Skip to main content

Home/ History Readings/ Group items tagged server

Rss Feed Group items tagged

Javier E

Luiz Barroso, Who Supercharged Google's Reach, Dies at 59 - The New York Times - 0 views

  • When Google arrived in the late 1990s, hundreds of thousands of people were instantly captivated by its knack for taking them wherever they wanted to go on the internet. Developed by the company’s founders Larry Page and Sergey Brin, the algorithm that drove the site seemed to work like magic.
  • as the internet search engine expanded its reach to billions of people over the next decade, it was driven by another major technological advance that was less discussed, though no less important: the redesign of Google’s giant computer data centers.
  • Led by a Brazilian named Luiz Barroso, a small team of engineers rebuilt the warehouse-size centers so that they behaved like a single machine — a technological shift that would change the way the entire internet was built, allowing any site to reach billions of people almost instantly and much more consistently.
  • ...8 more annotations...
  • Before the rise of Google, internet companies stuffed their data centers with increasingly powerful and expensive computer servers, as they struggled to reach more and more people. Each server delivered the website to a relatively small group of people. And if the server died, those people were out of luck.
  • Dr. Barroso realized that the best way to distribute a wildly popular website like Google was to break it into tiny pieces and spread them evenly across an array of servers. Rather than each server delivering the site to a small group of people, the entire data center delivered the site to its entire audience.
  • “In other words, we must treat the data center itself as one massive warehouse-scale computer.”
  • Widespread outages became a rarity, especially as Dr. Barroso and his team expanded these ideas across multiple data centers. Eventually, Google’s entire global network of data centers behaved as a single machine.
  • By the mid-1990s, he was working as a researcher in a San Francisco Bay Area lab operated by the Digital Equipment Corporation, one of the computer giants of the day.
  • There, he helped create multi-core computer chips — microprocessors made of many chips working in tandem. A more efficient way of running computer software, such chips are now a vital part of almost any new computer.
  • At first, Dr. Barroso worked on software. But as Dr. Hölzle realized that Google would also need to build its own hardware, he tapped Dr. Barroso to lead the effort. Over the next decade, as it pursued his warehouse-size computer, Google built its own servers, data storage equipment and networking hardware.
  • For years, this work was among Google’s most closely guarded secrets. The company saw it as a competitive advantage. But by the 2010s, companies like Amazon and Facebook were following the example set by Dr. Barroso and his team. Soon, the world’s leading computer makers were building and selling the same kind of low-cost hardware, allowing any internet company to build an online empire the way Google had.
rachelramirez

Hillary Clinton's email scandal, explained - Vox - 0 views

  • Hillary Clinton's email scandal, explained
  • She personally paid a State Department official and former campaign aide, Bryan Pagliano, to maintain her server outside of his government duties.
  • In March 2013, a hacker called Guccifer distributed a series of emails from former Clinton White House aide Sidney Blumenthal to Clinton about security in Libya. The email address Blumenthal used for her was HDR22@clintonemail.com. That was the first public disclosure of her personal email account, and it was a flag for journalists and lawmakers that Clinton was conducting official business on a secret account.
  • ...5 more annotations...
  • It had actually been in the possession of a firm called Platte River Networks, which was keeping it at a data center in New Jersey, since June.
  • The State Department official who oversees the production of documents under the Freedom of Information Act, Undersecretary Patrick Kennedy, battled the inspectors general of the State Department and the combined US intelligence agencies over who had access to review documents for the purposes of finding and censoring potentially classified information in the email set.
  • Clinton gave the State Department email messages her team determined to be work-related on December 5. Her aides attempted to wipe her personal email from her server. She gave thumb drives containing her work emails to her lawyer, David Kendall.
  • It should also be noted that officials in George W. Bush's White House, including political adviser Karl Rove, used a server controlled by the Republican National Committee for email, circumventing archiving rules.
  • The consensus among experts, including some who have been critical of Clinton, is that, based on what's known now, she is not likely to be prosecuted under the Espionage Act or the law prohibiting the removal and retention of classified information
James Flanagan

Chinese hackers outed themselves by logging into their personal Facebook accounts - 1 views

  • Mandiant, the U.S. firm contracted to investigate cyberattacks against U.S. corporations, says it was able to track an extensive hacking campaign back to the Chinese military in part by exploiting China’s own Web restrictions.
  • China’s “Great Firewall” blocks Web access to, among other things, Facebook and Twitter. People in China can get around the firewall, and very Web-savvy Chinese often do, by using something called VPNs, or Virtual Private Networks. But Chinese hackers already have access to what is presumably an extremely sophisticated VPN: the very servers they use for their foreign hacking.
  • according to Mandiant, some of the hackers got lazy. “The easiest way for them to log into Facebook and Twitter is directly from their attack infrastructure,” the company’s report explains. “Once noticed, this is an effective way to discover their real identities.” When the hacker uses the “attack” servers to log in to Twitter or Facebook, he or she unintentionally links the espionage servers with specific Facebook and Twitter accounts — in other words, with specific human beings.
Javier E

Silicon Valley's Youth Problem - NYTimes.com - 0 views

  • : Why do these smart, quantitatively trained engineers, who could help cure cancer or fix healthcare.gov, want to work for a sexting app?
  • But things are changing. Technology as service is being interpreted in more and more creative ways: Companies like Uber and Airbnb, while properly classified as interfaces and marketplaces, are really providing the most elevated service of all — that of doing it ourselves.
  • All varieties of ambition head to Silicon Valley now — it can no longer be designated the sole domain of nerds like Steve Wozniak or even successor nerds like Mark Zuckerberg. The face of web tech today could easily be a designer, like Brian Chesky at Airbnb, or a magazine editor, like Jeff Koyen at Assignmint. Such entrepreneurs come from backgrounds outside computer science and are likely to think of their companies in terms more grandiose than their technical components
  • ...18 more annotations...
  • Intel, founded by Gordon Moore and Robert Noyce, both physicists, began by building memory chips that were twice as fast as old ones. Sun Microsystems introduced a new kind of modular computer system, built by one of its founders, Andy Bechtolsheim. Their “big ideas” were expressed in physical products and grew out of their own technical expertise. In that light, Meraki, which came from Biswas’s work at M.I.T., can be seen as having its origins in the old guard. And it followed what was for decades the highway that connected academia to industry: Grad students researched technology, powerful advisers brokered deals, students dropped out to parlay their technologies into proprietary solutions, everyone reaped the profits. That implicit guarantee of academia’s place in entrepreneurship has since disappeared. Graduate students still drop out, but to start bike-sharing apps and become data scientists. That is, if they even make it to graduate school. The success of self-educated savants like Sean Parker, who founded Napster and became Facebook’s first president with no college education to speak of, set the template. Enstitute, a two-year apprenticeship, embeds high-school graduates in plum tech positions. Thiel Fellowships, financed by the PayPal co-founder and Facebook investor Peter Thiel, give $100,000 to people under 20 to forgo college and work on projects of their choosing.
  • Much of this precocity — or dilettantism, depending on your point of view — has been enabled by web technologies, by easy-to-use programming frameworks like Ruby on Rails and Node.js and by the explosion of application programming interfaces (A.P.I.s) that supply off-the-shelf solutions to entrepreneurs who used to have to write all their own code for features like a login system or an embedded map. Now anyone can do it, thanks to the Facebook login A.P.I. or the Google Maps A.P.I.
  • One of the more enterprising examples of these kinds of interfaces is the start-up Stripe, which sells A.P.I.s that enable businesses to process online payments. When Meraki first looked into taking credit cards online, according to Biswas, it was a monthslong project fraught with decisions about security and cryptography. “Now, with Stripe, it takes five minutes,” he said. “When you combine that with the ability to get a server in five minutes, with Rails and Twitter Bootstrap, you see that it has become infinitely easier for four people to get a start-up off the ground.”
  • The sense that it is no longer necessary to have particularly deep domain knowledge before founding your own start-up is real; that and the willingness of venture capitalists to finance Mark Zuckerberg look-alikes are changing the landscape of tech products. There are more platforms, more websites, more pat solutions to serious problems
  • There’s a glass-half-full way of looking at this, of course: Tech hasn’t been pedestrianized — it’s been democratized. The doors to start-up-dom have been thrown wide open. At Harvard, enrollment in the introductory computer-science course, CS50, has soared
  • many of the hottest web start-ups are not novel, at least not in the sense that Apple’s Macintosh or Intel’s 4004 microprocessor were. The arc of tech parallels the arc from manufacturing to services. The Macintosh and the microprocessor were manufactured products. Some of the most celebrated innovations in technology have been manufactured products — the router, the graphics card, the floppy disk
  • One of Stripe’s founders rowed five seat in the boat I coxed freshman year in college; the other is his older brother. Among the employee profiles posted on its website, I count three of my former teaching fellows, a hiking leader, two crushes. Silicon Valley is an order of magnitude bigger than it was 30 years ago, but still, the start-up world is intimate and clubby, with top talent marshaled at elite universities and behemoths like Facebook and Google.
  • Part of the answer, I think, lies in the excitement I’ve been hinting at. Another part is prestige. Smart kids want to work for a sexting app because other smart kids want to work for the same sexting app. “Highly concentrated pools of top talent are one of the rarest things you can find,” Biswas told me, “and I think people are really attracted to those environments.
  • The latter source of frustration is the phenomenon of “the 10X engineer,” an engineer who is 10 times more productive than average. It’s a term that in its cockiness captures much of what’s good, bad and impossible about the valley. At the start-ups I visit, Friday afternoons devolve into bouts of boozing and Nerf-gun wars. Signing bonuses at Facebook are rumored to reach the six digits. In a landscape where a product may morph several times over the course of a funding round, talent — and the ability to attract it — has become one of the few stable metrics.
  • there is a surprising amount of angst in Silicon Valley. Which is probably inevitable when you put thousands of ambitious, talented young people together and tell them they’re god’s gift to technology. It’s the angst of an early hire at a start-up that only he realizes is failing; the angst of a founder who raises $5 million for his company and then finds out an acquaintance from college raised $10 million; the angst of someone who makes $100,000 at 22 but is still afraid that he may not be able to afford a house like the one he grew up in.
  • San Francisco, which is steadily stealing the South Bay’s thunder. (“Sometime in the last two years, the epicenter of consumer technology in Silicon Valley has moved from University Ave. to SoMa,” Terrence Rohan, a venture capitalist at Index Ventures, told me
  • Both the geographic shift north and the increasingly short product cycles are things Jim attributes to the rise of Amazon Web Services (A.W.S.), a collection of servers owned and managed by Amazon that hosts data for nearly every start-up in the latest web ecosystem.Continue reading the main story
  • now, every start-up is A.W.S. only, so there are no servers to kick, no fabs to be near. You can work anywhere. The idea that all you need is your laptop and Wi-Fi, and you can be doing anything — that’s an A.W.S.-driven invention.”
  • This same freedom from a physical location or, for that matter, physical products has led to new work structures. There are no longer hectic six-week stretches that culminate in a release day followed by a lull. Every day is release day. You roll out new code continuously, and it’s this cycle that enables companies like Facebook, as its motto goes, to “move fast and break things.”
  • A few weeks ago, a programmer friend and I were talking about unhappiness, in particular the kind of unhappiness that arises when you are 21 and lavishly educated with the world at your feet. In the valley, it’s generally brought on by one of two causes: coming to the realization either that your start-up is completely trivial or that there are people your own age so knowledgeable and skilled that you may never catch up.
  • These days, a new college graduate arriving in the valley is merely stepping into his existing network. He will have friends from summer internships, friends from school, friends from the ever-increasing collection of incubators and fellowships.
  • As tech valuations rise to truly crazy levels, the ramifications, financial and otherwise, of a job at a pre-I.P.O. company like Dropbox or even post-I.P.O. companies like Twitter are frequently life-changing. Getting these job offers depends almost exclusively on the candidate’s performance in a series of technical interviews, where you are asked, in front of frowning hiring managers, to whip up correct and efficient code.
  • Moreover, a majority of questions seem to be pulled from undergraduate algorithms and data-structures textbooks, which older engineers may have not laid eyes on for years.
Javier E

Coronavirus Contact Tracing: Apple and Google Team Up to Enable Virus Tracking - The Ne... - 0 views

  • The technology giants said they would embed a feature in iPhones and Android devices to enable users to track infected people they’d come close to.
  • The technology giants said they were teaming up to release the tool within several months, building it into the operating systems of the billions of iPhones and Android devices around the world. That would enable the smartphones to constantly log other devices they come near, enabling what is known as “contact tracing” of the disease. People would opt in to use the tool and voluntarily report if they became infected.
  • underscores the seriousness of the health crisis and the power of the two companies whose software runs almost every smartphone in the world. Apple and Google said their joint effort came together in just the last two weeks.
  • ...11 more annotations...
  • With the tool, people infected with the coronavirus would notify a public health app that they have it, which would then alert phones that had recently come into proximity with that person’s device. The companies would need to get public-health authorities to agree to link their app to the tool.
  • There are already third-party tools for contact tracing, including from public health authorities and the Massachusetts Institute of Technology. In March, the government of Singapore introduced a similar coronavirus contact-tracing app, called TraceTogether, that detects mobile phones that are nearby.
  • One challenge for third-party apps is that they must run constantly — 24 hours a day, seven days a week — to be effective. Google said some Android smartphone manufacturers shut down those applications to save battery life.
  • Apple and Google said their tool would also constantly run in the background if people opt to use it, logging nearby devices through the short-range wireless technology Bluetooth. But it would eat up less battery life and be more reliable than third-party apps, they said.
  • “This data could empower members of the general population to make informed decisions about their own health in terms of self-quarantining,” said Dr. Reid. “But it doesn’t replace the public health imperative that we scale up contact tracing in the public health departments” around the world.
  • Other phones will constantly check those servers for the broadcast beacons of devices they had come near in the past 14 days. If there is a match, those people will receive an alert that they had likely come into contact with an infected person.
  • Apple and Google said they were discussing how much information to include in those alerts with health officials, aiming to strike a balance between being helpful while also protecting the privacy of those who have the coronavirus.
  • Once someone reports his or her infection to a public-health app, the tool will send the phone’s so-called broadcast beacons, or anonymous identifiers connected to the device, to central computer servers.
  • Apple and Google said they would make the tool’s underlying technology available to third-party apps by mid-May and publicly release the tool “in the coming months.” The companies said the tool would not collect devices’ locations — it only tracked proximity to other devices — and would keep people anonymous in the central servers.
  • The European Commission, the executive of the 27-nation bloc, said on Wednesday that “a fragmented and uncoordinated approach risks hampering the effectiveness” of such apps.
  • “The danger is, as you roll out these voluntary solutions and they gain adoption, it’s more likely that they are going to become compulsory,” said Mr. Soltani, a former chief technologist for the Federal Trade Commission.
davisem

The FBI will re-open the investigation into Hillary Clinton's email server - 0 views

  •  
    In a letter to the Senate Judiciary Committee on Friday, FBI Director James Comey wrote that the agency is investigating additional emails that were discovered as part of a separate investigation. "In connection with an unrelated case, the FBI has learned of the existence of emails that appear to be pertinent to the investigation ...
rachelramirez

Exclusive: Tim Kaine condemns "cryptic" FBI probe of new Clinton emails - VICE News - 0 views

  • Kaine slams FBI
  • Tim Kaine sharply criticized FBI Director James Comey Friday for the handling of information related to the renewed investigation into Hillary Clinton’s private email server. Kaine called the announcement “cryptic” and questioning the timing, just 11 days before Election
  • this is very, very troubling
  • ...1 more annotation...
  • In a letter to several leaders in Congress, Comey announced a renewed investigation into the home email server Clinton used while secretary of state after discovering pertinent emails “in connection with an unrelated case.”
mcginnisca

James Comey Reopens Investigation Into Clinton Emails: What Will the Legal Ramification... - 0 views

  • The FBI has announced that it is investigating newly discovered messages related to Hillary Clinton’s use of a private email server. According to The New York Times, these emails were found in the course of the agency’s investigation of the former New York Congressman Anthony Weiner and the longtime Clinton aide Huma Abedin.  
  • It’s possible Comey was partly motivated by fear. When he chose not to prosecute Clinton for her use of a private email server, he was brought before Congress to defend his decision; a hearing at the House Judiciary Committee in September lasted nearly four hours
  • “Comey and the FBI are in a terrible position here, one in which they would be accused of playing politics whatever they ended up doing.”
  • ...2 more annotations...
  • Democrats are already saying Comey has acted irresponsibly
  • At least one group, which is associated with the anti-Trump Keep America Great PAC, announced that it filed a complaint about Comey with the Department of Justice. “It is an obvious attack from a lifelong Republican who used to serve in the Bush White House, just to undermine her campaign,”
rachelramirez

Obama Criticizes F.B.I. Director: 'We Don't Operate on Incomplete Information' - The Ne... - 0 views

  • Obama Criticizes F.B.I. Director: ‘We Don’t Operate on Incomplete Information’
  • President Obama criticized the decision by his F.B.I. director to alert Congress on Friday about the discovery of new emails related to the Hillary Clinton server case, implying that it violated investigative norms and trafficked in innuendo.
  • “We don’t operate on leaks. We operate based on concrete decisions that are made.”
  • ...3 more annotations...
  • The president did not mention the F.B.I. director, James B. Comey, by name, but it was clear Mr. Obama was referring to him.
  • Mr. Obama’s comments were somewhat surprising since he weighed in on the investigation last year before the F.B.I. had determined that neither Mrs. Clinton nor her aides would face charges for mishandling classified information that was found on the secretary of state’s private email server.
  • Mr. Obama took a sharper tone than his press secretary, Josh Earnest, who said on Tuesday that the White House did not have an official position on Mr. Comey’s decision.
johnsonma23

Emails Add to Hillary Clinton's Central Problem: Voters Just Don't Trust Her - The New ... - 0 views

  • Emails Add to Hillary Clinton’s Central Problem: Voters Just Don’t Trust Her
  • She vowed to improve infrastructure in her first 100 days in office, promised to increase funding for Alzheimer’s research and proposed a $10 billion plan to combat drug and alcohol addiction.
  • Voters just don’t trust her.
  • ...9 more annotations...
  • they could to shed that image and convince voters that Mrs. Clinton can be trusted.
  • Mrs. Clinton had not sought or received approval to use a private email server while she was secretary of state.
  • It is not just that the inspector general found fault with her email practices. The report speaks directly to a wounding perception that Mrs. Clinton is not forthright or transparent.
  • Mrs. Clinton, through her lawyers, declined to be interviewed by the inspector general as part of the review.
  • Mrs. Clinton’s allies on Wednesday jumped on the fact that the report also revealed that Colin Powell, the secretary of state under President George W. Bush, and other State Department officials had also exclusively used personal email accounts
  • Crooked Hillary, crooked Hillary, she’s as crooked as they come,’’ Mr. Trump said at a rally in Anaheim, Calif.
  • But the Clinton campaign’s new effort to define Mr. Trump as a con man who rips off the little guy for his own gain will be met with the trickle of new developments related to Mrs. Clinton’s private email.
  • Mrs. Clinton spent much of last summer insisting she did not need to apologize for keeping a private server in her home in Chappaqua, N.Y. because the practice was “allowed.”
  • Mrs. Clinton has long contended that voters care more about issues — like equal pay for women, widely available child care, and making college more affordable — than how she handled her emails as secretary of state
Javier E

How to Muddy Your Tracks on the Internet - NYTimes.com - 0 views

  • There are no secrets online. That emotional e-mail you sent to your ex, the illness you searched for in a fit of hypochondria, those hours spent watching kitten videos (you can take that as a euphemism if the kitten fits) — can all be gathered to create a defining profile of you.
  • Your information can then be stored, analyzed, indexed and sold as a commodity to data brokers who in turn might sell it to advertisers, employers, health insurers or credit rating agencies.
  • you can take steps to do the technological equivalent of throwing on a pair of boxers and a T-shirt. Some of these measures are quite easy and many are free.
  • ...8 more annotations...
  • He advised logging off sites like Google and Facebook as soon as practicably possible and not using the same provider for multiple functions if you can help it. “If you search on Google, maybe you don’t want to use Gmail for your e-mail,”
  • Another shrouding tactic is to use the search engine DuckDuckGo, which distinguishes itself with a “We do not track or bubble you!” policy. Bubbling is the filtering of search results based on your search history. (Bubbling also means you are less likely to see opposing points of view or be exposed to something fresh and new.)
  • turn on your browser’s “private mode,” usually found under Preferences, Tools or Settings. When this mode is activated, tracking cookies are deleted once you close your browser, which “essentially wipes clean your history,”
  • private mode does nothing to conceal your I.P. address, a unique number that identifies your entry or access point to the Internet. So Web sites may not know your browsing history, but they will probably know who you are and where you are as well as when and how long you viewed their pages.
  • Shielding your I.P. address is possible by connecting to what is called a virtual private network, or V.P.N., such as those offered by WiTopia, PrivateVPN and StrongVPN. These services, whose prices price from $40 to $90 a year, route your data stream to what is called a proxy server, where it is stripped of your I.P. address before it is sent on to its destination. This obscures your identity not only from Web sites but also from your Internet service provider.
  • there is Tor, a free service with 36 million users that was originally developed to conceal military communications. Tor encrypts your data stream and bounces it through a series of proxy servers so no single entity knows the source of the data or whence it came. The only drawback is that with all that bouncing around, it is very S-L-O-W.
  • Free browser add-ons that increase privacy and yet will not interrupt your work flow include Ghostery and Do Not Track Plus, which prevent Web sites from relaying information about you and your visit to tracking companies.
  • “Companies like Google are creating these enormous databases using your personal information,” said Paul Hill, senior consultant with SystemExperts, a network security company in Sudbury, Mass. “They may have the best of intentions now, but who knows what they will look like 20 years from now, and by then it will be too late to take it all back.”
Javier E

Cyberattack Hits Iranian PCs - WSJ.com - 0 views

  • Flame is the biggest and most high-functioning cyberweapon ever discovered, various cybersecurity experts said. It is comprised of multiple files that are 20 times larger than Stuxnet and carry about 100 times more code than a basic virus, experts said.
  • The most alarming feature, experts said, is that Flame can be highly versatile, depending on instructions by its controller. The malware can steal data and social-network conversations, take snapshots of computer screens, penetrate across networks, turn on a computer's microphone to record audio and scan for Bluetooth-active devices.
  • Experts said they believe Flame reports back the information to a central command-and-control network that has constantly changed location. Analysts found servers in Germany, Vietnam, Turkey, Italy and elsewhere, but haven't located the main server.
  • ...1 more annotation...
  • U.S. officials draw a distinction between cyber espionage and cyberattacks, which have a destructive or manipulative purpose and could be considered an act of war.
katyshannon

Dell EMC agree to merge in biggest tech deal ever - Oct. 12, 2015 - 0 views

  • In the biggest tech deal of all time, Dell announced Monday that it has agreed to buy corporate software, storage and security giant EMC for $67 billion.
  • The deal completes Dell's transformation from a consumer PC business to an IT solutions provider for companies. That process began when Dell bought Perot Systems for $4 billion in 2009 and went full throttle in 2013 when company founder Michael Dell took the business private.
  • EMC is a behemoth of a corporate IT business. It is among the largest providers of storage hardware in the world. It also makes servers and owns security company RSA, which is known for its hard-to-crack SecurID tokens. And its most prized possession is its 81% stake in VMware -- the company that rules the world of virtualization software that allows businesses to run various operating systems on their devices.
  • ...3 more annotations...
  • both Dell and EMC have struggled lately as new technology trends have largely passed them by (namely: the cloud).
  • Now, cloud companies like Amazon can store all of a company's stuff for cheaper. It's no longer in vogue for businesses to operate their own data centers.
  • Dell, the world's second-largest server maker, is facing the same conundrum. As businesses offload their file storage to Amazon (AMZN, Tech30), Google (GOOGL, Tech30) and Microsoft (MSFT, Tech30), many are letting those companies handle their email and Web serving too.
Javier E

Inequality And The Right - The Daily Dish | By Andrew Sullivan - 0 views

  • The Atlantic Home todaysDate();Monday, March 7, 2011Monday, March 7, 2011 Go Follow the Atlantic » Politics Presented by The Rise and Fall of John Ensign Chris Good Sarah Palin Feud Watch Tina Dupuy In Wisconsin, the Mood Turns Against Compromise Natasha Vargas-Cooper Business Presented by Credit Card Balances Resume Their Decline Daniel Indiviglio 5 Ways the Value of College Is Growing Derek Thompson America's 401(k)'s Are a Mess, Are Its Pensions? Megan McArdle Culture Presented By 'Spy' Magazine's Digital Afterlife Bill Wyman http://as
  • To many on the right, this inequality is a non-issue, and in an abstract sense, I agree. Penalizing people for their success does not help the less successful. But at a time of real sacrifice, it does seem to me important for conservatives not to ignore the dangers of growing and vast inequality - for political, not economic, reasons. And by political, I don't mean partisan. I mean a genuine concern for the effects of an increasingly unequal society.
  • it increasingly seems wrong to me to exempt the very wealthy from sacrifice, in the context of their gains in the last three decades, if we are to ask it of everyone else. It's not about fairness. It isn't even really about redistribution, as we once understood that from the hard left. It's about political stability and cohesion and coherence. Without a large and strong middle class, we can easily become more divided, more bitter and more unstable. Concern about that is a legitimate conservative issue. And if someone on the right does not find a way to address it, someone on the left may well be empowered to over-reach.
Javier E

China Is Said to Use Powerful New Weapon to Censor Internet - NYTimes.com - 0 views

  • The Great Cannon, the researchers said in a report published on Friday, allows China to intercept foreign web traffic as it flows to Chinese websites, inject malicious code and repurpose the traffic as Beijing sees fit.
  • With a few tweaks, the Great Cannon could be used to spy on anyone who happens to fetch content hosted on a Chinese computer, even by visiting a non-Chinese website that contains Chinese advertising content.
  • “The operational deployment of the Great Cannon represents a significant escalation in state-level information control,” the researchers said in their report. It is, they said, “the normalization of widespread and public use of an attack tool to enforce censorship.”
  • ...10 more annotations...
  • The device has the ability not only to snoop on Internet traffic but also to alter the traffic and direct it — on a giant scale — to any website, in what is called a “man in the middle attack.”
  • The American system, according to the documents, which were published by The Intercept, can deploy a system of programs that can intercept web traffic on a mass scale and redirect it to a site of their choosing. The N.S.A. and its partners appear to use the programs for targeted surveillance, whereas China appears to use the Great Cannon for an aggressive form of censorship.
  • The similarities of the programs may put American officials on awkward footing, the researchers argue in their report. “This precedent will make it difficult for Western governments to credibly complain about others utilizing similar techniques,” they write.
  • the Chinese program illustrates how far officials in Beijing are willing to go to censor Internet content they deem hostile. “This is just one part of President Xi Jinping’s push to gain tighter control over the Internet and remove any challenges to the party,
  • Beijing continues to increase its censorship efforts under its State Internet Information Office, an office created under Mr. Xi to gain tighter control over the Internet within the country and to clamp down on online activism. In a series of recent statements, Lu Wei, China’s Internet czar, has called on the international community to respect China’s Internet policies.
  • “The position of the Chinese government is that efforts to serve what it views as hostile content inside China’s borders is a hostile and provocative act that is a threat to its regime stability and ultimately its national security.”
  • by sweeping up Baidu’s would-be visitors in its attacks, researchers and foreign policy experts say, Beijing could harm the company’s reputation and market share overseas.
  • “Because both the Great Cannon and Great Firewall are operating on the same physical link, we believe they are both being run under the same authority,
  • researchers’ fear is that the state could use its new weapon to attack Internet users, particularly dissidents, without their knowledge. If they make a single request to a server inside China or even visit a non-Chinese website that contains an ad from a Chinese server, the Great Cannon could infect their web communications and those of everyone they communicate with and spy on them.
  • Ultimately, researchers say, the only way for Internet users and companies to protect themselves will be to encrypt their Internet traffic so that it cannot be intercepted and diverted as it travels to its intended target.“Put bluntly,” the researchers said, “unprotected traffic is not just an opportunity for espionage but a potential attack vector.”
johnsonma23

11 Benghazi takeaways: One for each hour - CNNPolitics.com - 0 views

  • The panel's seven Republicans tried to prove Clinton ignored U.S. Ambassador to Libya Chris Stevens' requests for additional security before the September 11, 2012, attacks during which Stevens and three other Americans were killed.
  • Clinton -- seeking an October trifecta after delivering a strong performance in the first Democratic presidential debate
  • Rep. Jim Jordan, R-Ohio, pushed Clinton hard over her use of a private email server -- mocking her as "the most transparent person ever."
  • ...6 more annotations...
  • "We have diplomatic facilities in war zones," Clinton said. "We have ambassadors that we send to places that have been bombed and attacked all the time."
  • He demanded to know the search terms her attorneys used to sort through which emails were work-related and therefore should be turned over to the State Department and which were personal
  • One of the most compelling -- and informative -- moments of the day unfolded shortly after 7 p.m. during an exchange with Rep. Susan Brooks, R-Ind., who repeatedly asked whether Clinton had spoken with Stevens after he was sworn in
  • Despite Republicans' assurances that Clinton's use of a private email server wouldn't be a primary focus of the hearing, the seven GOP members kept coming back to her emails.
  • Rep. Mike Pompeo, R-Kansas, asked Clinton why she had never given Stevens her personal email address.
  • He then pushed Clinton on whether Stevens had her home address, fax number or cell phone number, too -- reminding her that her friend Blumenthal does.
johnsonel7

State Dept. Inquiry Into Clinton Emails Finds No Deliberate Mishandling of Classified I... - 0 views

  • A yearslong State Department investigation into former Secretary of State Hillary Clinton’s private email server found that while the use of the system for official business increased the risk of compromising classified information, there was no systemic or deliberate mishandling of classified information.
  • Ms. Clinton blamed the F.B.I.’s handling of the inquiry for crippling her campaign after James B. Comey, then the bureau’s director, reopened his investigation into the server days before the general election after initially declining to bring charges.
  • The use of a private email system “did not necessarily” increase the likelihood of classified information being transmitted on unclassified systems, investigators concluded, but it did add “an increased degree of risk of compromise.”
  • ...1 more annotation...
  • Mr. Trump’s own administration officials — including his daughter Ivanka Trump and son-in-law Jared Kushner — have admitted to using private messaging services to conduct official work. House Democrats’ impeachment inquiry has revealed that Trump administration diplomats used private phones to message each other about their efforts to pressure Ukrainian officials to investigate the president’s American political rivals, including the Bidens.
anniina03

Mulvaney Says, Then Denies, That Trump Held Back Ukraine Aid as Quid Pro Quo - The New ... - 0 views

  • White House withheld nearly $400 million in military aid to Ukraine to further President Trump’s political interests.
  • Ukraine, not Russia, was responsible for hacking Democratic Party emails in 2016 — a theory that would show that Mr. Trump was elected without Russian help.
  • The look back to what happened in 2016 certainly was part of the thing that he was worried about in corruption with that nation,”
  • ...12 more annotations...
  • Mr. Mulvaney issued a statement flatly denying what he had earlier said.
  • In wide-ranging remarks, Mr. Mulvaney told reporters at the White House that the $391 million in military aid was initially withheld from Ukraine because the president was displeased that European countries were not as generous with their assistance.
  • But the president did pressure Ukraine to re-examine discredited theories that Ukraine, not Russia, had worked to sway the 2016 campaign. Mr. Mulvaney’s mention of a “D.N.C. server” was a reference to an unfounded conspiracy theory promoted by Mr. Trump that Ukraine was somehow involved in Russia’s 2016 theft of emails from the Democratic National Committee and the Democratic Congressional Campaign Committee.
  • Russian military officers hacked Democratic servers to steal thousands of emails in 2016,
  • no one has uncovered evidence of Ukrainian involvement.
  • He blasted the current and former administration officials who have testified in the impeachment inquiry, describing them as personally opposed to the changes in foreign policy that Mr. Trump had put in place.
  • “What you’re seeing now, I believe, is a group of mostly career bureaucrats who are saying, ‘You know what, I don’t like President Trump’s politics, so I’m going to participate in this witch hunt that they are undertaking on the hill.’”
  • Asked whether he had admitted to a quid pro quo, Mr. Mulvaney said, “We do that all the time with foreign policy."
  • His answer ignored the distinction
  • between holding up foreign aid to further American interests and holding up foreign aid to further Mr. Trump’s personal interests.
  • They also have said they want to know whether Mr. Mulvaney helped prevent a White House meeting between Mr. Trump and Mr. Zelensky until the Ukrainian government agreed to investigate the president’s rivals, including the D.N.C. and the Bidens.
  • Mr. Mulvaney was part of a trio of Trump loyalists who conducted a rogue foreign policy operation in Ukraine.
Javier E

The Secretive Company That Might End Privacy as We Know It - The New York Times - 0 views

  • Tech companies capable of releasing such a tool have refrained from doing so; in 2011, Google’s chairman at the time said it was the one technology the company had held back because it could be used “in a very bad way.” Some large cities, including San Francisco, have barred police from using facial recognition technology.
  • without public scrutiny, more than 600 law enforcement agencies have started using Clearview in the past year
  • The computer code underlying its app, analyzed by The New York Times, includes programming language to pair it with augmented-reality glasses; users would potentially be able to identify every person they saw. The tool could identify activists at a protest or an attractive stranger on the subway, revealing not just their names but where they lived, what they did and whom they knew.
  • ...37 more annotations...
  • it’s not just law enforcement: Clearview has also licensed the app to at least a handful of companies for security purposes.
  • “The weaponization possibilities of this are endless,” said Eric Goldman, co-director of the High Tech Law Institute at Santa Clara University. “Imagine a rogue law enforcement officer who wants to stalk potential romantic partners, or a foreign government using this to dig up secrets about people to blackmail them or throw them in jail.”
  • While the company was dodging me, it was also monitoring me. At my request, a number of police officers had run my photo through the Clearview app. They soon received phone calls from company representatives asking if they were talking to the media — a sign that Clearview has the ability and, in this case, the appetite to monitor whom law enforcement is searching for.
  • The company eventually started answering my questions, saying that its earlier silence was typical of an early-stage start-up in stealth mode. Mr. Ton-That acknowledged designing a prototype for use with augmented-reality glasses but said the company had no plans to release it.
  • In addition to Mr. Ton-That, Clearview was founded by Richard Schwartz — who was an aide to Rudolph W. Giuliani when he was mayor of New York — and backed financially by Peter Thiel, a venture capitalist behind Facebook and Palantir.
  • “I’ve come to the conclusion that because information constantly increases, there’s never going to be privacy,” Mr. Scalzo said. “Laws have to determine what’s legal, but you can’t ban technology. Sure, that might lead to a dystopian future or something, but you can’t ban it.”
  • “In 2017, Peter gave a talented young founder $200,000, which two years later converted to equity in Clearview AI,” said Jeremiah Hall, Mr. Thiel’s spokesman. “That was Peter’s only contribution; he is not involved in the company.”
  • He began in 2016 by recruiting a couple of engineers. One helped design a program that can automatically collect images of people’s faces from across the internet, such as employment sites, news sites, educational sites, and social networks including Facebook, YouTube, Twitter, Instagram and even Venmo
  • Representatives of those companies said their policies prohibit such scraping, and Twitter said it explicitly banned use of its data for facial recognition
  • Another engineer was hired to perfect a facial recognition algorithm that was derived from academic papers. The result: a system that uses what Mr. Ton-That described as a “state-of-the-art neural net” to convert all the images into mathematical formulas, or vectors, based on facial geometry — like how far apart a person’s eyes are
  • Clearview created a vast directory that clustered all the photos with similar vectors into “neighborhoods.”
  • When a user uploads a photo of a face into Clearview’s system, it converts the face into a vector and then shows all the scraped photos stored in that vector’s neighborhood — along with the links to the sites from which those images came.
  • Mr. Schwartz paid for server costs and basic expenses, but the operation was bare bones; everyone worked from home. “I was living on credit card debt,” Mr. Ton-That said. “Plus, I was a Bitcoin believer, so I had some of those.”
  • The company soon changed its name to Clearview AI and began marketing to law enforcement. That was when the company got its first round of funding from outside investors: Mr. Thiel and Kirenaga Partners
  • Mr. Schwartz and Mr. Ton-That met in 2016 at a book event at the Manhattan Institute, a conservative think tank. Mr. Schwartz, now 61, had amassed an impressive Rolodex working for Mr. Giuliani in the 1990s and serving as the editorial page editor of The New York Daily News in the early 2000s. The two soon decided to go into the facial recognition business together: Mr. Ton-That would build the app, and Mr. Schwartz would use his contacts to drum up commercial interest.
  • They immediately got a match: The man appeared in a video that someone had posted on social media, and his name was included in a caption on the video. “He did not have a driver’s license and hadn’t been arrested as an adult, so he wasn’t in government databases,”
  • The man was arrested and charged; Mr. Cohen said he probably wouldn’t have been identified without the ability to search social media for his face. The Indiana State Police became Clearview’s first paying customer, according to the company
  • Clearview deployed current and former Republican officials to approach police forces, offering free trials and annual licenses for as little as $2,000. Mr. Schwartz tapped his political connections to help make government officials aware of the tool
  • The company’s most effective sales technique was offering 30-day free trials to officers, who then encouraged their acquisition departments to sign up and praised the tool to officers from other police departments at conferences and online, according to the company and documents provided by police departments in response to public-record requests. Mr. Ton-That finally had his viral hit.
  • Photos “could be covertly taken with telephoto lens and input into the software, without ‘burning’ the surveillance operation,” the detective wrote in the email, provided to The Times by two researchers,
  • Sergeant Ferrara found Clearview’s app superior, he said. Its nationwide database of images is much larger, and unlike FACES, Clearview’s algorithm doesn’t require photos of people looking straight at the camera.
  • “With Clearview, you can use photos that aren’t perfect,” Sergeant Ferrara said. “A person can be wearing a hat or glasses, or it can be a profile shot or partial view of their face.”
  • Mr. Ton-That said the tool does not always work. Most of the photos in Clearview’s database are taken at eye level. Much of the material that the police upload is from surveillance cameras mounted on ceilings or high on walls.
  • Despite that, the company said, its tool finds matches up to 75 percent of the time. But it is unclear how often the tool delivers false matches, because it has not been tested by an independent party
  • One reason that Clearview is catching on is that its service is unique. That’s because Facebook and other social media sites prohibit people from scraping users’ images — Clearview is violating the sites’ terms of service.
  • Some law enforcement officials said they didn’t realize the photos they uploaded were being sent to and stored on Clearview’s servers. Clearview tries to pre-empt concerns with an F.A.Q. document given to would-be clients that says its customer-support employees won’t look at the photos that the police upload.
  • Mr. Clement, now a partner at Kirkland & Ellis, wrote that the authorities don’t have to tell defendants that they were identified via Clearview, as long as it isn’t the sole basis for getting a warrant to arrest them.
  • Because the police upload photos of people they’re trying to identify, Clearview possesses a growing database of individuals who have attracted attention from law enforcement. The company also has the ability to manipulate the results that the police see.
  • After the company realized I was asking officers to run my photo through the app, my face was flagged by Clearview’s systems and for a while showed no matches. When asked about this, Mr. Ton-That laughed and called it a “software bug.”
  • “It’s creepy what they’re doing, but there will be many more of these companies. There is no monopoly on math,” said Al Gidari, a privacy professor at Stanford Law School. “Absent a very strong federal privacy law, we’re all screwed.”
  • But if your profile has already been scraped, it is too late. The company keeps all the images it has scraped even if they are later deleted or taken down, though Mr. Ton-That said the company was working on a tool that would let people request that images be removed if they had been taken down from the website of origin
  • Woodrow Hartzog, a professor of law and computer science at Northeastern University in Boston, sees Clearview as the latest proof that facial recognition should be banned in the United States.
  • We’ve relied on industry efforts to self-police and not embrace such a risky technology, but now those dams are breaking because there is so much money on the table,”
  • “I don’t see a future where we harness the benefits of face recognition technology without the crippling abuse of the surveillance that comes with it. The only way to stop it is to ban it.”
  • Mr. Ton-That said he was reluctant. “There’s always going to be a community of bad people who will misuse it,” he said.
  • Even if Clearview doesn’t make its app publicly available, a copycat company might, now that the taboo is broken. Searching someone by face could become as easy as Googling a name
  • Someone walking down the street would be immediately identifiable — and his or her home address would be only a few clicks away. It would herald the end of public anonymity.
rerobinson03

Opinion | Move On, but Never Forget - The New York Times - 0 views

  • Studies have shown that two things are true: Black people on average tip less, and servers on average provide Black people inferior service, in part because of the perception that they will tip less anyway. There has always seemed, to me, to be a bit of a chicken-and-egg problem here.
  • None of this is fair of course. It shifts the burden of the servers’ biases onto the innocent recipient of the service. The victim of prejudgments assuming the responsibility of mollifying the persons prejudging.
  • There is always so much talk of unity and coming together, of healing wounds and repairing divisions. We then have to have some version of the tip debate: Do we prove to them that we can rise above their attempt to harm us, or do we behave in a way that is commensurate with the harm they tried to inflict?
  • ...7 more annotations...
  • And yet, that is the very same position that Black people — and other people of color, religious minorities and women — are often forced into, or are asked to assume.
  • We have to acknowledge that he bragged about sexually assaulting women, had scores of women accuse him of sexual misconduct and was revealed to have paid off at least two women for their silence about alleged affairs.
  • We have to acknowledge that Trump is a racist — something proven over and over again by his own words and actions — and that he still received a record number of votes for a sitting president anyway.
  • We have to acknowledge that he has disparaged Mexicans, Muslims, Haitians and African nations.
  • These things happened. These people who supported him mostly knew these things happened. In many cases they heard Trump say them live on television or tweet them from his Twitter account.
  • And yet, his supporters still supported him. Many of them still do, even after his refutation of democracy. Many believe Trump’s lie that he actually won the election that he lost
  • oe Biden, as he has always said, is seeking to be a unifying president, to be the president of the people who didn’t vote for him as well as the ones who did.
1 - 20 of 90 Next › Last »
Showing 20 items per page