recentpopularlog in
« earlier  
F-Secure - Attacks using IoT devices and Windows SMB escalate in 2019 , Sep 2019
"Cyber criminals upped the intensity of IoT and SMB-related attacks in the first half of 2019, according to a new F-Secure report, “Attack Landscape H1 2019”. The report underscores the threats IoT devices face if not properly secured when online, as well as the continued popularity of EternalBlue and related exploits two years after WannaCry."
F-Secure  IoT  cybersecurity 
16 hours ago
Is 5G a Solution in Search of a Problem? – Brink – The Edge of Risk - William Webb
"Original proponents of 5G suggested widespread use of virtual and augmented reality, autonomous cars that need low-latency gigabit connectivity, body-cams, ubiquitous internet of things and many services we cannot currently imagine. However the upgrade to 4G showed that charging customers more did not work. More critically, few consumers will see any benefit from 5G."

"A Poor Business Case for the Operator"

"5G appears to be another leap into the unknown. But unlike 3G, which happened during a tech bubble, 5G is happening in an era of austerity."
5G  hype  cellular 
20 hours ago
Isaiah 58 New International Version (NIV) - True Fasting
“Is not this the kind of fasting I have chosen:
to loose the chains of injustice
and untie the cords of the yoke,
to set the oppressed free
and break every yoke?
7 Is it not to share your food with the hungry
and to provide the poor wanderer with shelter—
when you see the naked, to clothe them,
and not to turn away from your own flesh and blood?
Bible  poverty  justice  Isaiah 
How craving attention makes you less creative | Joseph Gordon-Levitt - YouTube
"I've been lucky in my life to get a lot more than my fair share of attention. And I'm grateful for that, because like I said, it's a powerful feeling.
But there's another powerful feeling... it's sort of the opposite feeling, because it doesn't come from getting attention. It comes from paying attention."
attention  TED 
William James: Once Born and Twice Born People -
"However this doesn't mean that twice borns are unhappy. The reason is that their attitude often leads to a crisis, experienced as clinical depression, in a desire to understand the meaning of life. But the incompatibility of their desire for making sense of things and their pessimism demands a resolution if they are to love life again. And it is this demand that can lead to rebirth"
"As for the happy life, James said it consists of four main ingredients. First, we must choose to view the world as positive even though life contains sorrow and pain. Second, we must take risks by acting from the demands of our hearts. Third, we must act as if we are free and life is meaningful even though we can't be sure of either. Finally, we should remember that a crisis of meaning often leads to the happiest life."
(This article was reprinted in the online magazine of the Institute for Ethics & Emerging Technologies, May 28, 2016.)
William-James  religion  philosophy  happiness  psychology 
(7) How we make pencils - YouTube Faber-Castell, Dec 2018
Producing 2.3 billion pencils a year and being in the business for over 257 years, Faber-Castell has a sound know-how of how quality pencils are made. Have a look behind the scenes of our manufacturing.
manufacturing  video  YouTube  Faber-Castell  * 
2 days ago
Dynamic Network Adaptation for Mission Optimization (DyNAMO) - DARPA
The Dynamic Network Adaptation for Mission Optimization (DyNAMO) program is developing and testing technologies that enable adaptive, mission-responsive networking among diverse airborne platforms in contested environments.
Darpa  spectrum-efficiency  RF-Mirrors 
2 days ago
Letters reveal Mother Teresa's doubt about faith
" A book of letters written by Mother Teresa of Calcutta reveals for the first time that she was deeply tormented about her faith and suffered periods of doubt about God."
Reuters  religion  faith  doubt  crisis 
3 days ago
coming and will reveal the minds of machines - New Scientist May 2019
"Stories abound of machines that are writing, painting and making music. Are we about to enter the creative singularity, asks Marcus du Sautoy"
"A basic definition of a creative act might be one that is new, surprising and has value." Margaret Boden
NewScientist  AI  creativity 
3 days ago
How kids are raised matters less than you think
"Twin and adoption studies have shown us that about half the differences between people in any trait you want to name is due to DNA differences<>, and half isn’t. But whatever the environment is, it makes two kids in the same family as different as those in two different families"
Read more:
New  Scientist  parenting  genetics  interview  education 
3 days ago
(7) 35 Hidden Android Features. - YouTube, Sep 2019
For the Ultimate Playlist on Android Customisation:

Google Lens:
Chrome Flags: chrome://flags
Hex Installer:
Wallpaper Modder:
Screenshot Assistant:
Accurate Heart Rate:
Face Pause:
Skyline Icons:
Betta Fish:
Android  tips  howto  Mrwhosetheboss 
3 days ago
(7) Crash Course Introduction to Schenkerian Analysis - YouTube
A basic overview of Schenkerian analysis. More in-depth videos to come.
music-theory  harmony  analysis  video  YouTube 
4 days ago
Simjacker – Next Generation Spying Over Mobile | Mobile Security News | AdaptiveMobile, Sep 2019
Via Amie Stepanovich

"... Simjacker. We believe this vulnerability has been exploited for at least the last 2 years by a highly sophisticated threat actor in multiple countries, primarily for the purposes of surveillance. Other than the impact on its victims, from our analysis, Simjacker and its associated exploits is a huge jump in complexity and sophistication compared to attacks previously seen over mobile core networks. It represents a considerable escalation in the skillset and abilities of attackers seeking to exploit mobile networks. "

"This S@T Browser software is not well known, is quite old, and its initial purpose was to enable services such as getting your account balance through the SIM card. Globally, its function has been mostly superseded by other technologies, and its specification has not been updated since 2009, however, like many legacy technologies it is still been used while remaining in the background."
AdaptiveMobile  SIM  cyber-spectrum  spectrum  cellular  vulnerability 
4 days ago
Stalking cheap Chinese GPS child trackers is as easy as 123... 456 – because that's the default password on 600k+ of these gizmos • The Register, Sep 2019
"Concerned parents who strap GPS trackers to their kids to keep tabs on the youngsters may be inadvertently putting their offspring in danger. Hundreds of thousands of the gizmos ship with pathetic security, including a default password of 123456, allowing them to be potentially monitored by strangers, it is claimed."

"White hats at Avast announced on Thursday they discovered 29 models of gadgets, designed to track their child wearers, had that weak default passcode. "

"once into an account, you can see the kid's GPS coordinates, eavesdrop on the built-in microphone, access any photos on the device, and potentially even make a call to the child"

"The security pros scanned a million account numbers, and said they found more than 600,000 vulnerable devices are in circulation"
TheRegister  GPS  China  cyber-spectrum  cybersecurity  hacking  Avast  surveillance  tracking 
7 days ago
The Complex Relationship Between Religion and Purpose - Gallup poll 2007
"Regardless of whether they affiliate themselves with a religion, more than 8 in 10 respondents across 84 countries say their lives have an important meaning or purpose"
Gallup  surveys  polls  opinion  meaning  purpose  religion 
10 days ago
Hacking Iridium Satellites With Iridium Toolkit - RTL-SDR, Sep 2019
"Over on YouTube TechMinds has uploaded a video showing how to use the Iridium Toolkit software to receive data and audio from Iridium satellites with an Airspy. Iridium is a global satellite service that provides various services such as global paging, satellite phones, tracking and fleet management services, as well as services for emergency, aircraft, maritime and covert operations too. It consists of multiple low earth orbit satellites where there is at least one visible in the sky at any point in time, at most locations on the Earth.

The frequencies used by the older generation Iridium satellites are in the L-band, and the data is completely unencrypted. That allows anyone with an RTL-SDR or other SDR radio to decode the data with the open source Iridium Toolkit."

Cf. : "they discuss how Iridium security is moderate to relaxed, pointing out that Iridium claims that the majority of ‘security’ comes from the complexity of the system, rather than actual security implementations"
RTL-SDR  Iridium  hacking  satellite 
10 days ago
Machine mind hack: The new threat that could scupper the AI revolution | New Scientist Issue 3227. Apr 2019
"Even tiny tweaks to data can confuse AI algorithms, potentially arming cyber attackers with a way to undermine everything from image recognition to driverless cars"
AI  NewScientist  image-recognition 
11 days ago
Why Science Can’t Break the GMO Stalemate - The New Atlantis, Tess Doezema Sep 2019
Review of Mark Lynas’s new book, "Seeds of Science: Why We Got It So Wrong on GMOs"

"What has gone wrong with the debate such that even someone who has occupied both sides has no new insight into why the two continue to talk past each other?"

"In illustrating how entwined science is with the corporations capitalizing on its fruits, he inadvertently undermines his conceit that the issue is simply a matter of science, separate from economics, culture, and history."

"The goal is to flip the anti-GMO worldview on its head: Obviously someone is The Villain and someone is The Hero. With this approach, Lynas intensifies the polarization and the simplistic framing of the larger debate. To accept their facts is to be swayed by corrupt interests and ideologies; to deny our facts is to be post-truth."

"His friends present him with an understanding of science that is not simply a conglomeration of value-free facts. Instead, science in their view is a human and social enterprise, one with fields of inquiry that stretch back far before the present debate, and now shape which questions show up as worth asking of new technologies."

"The trouble is this: By reducing non-technocratic ways of seeing the world to mere gut reactions masked in rational language, Lynas delegitimizes them, while implicitly elevating the vision of a good world — namely, a technological one — widely shared within particular cultures of scientific reason."

"If the only legitimate register in which to criticize a new technology is that of risk, it should not be terribly surprising when this is how opponents articulate their concerns."

"A call to let all voices be heard means little when all must speak in the scientist’s tongue."
TheNewAtlantis  science  technology  culture  GMO  biotech 
11 days ago
'BeiDou + GLONASS Better than GPS' - Global Times (China) | RNTF Sep 2019
Cover of article in Global Times, Sep 2019

Blog Editor’s Note: We reported on this cooperation last month and assessed the concerns for GPS and America. It is interesting this month to see China touting it in public as a way to offset GPS (and by extension, US) leadership around the world.

Some related items/thoughts:

There are already more Bei Dou satellites in view over much of the world than GPS satellites. Add in GLONASS satellites and you have something bigger than GPS + Galileo.
China is actively promoting Bei Dou as the PNT of choice for its neighbors. As one example, police/first responders in one Malaysian state have decided to use it exclusively, undoubtedly with some free equipment included in the deal.
Every time Russia or China disrupts GPS, which is often, users are nudged away from the American system and toward Russia’s and/or China’s.
GPS is a US military asset. Both China and Russia regard it as such, as can be seen in the below article. This means that both:
See it as a threat and something they need to counter
Jam and spoof GPS as mentioned above for tactical and strategic reasons
Have established their own satellite PNT systems
Have maintained and continue to cooperate in the operation of terrestrial PNT (Loran-C)
China has placed a PNT capability in Low Earth Orbit (GPS and other GNSS are in Medium Earth Orbit) and has been making other preparations that seem to indicate it will establish a LEO PNT constellation. Doing so would provide much more powerful signals and other functionalities that would place China firmly in the lead for global PNT.
13 days ago
Annual Report on the Status of Spectrum Repurposing | Sep 2019 - National Telecommunications and Information Administration
On October 25, 2018, President Donald J. Trump issued a Presidential Memorandum establishing a national policy for the efficient and effective use of radiofrequency spectrum “to help meet our economic, national security, science, safety, and other federal mission goals now and in the future.” Among other things, the Presidential Memorandum required the Secretary of Commerce, working through National Telecommunications and Information Administration (NTIA), and in coordination with the Office of Management and Budget (OMB), the Office of Science and Technology Policy (OSTP), and the Federal Communications Commission (FCC), to submit an annual report “on the status of existing efforts and planned near- to mid-term spectrum repurposing initiatives.” This is the initial report; it addresses activities and events during a period beginning on January 1, 2018 and running through June 30, 2019.
NTIA  spectrum-sharing  spectrum 
13 days ago
Why 5G requires new approaches to cybersecurity - Brookings, Tom Wheeler and David Simpson, Sep 2019
"The hyperbolic rhetoric surrounding the Chinese equipment issues is drowning out what should be a strong national focus on the full breadth of cybersecurity risk factors facing 5G."

"Policy leaders should be conducting a more balanced risk assessment, with a broader focus on vulnerabilities, threat probabilities, and impact drivers of the cyber risk equation."

"There are five ways in which 5G networks are more vulnerable to cyberattacks than their predecessors:"
1. moved away from centralized, hardware-based switching to distributed, software-defined digital routing
2. virtualizing in software higher-level network functions formerly performed by physical appliances
3. the network is also being managed by software—...—that itself can be vulnerable
4. dramatic expansion of bandwidth
5. IoT

#1: Companies must recognize and be held responsible for a new cyber duty of care
#2: Government must establish a new cyber regulatory paradigm to reflect the new realities
Brookings  5G  cybersecurity  risk-assessment 
13 days ago
The Difference Between Washi and Machine-Made (Western) Paper
"Washi is like a room filled with air, whereas machine-made paper is like a plank hardened by concrete. Concrete may seem to be hardwearing, but is very brittle indeed. Washi may seem weaker, but is very adjustable."
Japan  art  craft  paper  design 
14 days ago
About file conflicts/duplications – sugarsync
What should I do with the duplicate files on my computer?

You'll need to review any duplicate files and keep the files you need. As long as SugarSync is running, you can use your computer's file system to rename or delete files, or you can do the same in SugarSync desktop client.
SugarSync  troubleshooting 
14 days ago
5G Real Security Threats Lost in Trump's Twitter Diplomacy - CircleID Sep 2019
"A new report on 5G and geopolitics by Oxford Information Labs details the complex landscape of 5G security. Importantly, it draws out how a variety of proven technical concerns around the quality of Huawei security practices and equipment are drowned out by the US' Twitter diplomacy."

"Critical international dialogue on genuine cybersecurity concerns relating to 5G and Huawei are being lost in the noise of the US-China trade war. This includes issues like network resiliency, attack surfaces, remote access, and the move to software-defined networks"

"... the evolution from 4G to 5G will be more complex than previous evolutions in mobile technology. For instance, rather than cookie-cutter networks, 5G implementations will be highly specialised and vulnerable to software exploits."
CircleID  Huawei  5G  security  cyber-spectrum  cybersecurity 
14 days ago
ESA spacecraft dodges potential collision with Starlink satellite - Sep 2019
"The European Space Agency said Sept. 2 it maneuvered one of its Earth science satellites to avoid a potential collision with a SpaceX Starlink satellite, the first time the agency said it’s had to maneuver to avoid a satellite associated with a broadband megaconstellation."

“The case just showed that, in the absence of traffic rules and communication protocols, collision avoidance has to rely on the pragmatism of the involved operators,” Krag said. “This is done today by exchange of emails. Such a process is not viable any longer with the increase of space traffic.”

"While ESA sounded worried about the close approach, others in the industry were nonplussed by the attention it received. "
SpaceNews  SpaceX  Starlink  ESA  space-debris  space-junk 
14 days ago
Windows 10 wakes randomly from hibernate - Microsoft Community
Tried 2 Sep 2019: there wasn't an entry PowerdownAfterShutdown on Dell XPS

edit the registry Key
hkey_local_machine\software\Microsoft\Windows NT\CurrentVersion\WinLogon
and modify PowerdownAfterShutdown and change it to 1
Windows  Windows10  troubleshooting  hibernation 
15 days ago
Windows 10 tip: Find out why your system unexpectedly wakes up after going to sleep | ZDNet
Ran this 2 Sep 2019; didn't notice anything weird

Start by opening a Command Prompt session using your Administrator credentials. In the search box, type cmd.exe, then press Ctrl+Shift+Enter to force it to run as Administrator.
By default, this session opens in the C:\Windows\System32 folder. To save your report in a non-system location, type %temp% at the command prompt and then press Enter.
Type the command powercfg /energy and press Enter. It takes 60 seconds for the Power Settings tool to generate its report, and while that trace is under way you should avoid doing anything else.
When the process is complete, a message tells you whether it identified any energy efficiency problems. To see the full report, type energy-report.html at the command prompt and then press Enter.
Windows  Windows10  troubleshooting  hibernation 
15 days ago
Windows 10 randomly waking from hibernation - Microsoft Community
I suggest you to follow the steps below and check if it helps.

Step 1: Stop the Network from Waking Your PC (did this on Sep 2 for Dell XPS on 2 Sep 2019; the "wake the computer" was unchecked)

a. Press Windows key + X and select Device Manager.
b. In Device Manager, under Network Adapter, Right click and select properties.
c. Go to the Power Management tab. uncheck the box that says: "allow computer to turn off this device to save power".
d. you'll find an “Allow this device to wake the computer” check box, which you should uncheck.

Step2: Run the Power troubleshooter. (did this on Sep 2 for Dell XPS on 2 Sep 2019; issues: time before display goes to sleep is too long; time before computer goes to sleep is too long)

Windows 10 has a built-in troubleshooter to check and fix issues with power. I would suggest you to run this troubleshooter to check if the issue is with your Power.
Refer these steps:
Press Windows key +X, select Control panel.
Change the view by option on the top right to Large icons.
Click on troubleshooting and click on the view all option on the left panel.
Run the Power troubleshooter.
Windows  Windows10  troubleshooting  hibernation 
15 days ago
PC turning itself on from hibernation Solved - Windows 10 Forums
Automatic Maintenance by default runs at 2 AM and wakes the PC.
See this tutorial to change those settings and see if this is what is waking the PC:
Automatic Maintenance - Change Settings in Windows 10 - Windows 10 Forums
Windows10  troubleshooting  howto  hibernation 
16 days ago
Failed To Enumerate Objects In The Container, Access Is Denied
Failed to enumerate objects in the container, Access is denied.
You’re more likely to face this error when you’re not the owner of the content, whose permissions you’re changing about. Thus in ...
Windows  troubleshooting  howto 
16 days ago
NTFS Permissions vs Share: Everything You Need to Know
"Share and NTFS permissions function completely separately from each other, but ultimately serve the same purpose: to prevent unauthorized access. However, when NTFS and share permissions interact or when a shared folder is in a separate shared folder with different share permissions, users might not be able to access their data or they can get higher levels of access then security admins intend."

"When you are using share and NTFS permissions together, the most restrictive permission wins."
Windows  Windows10  security  howto 
16 days ago
Gavin R. Putland: A multiplatform Helvetica-like font stack that suppresses Arial
"Arial has a habit of popping up uninvited. Under Windows, the default registry settings replace “Helvetica” with Arial. In every major Windows browser except Opera, the registry substitution takes precedence over the CSS fallback fonts, in which case you are now seeing the word “Helvetica” in Arial, although the style declaration for the word “Helvetica” specifies Microsoft Sans Serif as the fallback."

"Unfortunately the fonts available via Google Fonts do not include a close imitation of Helvetica. They do, however, include a font family called Arimo, which has the following attractions"
fonts  typography  Windows  Helvetica  Arial 
18 days ago
How to change the Wikipedia font - Quora
If you register a Wikipedia account, you can specify whatever font you like using a personal CSS page.
Wikipedia  typography  fonts  howto 
18 days ago
Unlicensed Signal Boosters Get a Boost From Amazon | WIRED Aug 2019
Via Blake Reid

"The FCC requires booster manufacturers to get their products certified as safe, and it publishes each valid certification on its website. WIRED found a number of sellers offering boosters on Amazon that are not listed as certified by the FCC."
Amazon  cellular  enforcement  FCC 
18 days ago
How do I print directory list Windows 10? - Microsoft Community
Copy the path (e.g file:///C:/Users/Obama/Music) from the folder, paste to the address bar of Firefox and hit enter. Firefox will display the list of files. Use the Firefox Print to print. Or copy and paste to Word or Notepad.

Chrome will also work. Internet Explorer will not work as it will open the folder.
Windows10  howto 
18 days ago
Viewpoint: Russia, China Alliance on Navigation Satellites Threatens GPS - National Defense | RNTF aug 2019
"Russia and China have been increasingly moving toward greater synergies between their respective satellite navigation systems since at least 2015."

"At least a few industry insiders see this as part of an on-going effort to virtually combine the two systems and replace GPS as the leading global navigation system. This has far reaching geo-political implications and could impact GPS operations globally."

"Having such a large and robust satellite system could also add to the two nations’ predilection for interfering with international GPS signals over broad areas. . . . Jamming and spoofing GPS has tactical and strategic advantages for Russia and China. "
RNTF  GPS  China  Russia  GNSS  GLONASS  BeiDou 
22 days ago
How dangerous is the KNOB Bluetooth vulnerability and what should I be - Aug 2019
Via Dale Hatfield

"Security researchers recently discovered a way to intercept a Bluetooth connection between two devices, leading to the ability to plainly view all of the data being transmitted between the two devices. The ‘attack’ was successful on 17 different kinds of Bluetooth chips on 24 different devices that they tested, which means that every popular brand of device that uses Bluetooth is vulnerable."

"In essence, the security researchers figured out how to lower the encryption level used to keep Bluetooth connections secured, by jumping in during the initial negotiation process prior to making a connection."

"In order to actually pull this off in real life, the perpetrator would need a really specialized and expensive piece of equipment, be relatively nearby and could only exploit the connection at the very moment that the two devices where attempting to pair with one another."
cyber-spectrum  cybersecurity  Bluetooth  vulnerability 
22 days ago
Heidegger: The Question Concerning Technology
Links to
heidegger  guide  philosophy  tech 
23 days ago
Study on using millimetre waves bands for the deployment of the 5G ecosystem in the Union - Publications Office of the EU
Final report - Study
Publication metadata

“Study on using mm-waves bands for the deployment of the 5G ecosystem in the Union (SMART 2017/0015)” The objective of the study was to explore the state of play and the prospects for the use of the mm-waves frequency bands for the 5G ecosystem in the Union, while taking into account also the prospective use of these bands in other geographical regions, in view of the ITU World Radiocommunication Conference 2019 (WRC 19). In line with the policy priorities of the European Union, the study has explored the potential services that would make use of mm-wave bands and their respective demand, with a focus on the 24.25-27.5 GHz ('26 GHz') ‘pioneer’ band in order to strengthen the prospects of using this band for 5G. In addition, synergies with the use of the adjacent '28 GHz' band for fixed terrestrial and/or satellite services have been explored such as the potential development of hybrid terrestrial-satellite systems. The study has also analysed the co-existence scenarios between incumbent (mainly satellite) and terrestrial 5G services in the 26 GHz band and assessed the prospects for the evolution of the business environment alongside the progressive deployment of terrestrial 5G services. It has addressed business-related and regulatory aspects (such as authorisation) and assessed the potential health effects due to exposure to the electromagnetic fields (EMF) of mm-wave spectrum. The findings of the Study have contributed to assessing the impacts of the Commission implementing decision for designating the 26 GHz pioneer band for wireless broadband electronic communications services in the Union under harmonised technical conditions suitable for 5G. This measure is a follow-up of to the 5G Action Plan (5GAP) and the European Electronic Communications Code. Furthermore, the results of the study will contribute to the assessment of opportunities of usage of other mm-wave bands for electronic communications and other relevant services, in line with the 5GAP and the opinion of the Radio Spectrum Policy Group (RSPG).
EU  Scott-Marcus  5G  EMF-exposure  health 
24 days ago
China's version of GPS now has more satellites than US original - Nikkei Asian Review, Aug 2019

"China's BeiDou satellite positioning system has overtaken its U.S. rival in size, a shift with potentially huge implications for both high-tech industry and national security. ... As of the end of June, there were 35 BeiDou satellites in operation, compared with 31 for GPS"

"Qianxun SI, a location services provider funded by Alibaba Group Holding and others, is using BeiDou signals and data from more than 2,000 ground stations to create a positioning service for self-driving vehicles with an accuracy in the centimeter range. Just as the U.S. became the leader in positioning services with GPS, China is working to develop new satellite-based technology and promote it around the world using BeiDou."

"When using BeiDou for car navigation, the receiver could theoretically transmit the car's location to a satellite in orbit, said Dean Cheng, a senior research fellow at the Heritage Foundation in Washington. He also believes Chinese satellites can jam signals in specific areas. The U.S. government is worried that such capabilities could be used in cyberattacks."
China  GPS  GNSS  BeiDou  RNTF 
25 days ago
UK, 'Five Eyes' & the Future of SatNav & PNT | RNTF, Aug 2019
The United Kingdom has a golden opportunity with this initiative to be a world leader in PNT.

To capture this title, they must be innovative and not just field a British version of what the US, Russia, Europe, and China have already done. The UK must focus on users, reliability, resilience, and affordability.
26 days ago
After Technopoly - Alan Jacobs - The New Atlantis - aug 2019,
Technocratic solutionism is dying. To replace it, we must learn again the creation and reception of myth.

What Neil Postman called “technopoly” may be described as the universal and virtually inescapable rule of our everyday lives by those who make and deploy technology, especially, in this moment, the instruments of digital communication. It is difficult for us to grasp what it’s like to live under technopoly, or how to endure or escape or resist the regime. These questions may best be approached by drawing on a handful of concepts meant to describe a slightly earlier stage of our common culture.
technology  ideas  TheNewAtlantis  NewAtlantis  myth 
26 days ago
5 Languages That Could Change the Way You See the World
Riffs on Sapir-Whorf, via Rita Tan

"Linguist Roman Jakobson described this line of investigation thus: “Languages differ essentially in what they must convey and not in what they may convey.” In other words, the primary way language influences our minds is through what it forces us to think about—not what it prevents us from thinking about."

"Guugu Ymithirr, ... use cardinal directions to express spatial information ... speakers of languages that use cardinal directions to express locations have fantastic spatial memory and navigation skills"

"For the Kuuk Thaayorre speakers, the passage of time was intimately tied to the cardinal directions"

"Yélî Dnye, ... speakers talk about color as part of a metaphorical phrase, with color terms derived from words for objects in the islander’s environment."

"the Matses people speak with what seems to be great care, making sure that every single piece of information they communicate is true as far as they know at the time of speaking. . . The language has a huge array of specific terms for information such as facts that have been inferred in the recent and distant past, conjectures about different points in the past, and information that is being recounted as a memory"

"The Pirahã speak a language without numbers, color terms, perfect form, or basic quantity terms like “few” or “some”—supposed by some, like color, to be an universal aspect of human language"
29 days ago
Why widely spoken languages have simpler grammar - Johnson
" tend to find that “big” languages—spoken by large numbers over a big land area—are actually simpler than small, isolated ones. This is largely because linguists, unlike laypeople, focus on grammar, not vocabulary"

"... is not entirely foreigners and their sloppy ways that are to blame for languages becoming simpler. Merely being bigger was enough"

"Neither the more systematic nor the more idiosyncratic languages were “better”, given group size: the small and large groups communicated equally well"

"As groups grow, the need for systematic rules becomes greater; unlearnable in-group-speak with random variation won’t do. But languages develop more rules than they need; as they are learned by foreign speakers joining the group, some of these get stripped away"
TheEconomist  language 
29 days ago
Thinking technicity: Cultural Values: Vol 2, No 1 - Richard Beardsworth

The evermore explicit technicization of the world, together with the immeasurable nature of the political and ethical questions that it poses, explicitly defy the syntheses of human imagination and invention. In response to this challenge, how can philosophy, in its relation of nonrelation with politics, help in orienting present and future negotiation with the processes of complexification that this technicization implies? The article argues that one important way to do this is to think and develop our understanding of technicity from out of metaphysics, its destructions and deconstructions. The argument proceeds from the aporia of knowledge in Plato's Meno, situates continental philosophical thought's various articulations of the ‘other’ of metaphysics in relation to the problematic of this aporia and claims that certain understandings of this alterity can be further articulated in terms of technical supplementarity. Working between the concept of ‘arche‐writing’ in the thought of Jacques Derrida and that of ‘epiphylogenesis’ in that of Bernard Stiegler, the article then develops this supplementarity in terms of a play between originary technicity and its historical differentiations, one that both holds to the articulation of alterity in recent continental philosophy and develops it further in terms of its relation to historical determination. This relation, posited through a thinking of technicity, permits, finally, the ‘development’ of an ethics of giving time with which negotiation with processes of complexification can be undertaken in the name of justice. An ethical relation to these processes thereby emerges through the very excess of the human.
philosophy  technology  technicity 
29 days ago
GNSS Threat Monitoring and Reporting: Past, Present, and a Proposed Future | RNTF Aug 2019
The authors of this excellent paper, which was named the Journal of Navigation’s best paper for 2018, propose a technical architecture to enable collection and use of diverse GNSS threat monitoring sources.
RNTF  GPS  GNSS  Interference  measurement 
29 days ago
GNSS Threat Monitoring and Reporting: Past, Present, and a Proposed Future | The Journal of Navigation | Cambridge Core
Via RNTF blog, Aug 2019


Vulnerability of satellite-based navigation signals to intentional and unintentional interference calls for a high-level overview of Global Navigation Satellite System (GNSS) threats occurring globally to understand the magnitude and evolution of the problem. Therefore, a mechanism needs to be developed whereby disparate monitoring systems will be capable of contributing to a common entity of basic information about the threat scenarios they experience. This paper begins with a literature survey of 37 state-of-the-art GNSS threat monitoring systems, which have been analysed based on their respective operational features - constellations monitored and whether they possess the capability to perform interference-type classification, spoofing detection, and interference localisation. Also described is a comparative analysis of four GNSS threat reporting formats in use today. Based on these studies, the paper describes the Horizon2020 Standardisation of GNSS Threat Reporting and Receiver Testing through International Knowledge Exchange, Experimentation and Exploitation (STRIKE3) proposed integrated threat monitoring demonstration system and related standardised threat reporting message, to enable a high-level overview of the prevailing international GNSS threat scenarios and its evolution over time.
GNSS  GPS  Interference  measurement 
29 days ago
Softbank loses £380m stake in OneWeb as British satellite start-up races to get launches off the ground - aug 2019
Softbank took an impairment loss on its stake in OneWeb earlier this year, while some early investors have lost as much as half of the value of their stakes, a source said.
29 days ago
« earlier      
per page:    204080120160

Copy this bookmark:

to read