Berto Jongman: Social Media Censorship & Anti-Censorship — Twister vs. #GoogleGestapo

Advanced Cyber/IO, IO Impotency
Berto Jongman

A Storm on the Horizon? “Twister” and the Implications of the Blockchain and Peer-to-Peer Social Networks for Online Violent Extremism

“Twister,” developed by Miguel Freitas, is a social network platform centered around micro-blogging, much like Twitter. However, rather than relying on centralized servers owned and maintained by a single firm, Twister users operate a blockchain combined with distributed hash table (DHT)–like and BitTorrent-like protocols to both make posts and send private messages, and also to receive entries from other users. Twister’s raison d’etre is that it offers a social networking platform that cannot be censored and cannot itself censor.

Continue reading “Berto Jongman: Social Media Censorship & Anti-Censorship — Twister vs. #GoogleGestapo”

Stephen E. Arnold: Ignoring Amazon — Bad Idea…

Commerce, Corruption, IO Impotency
Stephen E. Arnold

Ignoring Amazon: Risky, Short Sighted, Maybe Not an Informed Decision

I read “AWS, MongoDB, and the Economic Realities of Open Source.” The write up does a good job of explaining how convenience can generate cash for old line businesses.

There are several facets of Amazon’s system and method for competition which may be more important than the inclusion of open source software in its suite of “conveniences.”

Continue reading “Stephen E. Arnold: Ignoring Amazon — Bad Idea…”

SPECIAL: 5G Will Mutate You Or Kill You….

03 Economy, 06 Family, 07 Health, 07 Other Atrocities, 10 Transnational Crime, 11 Society, Commerce, Corruption, Government, IO Impotency, Law Enforcement, Media

Tip of the Hat to Ray Songtree.

See Also:

5G @ Phi Beta Iota

Berto Jongman: Steven Feldstein on How Artificial Intelligence is Reshaping Repression

Commerce, Corruption, Government, IO Deeds of War, IO Impotency, Law Enforcement
Berto Jongman

How Artificial Intelligence is Reshaping Repression

Steven Feldstein

Journal of Democracy, 30/1 January 2019

Around the world, artificial-intelligence (AI) systems are showing their potential for abetting repressive regimes and upending the relationship between citizen and state, thereby accelerating a global resurgence of authoritarianism. China is driving the proliferation of AI technology to authoritarian and illiberal regimes, an approach that has become a key component of Chinese geopolitical strategy. The significance of this technology for authoritarians around the globe, as well as for their democratic opponents, is growing ever clearer. To counter not only the spread of high-tech repression abroad, but also potential abuses at home, policy makers in democratic states must think seriously about how to mitigate harm and to shape better practices.

SPECIAL: Covert British Military Intelligence False Flag Fake News Smear and Disinformation Machine Moving Into USA UPDATE 1: Twitter Smearing of Corbyn and Assange

Corruption, Government, IO Deeds of War, Military, Peace Intelligence
Robert Parry (RIP)

Covert British Military-Smear Machine Moving into US

After mobilizing a disinformation campaign across Europe, documents show that the Integrity Initiative is now infiltrating the U.S., report Max Blumenthal and Mark Ames.

A bombshell domestic spy scandal has been unfolding in Britain, after hacked internal communications exposed a covert U.K. state military-intelligence psychological warfare operation targeting its own citizens and political figures in allied NATO countries under the cover of fighting “Russian disinformation.”

Continue reading “SPECIAL: Covert British Military Intelligence False Flag Fake News Smear and Disinformation Machine Moving Into USA UPDATE 1: Twitter Smearing of Corbyn and Assange”

Berto Jongman: Why Hard Back-Ups Really Matter — How An Entire Community Lost Its “Digital” Mind….

IO Impotency
Berto Jongman

The cyber-attack that sent an Alaskan community back in  time

In 2018, a remote Alaskan community’s infrastructure was hit by a malware attack which forced it offline. It was only then they realised how much they depended on computers.

James Perloff: 9/11 Simplified — The Zionists Did It with Dick Cheney’s Active Advance Complicity & Cover-Up

07 Other Atrocities, 08 Wild Cards, Corruption, Government, IO Deeds of War, Law Enforcement, Media, Military, Officers Call

9/11 Simplified

Yes, Virginia, there really were hijackers on the 9/11 planes—but not the ones we were told

(Updated with an addendum on 7-28-17)

9/11 was an outside job, done by Israeli operatives, but with consent and cooperation at the highest levels of the U.S. government.

Continue reading “James Perloff: 9/11 Simplified — The Zionists Did It with Dick Cheney’s Active Advance Complicity & Cover-Up”

Berto Jongman: This million-core [neural network] supercomputer inspired by the human brain breaks all the rules

Advanced Cyber/IO
Berto Jongman

This million-core supercomputer inspired by the human brain breaks all the rules

SpiNNaker’s spiking neural network mimics the human brain, and could fuel breakthroughs in robotics and health.

Historically, the difficulty in making computers that could mimic the brain largely comes down to connectivity. Neurons — the nerve fibres that travel throughout the body and largely terminate in the brain — each have thousands of inputs and thousands of outputs. Computing systems struggle with anything on a similar scale.

Currently, it models one percent of the human brain, so a SpiNNaker system that could give a robot human-level cognition would require something of an engineering miracle.

Read full article.

Berto Jongman: Information Technology Futures

Advanced Cyber/IO
Berto Jongman

What Tech Will Look Like in 2039

Open source technology trends 2019

Phi Beta Iota: They both ignore short-falls in data collection (1%) and data processing (1% of the 1% we collect) and none of them really speak to sense-making tools and collective human intelligence.