Stephen E. Arnold: Computational Demand — Moore’s Law Broken

IO Impotency
Stephen E. Arnold
Stephen E. Arnold

Computational Demand: Not So Fast

Analytics, Big Data, and smart software. The computer systems today can handle the load. The death of Moore’s Law; that is, the drive to make chips ever more capable is dead. I just learned this. See “Moore’s Law Really Is Dead This Time.” If that is the case, too bad for some computations. With the rise of mobile and the cloud, who worries about doing complex calculations? As it turns out, some researchers do. Navigate to “New Finding May Explain Heat Loss in Fusion Reactors.” Here’s the passage that underscores the need to innovate in computational systems:

Continue reading “Stephen E. Arnold: Computational Demand — Moore's Law Broken”

Hal Berghel: Secretocracy

Corruption, Cultural Intelligence, Government, IO Impotency
Hal Berghel
Hal Berghel

Secretocracy

Hal Berghel, University of Nevada, Las Vegas

Secretocracy is an insidious, anti-democratic form of government sustained by secrecy and defined by an ill-informed body politic. Securocrats, and the military–industrial complex that feeds on them, increasingly use computing technology to prevent the electorate from accessing complete information.

PDF (5 Pages): Secretocracy

Full text below the fold.

Continue reading “Hal Berghel: Secretocracy”

Berto Jongman: NSF Truthy Social Media Project

IO Impotency
Berto Jongman
Berto Jongman

Feds Pouring Money Into a Project to Create a Database to Track “Suspicious” Internet Memes

The federal government spent $1 million to create an online database that will collect “suspicious” memes and track “misinformation.” The project, which is known as the “Truthy Database” is being funded by The National Science Foundation, but it seems as if the operation has some powerful political motivations.

Berto Jongman: ISIS & Internet Vulnerability

IO Deeds of War, IO Impotency
Berto Jongman
Berto Jongman

ISIS Smart Phone App is mentioned halfway down.

Ongoing Threat To The Whole Internet – John McAfee: ‘As Serious As It Gets – Absolutely No Defenses In Place'

“I feel certain that the IS news app was the source of the DDoS attack,” cybersecurity expert John McAfee tells IBTimes UK. “One of my researchers has discovered encrypted packets being sent to the Amaq Agency news app. “We found the 13 Root Server Addresses in the app memory while the app was running. The addresses did not appear inside the static app. The addresses therefore had to be decrypted at run time. Why would they encrypt the addresses inside the app unless they were trying to hide the true purpose of the app? This is the smoking gun we were looking for.”

noble gold