These powerful documents, demanding the utmost secrecy, are being required of anyone associated with the homes of a small but growing number of tech executives, according to real estate agents, architects and contractors. Sometimes the houses themselves are bought through trusts or corporate entities so that the owners’ names are not on public deeds.
Today, Dun & Bradstreet’s global commercial database brings together data from 35,000 sources to provide information on 235m businesses, across 1,000 industries, in more than 220 countries. That information is updated 5m times a day, providing high rates of data quality and accuracy.
Our Location Intelligence partners use this global business data to fuel many applications from GPS to GIS, providing insight into everything from the basics, like names and addresses, to industry classifications, professional contacts, diversity indicators and corporate family tree linkages. And that’s just the start.
Can't say that I am thrilled with this development.
the rule change, as requested by the department, would allow judges to grant warrants for remote searches of computers located outside their district or when the location is unknown.
The government has defended the maneuver as a necessary update of protocol intended to modernize criminal procedure to address the increasingly complex digital realities of the 21st century. The FBI wants the expanded authority, which would allow it to more easily infiltrate computer networks to install malicious tracking software. This way, investigators can better monitor suspected criminals who use technology to conceal their identity.
But the plan has been widely opposed by privacy advocates, such as the American Civil Liberties Union, as well as some technologists, who say it amounts to a substantial rewriting of the rule and not just a procedural tweak. Such a change could threaten the Fourth Amendment’s protections against unreasonable search and seizures, they warn, and possibly allow the FBI to violate the sovereignty of foreign nations. The rule change also could let the agency simultaneously target millions of computers at once, even potentially those belonging to users who aren’t suspected of any wrongdoing.
http://english.cw.com.tw/artic...
http://www.eetimes.com/documen...
http://www.extremetech.com/ext...
This tale of an industrial turncoat ought to be a lesson to all high-tech captains
An employee of TSMC defected to Samsung is the focus of this tale of industrial espionage
TSMC has paid dearly due to their inaction and is losing clients, including Apple, Qualcomm and Nvidia, to Samsung, as a result
TSMC's blind trust on its former employee, and the resultant loss of business should become a case study for all industrial captains, especially those running high-tech companies
Here's a very brief quote
Many people were puzzled why the normally decisive TSMC had suddenly gone soft. In fact, in May 2010, the vice president of TSMC's human resources division at the time, Tu Long-chin, sent an e-mail to Liang saying he had seen reports that Liang was already employed by Samsung. That, Tu warned, would constitute a violation of the non-compete clause and lead to the forfeiture of his shares, which would be handed over to the TSMC Education and Culture Foundation.
Liang immediately replied, writing: "I have never, am not now and will never in the future do anything to let down the company."
A month later Tu and Richard Thurston, then general counsel and vice president of TSMC's legal division, held a meeting with Liang at which he promised that he "will not join Samsung now or in the future." The next day, he even sent a letter to Thurston, with whom he had been close, saying that he was thinking of resigning his position at Sungkyunkwan University.
During that time, Liang even wrote a letter to Morris Chang, insisting on his innocence and saying that he had TSMC blood in his system.
Ultimately, TSMC executives decided to believe their old comrade who had fought alongside them for more than a decade and pay him the more than NT$100 million his 738,000 withheld shares were worth in three installments.
But on July 13, 2011, just two months after collecting the final installment of the stock payout, Liang formally became the chief technology officer of Samsung Electronics' System LSI division. When the news spread, it came as a slap in the face to those who trusted him
To do justice to the story, you just gotta read it yourself
One detail that does stand out: Romney was brilliantly ruthless: He clearly had the sort of plan one would expect of a high-grade consultant, and the idea of having his aides privatize their own data by purchasing their hard drives as surplus equipment shows the type of lateral thinking one seeks in a President. However, Clinton’s concept of privatizing the entire server from the beginning is even more brilliant, and even more ruthless. By contrast, Bush, Walker, and Kitzhaber don’t seem to have had any disaster planning in place, and improvised what to do with the hardware and the data only after the scandal broke. However, the blurred lines between public and private apply in each of these scandals, and in all the email episodes that don’t rise to the level of scandal.
Proposal and Conclusion
Zephyr Teachout knows a thing or two about corruption, and has this to say:Corruption exists when institutions and officials charged with serving the public serve their own ends.
And that’s why we should avoid mixing public and private communications together when doing email as official business. Again:
Corruption is about greed and private interests put ahead of the public good.
And that’s exactly what privatizing email is all about. If the person who owns the server determines what the public can see, how is the public to be certain that the public good has not been placed second to private gain?
He goes on to offer examples of how public officials could use their private email for private gain and the public would never be the wiser.
The Open Compute Project, which wants to open up hardware the same way Linux opened up software, is starting to tackle its forklift problem.
... ... The idea is that if a lot of vendors build hardware to OCP specifications, IT departments will have more suppliers to choose from offering gear they can easily bring into their data centers. Standard hardware can also provide more platforms for innovative software, Frankovsky said.
Now HP and other vendors are starting to deliver OCP systems in a way the average IT department understands. At the same time, the organization is taking steps to make sure new projects are commercially viable rather than just exercises in technology.
Bush has some thoughts on net neutrality. Speaking at the Cedar Rapids Pizza Ranch in Iowa this weekend, Bush criticized President Obama's stance on internet regulation, saying it would "stifle competition, stifle innovation."
"The idea of regulating access to the internet with a 1934 law is one of the craziest ideas I’ve ever heard," he said.
Gigaom recently became unable to pay its creditors in full at this time. As a result, the company is working with its creditors that have rights to all of the company’s assets as their collateral. All operations have ceased. We do not know at this time what the lenders intend to do with the assets or if there will be any future operations using those assets. The company does not currently intend to file bankruptcy. We would like to take a moment and thank our readers and our community for supporting us all along.
— Gigaom management
What a loss for the tech community.
Ya'll hear about the geometer who went to the beach to catch some rays and became a tangent ?