Pages

Saturday, May 14, 2022

We’ve survived

 

We’ve survived.

 

We’re reviving.

 

Time to thrive.

 

As our greatest living poet/storyteller (and Nobel Prize Winner) said:

 

As majestic bells of bolts struck shadows in the sounds


Seeming to be the Chimes of Freedom Flashing
Flashing for the warriors

whose strength is not to fight
Flashing for the refugees

on the unarmed road of flight
And for each and every underdog

soldier in the night
We gazed upon the Chimes of Freedom Flashing

Tolling for the aching ones

whose wounds cannot be nursed
For the countless confused, accused, misused,

strung-out ones ad’ worse
And for every hung-up person

in the whole wide universe
We gazed upon the Chimes of Freedom Flashing 

 

Let Freedom Ring.



Florida passenger with ‘no idea how to fly airplane’ lands safely after pilot gets sick New York Post


Powerful ‘Machine Scientists’ Distill the Laws of Physics From Raw Data Quanta


When Eyes Meet, Neurons Start to FireNeuroscience News


The ex-boyfriend of Vladimir Putin's alleged mistress is being hunted by the Russian president's personal CIA.

Former police captain Shalva Museliana, 52, dated Olympic gymnast and ex-MP Alina Kabaeva.



Washington Post The Library of Congress owns 15 million photos. 400 are on view now.: “There are more than 15 million photographic images in the Library of Congress’s holdings, so the chance of encountering anything familiar in an exhibition of a mere 400 of them is statistically slight. But “Not an Ostrich: And Other Images from America’s Library” begins with the reassuringly familiar.The first section, titled “Icons,” displays reproductions of the library’s most requested photos, which include pictures of Abraham Lincoln and the Wright brothers, as well as Dorothea Lange’s “Migrant Mother” and Gordon Parks’s “American Gothic.” 


It is absurd, almost obscene, for senior media hacks on >$150-200k a year to be howling in rage at the thought of nurses, aged-care workers, teachers etc getting another $1.00 per hour. How contemptible.

Mike Carlton

“It’s the difficult and the sad things in life that test your mettle, and test your emotional strength, sometimes in tragic ways,” Weaver says.

“But that’s what makes you stronger, ultimately, I think.”

Father Stu - From Boxing to Blessing


“I had a lover’s quarrel with the world.” Epitaph


The action superstar shines in a new multiverse comedy. She talks about her high-risk, low-budget Hong Kong days, why you can be a superhero in your 60s – and whether she could kick James Bond’s butt


People may not know those last two photos by their titles but will probably recognize the stark images of, respectively, a Dust Bowl-era refugee in California in 1936 and a Black cleaning woman in D.C. in 1942. Also featured in this section is an 1839 photo that has become renowned as the first selfie: Philadelphian Robert Cornelius’s self-portrait, made just months after Louis Daguerre announced his daguerreotype photographic process — and more than 150 years before the debut of the iPhone…Divided into 11 thematic sections, the show includes about 70 reproductions, some of them big enough to cover the large windows on the building’s southwest facade. The rest of the pictures rotate in slide shows on video screens…”

  • Library of Congress, Thomas Jefferson Building, 10 First St. SE. 202-707-9779loc.govDates: Through fall 2024.

  • Web Guide for the New Economy 2022 – Accurate and actionable data on the economy is critical to many aspects of our research and scholarship. This guide by research expert Marcus P. Zillman provides researchers with links to information on a range of sources focused on new economy data and analysis from the public and private sectors, as well as scholarly work, news, government information, reports and alerts.
  • Elon Musk’s plans for Twitter could make its misinformation problems worse – As a researcher of social media platforms, Anjana Susarla, the Omura-Saxena Professorship in Responsible AI at the Broad College of Business, finds that Musk’s ownership of Twitter and his stated reasons for buying the company raise important issues. Those issues stem from the nature of the social media platform and what sets it apart from others.
  • Propaganda, Mis- and Disinformation, and Censorship: The War for Hearts and Minds – Author and blogger Dave Pollardaddresses the incendiary global war of lies vs. truth, Pollard posits the most effective way to win and retain political power is by seizing the hearts and minds of citizens through a mix of propaganda, mis- and disinformation, and censorship. He continues, this is especially true now, living with a ubiquitous and unceasing firehose of often-conflicting information, and exploitative for-profit “social” media controlled by a handful of dimwitted and unstable western oligarchs.
  • Libraries around the world are helping safeguard Ukrainian books and culture – Ksenya Kiebuzinski, Slavic Resources Coordinator, and Head, Petro Jacyk Resource Centre, University of Toronto Libraries, University of Toronto informs us about the critical work of 1,000 volunteers, in partnership with universities in Canada and the United States, who are participating in the crowd-sourced project called Saving Ukrainian Cultural Heritage Online (SUCHO) to preserve and secure digitized manuscripts, music, photographs, 3D architectural models and other publications. So far, the team has captured 15,000 files, which are accessible via the Internet Archive.
  • The FBI is breaking into corporate computers to remove malicious code – smart cyber defense or government overreach? – What use are we in helping to solve difficult global challenges if we’re so depressed and cognitively depleted that we can’t think of the best actions to take? Ukraine doomscrolling can harm your cognition as well as your mood. Professors Barbara Jacquelyn SahakianChristelle LangleyChun Shen and Jianfeng Feng describe their research findings on what to do about it.
  • How QR codes work and what makes them dangerous – a computer scientist explains – Scott Ruoti, Assistant Professor of Computer Science, University of Tennessee discusses security issues respective to QR codes. He states that these codes are not inherently dangerous. They are simply a way to store data. However, just as it can be hazardous to click links in emails, visiting URLs stored in QR codes can also be risky in several ways.
  • Pete Recommends – Weekly highlights on cyber security issues, April 30, 2022 – Four highlights from this week: Amazon Workers Can Now Keep Cell Phones at Work; Best Reverse Image Search Tool: Google, Bing, Pixsy, Tineye; Google adds more ways to remove yourself from Search results; and Shut Stalkers Out of Your Tech.
  • Pete Recommends – Weekly highlights on cyber security issues, April 23, 2022 – Four highlights from this week: Report Finds Identity Fraud Up 167% In USPS Change Of Address Requests; Cell carriers can use your web history for ads; The FBI is breaking into corporate computers to remove malicious code – smart cyber defense or government overreach?; and Microsoft Teams Adds an Emergency Call Alert.
  • Pete Recommends – Weekly highlights on cyber security issues, April 16, 2022 – Four highlights from this week: Data From Friends and Strangers Show Where You Are; TSA’s Terrorist Watch List Comes for Amtrak Passengers; Facial recognition not required as tax ID – yet. But the tech spreads; You’re muted… or are you? Videoconferencing apps may listen even when mic is off; and Mismanaged Cloud Services Put User Data at Risk.
  • Pete Recommends – Weekly highlights on cyber security issues, April 9, 2022 – Four highlights from this week: Blockchain can power up government processes, GAO says; How QR codes work and what makes them dangerous – a computer scientist explains; Thieves hit on a new scam: Synthetic identity fraud; and Report: One in four employees who made security mistakes lost their job.
  • Pete Recommends – Weekly highlights on cyber security issues, April 2, 2022 – Four highlights from this week: Almost 50M US Residents Lost Health Data in Breaches Last Year; FCC Adds Kaspersky and Chinese Telecom Firms to National Security Threat List; Why digital ID for airport check-in is taking so long; and Hackers Are Impersonating Police to Subpoena People’s Data.