This video by artist Chris Jones seems to just be an extreme close up of a person’s eye. But as the camera pans back it becomes apparent that the eye is actually computer generated.
Eye Piece
This video by artist Chris Jones seems to just be an extreme close up of a person’s eye. But as the camera pans back it becomes apparent that the eye is actually computer generated.
The Obama administration’s claim that the IRS has “lost” two years of Lois Lerner’s emails, due to a hard drive failure, is unbelievable to anyone who understands how email systems work. Unless the server they actually existed on exploded (and also the redundant server, and also the redundant redundant server) the data is still there, whether Lerner’s personal hard drive failed or not.
From American Thinker:
I have been listening all week to TV pundits lamenting that Lois Lerner’s hard drive has been destroyed, and therefore her e-mails are lost. This is simply not the case. I never cease to be amazed at the lack of understanding of how the e-mail system works.
When you write an e-mail, it goes to your server to be sent to the person you e-mailed. Your server keeps a copy of that e-mail, and of all your e-mails – sent and received. When you create all the folders in your e-mail program that you use to save e-mails in…these are also stored on your server. I use MSN, so my server is an MSN server. My wife uses Gmail, so her server is a Google server. These servers are large machines, and they most often run the Unix operating system.
I have been using and working with Unix basically since its creation at Bell Labs in the ’60s. Unix has several features for doing regular backups – both incremental ones and full backups. On the Unix machine we used in one of my jobs, we created – automatically – daily incremental backups and once a week did a full backup. Back then, we did them to tape, and these tapes were then archived for future use if needed.
Lois Lerner’s e-mails exist on those backup tapes from her server. We kept our tapes for years because the government required us to do so!
Recently, my wife and I changed our e-mail program that runs on our PCs, from Windows Live to Thunderbird. And when we loaded Thunderbird, all of our e-mails and all of our folders we had been using for years to save e-mails in were automatically loaded into the new Thunderbird program. The program got them from the server! They were all there and fully restored.
So Lois Lerner’s hard drive is not the only source for her e-mails. They exist on her server in the archived backups.
When you read your e-mails from your PC, tablet, or smartphone, they are all accessing the e-mails that reside on the server. The only reason you can access them from different devices is because they exist on the server.
We went through this with Al Gore years ago, when he destroyed his PC and supposedly lost his e-mails. It was bogus then, and it’s bogus now.
As I’m typing this, I am listening to the brilliant minds on TV discussing recovering data from crashed hard drives. It makes me crazy.
Update:
From Gateway Pundit:
The IRS first signed a contract with Sonasoft in 2005.
And Sonasoft evened bragged about being the backup servers for the IRS in a 2009 tweet.
Via Peter Suderman at Reason:
Most people aren’t aware that their car is a high-tech computer. You could say that modern cars are smart phones on wheels.
In this episode of “Phreaked Out,” we met some of the top security researchers at the center of the car hacking world. The goal isn’t to make people crash: They highlight security holes in order to highlight flaws in car technology, intended to pressure auto manufacturers to be a few steps ahead of their friendly foes.
Information security researcher Mathew Solnik gave us a first-hand demonstration on how to wirelessly send commands to the car and remotely tell it what to do. With a little over a grand and about a month of work, Solnik found time outside of his full-time job to reverse-engineer a car’s computer system to make it ready for a takeover.
From his laptop, he was able to manipulate the car’s engine, brakes and security systems by wirelessly tapping into the Controller Area Network, or CAN bus, network. Without getting too deep into the details—both for legal reasons and due to my own training-wheel knowledge of such things—he was able to do so by implementing some off-the-shelf chips, a third party telematic control unit, a GSM-powered wireless transmitter/receiver setup, and a significant amount of know-how he’s accrued over the years.
The reason for such additional hardware was to make our older, mid-sized sedan function like a newer—and arguably more vulnerable—stock vehicle, which these days often come with data connections. (We would have loved to tinker with the latest, most connected car on the market, but since we were on a shoestring budget and it’s incredibly hard to find a friend who’s willing to lend their car for a hacking experiment, our pickings were slim.)
With that said, a car whose network system is connected to a cloud server and accessible by Bluetooth, cell networks, or wi-fi is potentially vulnerable to intrusion.
This is really freaky. Use your mouse to make his face move around. His eyes never leave your sight.
‘Look Up’ is a poetic short film by Gary Turk about the anti-social aspect of Social Media.
Never before has the world been so interconnected. There are countless platforms to connect, stay in touch, and talk to people. Yet with all this social media, we have ironically become anti-social.
Poet Gary Turk explains how in this powerful new poem Look Up.
“We’re a generation of idiots. Smartphones and dumb people.”
Would it be hypocritical to ask you to share this?
via Laughing Squid