pipeline
The possibility of points-of-no-return in the climate system has been discussed for two decades. A point-of-no-return can be seen as a threshold which, once surpassed, fundamentally changes the dynamics of the climate system. For example, by triggering irreversible processes like melting of the permafrost, drying of the rainforests, or acidification of surface waters. Recently, Lenton et al. summarized the global situation and warned that thresholds may be closer in time than commonly believed.
The purpose of this article is to report that we have identified a point-of-no-return in our climate model—and that it is already behind us. ESCIMO is a climate model which we run from 1850 to 2500. In ESCIMO the global temperature keeps rising to 2500 and beyond, irrespective of how fast humanity cuts the emissions of man-made greenhouse gas (GHG) emissions. […]
To stop the self-sustained warming in ESCIMO, enormous amounts of CO2 have to be extracted from the atmosphere.
{ Nature | Continue reading }
oil on canvas { John William Waterhouse, Pandora, 1898 }
climate, uh oh | November 16th, 2020 6:33 am
Senior campaign and GOP officials vented that Trump’s finance team, led by former Fox TV host and Donald Trump Jr. girlfriend Kimberly Guilfoyle, underperformed and was an HR nightmare. Trump couldn’t compete with Biden’s small-dollar fundraising machine, and some donors were horrified by what they described as Guilfoyle’s lack of professionalism: She frequently joked about her sex life and, at one fundraiser, offered a lap dance to the donor who gave the most money.
{ Politico | Continue reading }
previously { Dear 45, I ain’t Kanye }
related { To the other educational benefits of Rudy Giuliani’s recent press conference in the parking lot of Four Seasons Total Landscaping, we can add the opportunity to learn about Hazard Communications (HazCom) signage | Language Log | full sotry }
and { “A lawsuit without provable facts showing a statutory or constitutional violation is just a tweet with a filing fee” }
image { Trump campaign dismissing its own appeal from the Nevada Supreme Court }
buffoons, within the world | November 11th, 2020 8:50 am
On November 8, 1932, Americans decisively rejected Herbert Hoover’s leadership; he lost the popular vote by 17 percent and the Electoral College by 472 to 59. Franklin Roosevelt won an overwhelming victory, promising hope and government assistance for those in need. […]
Despite his defeat, Hoover was unrepentant, and doubled down on the very actions that voters had rejected. He used the long period between the election and the March 4 inauguration to sow discord, undermine the economy, and constrain his successor’s options. Hoover even pressured Roosevelt to abandon his campaign promises and sign on to his own failed policies. […]
The Twentieth Amendment, ratified in 1933, moved the presidential inauguration to January 20, where it remains.
{ The Bulwark | Continue reading }
related { Trump Team Holds News Conference Outside Drab Landscaping Firm, Next to Adult Book Store [and Crematorium] | More }
U.S., buffoons, flashback | November 8th, 2020 8:29 am
When a hornet scout locates and approaches a Japanese honey bee hive, she emits specific pheromonal hunting signals. When the Japanese honey bees detect these pheromones, 100 or so gather near the entrance of the nest and set up a trap, keeping the entrance open. This permits the hornet to enter the hive.
As the hornet enters, a mob of hundreds of bees surrounds it in a ball, completely covering it and preventing it from reacting effectively. The bees violently vibrate their flight muscles in much the same way as they do to heat the hive in cold conditions. This raises the temperature in the ball to the critical temperature of 46 °C (115 °F). In addition, the exertions of the honey bees raise the level of carbon dioxide (CO2) in the ball. At that concentration of CO2, they can tolerate up to 50 °C (122 °F), but the hornet cannot survive the combination of high temperature and high carbon dioxide level. […]
When honey bees detect scouting hornets, they transmit an “I see you” signal that commonly warns off the predator.
{ Wikipedia | Continue reading }
bees, fights | October 26th, 2020 10:30 am
Sacha Baron Cohen has responded to Donald Trump’s remarks about Borat 2
Donald—I appreciate the free publicity for Borat! I admit, I don’t find you funny either. But yet the whole world laughs at you.
I’m always looking for people to play racist buffoons, and you’ll need a job after Jan. 20. Let’s talk!
{ Sacha Baron Cohen | Quote: Borat }
buffoons, haha | October 25th, 2020 1:29 pm
…an agreement to feature Google’s search engine as the preselected choice on Apple’s iPhone and other devices. […] Apple had arranged the deal to require periodic renegotiations, according to a former senior executive, and each time, it extracted more money from Google. […]
Steve Jobs, Apple’s co-founder, once promised “thermonuclear war” on his Silicon Valley neighbor when he learned it was working on a rival to the iPhone. […] “I’m going to destroy Android,” Mr. Jobs told his biographer. […] A year later, Apple introduced Siri. Instead of Google underpinning the virtual assistant, it was Microsoft’s Bing. […] Around 2017, the deal was up for renewal. Google was facing a squeeze, with clicks on its mobile ads not growing fast enough. Apple was not satisfied with Bing’s performance for Siri. And Mr. Cook had just announced that Apple aimed to double its services revenue to $50 billion by 2020, an ambitious goal that would be possible only with Google’s payments. […] By the fall of 2017, Apple announced that Google was now helping Siri answer questions, and Google disclosed that its payments for search traffic had jumped. […]
Nearly half of Google’s search traffic now comes from Apple devices, according to the Justice Department, and the prospect of losing the Apple deal has been described as a “code red” scenario inside the company. When iPhone users search on Google, they see the search ads that drive Google’s business. They can also find their way to other Google products, like YouTube.
A former Google executive, who asked not to be identified because he was not permitted to talk about the deal, said the prospect of losing Apple’s traffic was “terrifying” to the company. […]
Apple now receives an estimated $8 billion to $12 billion in annual payments — up from $1 billion a year in 2014 — in exchange for building Google’s search engine into its products. It is probably the single biggest payment that Google makes to anyone and accounts for 14 to 21 percent of Apple’s annual profits. That’s not money Apple would be eager to walk away from.
{ NY Times | Continue reading }
economics, google, law | October 25th, 2020 8:19 am
The group, known to researchers as “Dragonfly” or “Energetic Bear” for its hackings of the energy sector, was not involved in 2016 election hacking. But it has in the past five years breached the power grid, water treatment facilities and even nuclear power plants, including one in Kansas.
It also hacked into Wi-Fi systems at San Francisco International Airport and at least two other West Coast airports in March in an apparent bid to find one unidentified traveler, a demonstration of the hackers’ power and resolve.
September’s intrusions marked the first time that researchers caught the group, a unit of Russia’s Federal Security Service, or F.S.B., targeting states and counties. The timing of the attacks so close to the election and the potential for disruption set off concern inside private security firms, law enforcement and intelligence agencies. […]
“This appears to be preparatory, to ensure access when they decide they need it,” […] Energetic Bear typically casts a wide net, then zeros in on a few high-value targets. […] They could take steps like pulling offline the databases that verify voters’ signatures on mail-in ballots, or given their particular expertise, shutting power to key precincts. […]
Officials at San Francisco International Airport discovered Russia’s state hackers had breached the online system that airport employees and travelers used to gain access to the airport’s Wi-Fi. The hackers injected code into two Wi-Fi portals that stole visitors’ user names, cracked their passwords and infected their laptops. The attack began on March 17 and continued for nearly two weeks until it was shut down. […] As pervasive as the attacks could have been, researchers believe Russia’s hackers were interested only in one specific person traveling through the airports that day.
{ NY Times | Continue reading }
spy & security | October 24th, 2020 6:55 pm
U.S., buffoons, law | October 24th, 2020 6:46 pm
A range of methods have been applied for user authentication on smartphones and smart watches, such as password, PIN and fingerprint. […] In this paper, a new biometric trait, finger snapping, is applied for person authentication.
Finger snapping is an act of making an impulsive sound with one’s fingers and palm. It is often done by connecting the thumb with another (middle, index or ring) finger, and then moving the other finger immediately downward to hit the palm. Such act of finger snapping involves physiological characteristics which refer to inherited traits that are related to human body, as the sound of finger snapping is differentiated by the size of palm and skin texture. In addition, it also involves behavioral characteristics which refer to learned pattern of a person, as it is the movement of the finger creates the sound.
A survey is carried out on 74 people about whether they can snap their fingers and accept the finger snapping authentication. Results show that 86.5 % of the respondents can snap fingers, of which 89.2 % would like to authenticate themselves using a simple finger snap. Besides, through our finger snapping collecting phase, we come to find out that people who could not snap their fingers can learn to do it after understanding the method of finger snapping.
{ Biometric Recognition | Continue reading }
previously { Silicon Valley Legends Launch Beyond Identity in Quest to Eliminate Passwords }
photo { Guen Fiore }
spy & security, technology | October 19th, 2020 4:33 pm
This paper presents a model in which politicians can increase the probability of election by making exaggerated claims about the benefits of their own platform — referred to as positive campaigning — and by exaggerating the undesirable characteristics of their rival — i.e., negative campaigning. Such lies may be detected at some point in the future and thus result in a costly loss in reputation. Thus the politician must tradeoff immediate benefits against potential future costs.
{ Public Choice (1996) | Continue reading }
buffoons | October 18th, 2020 3:29 pm
U.S., buffoons | October 17th, 2020 8:14 am
The Federal Bureau of Investigation is issuing this announcement to encourage Americans to exercise caution when using hotel wireless networks (Wi-Fi) for telework. FBI has observed a trend where individuals who were previously teleworking from home are beginning to telework from hotels. US hotels, predominantly in major cities, have begun to advertise daytime room reservations for guests seeking a quiet, distraction-free work environment. While this option may be appealing, accessing sensitive information from hotel Wi-Fi poses an increased security risk over home Wi-Fi networks. Malicious actors can exploit inconsistent or lax hotel Wi-Fi security and guests’ security complacency to compromise the work and personal data of hotel guests. Following good cyber security practices can minimize some of the risks associated with using hotel Wi-Fi for telework.
Attackers target hotels to obtain records of guest names, personal information, and credit card numbers. The hotel environment involves many unaffiliated guests, operating in a confined area, and all using the same wireless network. Guests are largely unable to control, verify, or monitor network security. Cyber criminals can take advantage of this environment to monitor a victim’s internet browsing or redirect victims to false login pages. Criminals can also conduct an “evil twin attack” by creating their own malicious network with a similar name to the hotel’s network. Guests may then mistakenly connect to the criminal’s network instead of the hotel’s, giving the criminal direct access to the guest’s computer. […]
Once the malicious actor gains access to the business network, they can steal proprietary data and upload malware, including ransomware. Cybercriminals or nation-state actors can use stolen intellectual property to facilitate their own schemes or produce counterfeit versions of proprietary products. Cybercriminals can use information gathered from access to company data to trick business executives into transferring company funds to the criminal.
{ iC3 | Continue reading }
ink on black paper { Aura Satz, Tone Transmission, 2020 }
spy & security | October 13th, 2020 7:31 am
California is gonna have to ration water. You wanna know why? Because they send millions of gallons of water out to sea, out to the Pacific. Because they want to take care of certain little tiny fish, that aren’t doing very well without water.
{ Donald J. Trump | Continue reading }
U.S., buffoons, water | October 9th, 2020 7:21 am
Recently, some scientists from NASA have claimed that there may be a black hole like structure at the centre of the earth. We show that the existence of life on the earth may be a reason that this black hole like object is a black brane that has been formed from biological materials like DNA. Size of this DNA black brane is 109 times longer than the size of the earth’s core and compacted interior it. By compacting this long object, a curved space-time emerges, and some properties of black holes emerge. This structure is the main cause of the emergence of the large temperature of the core, magnetic field around the earth and gravitational field for moving around the sun. Also, this structure produces some waves which act like topoisomerase in biology and read the information on DNAs. […]
These dark DNAs not only exchange information with DNAs but also are connected with some of the molecules of water and helps them to store information and have memory. Thus, the earth is the biggest system of telecommunication which connects DNAs, dark DNAs and molecules of water.
{ Macedonian Journal of Medical Sciences | Continue reading }
photo ( Nadia Von Scotti }
science, weirdos | September 24th, 2020 6:11 pm
Earlier this week, Elon Musk said there’s a “good chance” settlers in the first Mars missions will die. […] the trip itself will take a year based on current estimates, and applicants to settlement programs are told to expect this trip to be one way.
{ Popular Mechanics | Continue reading }
space, weirdos | September 6th, 2020 3:02 pm
The Justice Department plans to bring an antitrust case against Google as soon as this month […] A coalition of 50 states and territories support antitrust action against Google […]
Alphabet was an obvious antitrust target. Through YouTube, Google search, Google Maps and a suite of online advertising products, consumers interact with the company nearly every time they search for information, watch a video, hail a ride, order delivery in an app or see an ad online. Alphabet then improves its products based on the information it gleans from every user interaction, making its technology even more dominant.
Google controls about 90 percent of web searches globally, and rivals have complained that the company extended its dominance by making its search and browsing tools defaults on phones with its Android operating system. Google also captures about one-third of every dollar spent on online advertising, and its ad tools are used to supply and auction ads that appear across the internet. […]
Makan Delrahim, the head of the Justice Department’s antitrust division, had pushed the department to investigate Google but was recused from the case because he represented the company in a 2007 acquisition that helped it to dominate the online advertising market.
In an unusual move, Mr. Barr placed the investigation under Jeffrey A. Rosen, the deputy attorney general, whose office would not typically oversee an antitrust case. Mr. Barr and Mr. Delrahim also disagreed on how to approach the investigation, and Mr. Barr had told aides that the antitrust division had been asleep at the switch for decades, particularly in scrutinizing the technology industry.
Mr. Rosen does have a tech background: He was the lead counsel for Netscape Communications when it filed an antitrust complaint against Microsoft in 2002.
In October, Mr. Rosen hired Ryan Shores, a veteran antitrust lawyer, to lead the review and vowed to “vigorously seek to remedy any violations of law, if any are found.”
Mr. Barr also had a counselor from his own office, Lauren Willard, join the team as his liaison. She met with staff members and requested information about the investigation. She also issued directives and made proposals about next steps.
{ NY Times | Continue reading }
platinum print { Robert Mapplethorpe, Coral Sea, 1983 }
U.S., google, law, photogs | September 3rd, 2020 3:39 pm
Some luxury brands have started adding surveillance to their arsenal, turning to blockchains to undermine the emergence of secondary markets in a way that pays lip service to sustainability and labor ethics concerns. LVMH launched Aura in 2019, a blockchain-enabled platform for authenticating products from the Louis Vuitton, Christian Dior, Marc Jacobs, and Fenty brands, among others. Meanwhile, fashion label Stella McCartney began a transparency and data-monitoring partnership with Google for tracking garment provenance, discouraging fakes and promising to ensure the ethical integrity of supply chains. Elsewhere, a host of fashion blockchain startups, including Loomia, Vechain, and Faizod, have emerged, offering tracking technologies to assuage customer concerns over poor labor conditions and manufacturing-related pollution by providing transparency on precisely where products are made and by which subcontractors. […]
Companies such as Arianee, Dentsu and Evrythng also aim to track clothes on consumers’ bodies and in their closets. At the forefront of this trend is Eon, which with backing from Microsoft and buy-in from mainstream fashion brands such as H&M and Target, has begun rolling out the embedding of small, unobtrusive RFID tags — currently used for everything from tracking inventory to runners on a marathon course — in garments designed to transmit data without human intervention. […]
According to the future depicted by Eon and its partners, garments would become datafied brand assets administering access to surveillance-enabled services, benefits, and experiences. The people who put on these clothes would become “users” rather than wearers. In some respects, this would simply extend some of the functionality of niche wearables to garments in general. Think: swimsuits able to detect UV light and prevent overexposure to the sun, yoga pants that prompt the wearer to hold the right pose, socks that monitor for disease risks, and fitness trackers embedded into sports shirts. […]
According to one potential scenario outlined by Eon partners, a running shoe could send a stream of usage data to the manufacturer so that it could notify the consumer when the shoe “nears the end of its life.” In another, sensors would determine when a garment needs repairing and trigger an online auction among competing menders. Finally, according to another, sensors syncing with smart mirrors would offer style advice and personalized advertising.
{ Real Life | Continue reading }
related { Much of the fashion industry has buckled under the weight of the coronavirus — it appears to have sped up the inevitable }
cryptocurrency, fashion, spy & security, technology | August 23rd, 2020 9:47 am
Profits from organized crime are typically passed through legitimate businesses, often exchanging hands several times and crossing borders, until there is no clear trail back to its source—a process known as money laundering.
But with many businesses closed, or seeing smaller revenue streams than usual, hiding money in plain sight by mimicking everyday financial activity became harder. “The money is still coming in but there’s nowhere to put it,” says Isabella Chase, who works on financial crime at RUSI, a UK-based defense and security think tank.
The pandemic has forced criminal gangs to come up with new ways to move money around. In turn, this has upped the stakes for anti-money laundering (AML) teams tasked with detecting suspicious financial transactions and following them back to their source. […]
According to the United Nations Office on Drugs and Crime, between 2% and 5% of global GDP—between $800 billion and $2 trillion at current figures—is laundered every year. Most goes undetected. Estimates suggest that only around 1% of profits earned by criminals is seized. […] The problem for criminals is that many of the best businesses for laundering money were also those hit hardest by the pandemic. Small shops, restaurants, bars, and clubs are favored because they are cash-heavy, which makes it easier to mix up ill-gotten gains with legal income. […]
Older systems rely on hand-crafted rules, such as that transactions over a certain amount should raise an alert. But these rules lead to many false flags and real criminal transactions get lost in the noise. More recently, machine-learning based approaches try to identify patterns of normal activity and raise flags only when outliers are detected. These are then assessed by humans, who reject or approve the alert.
This feedback can be used to tweak the AI model so that it adjusts itself over time. Some firms, including Featurespace, a firm based in the US and UK that uses machine learning to detect suspicious financial activity, and Napier, another firm that builds machine learning tools for AML, are developing hybrid approaches in which correct alerts generated by an AI can be turned into new rules that shape the overall model.
{ Technology Review | Continue reading }
crime, economics | August 14th, 2020 5:02 pm
cats, haha, weirdos | June 25th, 2020 7:54 am