5 Matching Annotations
  1. Jul 2021
  2. May 2021
    1. he new aristocracy was made up for the most part of bureaucrats, scientists, technicians, trade-union organizers, publicity experts, sociologists, teachers, journalists, and professional politicians. These people, whose origins lay in the salaried middle class and the upper grades of the working class, had been shaped and brought together by the barren world of monopoly industry and centralized government. As compared with their opposite numbers in past ages, they were less avaricious, less tempted by luxury, hungrier for pure power, and, above all, more conscious of what they were doing and more intent on crushing opposition. This last difference was cardinal. By comparison with that existing today, all the tyrannies of the past were half-hearted and inefficient. The ruling groups were always infected to some extent by liberal ideas, and were content to leave loose ends everywhere, to regard only the overt act and to be uninterested in what their subjects were thinking. Even the Catholic Church of the Middle Ages was tolerant by modern standards. Part of the reason for this was that in the past no government had the power to keep its citizens under constant surveillance. The invention of print, however, made it easier to manipulate public opinion, and the film and the radio carried the process further. With the development of television, and the technical advance which made it possible to receive and transmit simultaneously on the same instrument, private life came to an end. Every citizen, or at least every citizen important enough to be worth watching, could be kept for twenty-four hours a day under the eyes of the police and in the sound of official propaganda, with all other channels of communication closed. The possibility of enforcing not only complete obedience to the will of the State, but complete uniformity of opinion on all subjects, now existed for the first time.

      new society, new aristocracy, total power, television, technology

  3. Oct 2019
    1. ) Blockchain MemoryWe let LL be the blockchain mem-ory space, represented as the hastable L:{0,1}256→{0,1}NL:\{0,1\}^{256}\rightarrow \{0, 1\}^{N}, where N≫N \gg 256 and can store sufficiently-large documents. We assume this memory to be tamperproof under the same adversarial model used in Bitcoin and other blockchains. To intuitively explain why such a trusted data-store can be implemented on any blockchain (including Bitcoin), consider the following simplified, albeit inefficient, implementation: A blockchain is a sequence of timestamped transactions, where each transaction includes a variable number of output addresses (each address is a 160-bit number). LL could then be implemented as follows - the first two outputs in a transaction encode the 256-bit memory address pointer, as well as some auxiliary meta-data. The rest of the outputs construct the serialized document. When looking up L[k]L[k], only the most recent transaction is returned, which allows update and delete operations in addition to inserts.

      This paragraph explains how blockchain hides one's individual identity and privacy, while giving them a secure way of using the funds. In my opinion lot hacker ransomware are done using block-chain technology coins, this and one more paragraph here is really interesting to read about how blockchain helps protect personal data. and i also related this this hacking and corruption or money laundering

  4. Mar 2019
    1. New Media Consortium Horizon Report This page provides a link to the annual Horizon Report. The report becomes available late in the year. The report identifies emerging technologies that are likely to be influential and describes the timeline and prospective impact for each. Unlike the link to top learning tools that anyone can use, the technologies listed here may be beyond the ability of the average trainer to implement. While it is informative and perhaps a good idea to stay abreast of these listings, it is not necessarily something that the average instructional designer can apply. Rating: 3/5

  5. Sep 2015