Menu

Blog

Archive for the ‘security’ category: Page 128

Nov 19, 2014

BitCoin, Cryptocurrency, and Blockchain Technology — FACTOM

Posted by in categories: automation, big data, biotech/medical, bitcoin, business, complex systems, computing, disruptive technology, economics, education, encryption, engineering, environmental, ethics, finance, futurism, geopolitics, hacking, information science, law, materials, open access, policy, science, security, software, supercomputing, transparency

Quoted: “The Factom team suggested that its proposal could be leveraged to execute some of the crypto 2.0 functionalities that are beginning to take shape on the market today. These include creating trustless audit chains, property title chains, record keeping for sensitive personal, medical and corporate materials, and public accountability mechanisms.

During the AMA, the Factom president was asked how the technology could be leveraged to shape the average person’s daily life.”

Kirby responded:

“Factom creates permanent records that can’t be changed later. In a Factom world, there’s no more robo-signing scandals. In a Factom world, there are no more missing voting records. In a Factom world, you know where every dollar of government money was spent. Basically, the whole world is made up of record keeping and, as a consumer, you’re at the mercy of the fragmented systems that run these records.”

Continue reading “BitCoin, Cryptocurrency, and Blockchain Technology — FACTOM” »

Nov 17, 2014

A New Economic Layer — BitCoin, Cryptorcurrency, and Blockchain Technology

Posted by in categories: big data, bitcoin, business, complex systems, computing, disruptive technology, economics, electronics, encryption, engineering, ethics, finance, futurism, geopolitics, hacking, human trajectories, information science, innovation, internet, law, materials, media & arts, military, open access, open source, policy, privacy, science, scientific freedom, security, software, supercomputing

Preamble: Bitcoin 1.0 is currency — the deployment of cryptocurrencies in applications related to cash such as currency transfer, remittance, and digital payment systems. Bitcoin 2.0 is contracts — the whole slate of economic, market, and financial applications using the blockchain that are more extensive than simple cash transactions like stocks, bonds, futures, loans, mortgages, titles, smart property, and smart contracts

Bitcoin 3.0 is blockchain applications beyond currency, finance, and markets, particularly in the areas of government, health, science, literacy, culture, and art.

Read the article here » http://ieet.org/index.php/IEET/more/swan20141110

Oct 22, 2014

Pentagon preparing for mass civil breakdown

Posted by in categories: defense, government, security

— The Guardian

Pentagon Building in Washington

A US Department of Defense (DoD) research programme is funding universities to model the dynamics, risks and tipping points for large-scale civil unrest across the world, under the supervision of various US military agencies. The multi-million dollar programme is designed to develop immediate and long-term “warfighter-relevant insights” for senior officials and decision makers in “the defense policy community,” and to inform policy implemented by “combatant commands.”

Launched in 2008 – the year of the global banking crisis – the DoD ‘Minerva Research Initiative’ partners with universities “to improve DoD’s basic understanding of the social, cultural, behavioral, and political forces that shape regions of the world of strategic importance to the US.”

Read more

Oct 21, 2014

US Now Faces Threat of US-Made Weapons in Iraq

Posted by in categories: military, security
Douglas Birch, Center for Public Integrity / News Investigation — Nation of Change

Never mind that the vehicle is a boxy, lumbering, second-hand set of wheels with a top speed of just 60 mph. To some of the fighters of the Islamic State in Iraq and Syria, the U.S. M1117, aka the Guardian Armored Security Vehicle, has become their favorite ride.

Or so says Jeremy Binnie, editor of Jane’s Terrorism and Security Monitor, who has monitored propaganda sites for reports of jihadis toting, towing or tooling around in some of the millions of dollars’ worth of U.S.- and other foreign-built military equipment that ISIS captured after it swept into northern Iraq in early June.

Read more

Sep 11, 2014

Justice Beyond Privacy

Posted by in categories: computing, disruptive technology, ethics, government, hacking, internet, law, policy, privacy, security

As the old social bonds unravel, philosopher and member of the Lifeboat Foundation’s advisory board Professor Steve Fuller asks: can we balance free expression against security?

justice

Justice has been always about modes of interconnectivity. Retributive justice – ‘eye for an eye’ stuff – recalls an age when kinship was how we related to each other. In the modern era, courtesy of the nation-state, bonds have been forged in terms of common laws, common language, common education, common roads, etc. The internet, understood as a global information and communication infrastructure, is both enhancing and replacing these bonds, resulting in new senses of what counts as ‘mine’, ‘yours’, ‘theirs’ and ‘ours’ – the building blocks of a just society…

Read the full article at IAI.TV

Aug 29, 2014

The Globalized Smartification and Changing for the Better Via Simultaneous: Activated and Deactivated Kaisen!

Posted by in categories: business, complex systems, computing, economics, education, engineering, futurism, physics, science, scientific freedom, security

The Globalized Smartification and Changing for the Better Via Simultaneous: Activated and Deactivated Kaisen!

We Activate Kaisen and We Deactivate Kaisen

Chiefly, this brief post is about the pictorial I composed here.

Pay great attention to this proprietary image. I greatly value Japanese execs and sages but they focus only on throughputting( the Known Inputs Into Desirable Outputs inside their premises, without considering the Non-Existential and Existential Risk of the External Environment (outside their industrial facade) at large as we do in the White Swan’s Tranformative and Integrative Risk Management Services.

Continue reading “The Globalized Smartification and Changing for the Better Via Simultaneous: Activated and Deactivated Kaisen!” »

Aug 21, 2014

Getting Sexy and the Undivided Attention of Your Fortune-500 Client CEOs! Aug 22 2014

Posted by in categories: architecture, big data, business, complex systems, disruptive technology, economics, education, engineering, ethics, existential risks, finance, futurism, government, information science, innovation, physics, science, scientific freedom, security

Getting Sexy and the Undivided Attention of Your Fortune-500 Client CEOs! (Excerpt from the White Swan book) By Andres Agostini at www.linkedin.com/in/andresagostini

0 ab

(1.- of 17 ).- If you want to seize the undivided attention of top executives at Los Alamos National Laboratory and Procter & Gamble, talk to them through the notions of and by Process Re-engineering.

(2.- of 17 ).- If you want to seize the undivided attention of top executives at GE, talk to them through the notions of and by Six Sigma, and Peter F. Drucker’s Management by Objective (MBO). While you are with them, remember to commend on the Jack Welch’ and Jeff Immelt’s master lectures at GE’s Crotonville.

Continue reading “Getting Sexy and the Undivided Attention of Your Fortune-500 Client CEOs! Aug 22 2014” »

Aug 8, 2014

The Brilliant Machine That Could Finally Fix Airport Security

Posted by in category: security

By — Wired
Fans at a World Cup game at Arena de Baixada stadium in Curitiba, Brazil use the Qylatron to go through security.
Australian fans pumped to see their team take on Spain during the first round of the World Cup were intrigued by the honeycomb-like machine that had replaced the standard manual search process at Arena de Baixada stadium in Curitiba, Brazil. They were less thrilled when the machine spotted the toy kangaroos they were trying to sneak into the match.

That machine is the Qylatron Entry Experience Solution, and it could soon replace a crappy experience of going through security checks at airports and other venues with one that’s faster and less invasive. Instead of having a human poke around in your bag, the machine scans it for a variety of threats in just a few seconds. Searching those Aussies and other soccer fans may prove to be a watershed moment for the system, a successful test of how well it can spot trouble and move people through security, efficiently and with their dignity intact.

Read more

Jul 2, 2014

AN ACTUAL EXCHANGE BETWEEN THE ROYAL DUTCH SHELL WORLDWIDE CEO AND THE ROYAL DUTCH SHELL WORLDWIDE CHIEF STRATEGIST!

Posted by in categories: big data, business, complex systems, disruptive technology, economics, education, energy, engineering, existential risks, finance, futurism, information science, innovation, physics, robotics/AI, science, scientific freedom, security

AN ACTUAL EXCHANGE BETWEEN THE ROYAL DUTCH SHELL WORLDWIDE CEO AND THE ROYAL DUTCH SHELL WORLDWIDE CHIEF STRATEGIST!

037

AN ACTUAL EXCHANGE BETWEEN THE ROYAL DUTCH SHELL WORLDWIDE CEO AND THE ROYAL DUTCH SHELL WORLDWIDE CHIEF STRATEGIST!

QUESTION: HOW CAN WE ILLUSTRATE MR. ANDRES AGOSTINI’S CONCURRENT COORDINATED CONVERGENT SYSTEMS THINKING (CCCST): ARTICULATED UNDER INTELLIGENCE AUGMENTATION AND AMPLIFICATION (IAA) VIA ASIN: B00KNL02ZE ANSWER: BY PAYING ATTENTION TO AN INDOORS INTERVIEW BY THE ROYAL DUTCH SHELL HERE:

Continue reading “AN ACTUAL EXCHANGE BETWEEN THE ROYAL DUTCH SHELL WORLDWIDE CEO AND THE ROYAL DUTCH SHELL WORLDWIDE CHIEF STRATEGIST!” »

Jul 1, 2014

E.Q.-Focused Nations (suboptimal) Versus I.Q.-Centric Countries (optimal)

Posted by in categories: business, defense, economics, education, ethics, existential risks, science, scientific freedom, security

E.Q.-Focused Nations (suboptimal) Versus I.Q.-Centric Countries (optimal)

047

1.- E.Q.-Focused Nations argue that the millenarian applied terms such as: Prudence, Tact, Sincerity, Kindness and Unambiguous Language DO NOT SUFFICE and hence they need to invent a marketeer’s stunt: Emotional Intelligence. I.Q.-Centric Countries argue that the millenarian applied terms are beyond utility and desirability and that stunts are to social-engineer and brain-wash the weak: Ergo, all of these are optimal: Prudence, Tact, Sincerity, Kindness and Unambiguous Language, as well as plain-vanilla Psychology 101.

2.- E.Q.-Focused Nations are mired with universal corruption, both in private and public office. I.Q.-Centric Countries are mired with transparency, accountability and reliability, as well as collective integrity and ethics.

Continue reading “E.Q.-Focused Nations (suboptimal) Versus I.Q.-Centric Countries (optimal)” »