Blog

‘Algorithm’ or ‘Intelligence’ or Who Cares?

This appeared:


But hey, an algorithm … exists on paper, in the head of programmers, just anywhere. But is an object, however ephemeral, not an actor. What’s probably meant, is that an actual computer, equipped with software that implements the algorithm, and with tons of data, and with electricity, will generate output that sufficiently resembles ‘human’ output. Any news there ..?

hFA00C326
[Your ‘brain’..?]

A dent in Dystopia (U~, too)

One part missing with all sorts of Visions for our future: What happen, to the past ..? Since we seem to value the past of today, most rightly, and will do for some time to come – we’ll have to find a way to accommodate for it in our visions for our future.
Yes, that link is to libraries. As we value the old stuff called Books. As a squared example. Whereas all the utopian visions don’t have such artefacts as if at some point, we’d all be happy with a clean slate completely overhauled redesigned world. It would be utter poverty, of cherished stuff and of mind. Shallows.
And the same, for the dystopians; as if the sun wouldn’t shine anywhere.

amazing-libraries-3__880
’nuff said.

Or… ? If the picture will not be that perfect, either way, don’t we run the danger of sliding into such a nightmare vision (either way) without noticing it ..?

[Edited to add: A couple of years later, I’ve actually been there! It’s in Prague and somewhere on this blog but haven’t been able to garner enough time to find it… ]

Half an argument for mainframes

This here article is somewhat interesting… Explanatory, but also lacking some. E.g., some strengths are given, but not how they would be competitive advantages over a mega-dc of blades or so, as the really big players do.
Oh well. Who cares ..?

For now:
Old camera
[Plain vanilla Vienna damn auto’rekt]

Start the Told You So now you still can (?)

Against the trend to dismiss any dystopian view as unduly unoptimistic and hence invalid, that I so dislike..: This here piece by In the Knows.

The Told You So Boys Cried Wolf (lopping two memes into one, in this case appropriately) may better have started now, since they will not be heard (fact about the (near) future) and may not get another opportunity when all the others, the drones, have been subdued by the 0,1%, the AI singularity beast. To put it mildly ;-|

Or, … maybe this time around, some exponential counter force may have come off the ground – not yet into full above-the-radar-floor visibility but still… If ever in history there was a chance to get it (technology) right, it would be now, now that more people are in the middle class (that always takes the beating, apart from the continuous light flogging the underclasses have always got and will always get) and have just the right minimum levels of insight and might care for their future. Unprecedented as an opportunity but hardly assured it’s seized

Anyway…, this:
DSCN6368
[Strasbourg, astronomical clock – yes, science within a cathedral]

Modernhaty

Some of you complained about hipsters’ “fedoras” (quod non). To help on your way to Initiated status, the following:
004
Which makes the choice easy, doesn’t it? Kindergarten beard plucks XOR being serious…:
4436a647f4ca019050285bce0799b732
Or, for an even more classical look:
mens-hat-chart
Or even
mens-vintage-hats-1

After which this here overview may also help, in a less culturally biased way.

PbD

Suddenly (?), amidst all sorts of ‘backlashes’ to whip the 90%, or 99%, back into sully compliance and complacency, this ENISA report came out. Issuer → importance. Get it and read…

For the effort:
20150109_144328
[Somewhat close to near perfect alignment. But no cigar for the Gemeentemuseum Den Haag …]

IoTOSI+

In order to get proper information risk management and audit in place for IoT, on top of IoTsec, the frames of mind should be grown and extended so at least they touch, if not overlap in a coherent way.
Where IoTsec-and-IRM-and-audit is about the I and C of All Of ICT, we could do worse than to have a look (back) at the OSI stack. All People Seem To Need Data Processing, remember. (Not even a question mark but a period Or else go back and study, a lot.)
Which we should extend, clarify for IoT, and deepen in detail, downwards towards the sensors and actuators, and upwards beyond the A level into … Meaning, like, Information and stuff ..?

As an interlude, you already deserve:
20150109_145625
Heh, ‘smart’phone pic; not FLlW but Van ‘t Hoff’s Villa Henny. As here in Dutch, though that states the style would be related to FLlW only – wiping the ‘near-perfect carbon copy’ aspect under the rug…
Now here’s a few actual FLlW’s…:
000005 (6)000023 (6)
How’zat for copying ‘in a style related to’…!
[Sorry for the pic quality; these scanned from analog…]

Now then, back to the OSI stack and the absence of Security in that. Audit is even further away; the orphaned nephew (role, function!) will be attached later to the whole shazam.
Given that the A is there for Application, do we really have anything like the function of the communications/data at that level or higher up ..? Well, it seems Higher Up is where we should aim indeed, as a starting point. And end point. Because the information criteria (being the quality criteria that information may or may not meet) play at that level. Resulting in all sorts of security measures being applied everywhere ‘in’ the OSI stack itself [as a quick Google shallows shows] for safeguarding these criteria at lower levels; lower in the sense of below the Meaning level i.e. A and down.

Because, the CIAEE+P (as partially explained here and here) regard quality criteria in order to ‘have’ appropriate data as medium in which Information may be seen, by interpretation, and by letting it emerge from it. (Sic, times two.) Above which we might, might possibly, even have Meaning getting attached to Information. (Big Sic.)

Oh, and, the even-below P-level implementation I’d relegate to the, usually not depicted, physical not-comms-box-but-signal-source/destination physical objects of sensors and actuators… Obviously.

So, all the Security in the picture regards the quality criteria, and the measures taken at all levels to enhance their achievement. Enhance, not ensure. Because whoever would use ‘ensure’ should be ashamed of their utter methodology devastation.
And, to be honest, there is some value in having measures at all levels. Since the grave but too common error of doing a top-down risk analysis would require that. And a proper, due, sane, bottom-up risk analysis would still also have this, in a way.
Where the conclusion is: Requirements come from above, measures to enhance meeting any requirements, should be built in as extensively and as low down as possible, only extended upwards as needed. Note that this wouldn’t mean we could potentially do without measures at some level (up), since the threats (‘risks’) would come in at intermediate and upper levels, too, not having been taken care of at lower levels ‘yet’.
Audit, well… just checking that all is there, to the needs whims of apparently unintelligent requirement setters…

I’ll leave you now; comments heartily welcomed…

All against all, part 2

OK, herewith Part II of:
Tinkering with some research that came out recently, and sometime(s) earlier, I had the idea that qua fraud, or rather ‘Cyber’threat analysis (#ditchcyber!), some development of models was warranted, as the discourse is dispersing into desparately disparate ways.

The usual picture suspect:
20141230_220025_HDR
[Art alight, Ams]

Second up, as said: The same matrix of actor threats, (actor) defenders, but this time not with the success chances or typifications, but (read horizontally) the motivations.
Fraud matrix big part 2

Next up (probably the 26th) will be typical main lines of attack vectors. After that, let’s see whether we can say anything about typical countermeasures.
Hmmm, still not sure this all will lead anywhere other than a vocabulary and classification for Attribution (as in this piece).

Maverisk / Étoiles du Nord