Yoda: Exascale by 2020? No Way, Jose! Four Socko Graphics and Bottom Line Upfront — Human Brain Still a Million Times More Power Efficient

Got Crowd? BE the Force!

Got Crowd? BE the Force!

Mind-shift, must have.

Supercomputing director bets $2,000 that we won’t have exascale computing by 2020

Joel Hruska

ExtremeTech, 17 May 2013

Over the past year, we’ve covered a number of the challenges facing the supercomputing industry in its efforts to hit exascale compute levels by the end of the decade. The problem has been widely discussed at supercomputing conferences, so we’re not surprised that Horst Simon, the Deputy Director at the Lawrence Berkeley National Laboratory’s NERSC (National Energy Research Scientific Computing Center), has spent a significant amount of time talking about the problems with reaching exascale speeds.

But putting up $2000 of his own money in a bet that we won’t hit exascale by 2020? That caught us off guard.

The exascale rethink

Read the rest of this entry »

Comments Off
May 4

Berto Jongman: NSA’s War on Encryption

Berto Jongman

Berto Jongman

The NSA’s War Against Encryption

New revelations about National Security Agency abuses, which now include everything from industrial espionage to reports that the agency can access most data on our smartphones, seem to put everything we know about how business is done on the Internet in danger.

Complete story below the line.

Read the rest of this entry »

Comments Off
Sep 12

Berto Jongman: DEFCON The Movie

Categories: Hacking,Vimeo
Berto Jongman

Berto Jongman

Very good on hacker culture.

DEFCON The Movie (Vimeo)

Read the rest of this entry »

Comments Off
Aug 11

BIG EVENT: 31 Jul – 4 Aug Geestmerambacht, The Netherlands OHM2013 — Observe – Hack – Make

ohm2013-rect-550px

About OHM2013

OHM2013 – Observe. Hack. Make. is a 5-day international outdoor technology and security conference. OHM2013 is currently requesting proposals for content.

A motley bunch of around 3000 hackers, free-thinkers, philosophers, activists, geeks, scientists, artists, creative minds and others will convene from all over the world for this informal meeting of minds to contemplate, reflect, share, criticize, look ahead, code, build, and more.

An otherwise unassuming stretch of land, just 30km (20mi) North of Amsterdam, will be transformed into a colourful oasis of light providing a backdrop for this unique event. It is an immersive experience, with an emphasis on interaction.

The four-yearly Dutch hacker camps provide a very open, friendly and relaxed atmosphere, with a high level of knowledge. The campsite is buzzing with energy, ideas and projects, not least because people from various backgrounds are interacting. It is a non-commercial community event where every visitor is also a volunteer.

Event Home Page and Call for Participation

Maps: OHM GIS – OpenStreetMap – Google Maps

Please Circulate Freely (txt version) (PDF version):

Robert David STEELE Vivas

Robert David STEELE Vivas

ROBERT STEELE: This is legitimate hacking’s third wind (ham radio was the first, cyber and social engineering the second). This takes hacking to a new level, with an emphasis on “Do It Yourself” and thus fullfils the guidance from Buckminster Fuller: do not seek to repair a pathologically damaged system, instead create a new system to replace it, and route around the old system.  I have proposed a lecture and a workshop (originally commissioned for the Wales Intelligence Conference in 2013), and am seeking donations to cover travel — estimated $1,500.  I particularly solicit donations for pre-conference and post-conference sessions, in person or via Skype, anywhere in Europe including the UK that will help cover travel including side trips, and perhaps a bit more to support the work of our 501c3.  I am on stand-by for Afghanistan and believe they won’t move on replacing the KIA/WIA until September for a 1 October start date.

2013 Intelligence Future — The Third Era of Local to Global Intelligence Robert Steele Overview & Workshop 2.7

See Also:

Public Intelligence 3.6

Steele on Hackers at PBS

Who Is Robert D. Steele?




Comments Off
Jul 10

Review (Guest): America’s Stolen Narrative: From Washington and Madison to Nixon, Reagan and the Bushes to Obama

Tags:
Amazon Page

Amazon Page

Robert Parry

5.0 out of 5 stars How we allowed the rightwing to get Away with falsely Re-writing American History, and thus steal the Nation’s narrative, and wi, March 7, 2013

Herbert L Calhoun “paulocal” (Falls Church, VA USA) – See all my reviews

Sam Parry proves here in his book, “America’s Stolen Narrative,” that he has his eye on the ball. For he sees that in large measure the decline in American civility, international prestige, much of today’s governmental dysfunction, and the alarming and unaccountable shift to the right, has a lot to do with the way we have allowed the rightwing 24/7 media attack machine and the money that backs it, to get away with lying about and thus stealing and murdering our history.

By fiat they have been able to commandeer both the symbols of state and now through Gerrymandering, voter suppression and other such illicit stratagems, have also been able to take over the very machinery of government: Even when they lose elections and are out of power, as they are today, they still win as they are able to control the national narrative, the national agenda and has a newly elected President, with his national voter mandate so stymied that he cannot even make appointments or carry out the normal duties delegated to the presidency?

Read the rest of this entry »

Comments Off
Jul 10

Michelle Monk: YouTube (1:35:38) Amazing Documentary of Hacktivists

Michelle Monk

Michelle Monk

Published on May 18, 2013

A Documentary about the Activist Group Anonymous.
Against New World Order http://new-world-order-plan.org

10,000 angry kids scared the shit out of the powers that be….proved to the government that its views about everything are wrong, and no longer matters — 10,000 angry kids can kick ass whenever and wherever they want.

Comments Off
May 29

Berto Jongman: Interview with a BlackHat + Related + USA Cyber-Idiocy RECAP

Berto Jongman

Berto Jongman

Interview With A Blackhat (Part 1)

[This interview openly discusses criminal activities from the perspective of an admitted criminal. You may find this content distressing, even offensive, but what is described in this interview is real. We know from personal experience is that these activities are happening on websites everywhere, everyday, and perhaps even on your websites. WhiteHat Security brings this information to light for the sole purpose of assisting those who want to protect themselves on their online business.]

Read the rest of this entry »

Comments Off
May 28

Berto Jongman: NSA “Tailored Access Operations” (TAO) — Focus on the 2% at Great Expense While Ignoring the 98% Open Access World 2.0 Refs Added

Berto Jongman

Berto Jongman

How the U.S. Government Hacks the World

Michael Riley

BloombergBusinessWeek, 23 May 2013

EXTRACT:

The men and women who hack for the NSA belong to a secretive unit known as Tailored Access Operations. It gathers vast amounts of intelligence on terrorist financial networks, international money-laundering and drug operations, the readiness of foreign militaries, even the internal political squabbles of potential adversaries, according to two former U.S. government security officials, who asked not to be named when discussing foreign intelligence gathering. For years, the NSA wouldn’t acknowledge TAO’s existence. A Pentagon official who also asked not to be named confirmed that TAO conducts cyber espionage, or what the Department of Defense calls “computer network exploitation,” but emphasized that it doesn’t target technology, trade, or financial secrets. The official says the number of people who work for TAO is classified. NSA spokeswoman Vaneé Vines would not answer questions about the unit.

The two former security officials agreed to describe the operation and its activities without divulging which governments or entities it targets. According to the former officials, U.S. cyberspies, most from military units who’ve received specialized training, sit at consoles running sophisticated hacking software, which funnels information stolen from computers around the world into a “fusion center,” where intelligence analysts try to make sense of it all. The NSA is prohibited by law from spying on people or entities within the U.S., including noncitizens, or on U.S. citizens abroad. According to one of the former officials, the amount of data the unit harvests from overseas computer networks, or as it travels across the Internet, has grown to an astonishing 2 petabytes an hour—that’s nearly 2.1 million gigabytes, the equivalent of hundreds of millions of pages of text.

Read full article.

Read the rest of this entry »

Comments Off
May 24

Koko: Biological Computer Created at Stanford

Koko

Koko

Biological computer created at Stanford

In the foreseeable future, humans might carry microscopic natural computers inside their cells that could guard against disease and warn of toxic threats based on a Stanford research achievement.

A team of engineers there has invented genetic transistors, completing a simple computer within a living cell, a major step forward in the emerging field of synthetic biology.

The startling achievement, to be unveiled in Friday’s issue of the journal Science, presages the day when “living computers’ inside the human body could screen for cancer, detect toxic chemicals or even turn cell reproduction on and off.

“We’re going to be able to put computers inside any living cell you want,’ said lead researcher Drew Endy of Stanford’s School of Engineering.

The computers could deliver true-false answers to virtually any biological question that might be posed within a cell. For instance: Is toxic mercury present? It could detect it.

Also: They can count. This would be a useful tool when treating diseases like cancer, where cells divide uncontrollably. Suppose a liver cell carries a counter that records how many times it divides. Once the counter hits 500, for instance, the cell could be programmed to die.

Endy’s work “clearly demonstrates the power of synthetic biology and could revolutionize how we compute in the future,’ said UC Berkeley biochemical engineer Jay Keasling. He is director of the Synthetic Biology Engineering Research Center that helped support research at Stanford.

Read full article.

Comments Off
Mar 31

Owl: Pedophilia as “Privilege” and “Pure” — Single Source Page for Glimpse of Chasm Into Hell — Coast to Shining Satanic Coast – FBI Complicit? 1.5

Who?  Who?

Who? Who?

A big problem in sharing even excellent, well-sourced information on the theme of pedophiles occupying the highest ranks of organizations, whether they be corporate, governmental or even religious, is not the sense of incredulity such information usually provokes in typically asleep middle-class readers who have lived relatively protected, cocooned existences oblivious to the innumerable black undersides of what some call reality.  That’s to be expected from those who live in middle-class cocoons.  The real difficulty is in examining and sharing information on practices that are unarguably loathsome, depraved, vile, degenerate and in essence evil, and done by people we look upon as our highest and most respectable leaders. It’s easy to accuse someone of evil, and it is insufficient by itself to do so. One has to provide evidence, and providing evidence entails describing something ineffably malign and almost unutterable in its horror – that’s hard to do, by comparison, because except for those with a strong appetite or attraction to very, very dark things, a minority, no one else, understandably, wants to look at such things. People flee from what repels them, and what is more repellent than pederasts, especially those who have great power and privilege?

This undoubtedly largely has to do with living in a dominantly secular age. The influence of those who don’t believe in a Divine Order or God is pervasive enough to compel the masses to assume the flip side: to take for granted there is no Devil, no source of deep, abiding non-human evil. Anything conveyed about people and their practices that smacks of a quality or degree of evil that puts the smug assumptions of modernity into doubt, that makes the Satanic much more plausible despite the stubborn persistence of modernity’s assumptions about good and evil, is an object of terror and revulsion to the degree that modernity’s values has descended into people’s hearts and minds.  Not that religious “authorities” can be counted on to protect innocent children. Note the Catholic Church’s endless calls to stop abortion, which victimizes innocent children, they say, which is all well and good, but its compulsive, monotonic repetition of this meme seems to be a sign of a compensatory spilling-out of a guilty conscience for having permitted and protected the many pederast priests in its midst. They seem to ignore the more concrete or real crime in exchange for protesting the more abstract one when it comes to their most repeated phrase: innocent children. This happens likely because the real crime is done by their very own, at the center of power and control in the Church, by priests and their bishops.

For these and other reasons, getting the message out about pedophiles who are very powerful is more challenging and daunting than getting out information on any other category of crimes performed by members of the Elite. Yet the task should be done, if only as a microscopic, belated effort to help get some chance of justice for the countless and truly innocent children victimized and even tortured and killed by pederasts, especially those in the highest places, plus to help prevent new such crimes by the high and mighty especially.

Read the rest of this entry »

Comments Off
Jan 31