Neon Balcony by randomwire (via http://flic.kr/p/eMJxW7 )
Relating a Google search return to an equivalent expenditure of fossil fuels, or the fluctuation of pixels across a screen with the exploited labour of rural migrant workers in Shenzen, or topsoil loss in Inner Mongolia, is as remote and unattainable for the majority of users as is an understanding of the technical functionality of the devices themselves
The shift to the distorporation comes at the expense of the “C” corporation, the formal name for the familiar limited-liability joint-stock structure that emerged a century ago (see chart 1). The newer structures still protect investors from liability. But the requirement for partnerships to pass through their money blocks the accumulation of earnings. In C corporations retained earnings can be used to fund investment and growth, assuring persistence. Without them, pass-through businesses have to be far more intertwined with investors. Staying alive means routinely inhaling capital, as well as exhaling.
20131102 (via http://flic.kr/p/hfWPyJ )
20131101 (via http://flic.kr/p/hfXTGD )
20131031 (via http://flic.kr/p/hfWGPw )
exhibit by Benoît Debuisser (via http://flic.kr/p/h86W83 )
Thursday October 31, 12:17:20 by JulianBleecker (via http://flic.kr/p/h9tzPr )
365/10 - Foresta elettrica - 1/11/13 by Lorenzo Carnevali (via http://flic.kr/p/haXNqQ )
The Origins of Freemasonry: Scotland’s century, 1590–1710 by David Stevenson, a 2001 reprint of the 1990 first paperback edition from Cambridge University Press, is part of the collection at the Reading Room.
“Freemasonry has always been a highly controversial movement. Yet inspite of…
Valid Foreign Intelligence Targets Are the Focus
October 31, 2013
Recent press articles on NSA’s collection operations conducted under Executive Order 12333 have misstated facts, mischaracterized NSA’s activities, and drawn erroneous inferences about those operations. NSA conducts all of its activities in accordance with applicable laws, regulations, and policies – and assertions to the contrary do a grave disservice to the nation, its allies and partners, and the men and women who make up the National Security Agency.
All NSA intelligence activities start with a validated foreign intelligence requirement, initiated by one or more Executive Branch intelligence consumers, and are run through a process managed by the Office of the Director of National Intelligence. When those requirements are received by NSA, analysts look at the Information Need and determine the best way to satisfy it. That process involves identifying the foreign entities that have the information, researching how they communicate, and determining how best to access those communications in order to get the foreign intelligence information. The analysts identify selectors – e-mail addresses and phone numbers are examples – that help isolate the communications of the foreign entity and task those to collection systems. In those cases where there are not specific selectors available, the analysts will use metadata, similar to the address on the outside of an envelope, to attempt to develop selectors for their targets. Once they have them, they task the selectors to the collection systems in order to get access to the content, similar to the letter inside the envelope.
The collection systems target communications links that contain the selectors, or are to and from areas likely to contain the selectors, of foreign intelligence interest. Seventy years ago, the communications links were shortwave radio transmissions between two points on the globe. Today’s communications flow over technologies like satellite links, microwave towers, and fiber optic cables. Terrorists, weapons proliferators, and other valid foreign intelligence targets make use of commercial infrastructure and services. When a validated foreign intelligence target uses one of those means to send or receive their communications, we work to find, collect, and report on the communication. Our focus is on targeting the communications of those targets, not on collecting and exploiting a class of communications or services that would sweep up communications that are not of bona fide foreign intelligence interest to us.
What NSA does is collect the communications of targets of foreign intelligence value, irrespective of the provider that carries them. U.S. service provider communications make use of the same information super highways as a variety of other commercial service providers. NSA must understand and take that into account in order to eliminate information that is not related to foreign intelligence.
NSA works with a number of partners and allies in meeting its foreign-intelligence mission goals, and in every case those operations comply with U.S. law and with the applicable laws under which those partners and allies operate. A key part of the protections that are provided to both U.S. persons and citizens of other countries is the requirement that information be in support of a valid foreign intelligence requirement, and the Attorney General-approved minimization procedures. These limitations protect the privacy of all people and, in particular, to any incidentally acquired communications of U.S. persons. The protections are applied when selectors are tasked to the collection system; when the collection itself occurs; when the collected data are being processed, evaluated, analyzed, and put into a database; and when any reporting of the foreign intelligence is being done. In addition, NSA is very motivated and actively works to remove as much extraneous data as early in the process as possible – to include data of innocent foreign citizens.
NSA Public Affairs Office
20131030 (via http://flic.kr/p/h96Gix )
20131029 (via http://flic.kr/p/h95pMw )
20131028 (via http://flic.kr/p/h96ePk )
EU citizens can support efforts to establish environmental destruction as a crime. When at least 1 million EU citizens from 7 different countries support it, the law will be discussed at EU level. It was on the UN table back in 96, but intense lobbying by the US, UK, France and Holland stopped it at the last moment. Here’s another chance at the EU…
The Industrial Age by biker500 (via http://flic.kr/p/fN7W96 )
To Abstraction by biker500 (via http://flic.kr/p/fXvn2T )
The old slaughterhouse by DMontalbano (via http://flic.kr/p/fQvcmT )
… by semantics aside (travelling) (via http://flic.kr/p/ceqta9 )
Inside Me by ferkystop (via http://flic.kr/p/ezHPvA )
a self portrait by im nothing in particular (via http://flic.kr/p/g8r8Qv )
Drone Shadow: Brazil by STML (via http://flic.kr/p/h5zw6i )
Life is in decay in Reynold Reynolds‘ beautifully shot short film Six Apartments. Six strangers, unaware of each other’s existence, live their lives in isolation, passing their time on Earth listening to the radio, watching TV, scrubbing their feet, feeding their pet snake, etc. All the while they do not notice that their world is slowly decomposing all around them. Depending on your stomach for that kind of thing, some of the decay can be quite grotesque. But, the stunning camera moves and shot compositions are completely wonderful to behold.
profundidades by letoiile (via http://flic.kr/p/drJvHj )
Prophecy by feldauge (via http://flic.kr/p/dy9oQp )
Last Hope by Reuben Wu (via http://flic.kr/p/dDf3gw )
Pier della Vigna by Roderick Usher (via http://flic.kr/p/e7bnY4 )
One Year by feldauge (via http://flic.kr/p/b6cjBZ )
Stars and Stripes by feldauge (via http://flic.kr/p/afBqxb )
This is probably the most painful bug report I’ve ever read, describing in glorious technicolor the steps leading to Knight Capital’s $465m trading loss due to a software bug that struck late last year, effectively bankrupting the company. The tale has all the hallmarks of technical debt in a huge, unmaintained, bitrotten codebase
20131027 (via http://flic.kr/p/h49Eyq )
20131026 (via http://flic.kr/p/h49nC2 )
20131025 (via http://flic.kr/p/h49j9Z )
by Kaometet (via http://flic.kr/p/fJwogv )
by Kaometet (via http://flic.kr/p/exBSPT )
by Kaometet (via http://flic.kr/p/fbwxJQ )
by Kaometet (via http://flic.kr/p/fdfJRj )
by Kaometet (via http://flic.kr/p/gRfPqT )
Slow joe by loloboubou1 (via http://flic.kr/p/gnnadr )
20131024 (via http://flic.kr/p/gXuKsQ )
Liquid by Hengki Koentjoro (via http://flic.kr/p/gWcSMS )
20131023 (via http://flic.kr/p/gWq71k )
This list pertains to current, widely held, erroneous ideas and beliefs about notable topics which have been reported by reliable sources. Each has been discussed in published literature, as has its topic area and the facts concerning it. Note that the statements which follow are corrections based on known facts; the misconceptions themselves are referred to rather than stated.
Wednesday October 23, 13:48:39 by JulianBleecker (via http://flic.kr/p/gVeP7X )
471-2 (via http://flic.kr/p/gVZhCk )
20131022 (via http://flic.kr/p/gVXqSx )
20131021 (via http://flic.kr/p/gVXjWA )
20131020 (via http://flic.kr/p/gVYajK )
20131019 (via http://flic.kr/p/gVXiEB )
20131018 (via http://flic.kr/p/gVXdGm )
I admit it: in my last book, The Five Stages of Collapse, I viewed collapse through rose-colored glasses. But I feel that I should be forgiven for this; it is human nature to try to be optimistic no matter what. Also, as an engineer, I am always looking for solutions to problems. And so I almost subconsciously crafted a scenario where industrial civilization fades away quickly enough to save what’s left of the natural realm, allowing some remnant of humanity to make a fresh start.
Just as Borges’s system groups animals by seemingly aleatory characteristics entirely divorced from their actual biological attributes, DSM-5 arranges its various strains of madness solely in terms of the behaviors exhibited. This is a recurring theme in the novel, while any consideration of the mind itself is entirely absent. In its place we’re given diagnoses such as “frotteurism,” “oppositional defiant disorder,” and “caffeine intoxication disorder.” That said, these classifications aren’t arranged at random; rather, they follow a stately progression comparable to that of Dante’s Divine Comedy, rising from the infernal pit of the body and its weaknesses (intellectual disabilities, motor tics) through our purgatorial interactions with the outside world (tobacco use, erectile dysfunction, kleptomania) and finally arriving in the limpid-blue heavens of our libidinal selves (delirium, personality disorders, sexual fetishism). It’s unusual, and at times frustrating in its postmodern knowingness, but what is being told is first and foremost a story.
Harbin’s landmark San Sophia church was barely visible Monday as heavy pollution forced the closure of schools and highways. (via http://sinosphere.blogs.nytimes.com/2013/10/21/air-pollution-hits-harbin-in-northeast-china-closing-schools-and-roads/?partner=rssnyt)
PRC_Global_Climate (via http://www.pewresearch.org/key-data-points/climate-change-key-data-points-from-pew-research/)
“The boys are quick to jump in front of my lens and demand, “Snap me! Snap me!” but often the young girls would hang back.”
Kansuke Yamamoto, The Man Who Went Too Far, 1956
VELVET ZOERISM by zoercsx (via http://flic.kr/p/gR4MZD )
First months of the #2014letterpresscalendar are printed ! Photos by @elcalotipo under spanish sunlight !!! preorder yours at www.mr-cup.com by fabienbarral (via http://flic.kr/p/gS41RBwww.mr-cup.com by fabienbarral (via http://flic.kr/p/gS41RB )
If there was ever a need for political representation or a paternalistic and opaque authority it has been removed by technology. Every political system we have tried has proven incapable of protecting human rights and dignity. Every political system we have tried has devolved into oligarchy. To effect the change we require immediately, to give individuals control and responsibility, to bring regional systems under regional governance, allow global collaboration and protect the heritage of future generations, we need a new political model.
Shadow Puppet - Mariska de Groot and Dieter Vandoren by mr prudence (via http://flic.kr/p/gPu1Fh )
Wide Gullies in Terra Cimmeria
Kodak Ektachrome Infrared EIR in AR-5 by infracolor™ (via http://flic.kr/p/gHAxqC )
Decorate, decorate… by Benoît Debuisser (via http://flic.kr/p/gK5Ebs )
20131017 (via http://flic.kr/p/gL7uLz )
20131016 (via http://flic.kr/p/gL6uvi )
Transdisciplinarity “concerns that which is at once between the disciplines, across the different disciplines, and beyond all discipline,” and its aim is the unity of knowledge together with the unity of our being: “Its goal is the understanding of the present world, of which one of the imperatives is the unity of knowledge.” (44) Nicolescu points out the danger of self-destruction caused by modernism and increased technologization and offers alternative ways of approaching them, using a transdisciplinary approach that propels us beyond the either/or thinking that gave rise to the antagonisms that produced the problems in the first place. The logic of the included middle permits “this duality [to be] transgressed by the open unity that encompasses both the universe and the human being.” (56). Thus, approaching problems in a transdisciplinary way enables one to move beyond dichotomized thinking, into the space that lies beyond.
mg21929360.100-1_1200.jpg (via http://www.newscientist.com/article/mg21929360.100-deadly-lake-turns-animals-into-statues.html)
A warning for future space colonizers: Babies born in space might not ever figure out how to deal with gravity. Jellyfish babies, at least, have to deal with massive vertigo on Earth after spending their first few days in space. NASA first started sending jellyfish to space aboard the Columbia space shuttle during the early ‘90s to test how space flight would affect their development. As cool as being an astronaut baby sounds, the jellies didn’t develop the same gravity-sensing capabilities as their Earthly relatives.
by 美撒郭 (via http://flic.kr/p/gJL4zt )
Famous though the slogan might be, its meaning has never been clear. In the 2004 IPO letter, founders Larry Page and Sergey Brin clarify that Google will be “a company that does good things for the world even if we forgo some short term gains.” But what counts as “good things,” and who constitutes “the world?” The slogan’s significance has likely changed over time, but today it seems clear that we’re misunderstanding what “evil” means to the company. For today’s Google, evil isn’t tied to malevolence or moral corruption, the customary senses of the term. Rather, it’s better to understand Google’s sense of evil as the disruption of its brand of (computational) progress.
“For I am divided for love’s sake, for the chance of union. This is the creation of the world, that the pain of division is as nothing, and the joy of dissolution all”
–Liber AL vel Legis, I, 29& 30
“orgasm can do for physical connection what the internet has done for us in terms of virtual connection”
By contrast I emphasize the role of misconceptions, misinterpretations and a sheer lack of understanding in shaping the course of events. I focus on the process of change rather than on the eventual outcome. The process involves reflexive feedback loops between the objective and subjective aspects of reality. Fallibility insures that the two aspects are never identical. That is where my framework differs from mainstream economics.
Trainsvision by ebergcanada (via http://flic.kr/p/gENxMd )
Dimension 12 x 18 x 22 cm
Compression molded Cocaine (street sourced) and Gelatin.
“The analysis started with the preparation of the 100% Cocaine standard and sample solution. An amount of standard was dissolved in a mobile phase followed by a series of trial runs to calibrate and identify the HPLC method that gave adequate separation of the standard. After several trail runs the preferred mobile phase consisted of 20% Acetonitrile, 80% water and contained 0,1% Trifluoroacetic Acid (TFA).”
20131013 (via http://flic.kr/p/gGY4y6 )
20131012 (via http://flic.kr/p/gGYQpB )
20131011 (via http://flic.kr/p/gGYLZa )
the manufactured and the natural.
Given the challenges to employing transparency as a check on algorithmic power, a new and complementary alternative is emerging. I call it algorithmic accountability reporting. At its core it’s really about reverse engineering—articulating the specifications of a system through a rigorous examination drawing on domain knowledge, observation, and deduction to unearth a model of how that system works. As interest grows in understanding the broader impacts of algorithms, this kind of accountability reporting is already happening in some newsrooms, as well as in academic circles. At the Wall Street Journal a team of reporters probed e-commerce platforms to identify instances of potential price discrimination in dynamic and personalized online pricing. By polling different websites they were able to spot several, such as Staples.com, that were adjusting prices dynamically based on the location of the person visiting the site. At the Daily Beast, reporter Michael Keller dove into the iPhone spelling correction feature to help surface patterns of censorship and see which words, like “abortion,” the phone wouldn’t correct if they were misspelled. In my own investigation for Slate, I traced the contours of the editorial criteria embedded in search engine autocomplete algorithms. By collecting hundreds of autocompletions for queries relating to sex and violence I was able to ascertain which terms Google and Bing were blocking or censoring, uncovering mistakes in how these algorithms apply their editorial criteria. All of these stories share a more or less common method. Algorithms are essentially black boxes, exposing an input and output without betraying any of their inner organs. You can’t see what’s going on inside directly, but if you vary the inputs in enough different ways and pay close attention to the outputs, you can start piecing together some likeness for how the algorithm transforms each input into an output. The black box starts to divulge some secrets.
Given the challenges to employing transparency as a check on algorithmic power, a new and complementary alternative is emerging. I call it algorithmic accountability reporting. At its core it’s really about reverse engineering—articulating the specifications of a system through a rigorous examination drawing on domain knowledge, observation, and deduction to unearth a model of how that system works.
As interest grows in understanding the broader impacts of algorithms, this kind of accountability reporting is already happening in some newsrooms, as well as in academic circles. At the Wall Street Journal a team of reporters probed e-commerce platforms to identify instances of potential price discrimination in dynamic and personalized online pricing. By polling different websites they were able to spot several, such as Staples.com, that were adjusting prices dynamically based on the location of the person visiting the site. At the Daily Beast, reporter Michael Keller dove into the iPhone spelling correction feature to help surface patterns of censorship and see which words, like “abortion,” the phone wouldn’t correct if they were misspelled. In my own investigation for Slate, I traced the contours of the editorial criteria embedded in search engine autocomplete algorithms. By collecting hundreds of autocompletions for queries relating to sex and violence I was able to ascertain which terms Google and Bing were blocking or censoring, uncovering mistakes in how these algorithms apply their editorial criteria.
All of these stories share a more or less common method. Algorithms are essentially black boxes, exposing an input and output without betraying any of their inner organs. You can’t see what’s going on inside directly, but if you vary the inputs in enough different ways and pay close attention to the outputs, you can start piecing together some likeness for how the algorithm transforms each input into an output. The black box starts to divulge some secrets.”
On October 14, 1998, science fiction author Bruce Sterling stood on the stage at the Yerba Buena Center for the Arts in San Francisco and announced his plans for the new millennium. Y2K was going to come and go, he predicted, and then in early January, journalists were going to be desperate for novelty. A new millennium needed new ideas and as a noted science fiction author, he expected they’d be ringing his phone off the hook (phones were on hooks back then — in 1998, everyone still had a landline)
Oh Susanna Oh don’t you cry for me by paolobarzman (via http://flic.kr/p/gBH4fZ )
project024.jpg (via http://scrying.org/lib/exe/detail.php?id=pmimages2:xxxxx)
“Eat Like What You Eat” by Tak Cheung by amc_ (via http://flic.kr/p/ehEodm )
And yet nobody wanted to add Peenemünde, where the Germans developed the V-2 rocket during the 1940s, to the glorious list of creative hothouses that includes Periclean Athens, Renaissance Florence, Belle Époque Paris and latter-day Austin, Texas. How much easier to tell us, one more time, how jazz bands work, how someone came up with the idea for the Slinky, or what shade of paint, when applied to the walls of your office, is most conducive to originality