Menu

Blog

Archive for the ‘security’ category: Page 140

Dec 29, 2014

Corporate Reconnoitering?

Posted by in categories: cybercrime/malcode, cyborgs, defense, economics, electronics, encryption, engineering, ethics, existential risks, finance, futurism, information science, innovation, life extension, physics, science, security, sustainability

Corporate Reconnoitering?

000000000 blitz 400
ABSOLUTE END.

Authored By Copyright Mr. Andres Agostini

White Swan Book Author (Source of this Article)

http://www.LINKEDIN.com/in/andresagostini

Continue reading “Corporate Reconnoitering?” »

Dec 28, 2014

Actuarial Science Suffice? By Mr. Andres Agostini — Amazon, Linkedin

Posted by in categories: economics, education, engineering, existential risks, physics, science, security, singularity

Actuarial Sciences Suffice?

000  actuarial erin

QUESTION: Actuarial Sciences Suffice?

ANSWER: Absolutely used by actuaries and some futurists, actuarial sciences are structurally linear and incomplete in a world mired by explosive nonlinearity, fluidly and incessantly.

EXCERPTED FROM THE WHITE SWAN BOOK:

Continue reading “Actuarial Science Suffice? By Mr. Andres Agostini — Amazon, Linkedin” »

Dec 28, 2014

Kaizen and Six Sigma Vs. White Swan “…Transformative and Integrative Risk Management …” [Pictorial] — Andres Agostini

Posted by in categories: big data, business, complex systems, cyborgs, defense, economics, education, engineering, ethics, existential risks, futurism, geopolitics, information science, innovation, lifeboat, physics, science, security, transparency

Kaizen and Six Sigma Vs. White Swan “…Transformative and Integrative Risk Management …”

000  a 24 hours

ABSOLUTE END.

Continue reading “Kaizen and Six Sigma Vs. White Swan ‘…Transformative and Integrative Risk Management …’ [Pictorial] — Andres Agostini” »

Dec 22, 2014

Homer Simpson on NASA and Bart Simpson on Book Of Five Rings and the Noda Secret! By Mr. Andres Agostini

Posted by in categories: automation, big data, business, complex systems, computing, defense, disruptive technology, economics, education, engineering, ethics, existential risks, finance, futurism, innovation, physics, robotics/AI, science, security, strategy, transparency

Homer Simpson on NASA and Bart Simpson on Book Of Five Rings and the Noda Secret!THE HANSDS OF THE SWAN IN COREL DRAW

Homer: Son, it has been said that Kaizen is “good change.”

Bart: Dad, good change, Do you mean the throttle?

Homer: Son, What do you mean by throttle?

Bart: Dad, the gas pedal gone lunatic!

Continue reading “Homer Simpson on NASA and Bart Simpson on Book Of Five Rings and the Noda Secret! By Mr. Andres Agostini” »

Nov 29, 2014

The Most Wanted Man in the World

Posted by in categories: government, hacking, privacy, security, surveillance

Wired.com

The message arrives on my “clean machine,” a MacBook Air loaded only with a sophisticated encryption package. “Change in plans,” my contact says. “Be in the lobby of the Hotel ______ by 1 pm. Bring a book and wait for ES to find you.”

ES is Edward Snowden, the most wanted man in the world. For almost nine months, I have been trying to set up an interview with him—traveling to Berlin, Rio de Janeiro twice, and New York multiple times to talk with the handful of his confidants who can arrange a meeting. Among other things, I want to answer a burning question: What drove Snowden to leak hundreds of thousands of top-secret documents, revelations that have laid bare the vast scope of the government’s domestic surveillance programs? In May I received an email from his lawyer, ACLU attorney Ben Wizner, confirming that Snowden would meet me in Moscow and let me hang out and chat with him for what turned out to be three solid days over several weeks. It is the most time that any journalist has been allowed to spend with him since he arrived in Russia in June 2013. But the finer details of the rendezvous remain shrouded in mystery. I landed in Moscow without knowing precisely where or when Snowden and I would actually meet. Now, at last, the details are set.

Read more

Nov 23, 2014

BitCoin, Cryptocurrency, and Blockchain Technology — The Ethereum Primer

Posted by in categories: automation, big data, biotech/medical, bitcoin, business, complex systems, computing, disruptive technology, economics, encryption, energy, engineering, ethics, finance, futurism, geopolitics, government, hacking, hardware, human trajectories, information science, innovation, internet, journalism, law, materials, military, neuroscience, open access, open source, philosophy, physics, policy, privacy, science, scientific freedom, security, software, supercomputing, transparency

Quoted: “Ethereum will also be a decentralised exchange system, but with one big distinction. While Bitcoin allows transactions, Ethereum aims to offer a system by which arbitrary messages can be passed to the blockchain. More to the point, these messages can contain code, written in a Turing-complete scripting language native to Ethereum. In simple terms, Ethereum claims to allow users to write entire programs and have the blockchain execute them on the creator’s behalf. Crucially, Turing-completeness means that in theory any program that could be made to run on a computer should run in Ethereum.” And, quoted: “As a more concrete use-case, Ethereum could be utilised to create smart contracts, pieces of code that once deployed become autonomous agents in their own right, executing pre-programmed instructions. An example could be escrow services, which automatically release funds to a seller once a buyer verifies that they have received the agreed products.”

Read Part One of this Series here » Ethereum — Bitcoin 2.0? And, What Is Ethereum.

Read Part Two of this Series here » Ethereum — Opportunities and Challenges.

Read Part Three of this Series here » Ethereum — A Summary.

Nov 20, 2014

Bitcoin, Cryptocurrency, and Blockchain Technology — Voting Systems

Posted by in categories: automation, big data, bitcoin, business, complex systems, computing, disruptive technology, economics, encryption, engineering, ethics, geopolitics, government, hacking, hardware, information science, innovation, law, materials, open access, open source, philosophy, policy, polls, privacy, science, security, software, supercomputing, transparency, treaties

Quoted: “Bitcoin technology offers a fundamentally different approach to vote collection with its decentralized and automated secure protocol. It solves the problems of both paper ballot and electronic voting machines, enabling a cost effective, efficient, open system that is easily audited by both individual voters and the entire community. Bitcoin technology can enable a system where every voter can verify that their vote was counted, see votes for different candidates/issues cast in real time, and be sure that there is no fraud or manipulation by election workers.”


Read the article here » http://www.entrepreneur.com/article/239809?hootPostID=ba473f…aacc8412c7

Nov 19, 2014

BitCoin, Cryptocurrency, and Blockchain Technology — FACTOM

Posted by in categories: automation, big data, biotech/medical, bitcoin, business, complex systems, computing, disruptive technology, economics, education, encryption, engineering, environmental, ethics, finance, futurism, geopolitics, hacking, information science, law, materials, open access, policy, science, security, software, supercomputing, transparency

Quoted: “The Factom team suggested that its proposal could be leveraged to execute some of the crypto 2.0 functionalities that are beginning to take shape on the market today. These include creating trustless audit chains, property title chains, record keeping for sensitive personal, medical and corporate materials, and public accountability mechanisms.

During the AMA, the Factom president was asked how the technology could be leveraged to shape the average person’s daily life.”

Kirby responded:

“Factom creates permanent records that can’t be changed later. In a Factom world, there’s no more robo-signing scandals. In a Factom world, there are no more missing voting records. In a Factom world, you know where every dollar of government money was spent. Basically, the whole world is made up of record keeping and, as a consumer, you’re at the mercy of the fragmented systems that run these records.”

Continue reading “BitCoin, Cryptocurrency, and Blockchain Technology — FACTOM” »

Nov 17, 2014

A New Economic Layer — BitCoin, Cryptorcurrency, and Blockchain Technology

Posted by in categories: big data, bitcoin, business, complex systems, computing, disruptive technology, economics, electronics, encryption, engineering, ethics, finance, futurism, geopolitics, hacking, human trajectories, information science, innovation, internet, law, materials, media & arts, military, open access, open source, policy, privacy, science, scientific freedom, security, software, supercomputing

Preamble: Bitcoin 1.0 is currency — the deployment of cryptocurrencies in applications related to cash such as currency transfer, remittance, and digital payment systems. Bitcoin 2.0 is contracts — the whole slate of economic, market, and financial applications using the blockchain that are more extensive than simple cash transactions like stocks, bonds, futures, loans, mortgages, titles, smart property, and smart contracts

Bitcoin 3.0 is blockchain applications beyond currency, finance, and markets, particularly in the areas of government, health, science, literacy, culture, and art.

Read the article here » http://ieet.org/index.php/IEET/more/swan20141110

Oct 22, 2014

Pentagon preparing for mass civil breakdown

Posted by in categories: defense, government, security

— The Guardian

Pentagon Building in Washington

A US Department of Defense (DoD) research programme is funding universities to model the dynamics, risks and tipping points for large-scale civil unrest across the world, under the supervision of various US military agencies. The multi-million dollar programme is designed to develop immediate and long-term “warfighter-relevant insights” for senior officials and decision makers in “the defense policy community,” and to inform policy implemented by “combatant commands.”

Launched in 2008 – the year of the global banking crisis – the DoD ‘Minerva Research Initiative’ partners with universities “to improve DoD’s basic understanding of the social, cultural, behavioral, and political forces that shape regions of the world of strategic importance to the US.”

Read more