And more of my photos from the Open Networking Summit this week.
The other thing is a stealth cold setting where it's "a bit chilly," "a bit chilly," "a bit chilly," "DEEP FROZEN OMG WHAT HAPPENED"
Me on Light Reading.
- The car was parked in the garage at her home.
- The key was partly in the ignition.
- She had her bills set up for auto-pay, so collections agents didn't come calling.
- Neighbors said they didn't see her much even before she died.
A.E. Van Vogt was a Golden Age science fiction writer whose novels and stories include World of Null-A and "The Weapon Shops of Isher."
He was born in 1912 on a farm in Edinburg, a Russian Mennonite community east of Gretna, Manitoba, Canada. Until he was four years old, he and his family spoke only a dialect of Old Low German in the home.
"The right to buy weapons is the right to be free" is the slogan repeated several times in "The Weapon Shops of Isher." The weapons sold in those shops can only be used in self-defense.
L. Ron Hubbard briefly appointed Van Vogt to head up California operations for Dianetics, a precursor to Scientology.
Government and big business are collecting vast troves of data about us, but they claim it isn't actually surveillance until a human being looks at it.
> Increasingly, we are watched not by people but by algorithms. Amazon and Netflix track the books we buy and the movies we stream, and suggest other books and movies based on our habits. Google and Facebook watch what we do and what we say, and show us advertisements based on our behavior. Google even modifies our web search results based on our previous behavior. Smartphone navigation apps watch us as we drive, and update suggested route information based on traffic congestion. And the National Security Agency, of course, monitors our phone calls, emails and locations, then uses that information to try to identify terrorists.
> Documents provided by Edward Snowden and revealed by the Guardian today show that the UK spy agency GHCQ, with help from the NSA, has been collecting millions of webcam images from innocent Yahoo users. And that speaks to a key distinction in the age of algorithmic surveillance: is it really okay for a computer to monitor you online, and for that data collection and analysis only to count as a potential privacy invasion when a person sees it? I say it's not, and the latest Snowden leaks only make more clear how important this distinction is.
The NSA wants to redefine the word "collects" to say it means what the agency wants it to mean.
> Director of National Intelligence James Clapper likened the NSA's accumulation of data to a library. All those books are stored on the shelves, but very few are actually read. "So the task for us in the interest of preserving security and preserving civil liberties and privacy," says Clapper, "is to be as precise as we possibly can be when we go in that library and look for the books that we need to open up and actually read." Only when an individual book is read does it count as "collection," in government parlance.
> So, think of that friend of yours who has thousands of books in his house. According to the NSA, he's not actually "collecting" books. He's doing something else with them, and the only books he can claim to have "collected" are the ones he's actually read.
> In the words of one Google executive: "Worrying about a computer reading your email is like worrying about your dog seeing you naked."
But now that we have an example of a spy agency seeing people naked -- there are a surprising number of sexually explicit images in the newly revealed Yahoo image collection -- we can more viscerally understand the difference.
> To wit: when you're watched by a dog, you know that what you're doing will go no further than the dog.
The dog doesn't remember the experience, or even know what it's seeing. It won't use the information to market to you, arrest you, or otherwise restrict your freedom. The dog won't leak the information to outsiders, or have it stolen by hackers.
- United Business Mediapresent
- Internet EvolutionEditor in chief, present
- State University of New York at Stony Brook1984
- John H. Glenn High School1976 - 1979
Comcast-Netflix: It's Really All About TWC | Light Reading
Two Wall Street analysts contend that Comcast struck a sweetheart peering deal with Netflix now to clear the way for regulatory approval of
Google Fiber Shifts Into High Gear | Light Reading
Google unit explores expanding its 1Gbit/s service to nine major US markets, extending its reach nationwide.
Juniper Bows to Investor Pressure, Refocuses | Light Reading
Juniper Networks unveils a new operating plan that pleases activist investor Elliott Management and brings Kevin DeNuccio on board.
New Citrix Box Lands Amid WAN Optimism | Light Reading
Citrix unveils a WAN optimization appliance with virtual Windows app servers, while WAN optimization market hopes build.
Comcast's TWC Coup: 3 Things to Know | Light Reading
Here are three things you need to know if the Comcast deal to acquire Time Warner Cable goes through.
Murray Leads Big Switch Into Bare Metal Battle | Light Reading
Doug Murray left Juniper Networks to guide Big Switch Networks beyond a crowded SDN controller market and into networking's next great disru
Is Comcast Ready for Big Hack Attack? | Light Reading
Concerned about Comcast's precautions, experts recommend that subscribers change their account passwords after last week's apparent hacker a
Know Your Small Cell: Home, Enterprise, or Public Access? | Light Reading
Small cells -- they're not just one size fits all.
Verizon: Security Compliance Coming Up Short | Light Reading
New report due out next week shows compliance with industry standards for payment cards is still sorely lacking.
Embrane Helps Cisco Build Its SDN Strategy | Light Reading
Embrane will help Cisco in its pie-fight against VMware.
Taqua Lets Mobile Users Talk Over WiFi | Light Reading
New software lets mobile users make calls and send messages over WiFi directly from the phone's dialer.
Businesses Emphasize Basics for Cloud Deployments - Cloud Clan Editor's ...
Cloud deployments are being undertaken by businesses looking to achieve scalability, reduced deployment time, cost savings, and improved ava