Thursday, October 17, 2019

Theatre’s Existential Question: What’s The Cost Of Survival?

BEAR THIS IN MIND WHEN NEXT YOU ARE LECTURED ABOUT RESPECTING THE DIGNITY OF THE COURT: Two male judges shot after female judge gives middle finger during drunken night out.


A Seattle Theatre’s Existential Question: What’s The Cost Of Survival?


“Sustainable. It was one of the hot buzzwords in the funding community a few years ago, until some began questioning why it was desirable to enable artistically limp arts organizations be better able to limp along. Sometimes perhaps it’s better to declare victory and acknowledge you’ve said all you needed to say.” – Post Alley





Harold Bloom, “a singular breed of scholar-teacher-critic-prose-poet-pamphleteer,” has died. He was 89... James Wood... Graeme Wood... Michael Dirda... Justin A. Sider... Dwight Garner... James Romm... Marco Roth... Lucas Zwirner... Guardian... AP... more much more  


I’ll let readers chew on this, but using caffeine as a basis of comparison is extraordinarily disingenuous. The amount of caffeine in coffee and colas is teeny. Pure caffeine is extraordinarily toxic. A research chemist colleague who had 12 patents to her name once took a job running a testing lab (she was a trailing spouse and this was way below her expertise level). For some reason, the lab had a pound of pure caffeine. She was completely freaked out about it. If anyone accidentally got some on their fingertip and put it in their mouth, it would be fatal. She said that pound was enough to kill 50,000 people


Carl Williams is back: Gyton Grantley returns to life of crime for third hit

The actor will return to play the baby-faced killer and drug dealer in Nine's new show Informer 3838.


Pete Recommends – Weekly highlights on cyber security issues, October 12, 2019 – Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weisshighlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: Americans and Digital Knowledge; 10 Tips to Avoid Leaving Tracks Around the Internet; Proving You’re You: How Federal Agencies Can Improve Online Verification; and New Report: “World’s First Deepfake Audit Counts Videos and Tools on the Open Web”



Cold River explained to Yammerings ...
Is 'water' simple or composite? Discussion of 'simple' here
'Water' would appear to be 'simple'.
Obj 1 If you split water into it's constituent parts, you end up with gas which is clearly not water.
Obj 2 If you try to split water, it stops being water, so must be simple.
On the other hand every created thing is composite.
I reply The composite nature of created things is apparent, whether you consider the building blocks from which they are made, or the fact that their being and essence are not the same etc.  If you can point at something, you can always demonstrate composition in some sense or other.  For example, I can split my pint of beer into two halves.  I think what we were really asking without realising it was 'is the form of water simple'.  Are forms simple?
Reply to the objections
 If this is simplicity, then what does complexity look like?






… Apple, Google, Basketball, and Chinese Dominance of American Culture | VodkaPundit.
Barely days after getting re-approved on Apple’s App Store, the Cupertino-based tech giant has caved to pressure from Beijing and removed the popular HKmap.live app, which protestors use to track (and avoid) police.


Bloomberg – “Where’s the best place to hide a body? The second page of a Google search… The gallows humor shows that people rarely look beyond the first few results of a search, but Lee Griffin isn’t laughing. In the 13 years since he co-founded British price comparison website GoCompare, the 41-year-old has tried to keep his company at the top of search results, doing everything from using a “For Dummies” guide in the early days to later hiring a team of engineers, marketers and mathematicians. That’s put him on the front lines of a battle challenging the dominance of Alphabet’s Google in the search market — with regulators in the U.S. and across Europe taking a closer look. Most of the sales at GoCompare, which helps customers find deals on everything from car and travel insurance to energy plans, come from Google searches, making its appearance at the top critical. With Google — whose search market share is more than 80% — frequently changing its algorithms, buying ads has become the only way to ensure a top spot on a page. Companies like GoCompare have to outbid competitors for paid spots even when customers search for their brand name


The  Comeback is always greater than the setback ...Witzelsucht .... 
Eichensehr, Kristen, The Law & Politics of Cyberattack Attribution (September 15, 2019). UCLA Law Review, Vol. 67, (2020, Forthcoming); UCLA School of Law, Public Law Research Paper No. 19-36. Available at SSRN: https://ssrn.com/abstract=3453804

“Attribution of cyberattacks requires identifying those responsible for bad acts, prominently including states, and accurate attribution is a crucial predicate in contexts as diverse as criminal indictments, insurance coverage disputes, and cyberwar. But the difficult technical side of attribution is just the precursor to highly contested legal and policy questions about when and how to accuse governments of responsibility for cyberattacks. Although politics may largely determine whether attributions are made public, this Article argues that when cyberattacks are publicly attributed to states, such attributions should be governed by legal standards. Instead of blocking the development of evidentiary standards for attribution, as the United States, United Kingdom, and France are currently doing, states should establish an international law requirement that public attributions must include sufficient evidence to enable cross-checking or corroboration of the accusations. This functionally defined standard harnesses both governmental and non-governmental attribution capabilities to shed light on states’ actions in cyberspace, and understanding state practice is a necessary precondition to establishing norms and customary international law to govern state behavior. Moreover, setting a clear evidentiary standard for attribution in the cybersecurity context has the potential to clarify currently unsettled general international law on evidentiary rules…”