systems.
Mark Gates (Blockchain: Ultimate guide to understanding blockchain, bitcoin, cryptocurrencies, smart contracts and the future of money. (Ultimate Cryptocurrency Book 1))
What is scarce? Surely time is scarce? This is true in the sense that we get only one life, but yet again there are ways in which competition and how we use our time can make us feel an artificial sense of time scarcity. Each time we are able to build on the work of others with confidence, each time we use the elements of life pulled from our commonwealth of agricultural knowledge, we bundle time, and so get the benefit of having multiple lifetimes. Each time nature uses genetic code that has been developed over millions of years, millions of years of development are collapsed into something that works in our lifetimes. Each time we add to that collection, we are putting our lifetimes' work into a useful form for the benefit of future generations. At the same time, yes, we each have only our own single lives in which to pursue happiness. The goal is to spend as much of that time in a framework of sharing abundance rather than having it squeezed into a life of scarcity and competition. In contrast, we need not look far to find lots of frustrating examples in which our time is treated as abundant when we would rather have it be valued as scarce. It happens each time we must stand in line at the DMV, fill out redundant forms at the hospital, reproduce others' efforts by spending time searching for knowledge or data that already exists somewhere, create a report that no one reads. In those cases, we are creating and living in artificial and unnecessary time scarcity. Time is indeed one of the most curious elements of life, especially since our lifetimes and those of plants and animals all move at different rates. We know, for example, that the urgency to address climate change is really on our human scale, not geologic scale. The Earth has been through greater upheavals and mass extinctions and will likely go through them again, but for the narrowest of narrow bands of human history on Earth, we require very specific conditions for us to continue to thrive as a species. To keep our planet within a habitable and abundant balance, we have, as Howard Buffet noted, only 'forty seasons' to learn and adjust. That is why building on one another's work is so important. One farmer can have the benefit of forty seasons and pass some of that experience down, but if 1,000 farmers do the same, there is the collective benefit of 1,000 years in a single year. If a million people participate, then a million years of collective experience are available. If we are then able to compound knowledge across generations and deepen our understanding of human and natural history, we add even greater richness. It is in this way of bundling our experiences for continual improvement, with compound interest, that time shifts from a scarce resource to being far less of a constraint, if not truly abundant. However, for time to be compounded, knowledge must be shared, and real resources, energy, and infrastructure must exist and function to support and grow our commonwealth of knowledge.
Dorn Cox (The Great Regeneration: Ecological Agriculture, Open-Source Technology, and a Radical Vision of Hope)
Meanwhile grid researchers are tackling the next set of challenges: How can we manage large, distributed infrastructures so that they deliver reliable service in the face of failures? How can we enable users to exploit the availability of on-demand resources and services? How must grid concepts and technologies evolve as the number and power of computers rise by orders of magnitude?
Scientific American (A.I. and Genius Machines)
Maples believes technology waves follow a three-phase pattern, “They start with infrastructure. Advances in infrastructure are the preliminary forces that enable a large wave to gather. As the wave begins to gather, enabling technologies and platforms create the basis for new types of applications that cause a gathering wave to achieve massive penetration and customer adoption. Eventually, these waves crest and subside, making way for the next gathering wave to take shape.”[cxxxviii]
Nir Eyal (Hooked: How to Build Habit-Forming Products)
Uber, which raised $1.2 billion this month at a valuation of $40 billion, said in August it had sought a legal opinion and that its Seoul service obeys the law. Opposition to its operations is down to outdated regulations that precede smartphone and wireless technology, Allen Penn, the company’s head of Asia, told reporters at the time. Paid transportation with unregistered vehicles is “clearly illegal activity,” South Korea’s Ministry of Land, Infrastructure and Transport said later that month. The maximum penalty for Uber’s alleged legal violation is a two-year prison sentence or a fine of nearly $20,000, Yonhap News reported Wednesday.
Anonymous
Office reformers are pulled in two directions. They either follow Frederick Taylor (the father of scientific management) and the successive waves of management scientists who thought that with enough overhead cameras, spreadsheets, computing power, and analysis, they could “solve” the organization and its problems. Or they follow the dreamers of the 1970s and ’80s, who, inspired by the cybernetic-counterculture movement, thought that by getting rid of that same organizational infrastructure, they could free workers to reach their full potential by embracing chaos, complexity, new technology, or all three.
Ray Fisman (The Org: The Underlying Logic of the Office)
physical sharing and exchange of computer tapes and disks on which the code was recorded. In current Internet days, rapid technological advances in computer hardware and software and networking technologies have made it much easier to create and sustain a communal development style on ever-larger scales. Also, implementing new projects is becoming progressively easier as effective project design becomes better understood, and as prepackaged infrastructural support for such projects becomes available on the Web. Today, an open source software development project is typically initiated by an individual or a small group seeking a solution to an individual's or a firm's need. Raymond (1999, p. 32) suggests that "every good work of software starts by scratching a developer's personal itch" and that "too often software developers spend their days grinding away for pay at programs they neither need nor love. But not in the (open source) world...." A project's initiators also generally become the project's "owners" or "maintainers" who take on responsibility for project management." Early on, this individual or group generally develops a first, rough version of the code that outlines the functionality envisioned. The source code for this initial version is then made freely available to all via downloading from an Internet website established by the project. The project founders also set up infrastructure for the project that those interested in using or further developing the code can use to seek help, provide information or provide new open source code for others to discuss and test. In the case of projects that are successful in attracting interest, others do download and use and "play with" the code-and some of these do go on to create new and modified code. Most then post what they have done on the project website for use and critique by any who are interested. New and modified code that is deemed to be of sufficient quality and of general interest by the project maintainers is then added to the authorized version of the code. In many projects the privilege of adding to the authorized code is restricted to only a few trusted developers. These few then serve as gatekeepers for code written by contributors who do not have such access (von Krogh and Spaeth 2002). Critical tools and infrastructure available to open source software project participants includes email lists for specialized purposes that are open to all. Thus, there is a list where code users can report software failures ("bugs") that they encounter during field use of the software. There is also a list where those developing the code can share ideas about what would be good next steps for the project, good features to add, etc. All of these lists are open to all and are also publicly archived,
Eric von Hippel (Democratizing Innovation)
From what Kashmareck understood, the clinic, in addition to its role as a hospital, also performed specialized research, supported by an up-to-the-minute technological infrastructure.
Franck Thilliez (Syndrome E)
Life expectancy rose only modestly between the Neolithic era of 8500 to 3500 BC and the Victorian era of 1850 to 1900.13 An American born in the late nineteenth century had an average life expectancy of around forty-five years, with a large share never making it past their first birthdays.14 Then something remarkable happened. In countries on the frontier of economic development, human health began to improve rapidly, education levels shot up, and standards of living began to grow and grow. Within a century, life expectancies had increased by two-thirds, average years of schooling had gone from single to double digits, and the productivity of workers and the pay they took home had doubled and doubled and then doubled again. With the United States leading the way, the rich world crossed a Great Divide—a divide separating centuries of slow growth, poor health, and anemic technical progress from one of hitherto undreamed-of material comfort and seemingly limitless economic potential. For the first time, rich countries experienced economic development that was both broad and deep, reaching all major segments of society and producing not just greater material comfort but also fundamental transformations in the health and life horizons of those it touched. As the French economist Thomas Piketty points out in his magisterial study of inequality, “It was not until the twentieth century that economic growth became a tangible, unmistakable reality for everyone.”15 The mixed economy was at the heart of this success—in the United States no less than in other Western nations. Capitalism played an essential role. But capitalism was not the new entrant on the economic stage. Effective governance was. Public health measures made cities engines of innovation rather than incubators of illness.16 The meteoric expansion of public education increased not only individual opportunity but also the economic potential of entire societies. Investments in science, higher education, and defense spearheaded breakthroughs in medicine, transportation, infrastructure, and technology. Overarching rules and institutions tamed and transformed unstable financial markets and turned boom-bust cycles into more manageable ups and downs. Protections against excessive insecurity and abject destitution encouraged the forward-looking investments and social integration that sustained growth required. At every level of society, the gains in health, education, income, and capacity were breathtaking. The mixed economy was a spectacularly positive-sum bargain: It redistributed power and resources, but as its impacts broadened and diffused, virtually everyone was made massively better off.
Jacob S. Hacker (American Amnesia: How the War on Government Led Us to Forget What Made America Prosper)
Marc Goodman is a cyber crime specialist with an impressive résumé. He has worked with the Los Angeles Police Department, Interpol, NATO, and the State Department. He is the chief cyber criminologist at the Cybercrime Research Institute, founder of the Future Crime Institute, and now head of the policy, law, and ethics track at SU. When breaking down this threat, Goodman sees four main categories of concern. The first issue is personal. “In many nations,” he says, “humanity is fully dependent on the Internet. Attacks against banks could destroy all records. Someone’s life savings could vanish in an instant. Hacking into hospitals could cost hundreds of lives if blood types were changed. And there are already 60,000 implantable medical devices connected to the Internet. As the integration of biology and information technology proceeds, pacemakers, cochlear implants, diabetic pumps, and so on, will all become the target of cyber attacks.” Equally alarming are threats against physical infrastructures that are now hooked up to the net and vulnerable to hackers (as was recently demonstrated with Iran’s Stuxnet incident), among them bridges, tunnels, air traffic control, and energy pipelines. We are heavily dependent on these systems, but Goodman feels that the technology being employed to manage them is no longer up to date, and the entire network is riddled with security threats. Robots are the next issue. In the not-too-distant future, these machines will be both commonplace and connected to the Internet. They will have superior strength and speed and may even be armed (as is the case with today’s military robots). But their Internet connection makes them vulnerable to attack, and very few security procedures have been implemented to prevent such incidents. Goodman’s last area of concern is that technology is constantly coming between us and reality. “We believe what the computer tells us,” says Goodman. “We read our email through computer screens; we speak to friends and family on Facebook; doctors administer medicines based upon what a computer tells them the medical lab results are; traffic tickets are issued based upon what cameras tell us a license plate says; we pay for items at stores based upon a total provided by a computer; we elect governments as a result of electronic voting systems. But the problem with all this intermediated life is that it can be spoofed. It’s really easy to falsify what is seen on our computer screens. The more we disconnect from the physical and drive toward the digital, the more we lose the ability to tell the real from the fake. Ultimately, bad actors (whether criminals, terrorists, or rogue governments) will have the ability to exploit this trust.
Peter H. Diamandis (Abundance: The Future is Better Than You Think)
The infrastructure that holds society in place is based on increasingly sophisticated systems, technology, and complexity.
Jeff Davidson
For decades, the U.S. and most western nations had let their infrastructure crumble and rot away while China and other Asian nations had invested in the best technology of the day. The U.S. in particular was literally beggared by a point-by-point comparison. As early as 2010, places like Korea and Hong Kong had had Internet and information network access that made the United States look like a third-world country.
Evan Currie (Homeworld (Odyssey One, #3))
Another salesman flew down to SpaceX to sell the company on some technology infrastructure equipment. He was doing the standard relationship-building exercise practiced by salespeople for centuries. Show up. Speak for a while. Feel each other out. Then, start doing business down the road. Musk was having none of it. “The guy comes in, and Elon asks him why they’re meeting,” Spikes said. “He said, ‘To develop a relationship.’ Elon replied, ‘Okay. Nice to meet you,’ which basically meant, ‘Get the fuck out of my office.’ This guy had spent four hours traveling for what ended up as a two-minute meeting. Elon just has no tolerance for that kind of stuff.
Ashlee Vance (Elon Musk: How the Billionaire CEO of SpaceX and Tesla is Shaping our Future)
Just like Creation author Steve Grand had predicted, the creatures were evolving in ways that Bezos could not have imagined. It was the combination of EC2 and S3—storage and compute, two primitives linked together—that transformed both AWS and the technology world. Startups no longer needed to spend their venture capital on buying servers and hiring specialized engineers to run them. Infrastructure costs were variable instead of fixed, and they could grow in direct proportion to revenues. It freed companies to experiment, to change their business models with a minimum of pain, and to keep up with the rapidly growing audiences of erupting social networks like Facebook and Twitter.
Brad Stone (The Everything Store: Jeff Bezos and the Age of Amazon)
It is clear that criminals, hacktivists, and terrorists use our interconnectivity against us, whether for profit, politics, or massacre. They have schooled themselves in science and technology and have proven a formidable force in exploiting the fundamentally insecure nature of our twenty-first-century technological skin. Yet thieves, hackers, activists, and terrorists are not the sole inhabitants of the digital underground. They are accompanied by a phalanx of nation-states, cyber warriors, and foreign intelligence services, each handily playing in the so-called fifth domain, fully leveraging for their own purposes the insecurity of the underlying digital infrastructure that unifies the planet.
Marc Goodman (Future Crimes)
5 provided you with a comprehensive view of the overall discovery process. It’s fair to say that every client of ours possesses a solid technical discovery process, and their SEs are trained to gather the “speeds and feeds” and the technical infrastructure issues. The skill that many SE organizations seem to lack is staying focused on the business issues and not reverting back to technology at the first chance they get.
John Care (Mastering Technical Sales: The Sales Engineer’s Handbook (Technology Management and Professional Development))
is clear that neither countries nor regions can flourish if their cities (innovation ecosystems) are not being continually nourished. Cities have been the engines of economic growth, prosperity and social progress throughout history, and will be essential to the future competitiveness of nations and regions. Today, more than half of the world’s population lives in urban areas, ranging from mid-size cities to megacities, and the number of city dwellers worldwide keeps rising. Many factors that affect the competitiveness of countries and regions – from innovation and education to infrastructure and public administration – are under the purview of cities. The speed and breadth by which cities absorb and deploy technology, supported by agile policy frameworks, will determine their ability to compete in attracting talent. Possessing a superfast broadband, putting into place digital technologies in transportation, energy consumption, waste recycling and so on help make a city more efficient and liveable, and therefore more attractive than others. It is therefore critical that cities and countries around the world focus on ensuring access to and use of the information and communication technologies on which much of the fourth industrial revolution depends. Unfortunately, as the World Economic Forum’s Global Information Technology Report 2015 points out, ICT infrastructures are neither as prevalent nor diffusing as fast as many people believe. “Half of the world’s population does not have mobile phones and 450 million people still live out of reach of a mobile signal. Some 90% of the population of low-income countries and over 60% globally are not online yet. Finally, most mobile phones are of an older generation.”45
Klaus Schwab (The Fourth Industrial Revolution)
How did Facebook successfully overcome the growth limiter of operational scalability? On the technology side, one of the philosophies that helped Facebook become successful was its famous motto “Move fast and break things.” This emphasis on speed, which came directly from Mark Zuckerberg, allowed Facebook to achieve rapid product development and continuous product improvement. Even today, every new software engineer who joins Facebook is asked to make a revision to the Facebook codebase (potentially affecting millions or even billions of users) on his or her first day of work. However, as Facebook’s user base and engineering team grew to a massive size, Mark had to change the philosophy to “Move fast and break things with stable infrastructure.
Reid Hoffman (Blitzscaling: The Lightning-Fast Path to Building Massively Valuable Companies)
When Gopnik argues that liberalism is the rational preference, it is hard to disagree with him given the evidence that liberal methods work and—despite their incremental approach—they work remarkably fast. It is no coincidence that liberalism, rationalism, and empiricism go together under the banner of the “Enlightenment” or that, together, they have decreased human suffering so much through technological improvements, effective infrastructure, and medical and other scientific advances, as well as by upholding human rights.
Helen Pluckrose (Cynical Theories: How Activist Scholarship Made Everything about Race, Gender, and Identity—and Why This Harms Everybody)
Shervin Pishevar’s other star investment, Uber, was embroiled in its own case about whether it was as humble and powerless as it claimed. A group of drivers had sued Uber, as well as its rival Lyft, in federal court, seeking to be treated as employees under California’s labor laws. Their case was weakened by the fact that they had signed agreements to be contractors not subject to those laws. They had accepted the terms and conditions that cast each driver as an entrepreneur—a free agent choosing her hours, needing none of the regulatory infrastructure that others depended on. They had bought into one of the reigning fantasies of MarketWorld: that people were their own miniature corporations. Then some of the drivers realized that in fact they were simply working people who wanted the same protections that so many others did from power, exploitation, and the vicissitudes of circumstance. Because the drivers had signed that agreement, they had blocked the easy path to being employees. But under the law, if they could prove that a company had pervasive, ongoing power over them as they did their work, they could still qualify as employees. To be a contractor is to give up certain protections and benefits in exchange for independence, and thus that independence must be genuine. The case inspired the judges in the two cases, Edward Chen and Vince Chhabria, to grapple thoughtfully with the question of where power lurks in a new networked age. It was no surprise that Uber and Lyft took the rebel position. Like Airbnb, Uber and Lyft claimed not to be powerful. Uber argued that it was just a technology firm facilitating links between passengers and drivers, not a car service. The drivers who had signed contracts were robust agents of their own destiny. Judge Chen derided this argument. “Uber is no more a ‘technology company,’ ” he wrote, “than Yellow Cab is a ‘technology company’ because it uses CB radios to dispatch taxi cabs, John Deere is a ‘technology company’ because it uses computers and robots to manufacture lawn mowers, or Domino Sugar is a ‘technology company’ because it uses modern irrigation techniques to grow its sugar cane.” Judge Chhabria similarly cited and tore down Lyft’s claim to be “an uninterested bystander of sorts, merely furnishing a platform that allows drivers and riders to connect.” He wrote: Lyft concerns itself with far more than simply connecting random users of its platform. It markets itself to customers as an on-demand ride service, and it actively seeks out those customers. It gives drivers detailed instructions about how to conduct themselves. Notably, Lyft’s own drivers’ guide and FAQs state that drivers are “driving for Lyft.” Therefore, the argument that Lyft is merely a platform, and that drivers perform no service for Lyft, is not a serious one.
Anand Giridharadas (Winners Take All: The Elite Charade of Changing the World)
The Social Currency - The intersection of bartering, cryptocurrency, and financing The Social Currency addresses the idea that money is a social construct, and therefore so is poverty. From Capitalism to Communism, economists war over who controls the means of production. It is time for communities to become proactive in control over currency, the means of exchange. Activists around the world are now challenging the idea that money has to be created and controlled by government. In 2017, the bitcoin cryptocurrency that the anonymous Satoshi Nakomoto created and reserved for himself, was worth $22 billion. Minorities, women, and even the disadvantaged among whites struggle to raise valuable capital to develop their goods and services. The Social Currency presents a blockchain powered technology infrastructure for the alleviation of poverty. Finally, the book will address how to comply with some of the regulatory hurdles necessary for the proper implementation of blockchain secure tokens offerings.
Cecil John
It’s not just their skills and talents that matter; it’s the way they weave those individual skills and talents together with larger-scale infrastructure, operations, and technology, to produce something that no other enterprise can match.
Paul Leinwand (Strategy That Works: How Winning Companies Close the Strategy-to-Execution Gap)
In order to achieve the goals of the Paris Treaty – that global warming should not exceed 1.5 degrees Celsius – CO2 emissions must be reduced to zero by 2050. In order to succeed, we will also need to invent technologies that remove CO2 from the atmosphere in quantities that are equal to all today’s emissions. This is one of the biggest challenges humankind has ever faced. What is being proposed is an unprecedented turnaround in the world’s energy mechanisms. And 2050 is exactly as far into the future as 1990 is in the past. Since 1990, emissions have increased from twenty-two gigatons to thirty-six gigatons. That’s a 60 per cent increase. To get emissions down to zero in thirty years sounds like an unmanageable task. Like constructing a time machine, thwarting gravity or inventing a pill for bringing someone back to life. No one knows whether it’s technically possible to capture thirty gigatons per year. The technology is at an early stage and no one has figured out buildings or infrastructure that could enable us to achieve our goals. Even if we reduce emissions by 50 per cent, our problems will still have increased if we do nothing to remove the carbon dioxide already in the air. If we don’t succeed in that project, the Earth will continue to warm, the glaciers will continue to melt and the sea levels will continue to rise, submerging cities and coastal areas. The market value of a 100 million barrels of oil is about $6 billion, assuming a $60/barrel price for oil. We therefore burn approximately $600 billion a day. If anyone thinks changing our sources of energy will
Andri Snær Magnason (On Time and Water)
The biggest problem Africa has , it is not poverty or economy, lack of resources or infrastructure, lack of technology or slavery , but it is African leaders.
De philosopher DJ Kyos
The great divergence 1. Some questions arise from why we need to study economic history: 'why are some countries rich and others poor?'/ 'why did the Industrial Revolution happen in England rather than France' 2. time span of history 1500-1800: the mercantilist era. The leading European countries sought to increase their trade by acquring colonies and using tariffs and war to prevent other countries from trading with them. European manufacturing was promoted at the expense of the colonies, but economic development, as such, was not the objective 19th century: Western Europe and the USA made economic development a priority and tried to achieve it with a standard set of four policies: creation of a unified national market by eliminating internal tariffs and building transportation infrastructure; the erection of an external tariff to protect their industries from British competition; the chartering of banks to stablise the currency and finance industrial investment; the establishment of mass education to upgrade the labour force. --> the government play a critical role in promoting economic. and we can get to know that European countries had used the tarrif protection to thrive their economic before. also by boosting the transportation infrastructure and education section, along with the function of bank, economic can proliferate 20th century: the policies above proved less effective in countries that had not yet developed. most new technology is not cost-effective in low-wage countries, but it is what they need in order to catch up to the West. Most countries have adopted modern technology to some degree, but not rapidly enough to overtake the rich countries. the coutries that have closed the gap with West have done so with Big Push that has used planning and investment coordination to jump ahead. --> that can explain the Mattew Effect: as the rich will be richer, poor will get poorer.
Rober C.Allen
The vague contention that the economy must be decarbonised via the replacement of fossil fuels by renewable energy is inadequate when building the new infrastructure required currently relies on continued and expanded environmental plunder, such as the mining of cobalt and lithium for batteries. Resource extraction is responsible for 50% of global emissions, with minerals and metal mining responsible for 20% of emissions even before the manufacturing stage.[36] The ‘green’ industrial revolution proposed by social democrats may end up with a carbon neutral system of production by the time it is finished, but in the meantime it would be anything but. That mankind and nature have been so profoundly alienated from each other under capitalism requires that they be reunited if the planet is to remain habitable.[37] One of the ways that this alienation has been most concretely institutionalised has been through the international prohibition and under-utilisation of the hemp and cannabis plants, the most prolific and versatile crops on Earth that were used for thousands of years before capitalism for food, fuel, medicine, clothing and construction. As we shall see, not only does hemp remain capable of providing for most of humanity’s needs, it is the key not only to reversing desertification and stabilising the climate, but also furthering technological and industrial progress. We therefore argue that saving the planet is bound up with ending this alienation and completing the transition from a labour-intensive extraction-based economy to a hemp-based fully automated system of production. A green industrial revolution must be precisely that – green.
Ted Reese (Socialism or Extinction: Climate, Automation and War in the Final Capitalist Breakdown)
Once again, infrastructure had set a limit on the pace of development of a new technology. But by the second decade of the nineteenth century, malleable-iron rails were beginning to replace brittle cast iron on the wagonways of England, and stone or wooden sleepers strengthened the roadbeds for heavy locomotives. With such improvements, Trevithick’s circular track on vacant land in London would open out into a network of fast, reliable transportation—but not before its inventors and engineers endured a final long haul of challenges and trials.
Richard Rhodes (Energy: A Human History)
The connection between clean-energy systems and a growing economy is a direct one.We can take money that would otherwise flow to foreign emirates and invest those same dollars in local jobs. We can reduce harms to public health and the global commons by investing in skills, technology, and productive infrastructure.
Jay Inslee (Apollo's Fire: Igniting America's Clean Energy Economy)
Perhaps the major tenet of Pinpoint is that GPS barely exists—not just because the signal itself is so weak, but also because GPS is a remarkably diffuse concept. At root, GPS is just a radio signal, maintained and perfected by a vast infrastructure that is ultimately linked to the United States Department of Defense.
Greg Milner (Pinpoint: How GPS is Changing Technology, Culture, and Our Minds)
Thomas Edison had to invent much more than the electric light. As do all innovators of new technologies, he faced the larger problem of developing and deploying the infrastructure required to support his inventions. Behind the steam engine, a network of mines and distribution systems supplied coal for its operation. Local generating plants and networks of underground pipes sustained gas lighting. When Edison planned his direct-current system of electric lighting, not wanting to run wires as thick as a man’s leg, he envisioned neighborhood-scale generating stations—steam engines turning direct-current generators—modeling his system on the gas-lighting system and even running his wiring, like gas, in pipes underground.
Richard Rhodes (Energy: A Human History)
Encourage teams to organize internal “yak days,” where teams get together to work on technical debt. These are great events because technical debt is so rarely prioritized. Hold regular internal DevOps mini-conferences. We’ve seen organizations achieve success using the classic DevOpsDays format, which combines pre-prepared talks with “open spaces” where participants self-organize to propose and facilitate their own sessions. Give staff dedicated time, such as 20% time or several days after a release, to experiment with new tools and technologies. Allocate budget and infrastructure for special projects.
Nicole Forsgren (Accelerate: The Science of Lean Software and DevOps: Building and Scaling High Performing Technology Organizations)
We need to do this not only for ourselves, but for each other and for the world itself. It’s a truism that scientific materialism has tended to reduce all natural phenomena to mechanical processes, as postmodernism has tended to reduce metaphysics to an outworn cultural artifact. Unless we live in rural India or Bali, there are no roadside shrines to remind us to look beyond the surface of the land, to see the energies at play within the soil or the soulful presences that live in plants and weather patterns. So we move through the world with tunnel vision, using our technological skills to control the weather, to engineer crops and their DNA, and to force productivity from desert soil. For most people, it’s only when earthquakes, hurricanes, and tsunamis disrupt our human infrastructures that we recognize the awesome natural powers that create our world.
Sally Kempton (Awakening to Kali: The Goddess of Radical Transformation)
Net neutrality proponents rightly focus on Internet service providers like Comcast, who provide and maintain the underlying technological infrastructure, as the biggest threat to a free and open Internet. And at an architectural level, the Internet is still a fairly level playing field. Anyone can start and build a business online. But as a practical matter, the open Internet is a myth. The Internet as we know it today is almost entirely dominated by platforms.
Alex Moazed (Modern Monopolies: What It Takes to Dominate the 21st Century Economy)
Rather than ending the dominance of platforms, we would suggest that the growth of blockchain technologies will be accompanied by the emergence of many new platform companies. Like HTTP and the Web before it, the blockchain will create a decentralized infrastructure that provides the opportunity for new markets and communities to emerge. But most of these new opportunities won’t take shape without a platform company orchestrating them and capitalizing on their potential.
Alex Moazed (Modern Monopolies: What It Takes to Dominate the 21st Century Economy)
What we inherit from the past is willfully blind, and out of date. It’s a ghost, a machine, and a monster. It must be rescued, repaired and kept at bay by the attention and effort of the living. It crushes, as it hammers us into socially acceptable shape, and it wastes great potential. But it offers great gain, too. Every word we speak is a gift from our ancestors. Every thought we think was thought previously by someone smarter. The highly functional infrastructure that surrounds us, particularly in the West, is a gift from our ancestors: the comparatively uncorrupt political and economic systems, the technology, the wealth, the lifespan, the freedom, the luxury, and the opportunity. Culture takes with one hand, but in some fortunate places it gives more with the other. To think about culture only as oppressive is ignorant and ungrateful, as well as dangerous. This is not to say (as I am hoping the content of this book has made abundantly clear, so far) that culture should not be subject to criticism.
Jordan B. Peterson (12 Rules for Life: An Antidote to Chaos)
The road to EPIC was not frictionless, however, and required constant symbolic investments in the capacity of the 'technocrats' and their inventions. As Mitford-Slate noted in interview, technologists had to pass numerous hurdles, in addition to the technical difficulties of building systems that not available off the shelf, they 'had to sell [their ideas] to me and I had to sell them to a lot of people who didn't understand technology whatsoever.
Juan Pablo Pardo-Guerra (Automating Finance: Infrastructures, Engineers, and the Making of Electronic Markets)
The problem is also not, as suggested by the technosphere concept, that human beings are incapable of controlling systems that have a larger range of behaviors than they do themselves. The problem rather lies in the question of what 'control' means in the first place. The stewardship of technological systems and infrastructures always depends on their specific nature (in particular, the way they are embedded in natural and cultural environment) as well as on their representation in knowledge and belief systems. Human cognition is always embodied cognition. There are historical examples showing that humans have been able to manage and sustain extremely complex ecologies and infrastructures of their own making over the long term. The systems' potential behaviors always far exceeded those of their human components, but these were typically ecologies and infrastructures in which the relevant regulative structures of human behavior had themselves been coevolving over long periods, including in their representation by knowledge and belief systems. As recent work on Japanese ecologies during the Tokugawa period (between 1603 and 1868) shows, age-old traditions had accumulated knowledge on how to sustainably manage a complex landscape providing humans with food, shelter, clothing, and energy. The knowledge was implemented through a complex system of governance and material practices ranging from sanitation to publishing.
Jürgen Renn (The Evolution of Knowledge: Rethinking Science for the Anthropocene)