During a Q&A in which he’d promised to answer any questions put to him, The CEO of computer chip company Intel stayed silent when asked about NSA spying.
Bush or Clinton: Will America's Only Choice be a Presidential Dynasty?
After the inevitable disaster of having a dynasty in office, maybe Americans will want to roll it all back to before 1776, and just have a King or Queen in charge, screw democracy.
Which Dynast will win, Jeb Bush or Hilary/Bill Clinton? Ed Ross leans towards Jeb Bush in this article:
“Polls had New Jersey Gov. Chris Christie ahead of the Republican pack and Democratic odds-on favorite Hillary Clinton until orange cones on the George Washington Bridge stalled his campaign bus. This far out from November 2016, there is time for perhaps a dozen other Republicans to take his place. One of them is former Florida Gov. Jeb Bush. Assuming he could win the Republican nomination, is the country ready for a third Bush president?
Is keeping military funding secret truly necessary for national security? Not according to Pieter and Siemon Wezeman. Greater transparency not only makes governments more accountable, it also helps reduce the causes of insecurity and conflict.
By Pieter Wezeman and Siemon Wezeman for SIPRI
EXTRACT
The secrecy of military matters is an illusion
Many governments justify secrecy in military budgets on the basis that such information should not be allowed to fall into the hands of potentially hostile forces. However, maintaining secrecy about military spending and key military procurement projects is practically impossible. For example, SIPRI has had 45 years of experience in collecting information about military budgets and international arms transfers. Open sources, official or non-official, provide SIPRI with a wealth of information about the procurement of major arms. If organizations like SIPRI, with minimal resources and working only with open sources, can calculate military spending and map global arms transfers with a high degree of comprehensiveness and accuracy, then national intelligence agencies in potentially hostile countries are obviously able to achieve a lot more.
I read a long report and then a handful of spin off reports about HP and Autonomy, mid February 2014 version. The Financial Times’s story is a for fee job. You can get a feel for the information in “HP Executives Knew of Autonomy’s Hardware Sales Losses: Report.” There are clever discussions of this allegedly “new information” in a number of blogs. What is interesting is an allegedly accurate chunk of information in “HP Explores Settlement of Autonomy Shareholder Lawsuit.” My head is spinning. HP buys something. Changes the person on watch when the deal was worked out. HP gets a new boss and makes changes to its board of directors. HP then accuses everyone except itself for buying Autonomy for a lot of money. HP then whips up the regulators, agitates accounting firms, and pokes Michael Lynch with a cattle prod.
As this activity was in the microwave, it appears that HP knew how the hardware/software deals were handled. If the reports are accurate, Dell hardware was more desirable than HP’s hardware.
I wish to note that the article does not in any way represent the views of my employer, the William J. Perry Center for Hemispheric Defense Studies, or the U.S. government.
The F-35, the latest fighter jet being developed for the U.S. Armed Forces, has hit another potential snag.This time, it's not questions of the jet's structural integrity or even questions of relevance in combat.
It's the plane's vulnerability to hackers.
The F-35's helmet displays an augmented reality overview, which is drawn from six cameras across the body of the plane. This enables the pilot to look around the cockpit and, instead of seeing the interior of the plane, see directly through the cameras at the world outside.
This computational capability is all run by a computer system called ALIS.