LED Day – 128

What is Project LED? Find out here

I’m something of a photographer too! Check out my work here.

Day of September 15th 2014

  • Microsoft is purchasing the popular game Minecraft for $2.5 Billion. However, the game’s brainchild and creator will not be working with Microsoft.
  • Schizophrenia is a combination of several genetic disorders; at least 8. Until now, schizophrenia has been understood as one disease, but no one disorder can cause schizophrenia on its own.
  • Apple has (photo) shopped out the iPhone 6’s camera bulge in some of the profile shots of the phone. This was probably just done for streamlining purposes.
  • Debilitate means to weaken or hinder.
  • The Nacirema is a very interesting sociological and anthropological take on behavior and perception of behavior.

Sources:

Daily Track:

LED Day – 127

What is Project LED? Find out here

I’m something of a photographer too! Check out my work here.

Day of September 14th 2014

  • A garron is a small but study breed of workhorses originally found in Ireland and Scotland.
  • Junior Investment Bankers are sometimes assigned 120 hour work weeks. (A 7 day period has a total of 168 hours.)
  • The divorce rate in the U.S. is between 40-50%.
  • The EZoo festival has free “high-speed” water fill up stations across the festival site on Randall’s island. EZoo security also permits clear & empty containers up to 1 liter in capacity to be brought on site.
  • There is a watch that sells for $11,650 on Amazon..

Sources:

  • This term came up while I was reading the second Game of Thrones book. (Kindle dictionary is awesome.)
  • I was reading an article about top paying jobs that make people miserable.
  • A Google search of the American divorce rate will yield this answer.
  • I found the EZoo FAQ page open in a set of old tabs on my mobile chrome browser, and I decided to read through it.
  • This came up in “recommendations”.

 

Daily Track:

LED Day – 126

What is Project LED? Find out here

I’m something of a photographer too! Check out my work here.

Day of September 11th 2014 **Never Forget**

  • Eggs are not washed and kept chilled in all parts of the world. There is a thin layer of natural protective film around the egg which prevents toxic chemicals from entering the egg. This layer is washed away in America; to replace this natural protection, eggs are lightly sprayed with oil and then kept chilled.
  • Grado Headphones have been made in Brooklyn since the 1950’s. The original production house is still active in Sunset Park.
  • Desecration of a Venerated Object is a crime in Pennsylvania.
  • The Huffington Post has a “Weird News” section.

Sources:

Daily Track:

LED Day – 125

What is Project LED? Find out here

I’m something of a photographer too! Check out my work here.

Day of September 10th 2014

  • A caliper is a tool used to measure the distance between two opposite sides of an object.
  • The distinction between the words who & whom is minute. One way to self check is by replacing the word who with he/she & the word whom with him/her. If the replacement term renders the sentence incorrect, then you are using the wrong word. (**Note: This is still a little confusing, even for me, and it does not work in every situation.)
  • The iPhone 6 will come in two sizes 4.7″ & 5.5″ (diagonal screen length) and finally incorporate NFC technology; there is also an Apple smart-watch coming.
  • ISIS stands for “Islamic State of Iraq and Syria” while ISIL stands for “Islamic State of Iraq and the Levant”. President Obama insists on using the acronym ISIL when referring to the militant group.
  • The Levant refers to the Eastern Mediterranean region including modern day Iraq, Syria, Jordan, Lebanon and Israel.

Sources:

Daily Track:

On Internet and Security Leaks

DSC_2197Over the last few days, I’ve seen countless reports, op-ed pieces — even gossip columns and tabloid articles — about the “heinous crime(s)” recently committed online. Now that this personal photo hacking scandal (involving Jennifer LawrenceKate Upton and several other popular female media stars) has blown over a little bit, I feel that it’s a bit more appropriate to have an objective analysis of the incident, and the relevant cultural backlash.

More information on the photo leak can be found here:

http://www.cnn.com/2014/09/01/showbiz/jennifer-lawrence-photos/

First, a few facts that seem to have been blurred in the crossfire of opinions.

  • iCloud itself was not compromised as a system. The cyber attack was targeted at specific individuals, and employed a combination of social hacking techniques and flaw exploitation. In this particular case, social hacking means that the hackers tried guessing passwords, and answers to security questions; hackers also exploited the fact that Apple’s iCloud password recovery system does not lock out users from making password recovery attempts or logging in, after multiple failures.
  • The DMCA allows for legal claims (at the Federal level) to be made concerning personal or copyrighted material published on the internet. These claims are then evaluated and sent to the hosting party/web admin. At this point, a site(s) hosting the material is legally required to see to its immediate removal. The DMCA does not require private hosts like 4chanReddit and Google (all of which have a large public user base) to constantly monitor and filter their content.
  • Both the theft and the online release of the photos in question are considered criminal activity.
  • The official investigation is high profile and being handled by the FBI.

Everything I’ve read so far concerning the iCloud breach has made out the hackers to be wicked, bordering on evil. Posts and articles written by feminists take a very strong (and typical) position about how the leak perpetuates rape culture and demeans the privacy and security of women. Conversely, the anonymous (and largely male) free-for-all communities on Reddit & 4chan were rather grossly excited and welcomed the photos — even setting up dedicated forum threads for easy access. Some writers have criticized the victims of the cyber attack for either having stored the revealing photos on iCloud or having taken the photos in the first place, while others have even written about the concept of hacker’s glory, which may play a major role in motivating hackers to continue hacking and publishing/trading their illicitly obtained data. Regardless of point of view or persuasion, the salient take-away from this incident should be that data organized online is only as safe as its irrelevance. Or more simply put: if the data hidden behind passwords is not important to a potential thief, then it is safe. Any data stored with information giants is at risk of theft; including the likes of (but not limited to) AppleGoogle and Microsoft – all of which offer e-mail, cloud storage and instant messaging services.

This issue of flawed internet security has been highlighted countless times over the last decade. Hackers have hacked everything from the credit card information of private citizens to the front pages of major government institutions. And then of course there’s the issue of who the hackers actually are; as Edward Snowden gracefully revealed to American public, introverted teenagers with lots of free time aren’t the only ones hunting and hacking for data. Intelligence agencies all over the world (especially our own) prowl the internet and take as they see fit.

Check out this awesome interactive infographic detailing data theft from the last decade.

http://www.informationisbeautiful.net/visualizations/worlds-biggest-data-breaches-hacks/

This sort of behavior by any party, be it adolescent or secret agent, is considered theft, but not in the traditional sense. I found many op-ed articles likening digital data theft to the theft of one’s home, car or person; an analogy I strongly oppose. The internet is an enormous and dynamic system of networks. Not a neighborhood, parking lot or city block. Stealing from the internet is nowhere near as personal as stealing in real life. It is this impersonal attitude in particular which makes online theft so common and light on the conscience; hackers can effectively rob hundreds and thousands of people with just a few keystrokes. This experience of pulling files off of a remote server is nothing like traditional theft for the hacker or the victim. It’s also worth mentioning that victims of cyber theft are usually not “robbed” of their data. In most cases, the stolen material is simply copied and used without authorization.

It’s probably fair to say (for now) that the vast majority of internet users won’t be affected by online security breaches in any life changing way, but Big Data is coming. Data giants already have comprehensive sets of information detailing the lives of the average user. A combination of the data stored in my Facebook and Google accounts can be used to easily create a very (and almost scarily accurate) comprehensive map of my life. Just the other day, Google Now informed me that I walked 19% more than I did the month prior. As we move forward, even more of our data will be organized in cyberspace. Smart-watches and newer smartphones are beginning to keep track of blood pressure, pulse and even caloric intake; smart-glasses will eventually make it through legal and civil hurdles and revolutionize the way we see the world. It’s definitely high time to take our data security more seriously.

FM RADIO

 

 

 

LED Day – 124

What is Project LED? Find out here

I’m something of a photographer too! Check out my work here.

Day of September 8th 2014

  • The top three finishers in a Formula One race are each handed a bottle of champagne to spray on one another and the nearby crowd. By contrast, the top finisher of the Indianapolis 500 is given milk.
  • There are what appear to be goats at Queens College (near Queens Hall).
  • Sweden has incinerators all over the country which and use the resulting fumes/steam to power turbines which generate electricity.
  • TV anchorperson & journalist Bob Woodruff was critically injured by a roadside bomb while he was reporting in Iraq. He was not expected to survive, and needed major surgeries for which he was kept in a medically induced coma for 36 days.
  • Gambia’s “President” (leader) is named Yahya Jammeh. His views on homosexuality are extreme, and he has ratified a bill which will punish participants of “aggravated homosexuality” with life imprisonment. Homosexual acts already carried a 14 year sentence in Gambia prior to this.

Sources:

Daily Track:

LED Day – 123

What is Project LED? Find out here

I’m something of a photographer too! Check out my work here.

Day of September 7th 2014

  • CC & BCC (in emails) mean carbon copy and blind carbon copy respectively. Email addresses listed in BCC will not be visible to standard and CC recipients or to other BCC recipients.
  • Bridgestone tire company is Japanese. It was founded in 1931 by Shorjiro Ishibashi. “Ishibashi translates to “Stone Bridge”.
  • Calque is another term for “loan translation“. This refers to a situation in which a word from one language is translated very literally into another language.
  • There is a list of unsolved linguistics problems on Wikipedia. Some of the questions are quite interesting and call for deep thought.
  • Ed Koch was a Jewish US Congressman, lawyer & three term mayor of NYC.

Sources:

  • This is something I feel like I should’ve known quite a while ago. It was only when one of my professors noted that he emails all of his students using BCC, that I wondered about how BCC really functioned.
  • This information was on a newsfeed I follow.
  • Bridgestone is a calque translation of Ishibashi.
  • I found this while reading about “calque”.

    https://en.wikipedia.org/wiki/List_of_unsolved_problems_in_linguistics

  • A friend of mine was talking about Jewish presence in NYC and mentioned Ed Koch. I looked up him shortly after.

Daily Track: