I'm sure it's not because “We don't
want to start that debate before the election.” It must be because
of a technical glitch, even if we have to create the glitch
ourselves... Perhaps it just expired and we need to start another?
"The Electronic Privacy
Information Center posted a brief
and detailed notice about the removal of a petition regarding
security screenings by the TSA at US airports and other locations.
'At approximately 11:30 am EDT, the White House removed a petition
about the TSA airport screening procedures from the White House 'We
the People' website. [now
“We the second class People” Bob] About
22,500 of the 25,000 signatures necessary for a response from the
Administration were obtained when the White House unexpectedly cut
short the time period for the petition. The site also went down for
'maintenance' following an article
in Wired that sought support for the campaign."
(Related) It has nothing what-so-ever
to do with Security Theater that costs more that a Broadway show.
JFK's
$100M security system breached
A man on a personal watercraft who
became stranded in a New
York bay easily breached Kennedy
Airport's security system by walking undetected through two
runways and into a terminal.
The New
York Post reports that the 31-year-old man swam to a Jamaica
Bay shore and then walked past motion sensors and closed-circuit
cameras of the airport's state-of-the-art Perimeter Intrusion
Detection System. The $100 million system is meant to safeguard
against terrorists.
The man climbed an 8-foot-tall
perimeter fence and made his way to Terminal 3.
He approached a Delta Airlines worker,
who alerted authorities.
The Port
Authority of New York and New Jersey is investigating. The
agency says it plans to meet with the security system's maker this
week.
So IP lawyers, is this how it should be
done?
"New
research (PDF) shows that Intellectual Ventures is tied
to at least 1,300 shell companies whose sole purpose is to coerce
real companies into buying patent license that they don't want or
need. Those who resist the "patent trolls" are dragged
into nightmarish
lawsuits."
Why secret? By now even the terrorists
must know we're there. Are we doing something that citizens would
not like? (Unlikely, Romney would jump on that) So it must be that
the CIA is running the drones, and they won't talk about anything.
(Why doesn't that make me all warm an fuzzy?)
Hidden
History: America’s Secret Drone War in Africa
More secret bases. More and better
unmanned warplanes. More frequent and deadly robotic attacks. Some
five years after a U.S. Predator Unmanned Aerial Vehicle flew the
type’s first mission over lawless Somalia, the shadowy American-led
drone campaign in the Horn of Africa is targeting Islamic militants
more ruthlessly than ever.
Thanks to media accounts, indirect
official statements, fragmentary crash reports and one complaint by a
U.N. monitoring group, we can finally begin to define — however
vaguely — the scope and scale of the secret African drone war.
The details that follow are in part
conjecture, albeit informed conjecture. They outline of
just one
of America’s ongoing shadow wars — and one possible model for
the future U.S. way of war. Along with the counterterrorism
campaigns in Pakistan, Yemen and the Philippines, the Somalia drone
war demonstrates how high-tech U.S. forces can inflict major damage
on America’s enemies at relatively low cost … and without most
U.S. citizens having any idea it’s even happening.
Why we need Data Mining (to find
relevant data) and Data Analytics (to make sense of what we find)
August 12, 2012
The
Problem of Data - Council on Library and Information Resources
The
Problem of Data, Lori Jahnke and Andrew Asher, Spencer D. C.
Keralis with an introduction by Charles Henry. August 2012. CLIR
Pubublication No. 154. “Every day, we create 2.5
quintillion bytes of data—so much that 90% of the data
in the world today has been created in the last two years alone.”
IBM, Bringing Big Data to the Enterprise
- This extraordinary and often cited statistic is an apt quantitative introduction to our technological era, increasingly referred to as the era of Big Data. The massive scale of data creation and accumulation, together with the increasing dependence on data in research and scholarship, are profoundly changing the nature of knowledge discovery, organization, and reuse. As our intellectual heritage moves more deeply into online research and teaching environments, new modes of inquiry emerge; digital data afford investigations across disciplinary boundaries in the sciences, social sciences, and humanities, further muddling traditional boundaries of inquiry. Jahnke and Asher explore workflows and methodologies at a variety of academic data curation sites, and Keralis delves into the academic milieu of library and information schools that offer instruction in data curation. Their conclusions point to the urgent need for a reliable and increasingly sophisticated professional cohort to support data-intensive research in our colleges, universities, and research centers."
(Related) Never ever analyze data in
isolation (or by pre-defining a target group based on your
perceptions and assumptions)
August 12, 2012
Big
Data, Big Impact: New Possibilities for International Development
Big
Data, Big Impact: New Possibilities for International Development:
"The amount of data in the world is exploding - large portion of
this comes from the interactions over mobile devices being used by
people in the developing world - people whose needs and habits have
been poorly understood until now. Researchers and policymakers are
beginning to realize the potential for channeling these torrents of
data into actionable information that can be used to identify needs &
provide services for the benefit of low-income populations. This
discussion note is a Call-to-action for stakeholders for concerted
action to ensure that this data helps the individuals and communities
who create it."
No comments:
Post a Comment