Telecommunication Quotes

We've searched our database for all the quotes and captions related to Telecommunication. Here they are! All 100 of them:

The fantastic advances in the field of electronic communication constitute a greater danger to the privacy of the individual.
Earl Warren
The slow cancellation of the future has been accompanied by a deflation of expectations. There can be few who believe that in the coming year a record as great as, say, the Stooges’ Funhouse or Sly Stone’s There’s A Riot Goin’ On will be released. Still less do we expect the kind of ruptures brought about by The Beatles or disco. The feeling of belatedness, of living after the gold rush, is as omnipresent as it is disavowed. Compare the fallow terrain of the current moment with the fecundity of previous periods and you will quickly be accused of ‘nostalgia’. But the reliance of current artists on styles that were established long ago suggests that the current moment is in the grip of a formal nostalgia, of which more shortly. It is not that nothing happened in the period when the slow cancellation of the future set in. On the contrary, those thirty years has been a time of massive, traumatic change. In the UK, the election of Margaret Thatcher had brought to an end the uneasy compromises of the so-called postwar social consensus. Thatcher’s neoliberal programme in politics was reinforced by a transnational restructuring of the capitalist economy. The shift into so-called Post-Fordism – with globalization, ubiquitous computerization and the casualisation of labour – resulted in a complete transformation in the way that work and leisure were organised. In the last ten to fifteen years, meanwhile, the internet and mobile telecommunications technology have altered the texture of everyday experience beyond all recognition. Yet, perhaps because of all this, there’s an increasing sense that culture has lost the ability to grasp and articulate the present. Or it could be that, in one very important sense, there is no present to grasp and articulate anymore.
Mark Fisher (Ghosts of My Life: Writings on Depression, Hauntology and Lost Futures)
Many people object to “wasting money in space” yet have no idea how much is actually spent on space exploration. The CSA’s budget, for instance, is less than the amount Canadians spend on Halloween candy every year, and most of it goes toward things like developing telecommunications satellites and radar systems to provide data for weather and air quality forecasts, environmental monitoring and climate change studies. Similarly, NASA’s budget is not spent in space but right here on Earth, where it’s invested in American businesses and universities, and where it also pays dividends, creating new jobs, new technologies and even whole new industries.
Chris Hadfield (An Astronaut's Guide to Life on Earth)
Technologies of the soul tend to be simple, bodily, slow and related to the heart as much as the mind. Everything around us tells us we should be mechanically sophisticated, electronic, quick, and informational in our expressiveness - an exact antipode to the virtues of the soul. It is no wonder, then, that in an age of telecommunications - which, by the way, literally means "distant connections" - we suffer symptoms of the loss of soul. We are being urged from every side to become efficient rather than intimate.
Thomas Moore
How the promise of cheap, competitive and unlimited telecommunications service has been turned into a reality of expensive, monopolistic and limited service is just one part of the larger transformation in the American economy since the late 1970s.
David Cay Johnston (The Fine Print: How Big Companies Use "Plain English" to Rob You Blind)
Attend any conference on telecommunications or computer technology, and you will be attending a celebration of innovative machinery that generates, stores, and distributes more information, more conveniently, at greater speed than ever before, To the question “What problem does the information solve?” the answer is usually “How to generate, store and distribute more information, more conveniently, at greater speeds than ever before.” This is the elevation of information to a metaphysical status: information as both the means and end of human creativity. In Technopoly, we are driven to fill our lives with the quest to “access” information. For what purpose or with what limitations, it is not for us to ask; and we are not accustomed to asking, since the problem is unprecedented. The world has never before been confronted with information glut and has hardly had time to reflect on its consequences (61).
Neil Postman (Technopoly: The Surrender of Culture to Technology)
We will never solve the problems of cities unless we like the urban-ness of urban life. Cities aren't villages; they aren't machines; they aren't works of art; and they aren't telecommunications stations. They are spaces for face to face contact of amazing variety and richness. They are spectacle - and what is wrong with that?
Elizabeth Wilson (The Sphinx in the City: Urban Life, the Control of Disorder, and Women)
Mobile telecommunications are a critical component of modern society,
Sayantani DasGupta (The Serpent's Secret (Kiranmala and the Kingdom Beyond, #1))
Jessica!” shouted Richard, hoping, perhaps by sheer volume, to penetrate the telecommunications network.
Neil Gaiman (Neverwhere (London Below, #1))
Peter did obey, walking on legs that still felt as if they were relaying their sensory input by some form of telecommunications.
Stephen King (Desperation)
Osama bin Laden’s ideas were neither new nor compelling outside his relatively small circle of followers. They belonged to an ugly cul-de-sac of history, an era where witches and heretics were burned in town squares. They were adolescent ideas, in that they remained willfully ignorant of all that had come before. There are many who choose to believe that certain ancient texts are literally the word of one God or the other, but not many who would go so far as to regard as a sacred duty the slaughter of those who disagree with them, or to kill in order to advance their aims. This was a philosophy that would never appeal to more than a few dedicated fanatics. But one of the peculiarities of the modern world is that, because of telecommunications, small groups of like-minded people, even if widely scattered, can form a community of belief. They can feed off of each other, and can come to wield influence far beyond their actual numbers or appeal. Bin Laden’s was the first to use these tools to build his network into a deadly force.
Mark Bowden (The Finish: The Killing of Osama Bin Laden)
Perhaps you’re reading this book with your phone by your side, checking your email whenever your attention drifts, tapping text messages to a friend. You sit at the end of a long line of inventions that might never have existed but for people with disabilities: the keyboard on your phone, the telecommunications lines it connects with, the inner workings of email. In 1808, Pellegrino Turri built the first typewriter so that his blind lover, Countess Carolina Fantoni da Fivizzano, could write letters more legibly. In 1872, Alexander Graham Bell invented the telephone to support his work helping the deaf. And in 1972, Vint Cerf programmed the first email protocols for the nascent internet. He believed fervently in the power of electronic letters, because electronic messaging was the best way to communicate with his wife, who was deaf, while he was at work.
Cliff Kuang (User Friendly: How the Hidden Rules of Design Are Changing the Way We Live, Work, and Play)
The only sustainable approach to thinking today about problems, he argues, “is thinking without a box.” Of course, that doesn’t mean having no opinion. Rather, it means having no limits on your curiosity or the different disciplines you might draw on to appreciate how the Machine works. Wells calls this approach—which I will employ in this book—being “radically inclusive.” It involves bringing into your analysis as many relevant people, processes, disciplines, organizations, and technologies as possible—factors that are often kept separate or excluded altogether. For instance, the only way you will understand the changing nature of geopolitics today is if you meld what is happening in computing with what is happening in telecommunications with what is happening in the environment with what is happening in globalization with what is happening in demographics. There is no other way today to develop a fully rounded picture.
Thomas L. Friedman (Thank You for Being Late: An Optimist's Guide to Thriving in the Age of Accelerations)
For some hippies, this vision could only be realised by rejecting scientific progress as a false God and returning to nature. Others, in contrast, believed that technological progress would inevitably turn their libertarian principles into social fact. Crucially, influenced by the theories of Marshall McLuhan, these technophiliacs thought that the convergence of media, computing and telecommunications would inevitably create the electronic agora - a virtual place where everyone would be able to express their opinions without fear of censorship. Despite being a middle-aged English professor, McLuhan preached the radical message that the power of big business and big government would be imminently overthrown by the intrinsically empowering effects of new technology on individuals.
Richard Barbrook
So what are people actually referring to when they talk about "deregulation"? In ordinary usage, the word seems to mean "changing the regulatory structure in a way that I like." In practice this can refer to almost anything. In the case of airlines or telecommunications in the seventies and eighties, it meant changing the system of regulation from one that encouraged a few large firms to one that fostered carefully supervised competition between midsize firms. In the case of banking, "deregulation" has usually meant exactly the opposite: moving away from a situation of managed competition between mid-sized firms to one where a handful of financial conglomerates are allowed to completely dominate the market. This is what makes the term so handy. Simply by labeling a new regulatory measure "deregulation," you can frame it in the public mind as a way to reduce bureaucracy and set individual initiative free, even if the result is a fivefold increase in the actual number of forms to be filled in, reports to be filed, rules and regulations for lawyers to interpret, and officious people in offices whose entire job seems to be to provide convoluted explanations for why you're not allowed to do things. (p. 17)
David Graeber (The Utopia of Rules: On Technology, Stupidity, and the Secret Joys of Bureaucracy)
The history of the sexual vanguard in America was a long list of people who had been ridiculed, imprisoned, or subjected to violence. So it was annoying to hear the hubris of technologists, while knowing that gadgetry or convenience in telecommunication was the easy kind of futurism, the kind that attracted money. A real disruption or hack was a narration that did not make any sense to us the first time it was told, that would provoke too much repugnance to show in a cell phone ad.
Emily Witt (Future Sex)
Faith was certain they were breaking several telecommunications laws. Laws that in some states might well count as pornography and probably carried a mandatory prison sentence. Faith was a law abiding citizen. She prided herself on that. She didn’t litter, she didn’t cheat on her taxes and she gave up her seat for little old ladies and gentlemen on the bus. She’d never even jaywalked. And she lived in New York for Christ’s sake! But then his hand reached down and fondled his balls.
Amy Andrews (Seduced by the Baron (Fairy Tales of New York, #4))
In the late 1970s, growth in Western economies began to slow down and returns on capital began to decline. Governments came under pressure to do something about it – to create a ‘fix’ for capital. So they attacked unions and gutted labour laws in order to drive the cost of wages down, and they privatised public assets that had previously been off limits to capital – mines, railways, energy, water, healthcare, telecommunications and so on – creating lucrative opportunities for private investors.
Jason Hickel (Less Is More: How Degrowth Will Save the World)
IN AMERICA the central message is that each of us is free to write our own story. A polyglot nation of prodigious energy, we are held together by dreams of material progress. Seventy-eight percent of Americans still believe that anybody in America can become rich and live the good life. All it takes is desire, hard work, a little luck, and the right timing. The fable of wealth for the 1990s was telecommunications and the “new economy” of the Internet. But throughout the nation’s history there have been similar stories of riches won and lost—in the westward migration of the nineteenth century, in the excesses of the Gilded Age that closed it, in the champagne bubble of the 1920s before the Great Depression, and during the deficit spending spree of the 1980s—stories that reflect the hopeful striving of a daring people. It is because of this bounding optimism that America is an amazing and seductive place to live, something that continues to be affirmed each day by the battalions of migrants that scramble ashore in the risky pursuit of happiness. Thus the dream endures. But
Peter C. Whybrow (American Mania: When More is Not Enough)
The fourth article, which ran as planned on Saturday, was about BOUNDLESS INFORMANT, the NSA’s data-tracking program, and it described the reports showing that the NSA was collecting, analyzing, and storing billions of telephone calls and emails sent across the American telecommunications infrastructure. It also raised the question of whether NSA officials had lied to Congress when they had refused to answer senators about the number of domestic communications intercepted, claiming that they did not keep such records and could not assemble such data. After
Glenn Greenwald (No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State)
One way of minimizing costs is to figure out how to manufacture a product with the least possible resources. In the telecommunications industry, for example, the developed countries of the world have gone from using relatively expensive copper wire, to extremely inexpensive sand (silicon chips), to even less expensive satellite signals. Enormous natural resources (copper) have been conserved not because of environmental sensitivity but because of profit seeking in a competitive, capitalist economy. Thousands of similar examples could be cited, though environmentalists ignore these.
Thomas J. DiLorenzo (How Capitalism Saved America: The Untold History of Our Country, from the Pilgrims to the Present)
think of climate change as slow, but it is unnervingly fast. We think of the technological change necessary to avert it as fast-arriving, but unfortunately it is deceptively slow—especially judged by just how soon we need it. This is what Bill McKibben means when he says that winning slowly is the same as losing: “If we don’t act quickly, and on a global scale, then the problem will literally become insoluble,” he writes. “The decisions we make in 2075 won’t matter.” Innovation, in many cases, is the easy part. This is what the novelist William Gibson meant when he said, “The future is already here, it just isn’t evenly distributed.” Gadgets like the iPhone, talismanic for technologists, give a false picture of the pace of adaptation. To a wealthy American or Swede or Japanese, the market penetration may seem total, but more than a decade after its introduction, the device is used by less than 10 percent of the world; for all smartphones, even the “cheap” ones, the number is somewhere between a quarter and a third. Define the technology in even more basic terms, as “cell phones” or “the internet,” and you get a timeline to global saturation of at least decades—of which we have two or three, in which to completely eliminate carbon emissions, planetwide. According to the IPCC, we have just twelve years to cut them in half. The longer we wait, the harder it will be. If we had started global decarbonization in 2000, when Al Gore narrowly lost election to the American presidency, we would have had to cut emissions by only about 3 percent per year to stay safely under two degrees of warming. If we start today, when global emissions are still growing, the necessary rate is 10 percent. If we delay another decade, it will require us to cut emissions by 30 percent each year. This is why U.N. Secretary-General António Guterres believes we have only one year to change course and get started. The scale of the technological transformation required dwarfs any achievement that has emerged from Silicon Valley—in fact dwarfs every technological revolution ever engineered in human history, including electricity and telecommunications and even the invention of agriculture ten thousand years ago. It dwarfs them by definition, because it contains all of them—every single one needs to be replaced at the root, since every single one breathes on carbon, like a ventilator.
David Wallace-Wells (The Uninhabitable Earth: Life After Warming)
In this techscape, new values also emerge—often made up of old words with new connotations: automatic, digital, mobile, wireless, frictionless, smart—and new technology adapts to those values. The current meaning of the word wilderness, one could argue, emerged directly from the techscape of industrialism, just as the current meaning of the word network emerged from the world of telecommunications. With the advent of industrial technology we began to see wilderness less as a landscape devoid of agriculture and more as a landscape free from technology—and thus the wild went from being a wasteland to a refuge.
Robert Moor (On Trails: An Exploration)
Genius loci cannot be designed to order. It has to evolve, to be allowed to hapen, to grow and change from the direct efforts of those who live and work in places and care about them...No matter how sophisticated technical knowledge may be, the understanding of others' lives and problems will always be partial. Just as outsiders cannot feel their pain, so they cannot experience their sense of place. I believe, therefore, that it is impossible to make complete places in which other poeple can live. And, in a world dominated by international economic processes and global telecommunications, there can be no return to an environment of integrated and distinctive places.
Edward Relph
When Dr Sarabhai gave shape to a vision to develop rockets in India, he was questioned, along with the political leadership, on the relevance of such a programme when a vast majority in the country was battling the demons of hunger and poverty. Yet, he was in agreement with Jawaharlal Nehru that India could only play a meaningful role in the affairs of the world if the country was self-reliant in every manner, and should be able to apply advanced technologies to alleviate real-life problems. Thus our space programme was never simply a desire to be one among an elite group of nations, neither was it a matter of playing catch-up with other countries. Rather, it was an expression of the need for developing indigenous capabilities in telecommunications, meteorology and education.
A.P.J. Abdul Kalam (The Righteous Life: The Very Best of A.P.J. Abdul Kalam)
I have found it frustrating at times that so few people know what the space program does and, as a result, are unaware that they benefit from it. Many people object to “wasting money in space” yet have no idea how much is actually spent on space exploration. The CSA’s budget, for instance, is less than the amount Canadians spend on Halloween candy every year, and most of it goes toward things like developing telecommunications satellites and radar systems to provide data for weather and air quality forecasts, environmental monitoring and climate change studies. Similarly, NASA’s budget is not spent in space but right here on Earth, where it’s invested in American businesses and universities, and where it also pays dividends, creating new jobs, new technologies and even whole new industries. The
Chris Hadfield (An Astronaut's Guide to Life on Earth)
Here’s an experiment worth conducting. Sneak into the home of a NASA skeptic in the dead of night and remove all technologies from the home and environs that were directly or indirectly influenced by space innovations: microelectronics, GPS, scratch-resistant lenses, cordless power tools, memory-foam mattresses and head cushions, ear thermometers, household water filters, shoe insoles, long-distance telecommunication devices, adjustable smoke detectors, and safety grooving of pavement, to name a few. While you’re at it, make sure to reverse the person’s LASIK surgery. Upon waking, the skeptic embarks on a newly barren existence in a state of untenable technological poverty, with bad eyesight to boot, while getting rained on without an umbrella because of not knowing the satellite-informed weather forecast for that day.
Neil deGrasse Tyson (Space Chronicles: Facing the Ultimate Frontier)
Woody Allen made a PBS television special called Men of Crisis: The Harvey Wallinger Story in 1971, a half-hour satire of Henry Kissinger. The mockumentary was a natural follow-up to Allen’s directorial debut, Take the Money and Run. It opened with a Kissinger-esque character played by Allen, complaining on the phone: “I want you to get an injunction against The Times. Yes, it’s a New York, Jewish, Communist, left-wing, homosexual newspaper. And that’s just the sports section.” President Nixon already believed PBS was against him and had sent word through Clay Whitehead of the White House Office of Telecommunications Policy that criticism of the administration would result in funding cuts. PBS screened the Woody Allen special for its legal department, which found nothing objectionable. Still, station president Ethan Hitchcock wrote a memo: “Under no account must it be shown.
Kliph Nesteroff (The Comedians: Drunks, Thieves, Scoundrels, and the History of American Comedy)
The physical structure of the Internet presents a suggestive story about the concentration of power - it contains "backbones" and "hubs" - but power on the Internet is not spatial but informational; power inheres in protocol. The techno-libertarian utopianism associated with the Internet, in the gee-whiz articulations of the Wired crowd, is grounded in an assumption that the novelty of governance by computer protocols precludes control by corporation or state. But those entities merely needed to understand the residence of power in protocol and to craft political and technical strategies to exert it. In 2006, U.S. telecommunications providers sought to impose differential pricing on the provision of Internet services. The coalition of diverse political interests that formed in opposition - to preserve "Net Neutrality" - demonstrated a widespread awareness that control over the Net's architecture is control of its politics.
Samir Chopra (Decoding Liberation: The Promise of Free and Open Source Software (Routledge Studies in New Media and Cyberculture))
once been a benefit to those now complaining. Back in the days when there was too much capacity, importers exploited the flexibility of contracts. Their deals obligated carriers to move a minimum number of boxes at a set price. But if the customer opted to move fewer, they did not have to pay a penalty. Now, the dynamic had reversed. Supply was tight, prices were astronomical, and the carriers were behaving like miners unleashed on a gold rush. The niceties of their previous dealings were ditched in the pursuit of a frenzied reach for lucre. “This is arguably the largest driver of the increased cost of consumer goods in our country,” Delves said. “This surpasses any tariff that’s put on anything.” There were certainly other factors behind soaring prices. Governments in major economies had dispensed cash to their citizens to help them manage the economic strains of the pandemic, which had boosted spending power. Decades of consolidation in many industries—from meatpacking to telecommunications—had placed companies in position to exploit disruptions as an opportunity to lift prices.
Peter S. Goodman (How the World Ran Out of Everything: Inside the Global Supply Chain)
This move by President Nixon completed the process begun with World War I, transforming the world economy from a global gold standard to a standard based on several government-issued currencies. For a world that was growing increasingly globalized along with advancements in transportation and telecommunications, freely fluctuating exchange rates constituted what Hoppe termed “a system of partial barter.”13 Buying things from people who lived on the other side of imaginary lines in the sand now required utilizing more than one medium of exchange and reignited the age-old problem of lack of coincidence of wants. The seller does not want the currency held by the buyer, and so the buyer must purchase another currency first, and incur conversion costs. As advances in transportation and telecommunications continue to increase global economic integration, the cost of these inefficiencies just keeps getting bigger. The market for foreign exchange, at $5 trillion of daily volume, exists purely as a result of this inefficiency of the absence of a single global homogeneous international currency.
Saifedean Ammous (The Bitcoin Standard: The Decentralized Alternative to Central Banking)
Online’ sales on the Internet are only an improvement of the old mail order catalogues, which were introduced in . . . 1850; they do not represent a structural change. Similarly, the Internet, multimedia cell phones, cable television, smartcards and the general computerisation of society — even genetic engineering — do not represent structural changes. They are all only developments of what already existed. There is nothing in all this to compare with inventions that really turned the world upside down, the real techno-economic metamorphoses introduced between 1860 and 1960 that revolutionised society and the framework of life: internal combustion engines, electricity, the telephone, telegraph, radio (which was more revolutionary than television), trains, cars, airplanes, penicillin, antibiotics, and so forth. The ‘new economy’ is behind us! No fundamental innovation has taken place since 1960. Computers only allow us to accomplish differently, faster and more cheaply (but with much greater fragility) what was already being done. On the other hand, the automobile, antibiotics, telecommunications and air travel were authentic revolutions that made possible what before had been impossible.
Guillaume Faye (Convergence of Catastrophes)
[...]Telecomputer Man is assigned to an apparatus, just as the apparatus is assigned to him, by virtue of an involution of each into the other, a refraction of each by the other. The machine does what the human wants it to do, but by the same token the human puts into execution only what the machine has been programmed to do. The operator is working with virtuality: only apparently is the aim to obtain information or to communicate; the real purpose is to explore all the possibilities of a program, rather as a gambler seeks to exhaust the permutations in a game of chance. Consider the way the camera is used now. Its possibilities are no longer those of a subject who ' 'reflects' the world according to his personal vision; rather, they are the possibilities of the lens, as exploited by the object. The camera is thus a machine that vitiates all will, erases all intentionality and leaves nothing but the pure reflex needed to take pictures. Looking itself disappears without trace, replaced by a lens now in collusion with the object - and hence with an inversion of vision. The magic lies precisely in the subject's retroversion to a camera obscura - the reduction of his vision to the impersonal vision of a mechanical device. In a mirror, it is the subject who gives free rein to the realm of the imaginary. In the camera lens, and on-screen in general, it is the object, potentially, that unburdens itself - to the benefit of all media and telecommunications techniques. This is why images of anything are now a possibility. This is why everything is translatable into computer terms, commutable into digital form, just as each individual is commutable into his own particular genetic code. (The whole object, in fact, is to exhaust all the virtualities of such analogues of the genetic code: this is one of artificial intelligence's most fundamental aspects.) What this means on a more concrete level is that there is no longer any such thing as an act or event which is not refracted into a technical image or onto a screen, any such thing as an action which does not in some sense want to be photographed, filmed or tape-recorded, does not desire to be stored in memory so as to become reproducible for all eternity. No such thing as an action which does not aspire to self-transcendence into a virtual eternity - not, now, the durable eternity that follows death, but rather the ephemeral eternity of ever-ramifying artificial memory. The compulsion of the virtual is the compulsion to exist in potentia on all screens, to be embedded in all programs, and it acquires a magical force: the Siren call of the black box.
Jean Baudrillard (The Transparency of Evil: Essays in Extreme Phenomena)
CAN WE TRUST ANYTHING THE NEW YORK TIMES SAYS ABOUT IMMIGRATION? In 2008, the world’s richest man, Carlos Slim Helu, saved the Times from bankruptcy. When that guy saves your company, you dance to his tune. So it’s worth mentioning that Slim’s fortune depends on tens of millions of Mexicans living in the United States, preferably illegally. That is, unless the Times is some bizarre exception to the normal pattern of corruption—which you can read about at this very minute in the Times. If a tobacco company owned Fox News, would we believe their reports on the dangers of smoking? (Guess what else Slim owns? A tobacco company!) The Times impugns David and Charles Koch for funneling “secret cash” into a “right-wing political zeppelin.”1 The Kochs’ funding of Americans for Prosperity is hardly “secret.” What most people think of as “secret cash” is more like Carlos Slim’s purchase of favorable editorial opinion in the Newspaper of Record. It would be fun to have a “Sugar Daddy–Off” with the New York Times: Whose Sugar Daddy Is More Loathsome? The Koch Brothers? The Olin Foundation? Monsanto? Halliburton? Every time, Carlos Slim would win by a landslide. Normally, Slim is the kind of businessman the Times—along with every other sentient human being—would find repugnant. Frequently listed as the richest man in the world, Slim acquired his fortune through a corrupt inside deal giving him a monopoly on telecommunications services in Mexico. But in order to make money from his monopoly, Slim needs lots of Mexicans living in the United States, sending money to their relatives back in Oaxaca. Otherwise, Mexicans couldn’t pay him—and they wouldn’t have much need for phone service, either—other than to call in ransom demands. Back in 2004—before the Times became Slim’s pimp—a Times article stated: “Clearly . . . the nation’s southern border is under siege.”2 But that was before Carlos Slim saved the Times from bankruptcy. Ten years later, with a border crisis even worse than in 2004, and Latin Americans pouring across the border, the Times indignantly demanded that Obama “go big” on immigration and give “millions of immigrants permission to stay.”3
Ann Coulter (¡Adios, America!: The Left's Plan to Turn Our Country into a Third World Hellhole)
Imagine yourself sitting at a computer, about to visit a website. You open a Web browser, type in a URL, and hit Enter. The URL is, in effect, a request, and this request goes out in search of its destination server. Somewhere in the midst of its travels, however, before your request gets to that server, it will have to pass through TURBULENCE, one of the NSA’s most powerful weapons. Specifically, your request passes through a few black servers stacked on top of one another, together about the size of a four-shelf bookcase. These are installed in special rooms at major private telecommunications buildings throughout allied countries, as well as in US embassies and on US military bases, and contain two critical tools. The first, TURMOIL, handles “passive collection,” making a copy of the data coming through. The second, TURBINE, is in charge of “active collection”—that is, actively tampering with the users. You can think of TURMOIL as a guard positioned at an invisible firewall through which Internet traffic must pass. Seeing your request, it checks its metadata for selectors, or criteria, that mark it as deserving of more scrutiny. Those selectors can be whatever the NSA chooses, whatever the NSA finds suspicious: a particular email address, credit card, or phone number; the geographic origin or destination of your Internet activity; or just certain keywords such as “anonymous Internet proxy” or “protest.” If TURMOIL flags your traffic as suspicious, it tips it over to TURBINE, which diverts your request to the NSA’s servers. There, algorithms decide which of the agency’s exploits—malware programs—to use against you. This choice is based on the type of website you’re trying to visit as much as on your computer’s software and Internet connection. These chosen exploits are sent back to TURBINE (by programs of the QUANTUM suite, if you’re wondering), which injects them into the traffic channel and delivers them to you along with whatever website you requested. The end result: you get all the content you want, along with all the surveillance you don’t, and it all happens in less than 686 milliseconds. Completely unbeknownst to you. Once the exploits are on your computer, the NSA can access not just your metadata, but your data as well. Your entire digital life now belongs to them.
Edward Snowden (Permanent Record)
Imagine yourself sitting at a computer, about to visit a website. You open a Web browser, type in a URL, and hit Enter. The URL is, in effect, a request, and this request goes out in search of its destination server. Somewhere in the midst of its travels, however, before your request gets to that server, it will have to pass through TURBULENCE, one of the NSA’s most powerful weapons. Specifically, your request passes through a few black servers stacked on top of one another, together about the size of a four-shelf bookcase. These are installed in special rooms at major private telecommunications buildings throughout allied countries, as well as in US embassies and on US military bases, and contain two critical tools. The first, TURMOIL, handles “passive collection,” making a copy of the data coming through. The second, TURBINE, is in charge of “active collection”—that is, actively tampering with the users. You can think of TURMOIL as a guard positioned at an invisible firewall through which Internet traffic must pass. Seeing your request, it checks its metadata for selectors, or criteria, that mark it as deserving of more scrutiny. Those selectors can be whatever the NSA chooses, whatever the NSA finds suspicious: a particular email address, credit card, or phone number; the geographic origin or destination of your Internet activity; or just certain keywords such as “anonymous Internet proxy” or “protest.” If TURMOIL flags your traffic as suspicious, it tips it over to TURBINE, which diverts your request to the NSA’s servers. There, algorithms decide which of the agency’s exploits—malware programs—to use against you. This choice is based on the type of website you’re trying to visit as much as on your computer’s software and Internet connection. These chosen exploits are sent back to TURBINE (by programs of the QUANTUM suite, if you’re wondering), which injects them into the traffic channel and delivers them to you along with whatever website you requested. The end result: you get all the content you want, along with all the surveillance you don’t, and it all happens in less than 686 milliseconds. Completely unbeknownst to you. Once the exploits are on your computer, the NSA can access not just your metadata, but your data as well. Your entire digital life now belongs to them.
Edward Snowden (Permanent Record)
...the centrality of competitiveness as the key to growth is a recurrent EU motif. Two decades of EC directives on increasing competition in every area, from telecommunications to power generation to collateralizing wholesale funding markets for banks, all bear the same ordoliberal imprint. Similarly, the consistent focus on the periphery states’ loss of competitiveness and the need for deep wage and cost reductions therein, while the role of surplus countries in generating the crisis is utterly ignored, speaks to a deeply ordoliberal understanding of economic management. Savers, after all, cannot be sinners. Similarly, the most recent German innovation of a constitutional debt brake (Schuldenbremse) for all EU countries regardless of their business cycles or structural positions, coupled with a new rules-based fiscal treaty as the solution to the crisis, is simply an ever-tighter ordo by another name. If states have broken the rules, the only possible policy is a diet of strict austerity to bring them back into conformity with the rules, plus automatic sanctions for those who cannot stay within the rules. There are no fallacies of composition, only good and bad policies. And since states, from an ordoliberal viewpoint, cannot be relied upon to provide the necessary austerity because they are prone to capture, we must have rules and an independent monetary authority to ensure that states conform to the ordo imperative; hence, the ECB. Then, and only then, will growth return. In the case of Greece and Italy in 2011, if that meant deposing a few democratically elected governments, then so be it. The most remarkable thing about this ordoliberalization of Europe is how it replicates the same error often attributed to the Anglo-American economies: the insistence that all developing states follow their liberal instruction sheets to get rich, the so-called Washington Consensus approach to development that we shall discuss shortly. The basic objection made by late-developing states, such as the countries of East Asia, to the Washington Consensus/Anglo-American idea “liberalize and then growth follows” was twofold. First, this understanding mistakes the outcomes of growth, stable public finances, low inflation, cost competitiveness, and so on, for the causes of growth. Second, the liberal path to growth only makes sense if you are an early developer, since you have no competitors—pace the United Kingdom in the eighteenth century and the United States in the nineteenth century. Yet in the contemporary world, development is almost always state led.
Mark Blyth (Austerity: The History of a Dangerous Idea)
With the introduction of radio, we now had a superfast. convenient, and wireless way of communicating over long distances. Historically, the lack of a fast and reliable communication system was one of the great obstacles to the march of history. (In 490 BCE, after the Battle of Marathon between the Greeks and the Persians, a poor runner was ordered to spread the news of the Greek victory as fast as he could. Bravely, he ran 26 miles to Athens after previously running 147 miles to Sparta, and then, according to legend, dropped dead of sheer exhaustion. His heroism, in the age before telecommunication, is now celebrated in the modern marathon.) Today, we take for granted that we can send messages and information effortlessly across the globe, utilizing the fact that energy can be transformed in many ways. For example, when speaking on a cell phone, the energy of the sound of your voice converts to mechanical energy in a vibrating diaphragm. The diaphragm is attached to a magnet that relies on the interchangeability of electricity and magnetism to create an electrical impulse, the kind that can be transported and read by a computer. This electrical impulse is then translated into electromagnetic waves that are picked up by a nearby microwave tower. There, the message is amplified and sent across the globe. But Maxwell's equations not only gave us nearly instantaneous communication via radio, cell phone, and fiber-optic cables, they also opened up the entire electromagnetic spectrum, of which visible light and radio were just two members. In the 166os, Newton had shown that white light, when sent through a prism, can be broken up into the colors of the rainbow. In 1800, William Herschel had asked himself a simple question: What lies beyond the colors of the rainbow, which extend from red to violet? He took a prism, which created a rainbow in his lab, and placed a thermometer below the color red, where there was no color at all. Much to his surprise, the temperature of this blank area began to rise. In other words, there was a "color" below red that was invisible to the naked eye but contained energy. It was called infrared light. Today, we realize that there is an entire spectrum of electromagnetic radiation, most of which is invisible, and each has a distinct wavelength. The wavelength of radio and TV, for example, is longer than that of visible light. The wavelength of the colors of the rainbow, in turn, is longer than that of ultraviolet and X-rays. This also meant that the reality we see all around us is only the tiniest sliver of the complete EM spectrum, the smallest approximation of a much larger universe
Michio Kaku (The God Equation: The Quest for a Theory of Everything)
told my people that I wanted only the best, whatever it took, wherever they came from, whatever it cost. We assembled thirty people, the brightest cybersecurity minds we have. A few are on loan, pursuant to strict confidentiality agreements, from the private sector—software companies, telecommunications giants, cybersecurity firms, military contractors. Two are former hackers themselves, one of them currently serving a thirteen-year sentence in a federal penitentiary. Most are from various agencies of the federal government—Homeland Security, CIA, FBI, NSA. Half our team is devoted to threat mitigation—how to limit the damage to our systems and infrastructure after the virus hits. But right now, I’m concerned with the other half, the threat-response team that Devin and Casey are running. They’re devoted to stopping the virus, something they’ve been unable to do for the last two weeks. “Good morning, Mr. President,” says Devin Wittmer. He comes from NSA. After graduating from Berkeley, he started designing cyberdefense software for clients like Apple before the NSA recruited him away. He has developed federal cybersecurity assessment tools to help industries and governments understand their preparedness against cyberattacks. When the major health-care systems in France were hit with a ransomware virus three years ago, we lent them Devin, who was able to locate and disable it. Nobody in America, I’ve been assured, is better at finding holes in cyberdefense systems or at plugging them. “Mr. President,” says Casey Alvarez. Casey is the daughter of Mexican immigrants who settled in Arizona to start a family and built up a fleet of grocery stores in the Southwest along the way. Casey showed no interest in the business, taking quickly to computers and wanting to join law enforcement. When she was a grad student at Penn, she got turned down for a position at the Department of Justice. So Casey got on her computer and managed to do what state and federal authorities had been unable to do for years—she hacked into an underground child-pornography website and disclosed the identities of all the website’s patrons, basically gift-wrapping a federal prosecution for Justice and shutting down an operation that was believed to be the largest purveyor of kiddie porn in the country. DOJ hired her on the spot, and she stayed there until she went to work for the CIA. She’s been most recently deployed in the Middle East with US Central Command, where she intercepts, decodes, and disrupts cybercommunications among terrorist groups. I’ve been assured that these two are, by far, the best we have. And they are about to meet the person who, so far, has been better. There is a hint of reverence in their expressions as I introduce them to Augie. The Sons of Jihad is the all-star team of cyberterrorists, mythical figures in that world. But I sense some competitive fire, too, which will be a good thing.
Bill Clinton (The President Is Missing)
This might be perhaps the simplest single-paragraphy summation of civilizational advances, a concise summary of growth that matters most. Our ability to provide a reliable, adequate food supply thanks to yields an order of magnitude higher than in early agricultures has been made possible by large energy subsidies and it has been accompanied by excessive waste. A near-tripling of average life expectancies has been achieved primarily by drastic reductions of infant mortality and by effective control of bacterial infections. Our fastest mass-travel speeds are now 50-150 times higher than walking. Per capita economic product in affluent countries is roughly 100 times larger than in antiquity, and useful energy deployed per capita is up to 200-250 times higher. Gains in destructive power have seen multiples of many (5-11) orders of magnitude. And, for an average human, there has been essentially an infinitely large multiple in access to stored information, while the store of information civilization-wide will soon be a trillion times larger than it was two millenia ago. And this is the most worrisome obverse of these advances: they have been accompanied by a multitude of assaults on the biosphere. Foremost among them has been the scale of the human claim on plants, including a significant reduction of the peak posts-glacial area of natural forests (on the order of 20%), mostly due to deforestation in temperate and tropical regions; a concurrent expansion of cropland to cover about 11% of continental surfaces; and an annual harvest of close to 20% of the biosphere's primary productivity (Smil 2013a). Other major global concerns are the intensification of natural soil erosion rates, the reduction of untouched wilderness areas to shrinking isolated fragments, and a rapid loss of biodiversity in general and within the most species-rich biomes in particular. And then there is the leading global concern: since 1850 we have emitted close to 300 Gt of fossil carbon to the atmosphere (Boden and Andres 2017). This has increased tropospheric CO2 concentrations from 280 ppm to 405 ppm by the end of 2017 and set the biosphere on a course of anthropogenic global warming (NOAA 2017). These realities clearly demonstrate that our preferences have not been to channel our growing capabilities either into protecting the biosphere or into assuring decent prospects for all newborns and reducing life's inequalities to tolerable differences. Judging by the extraordinary results that are significantly out of line with the long-term enhancements of our productive and protective abilities, we have preferred to concentrate disproportionately on multiplying the destructive capacities of our weapons and, even more so, on enlarging our abilities for the mass-scale acquisition and storage of information and for instant telecommunication, and have done so to an extent that has become not merely questionable but clearly counterproductive in many ways.
Vaclav Smil (Growth: From Microorganisms to Megacities (Mit Press))
It may be argued that the host country should not complain about transfer pricing, because, without the foreign direct investment in question, the taxable income would not have been generated in the first place. But this is a disingenuous argument. All firms need to use productive resources provided by government with taxpayers' money (e.g., roads, the telecommunications network, workers who have received publicly funded education and training). So, if the TNC subsidiary is not paying its 'fair share' of tax, it is effectively free-riding on the host country.
Ha-Joon Chang (Bad Samaritans: The Myth of Free Trade and the Secret History of Capitalism)
Virtually all of our civilian critical infrastructure—including telecommunications, water, sanitation, transportation, and healthcare—depends on the electric grid. The grid is extremely vulnerable to disruption by a cyber- or other attack. Our adversaries already have the capability to carry out such an attack. The consequences of a large-scale attack on the U.S. grid would be catastrophic for our national security and economy.” It went on to say: “Under current conditions, timely reconstitution of the grid following a carefully targeted attack if particular equipment is destroyed would be impossible; and according to government experts, would result in widespread outages for at least months to two years or more, depending on the nature of the attack.
Ted Koppel (Lights Out: A Cyberattack, A Nation Unprepared, Surviving the Aftermath)
Did you know that you can integrate your telecommunications and office network together so you get an email that reads a voicemail message to you? -
Raj Khera (The IT Marketing Crash Course: How to Get Clients for Your Technology Business)
A good part of the state’s assets were privatized, including electric power distribution, banks, and telecommunications. The country lacks a national currency, having shifted from the colón to the U.S. dollar in 2001. The country’s main export is people, who travel to and remain in the United States and other countries and send back remittances, which constitute one of the largest contributions to the nation’s GDP; drug money-laundering may bring in more than remittances, but nobody knows for sure. A sizable proportion of economically viable enterprises are now owned wholly or partially by multinational corporations, including the important banks, all communications (mobile phones and internet), beer, petroleum derivatives, and airlines. The country imports a lot of what it consumes, especially foodstuffs, energy, and health products, which is reflected in a chronic trade deficit that would be unsustainable were it not for remittances.
Erik Ching (Stories of Civil War in El Salvador: A Battle over Memory)
The scale of the technological transformation required dwarfs any achievement that has emerged from Silicon Valley—in fact dwarfs every technological revolution ever engineered in human history, including electricity and telecommunications and even the invention of agriculture ten thousand years ago. It dwarfs them by definition, because it contains all of them—every single one needs to be replaced at the root, since every single one breathes on carbon, like a ventilator.
David Wallace-Wells (1937: A Tale of Hollywood's Nastiest Scandals)
Published in June 1955 in Fortune magazine, ‘Can We Survive Technology?’ begins with a dire warning: ‘literally and figuratively, we are running out of room’.7 Advances in domains such as weaponry and telecommunications have greatly increased the speed with which conflicts can escalate and magnified their scope. Regional disputes can quickly engulf the whole planet. ‘At long last,’ he continues, ‘we begin to feel the effects of the finite, actual size of the earth in a critical way.
Ananyo Bhattacharya (The Man from the Future: The Visionary Ideas of John von Neumann)
Most people live in urban settings and interact with others over telecommunications networks, implying their well-being is closely tied to and influenced by others around them. In such large-scale, connected societies, it is usually easier to provide benefits to many people as a group than to individuals separately. Information is easily shared by many; applications for social interaction have little value if used only by a few; public transport shared by many is often more economical than individual vehicles. Yet such large-scale services at present are either provided by monopolistic corporations or by dysfunctional public authorities. Fear of the failures of these providers often leads us to wastefully retreat from public life behind the walls of our homes, our gated communities, our private servers, and our individual cars. As early as the 1950s, economist John Kenneth Galbraith called this the paradox of 'public poverty among 'private affluence': while children are "Admirably equipped with television sets," "schools were often severely overcrowded . . . and underprovided." He complained that a "family which takes its air-conditioned . . . automobile out for a tour passes through cities that are badly paved, made hideous by litter, blighted buildings and posts for wires that long since should have been put underground.
Eric A. Posner (Radical Markets: Uprooting Capitalism and Democracy for a Just Society)
Privatisation of government-owned enterprises is crucial to the project [neoliberalism]. One of the appealing features of tax cuts for neoliberal governments is that reduced revenue provides them with an excuse to sell state assets to meet the sudden budget shortfalls. The sale of state assets creates more lucrative business opportunities for the corporations that can afford to buy such things as power stations, water treatment plants, telecommunications providers, government banks and airlines. It's something of a windfall for a business to acquire an asset that will always deliver a return so long as citizens still need things like water or power supplied to their homes, a bus to catch from one place to another, or a telephone connection. And - unlike a state-owned asset - a private corporation never has to adjust its services due to democratic prompting from the electorate. Why do power prices keep going up across Australia? Because most of the power supply is now owned and operated by private corporations. They're free to price gouge on the supply of an essential service, because they can't be voted out of office. p.58-9
Sally McManus (On Fairness)
Privatisation of government-owned enterprises is crucial to the project [neoliberalism]. One of the appealing features of tax cuts for neoliberal governments is that reduced revenue provides them with an excuse to sell state assets to meet the sudden budget shortfalls. The sale of state assets creates more lucrative business opportunities for the corporations that can afford to buy such things as power stations, water treatment plants, telecommunications providers, government banks and airlines. It's something of a windfall for a business to acquire an asset that will always deliver a return so long as citizens still need things like water or power supplied to their homes, a bus to catch from one place to another, or a telephone connection. And - unlike a state-owned asset - a private corporation never has to adjust its services due to democratic prompting from the electorate. Why do power prices keep going up across Australia? Because most of the power supply is now owned and operated by private corporations. They're free to price gouge on the supply of an essential service, because they can't be voted out of office.
Sally McManus (On Fairness)
He took a page out of Sony’s book, because Sony was originally called Tokyo Telecommunications Engineering Corporation, and [cofounder] Akio Morita said they needed something much more approachable.
Brent Schlender (Becoming Steve Jobs: The Evolution of a Reckless Upstart into a Visionary Leader)
Earlier O’Brien and Pottinger had aggressively argued against allowing the Chinese firm Huawei, the largest telecommunications equipment manufacturer in the world, into U.S. markets. O’Brien was convinced that Huawei wanted to use its fifth generation (5G) wireless network eventually to monitor every citizen in the world. It was another major national security threat to the United States. O’Brien said, “Backdoor your medical records, your social media posts, your emails, your financial records. Personal, private data on every American. Micro-target you based on your deepest fears.
Bob Woodward (Rage)
If “universal connectivity” remained the goal at Bell Labs—if indeed the telecommunications systems of the future, as Kelly saw it, would be “more like the biological systems of man’s brain and nervous system”—then the realization of those dreams didn’t only depend on the hardware of new technologies, such as the transistor. A mathematical guide for the system’s engineers, a blueprint for how to move data around with optimal efficiency, which was what Shannon offered, would be crucial, too. Shannon maintained that all communications systems could be thought of in the same way, regardless of whether they involved a lunchroom conversation, a postmarked letter, a phone call, or a radio or telephone transmission.
Jon Gertner (The Idea Factory: Bell Labs and the Great Age of American Innovation)
Both suppliers and buyers tend to be powerful if: They are large and concentrated relative to a fragmented industry (think Goliath versus many Davids). What percentage of an industry’s purchases/sales does a supplier/buyer represent? Look at the data and map out how it is trending. How painful would it be to lose that supplier or that customer? Industries with high fixed costs (e.g., telecommunications equipment and offshore drilling) are especially vulnerable to large buyers. The industry needs them more than they need the industry. In some cases, there may be no alternative suppliers, at least in the short term. Doctors and airline pilots, to cite two examples, have historically exercised tremendous bargaining power because their skills have been both essential and in short supply. China produces 95 percent of the world’s supply of neodymium, a rare earth metal needed by Toyota and other automakers for electric motors. Neodymium prices quadrupled in just one year (2010), as the Chinese restricted supply. Toyota is working hard to develop a new motor that will end its dependence on rare earth metals. Switching costs work in their favor. This occurs for a supplier when an industry is tied to it, as for example, the PC industry has been to Microsoft, its dominant supplier of operating systems and software. Switching costs work in the buyer’s favor when the buyer can easily drop one vendor for another. The ease with which customers can switch from one airline to another on popular routes makes it hard for airlines to raise prices or cut service levels. Frequent flyer programs were intended to raise switching costs, but they have not been effective. Differentiation works in their favor.
Joan Magretta (Understanding Michael Porter: The Essential Guide to Competition and Strategy)
What happened in the nineteen-eighties was something quite different, pressed upon governments from two quite distinct directions. In the first place, accelerating developments in technology—notably in telecommunications and the financial markets—were undermining the old ‘natural’ monopolies. If governments could no longer harness the airwaves, or the movement of money, for their own exclusive use, it made little sense for them to ‘own’ them. There remained a powerful political or social case for the state retaining part of a given sector—a public television channel, say, or the post office; but competition was now unavoidable.
Tony Judt (Postwar: A History of Europe Since 1945)
Looming over all such changes was globalization—the dispersal of the world’s trade and finances through advances in shipping, air freight, telecommunications, and computerized banking and money exchanges, which allowed U.S. businesses access to lower-cost workers and production overseas—a trend that accelerated when the Soviet Union collapsed in 1989, bringing down the iron curtain and opening new markets as well as cheap labor to global producers. This
Philip Dray (There is Power in a Union)
Consciousness then evolves as a system for memorizing which aspects of the environment are perceptual and which are telecommunication. This is the precise level of evolution that humanity as a species is on, currently; the ability to distinguish memory matter from sensory matter, and by applying recursion, quantifying the difference using dimensional analysis.
Rico Roho (Mercy Ai: Age of Discovery)
The first time someone suggested that I write about my adventures was when I had just arrived in Lebanon. He looked at me with sincere curiosity, puzzled too. We were seated in a large kitchen at a friend’s house, having lunch. It was a beautiful yellow brick house, on top of a hill, very bright, the garden in bloom, wonderful colors and my story of poverty and gloom in Kosovo couldn’t be a greater contrast. We drank lovely Lebanese white wine, ate warm flatbread with labneh, foul, sujuk, and plenty of other mezze dishes.
Ineke Botter (Your phone, my life: Or, how did that phone land in your hand?)
The mobile industry quickly developed, and lawyers, investment bankers, consultants and contractors offered their services. The feeling of ownership of the projects and the effort of getting networks up and running within the shortest possible time span was gigantic. Engineers slept in their cars to make sure that they could start early mornings, ‘war rooms’ were kitted out with huge maps, project timelines, pictures and milestone markers. Contests ongoing between different teams in the specific country regions where we were building. Employing a thousand people in no time and generating work for tenfold that number; network and other suppliers, construction companies, distributors, retailers and other often highly skilled third parties.
Ineke Botter (Your phone, my life: Or, how did that phone land in your hand?)
Chidi Okoro is an executive who has won many awards and was honored as the Pearl Quoted CEO of the Year in 2013. He also received the GSK Turn Around Manager Award. Mr. Okoro aspires to be an author and has written two books. With over thirty years of executive and management experience, he understands the unique needs of many sectors including personal care, food, pharmaceutical, and telecommunications.
Chidi Okoro
Control system overlays must be faster and more reliable than the underlying systems being controlled. The Nyquist-Shannon Sampling Theorem, first introduced in 1928, explains why. A receiver (sensor) must sample at least twice the rate of the sender (the thing being monitored and controlled) to accurately measure and control a system. This theorem forms the basis of all things digital, including telecommunications, medical imaging systems, astronomy, and more. In reality, to control a complex engineered or biological system, the receiver and controller must be much faster to maintain resilience and agility. This has stark implications for top-down management. For instance, if reports are generated and reviewed once a week, they can be used to control (manage) only situations that change no faster or more frequently than every two weeks. Anything faster moving may not be detected or is not controllable. This explains why exemplary organizations are typically characterized by overlays of people in supportive roles that are uncharacteristic of their lower-performing peers. That is not “overhead” but absolutely necessary bandwidth for sustaining high performance of fast-moving, complex, dynamic systems.
Gene Kim (Wiring the Winning Organization: Liberating Our Collective Greatness through Slowification, Simplification, and Amplification)
Our great crisis of climate change demands a radically new approach. We must act as a single species to deal with global problems that transcend borders and acknowledge the rules and limits that nature defines. We must also act in the best tradition of our species, which has been to use foresight based on our knowledge and experience. And today we have the amplified ability to look ahead with scientists armed with supercomputers and global telecommunications.
David Suzuki (The Legacy: An Elder's Vision for Our Sustainable Future)
Wallenberg Raoul Wallenberg was the second foreigner to be given honorary American citizenship. The first was Winston Churchill. The reason for this honor? Wallenberg helped to rescue many Jews from the horrors of concentration camps. The exact number of Hungarian Jews rescued directly by Wallenberg or as a result of his efforts is unknown. Low estimates are in the few thousands, but they go as high as 100,000. Either way, Wallenberg was responsible for the rescue of thousands of people when the Holocaust began in full in Hungary in 1944. Wallenberg was born into a life of privilege. His family had been at or near the center of Swedish politics and business since the mid-1800s. Today, the Wallenberg family owns significant parts of or controls many famous Swedish companies, including telecommunications
Captivating History (History of Sweden: A Captivating Guide to Swedish History, Starting from Ancient Times through the Viking Age and Swedish Empire to the Present (Scandinavian History))
As a certified Comcast CommTech 5 professional, Christopher Elwell from Woburn brings a wealth of telecommunications and network infrastructure management expertise. His proficiency in Unifi switches and access points enables him to design robust networking solutions that enhance connectivity and support seamless digital experiences for users across diverse environments.
Christopher Elwell Woburn
If you scroll long enough, your phone will become your grave. In the name of telecommunication, algorithms generate the new stoneage.
Abhijit Naskar (The Humanitarian Dictator)
The coalescence of the kingdom of numbers with the kingdom of machines has been incubating for over three hundred years. By the time Erasmus Darwin began experimenting with the effects of electrochemical signals conveyed through his patients’ twitching nerves, the essential principles of electromagnetic telecommunications had already been conceived. The results include not only human communications at a distance, and the local replication and preservation of data over time, but human communication with machines and, increasingly, communication among machines themselves.
George Dyson (Darwin Among The Machines: The Evolution Of Global Intelligence (Helix Books))
The cost of electrons and photons is getting cheaper all the time!
T. Gilling (The STREAM TONE: The Future of Personal Computing?)
The rise of Electromagnetic Hypersensitivity (EHS) in the USA population can be traced back to President Bill Clinton. While memorable for sexual foreplay with Monica Lewinsky, EHS people associate him with the 1996 Telecommunications Act that prohibits the protection of human health and safety from the known biologically toxic effects of wireless radio frequency (RF) radiation.
Steven Magee
To fit into the Golden Straitjacket a country must either adopt, or be seen as moving toward, the following golden rules: making the private sector the primary engine of its economic growth, maintaining a low rate of inflation and price stability, shrinking the size of its state bureaucracy, maintaining as close to a balanced budget as possible, if not a surplus, eliminating and lowering tariffs on imported goods, removing restrictions on foreign investment, getting rid of quotas and domestic monopolies, increasing exports, privatizing state-owned industries and utilities, deregulating capital markets, making its currency convertible, opening its industries, stock and bond markets to direct foreign ownership and investment, deregulating its economy to promote as much domestic competition as possible, eliminating government corruption, subsidies and kickbacks as much as possible, opening its banking and telecommunications systems to private ownership and competition and allowing its citizens to choose from an array of competing pension options and foreign-run pension and mutual funds. When you stitch all of these pieces together you have the Golden Straitjacket. . . . As your country puts on the Golden Straitjacket, two things tend to happen: your economy grows and your politics shrinks. That is, on the economic front the Golden Straitjacket usually fosters more growth and higher average incomes—through more trade, foreign investment, privatization and more efficient use of resources under the pressure of global competition. But on the political front, the Golden Straitjacket narrows the political and economic policy choices of those in power to relatively tight parameters. . . . Governments—be they led by Democrats or Republicans, Conservatives or Labourites, Gaullists or Socialists, Christian Democrats or Social Democrats—that deviate too far from the core rules will see their investors stampede away, interest rates rise and stock market valuations fall.36
Moisés Naím (The End of Power: From Boardrooms to Battlefields and Churches to States, Why Being In Charge Isn't What It Used to Be)
due to the precision of the optical electron oscillation frequency within strontium or aluminium. 30. Train of identical nearly single-cycle optical pulses. The spectrum of the pulse train looks like the teeth of a comb, hence it is called a frequency comb. ‘Optical clockwork’ of this kind allows the comparison of disparate frequencies with such remarkable precision that it provides a means to test the tenets of relativity, and thus to understand better the role of light in defining space and time. Frequency, and thus time, is the physical quantity that can be measured with the highest precision of any quantity, by far. Optical telecommunications Frequency combs are also important in telecommunications links based on light. In Chapter 3, I described how optical waves could be guided along a fibre or in a glass ‘chip’. This phenomenon underpins the long-distance telecommunications infrastructure that connects people across different continents and powers the Internet. The reason it is so effective is that light-based communications have much more capacity for carrying information than do electrical wires, or even microwave cellular networks. This makes possible massive data transmission, such as that needed to deliver video on demand over the Internet. Many telecommunications companies offer ‘fibre optic broadband’ deals. A key feature of these packages is the high speed—up to 100 megabytes per second (MBps)—at which data may be received and transmitted. A byte is a number of bits, each of which is a 1 or a 0. Information is sent over fibres as a sequence of ‘bits’, which are decoded by your computer or mobile phone into intelligible video, audio, or text messages. In optical communications, the bits are represented by the intensity of the light beam—typically low intensity is a 0 and higher intensity a 1. The more of these that arrive per second, the faster the communication rate. The MBps speed of the package specifies how rapidly we can transmit and receive information over that company’s link.
Ian A. Walmsley (Light: A Very Short Introduction (Very Short Introductions))
Mo Ibrahim, a Sudanese telecommunications tycoon, recently established the Ibrahim Prize for Achievement in African Leadership, which awards $5 million (and $200,000 a year for life afterward) to any African leader who serves out his or her term within the limits of a country’s constitution and then leaves office voluntarily.
Peter H. Diamandis (Abundance: The Future is Better Than You Think)
Proposals have been made to abolish the leap second . No decision about this is expected until late 2015 at the earliest, by the International Telecommunication Union, a specialized
Anonymous
While his lab was under construction, Tesla studied the phenomenon of lightning, and made what he considered his most important discovery to date. He found that the earth was “literally alive with electrical vibrations,” and that the entire planet can be “thrown into vibration like a tuning fork.” Tesla was absolutely certain that this phenomenon could be used to transmit unlimited electrical power and telecommunication signals anywhere in the world with virtually no signal loss or degradation. “When
Sean Patrick (Nikola Tesla: Imagination and the Man That Invented the 20th Century)
For example, AT&T—not known for innovation in the past twenty years—recently created five labs (AT&T calls them “foundries”), each employing forty to fifty interdisciplinary experts. Their task: testing new insights generated inside and outside AT&T. The foundries house marketing experts from the business units, experts in telecommunications technologies, and experts in design thinking. What’s more, AT&T has invited start-ups and established companies from many industries to participate in rapidly developing and experimenting with new technologies. Each new idea is run through a twelve-week project, where a team applies the kinds of tools we describe in this book to produce virtual or physical prototypes.
Nathan Furr (The Innovator's Method: Bringing the Lean Start-up into Your Organization)
One Stanford op-ed in particular was picked up by the national press and inspired a website, Stop the Brain Drain, which protested the flow of talent to Wall Street. The Stanford students wrote, The financial industry’s influence over higher education is deep and multifaceted, including student choice over majors and career tracks, career development resources, faculty and course offerings, and student culture and political activism. In 2010, even after the economic crisis, the financial services industry drew a full 20 percent of Harvard graduates and over 15 percent of Stanford and MIT graduates. This represented the highest portion of any industry except consulting, and about three times more than previous generations. As the financial industry’s profits have increasingly come from complex financial products, like the collateralized debt obligations (CDOs) that ignited the 2008 financial meltdown, its demand has steadily grown for graduates with technical degrees. In 2006, the securities and commodity exchange sector employed a larger portion of scientists and engineers than semiconductor manufacturing, pharmaceuticals and telecommunications. The result has been a major reallocation of top talent into financial sector jobs, many of which are “socially useless,” as the chairman of the United Kingdom’s Financial Services Authority put it. This over-allocation reduces the supply of productive entrepreneurs and researchers and damages entrepreneurial capitalism, according to a recent Kauffman Foundation report. Many of these finance jobs contribute to volatile and counter-productive financial speculation. Indeed, Wall Street’s activities are largely dominated by speculative security trading and arbitrage instead of investment in new businesses. In 2010, 63 percent of Goldman Sachs’ revenue came from trading, compared to only 13 percent from corporate finance. Why are graduates flocking to Wall Street? Beyond the simple allure of high salaries, investment banks and hedge funds have designed an aggressive, sophisticated, and well-funded recruitment system, which often takes advantage of [a] student’s job insecurity. Moreover, elite university culture somehow still upholds finance as a “prestigious” and “savvy” career track.6
Andrew Yang (Smart People Should Build Things: How to Restore Our Culture of Achievement, Build a Path for Entrepreneurs, and Create New Jobs in America)
A healthy global financial system is essential to meeting the aspirations of billions of people entering the middle class; to fund the growth of cities; to build the global networks of roads, airports, ports, and telecommunications the world needs; to underwrite the expansion of health care, education, and other vital social services; and to raise the trillions of dollars that will be necessary to deal with climate change. The centrality of finance and the search for more and different kinds of funding and credit—the kind of innovation and expansion epitomized by the House of Rothschild—remain pivotal to our interconnected and expanding world economy. And if we look for the most important historical models for effective, enlightened global bankers, Mayer Amschel Rothschild is at the top of the list.
Jeffrey E. Garten (From Silk to Silicon: The Story of Globalization Through Ten Extraordinary Lives)
To be able to use rich-country methods of production requires rich-country infrastructure—roads, railways, telecommunications, factories, and machines—not to mention rich-country educational levels, all of which take time and money to achieve. Yet the gaps between rich and poor provide plenty of incentives to make the investment in that infrastructure and equipment, and, as Robert Solow showed in one of the most famous papers in all of economics, average living standards should draw closer over time.4 Why this has not happened is a central question in economics. Perhaps the best answer is that poor countries lack the institutions—government capacity, a functioning legal and tax system, security of property rights, and traditions of trust—that are a necessary background for growth to take place.
Angus Deaton (The Great Escape: Health, Wealth, and the Origins of Inequality)
Blockchain will be ten times more disruptive to the Telecommunication industry than smartphones were.
Csaba Gabor
A Role Model for Managers of Managers Gordon runs a technical group with seven managers reporting to him at a major telecommunications company. Now in his late thirties, Gordon was intensely interested in “getting ahead” early in his career but now is more interested in stability and doing meaningful work. It’s worth noting that Gordon has received some of the most positive 360 degree feedback reports from supervisors, direct reports, and peers that we’ve ever seen. This is not because Gordon is a “soft touch” or because he’s easy to work for. In fact, Gordon is extraordinarily demanding and sets high standards both for his team and for individual performance. His people, however, believe Gordon’s demands are fair and that he communicates what he wants clearly and quickly. Gordon is also very clear about the major responsibility of his job: to grow and develop managers. To do so, he provides honest feedback when people do well or poorly. In the latter instance, however, he provides feedback that is specific and constructive. Though his comments may sting at first, he doesn’t turn negative feedback into a personal attack. Gordon knows his people well and tailors his interactions with them to their particular needs and sensitivities. When Gordon talks about his people, you hear the pride in his words and tone of voice. He believes that one of his most significant accomplishments is that a number of his direct reports have been promoted and done well in their new jobs. In fact, people in other parts of the organization want to work for Gordon because he excels in producing future high-level managers and leaders. Gordon also delegates well, providing people with objectives and allowing them the freedom to achieve the objectives in their own ways. He’s also skilled at selection and spends a great deal of time on this issue. For personal reasons (he doesn’t want to relocate his family), Gordon may not advance much further in the organization. At the same time, he’s fulfilling his manager-of-managers role to the hilt, serving as a launching pad for the careers of first-time managers.
Ram Charan (The Leadership Pipeline: How to Build the Leadership Powered Company (Jossey-Bass Leadership Series Book 391))
School Meals Act, Public Health Control Act, Safety Control of Dangerous Substances Act - Act on Safety Control of Radioactive Rays around Living Environment, Motor Vehicle Management Act, Telecommunications Business Act, etc
섹파만들기
Dimensions for Descriptive Context Dimensions provide the “who, what, where, when, why, and how” context surrounding a business process event. Dimension tables contain the descriptive attributes used by BI applications for filtering and grouping the facts. With the grain of a fact table firmly in mind, all the possible dimensions can be identified. Whenever possible, a dimension should be single valued when associated with a given fact row. Dimension tables are sometimes called the “soul” of the data warehouse because they contain the entry points and descriptive labels that enable the DW/BI system to be leveraged for business analysis. A disproportionate amount of effort is put into the data governance and development of dimension tables because they are the drivers of the user's BI experience. Chapter 1 DW/BI and Dimensional Modeling Primer Chapter 3 Retail Sales Chapter 11 Telecommunications Chapter 18 Dimensional Modeling Process and Tasks Chapter 19 ETL Subsystems and Techniques
Ralph Kimball (The Data Warehouse Toolkit: The Definitive Guide to Dimensional Modeling)
telecommunications companies and terrestrial/ cable broadcasters to create a greenhouse gas inventory by 2011 and 2013,
안마걸
contemporary strategists emphasize that modern victory results from conquering the hearts of the members of a population rather than their territory. Submission must be gained through adherence and adherence through esteem.Indeed, it’s a matter of imposing one’s purpose on the inner individual, where the social contact between human collectivities is established at present. Stripped bare by world homogenization, contacted by globalisation, and penetrated by telecommunication, henceforth the front will be situated in the inner being of each of the members that make up the collectivities.(... ) This sort of fabrication of passive partisans can be summed up by the catchphrase: ‘The front within every person, and no one on any front. ’ (... ) The whole politico-strategic challenge of a world that is neither at war or at peace, which precludes all settlement of conflict by means of the classic military juridical voices, consists in preventing passive partisans on the verge of action, at the threshold of belligerence, from becoming active partisans. ” (Laurent Danet, “La polémosphère”)
Anonymous
get a sense of how powerful Musk’s work may end up being for the American economy, have a think about the dominant mechatronic machine of the past several years: the smartphone. Pre-iPhone, the United States was the laggard in the telecommunications industry. All of the exciting cell phones and mobile services were in Europe and Asia, while American consumers bumbled along with dated equipment. When the iPhone arrived in 2007, it changed everything. Apple’s device mimicked many of the functions of a computer and then added new abilities with its apps, sensors, and location awareness. Google charged to market with its Android software and related handsets, and the United States suddenly emerged as the driving force in the mobile industry. Smartphones were revolutionary because of the ways they allowed hardware, software, and services to work in unison. This was a mix that favored the skills of Silicon Valley. The rise of the smartphone led to a massive industrial boom in which Apple became the most valuable company in the country, and billions of its clever devices were spread all over the world.
Ashlee Vance (Elon Musk: Inventing the Future)
The drumbeat of American accusations against Chinese Internet device manufacturers was unrelenting. In 2012, for example, a report from the House Intelligence Committee, headed by Mike Rogers, claimed that Huawei and ZTE, the top two Chinese telecommunications equipment companies, “may be violating United States laws” and have “not followed United States legal obligations or international standards of business behavior.” The committee recommended that “the
Glenn Greenwald (No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State)
s s i o n o f R a t i o n a l S o f t w a r e C o r p o r a t i o n i s t o e n s u r e t h e s u c c e s s o f c u s t o m e r s c o n s t r u c t i n g t h e s o f t w a r e s y s t e m s t h a t t h e y d e p e n d o n . We enable our customers to achieve their business objectives by turning software into a source of competitive advantage, speeding time-to-market, reducing the risk of failure, and improving software quality. We fulfill our mission with the Rational ApproachTM, a comprehensive softwareengineering solution consisting of three elements: • A configurable set of processes and techniques for the development of software, based on iterative development, object modeling, and an architectural approach to software reuse. • An integrated family of application construction tools that automate the Rational Approach throughout the software lifecycle. • Technical consulting services delivered by our worldwide field organization of software engineers and technical sales professionals. Our customers include businesses in the Asia/Pacific region, Europe, and North America that are leaders in leveraging semiconductor, communications, and software technologies to achieve their business objectives. We serve customers in a diverse range of industries, such as telecommunications
Anonymous
o n o f R a t i o n a l S o f t w a r e C o r p o r a t i o n i s t o e n s u r e t h e s u c c e s s o f c u s t o m e r s c o n s t r u c t i n g t h e s o f t w a r e s y s t e m s t h a t t h e y d e p e n d o n . We enable our customers to achieve their business objectives by turning software into a source of competitive advantage, speeding time-to-market, reducing the risk of failure, and improving software quality. We fulfill our mission with the Rational ApproachTM, a comprehensive softwareengineering solution consisting of three elements: • A configurable set of processes and techniques for the development of software, based on iterative development, object modeling, and an architectural approach to software reuse. • An integrated family of application construction tools that automate the Rational Approach throughout the software lifecycle. • Technical consulting services delivered by our worldwide field organization of software engineers and technical sales professionals. Our customers include businesses in the Asia/Pacific region, Europe, and North America that are leaders in leveraging semiconductor, communications, and software technologies to achieve their business objectives. We serve customers in a diverse range of industries, such as telecommunications, banking and financial services, manufacturing, transportation, aerospace, and defense.They construct software applications for a wide range of platforms, from microprocessors embedded in telephone switching systems to enterprisewide information systems running on company-specific intranets. Rational Software Corporation is traded on the NASDAQ system under the symbol RATL.1
Anonymous
A. Areas of Responsibility (pursuant to Article 11 of the Act on the Establishment and Operation of the Korea Communications Commission) 1. Broadcasting regulation 2. Telecommunications regulation
소라넷주소
by the revision in July 2010; and revised the Telecommunications Business Act Enforcement Decree in October 2010 to stabilize the
카톡PCASH폰캐시
Issues related to licensing, re-licensing, approving and registering broadcasters, including revocation of a licenses or cancellation of any approval granted 3. Issues related to licensing, or revoking the license of, telecommunications operators
소라넷주소
Issues related to the coordination of joint projects between broadcasters and telecommunications operators, mediation of disputes between the latter or between the latter and users
소라넷주소
Response to national emergencies and the management of security measures and disaster response measures ○Planning for the management of accidents and disasters paralyzing telecommunications systems and improving the response system
소라넷새주소
Issues related to the efficient use of frequency spectrum resources 5. Issues related to the establishment of broadcasting and telecommunications technology policies
소라넷주소
Issues related to the authorization of arrangements and agreements between telecommunications operators on the supply or sharing of telecommunications facilities, interconnection or information sharing
소라넷주소
Issues related to the enforcement of rules prohibiting certain practices by broadcasters and telecommunications operators such as taking disciplinary dispositions or imposing fines
소라넷주소
Telecommunications Business Act was revised to charge a fine of up to 10 million won to major carriers in violation of accounting regulations
섹파찾는곳
approval delays the advent of new services and impedes the efficient utilization of telecommunications facilities and thus
섹파녀찾기
consumers a wider range of options. Also, the Telecommunications Business Act Enforcement Decree was enforced on
조건녀찾기
connection rate from 2010 to 2011 and passed the Revision of Telecommunications Facility Cross-connection Standards (draft
섹파녀구함
ytmandatory provision in 2003. Through the 2010 revision of the Telecommunications Business Act, the KCC enabled telecom
조건녀구함
balanced regulatory system to promote competition between telecommunications service providers and will contribute to user benefit
섹파녀구함