11 Matching Annotations
  1. Dec 2023
    1. “come back next year and try again”. My response is that it will be the same old thing – they’ve had 26 chances already. The planet can’t afford any more. I think the time for the Cop process is over. We just can’t keep kicking the can down the road.
      • for: quote - COP - Rupert Read, quote - COP - come back next year and try again, quote - alternative COP

      • quote

        • come back next year and try again
      • author: Rupert Read
      • date: Dec. 4, 2021

      • quote

        • We just can't keep kicking the can down the road
      • author: Rupert Read
      • date: Dec 4, 2021

      • comment

        • Well, COP28 is over and just as Rupert Read predicted above, we will
          • kick the can down the road again
          • come back next year and try again
        • It's a perpetual groundhog day, until it isn't
  2. Sep 2023
  3. Nov 2019
    1. Risk assessment◕Risk management strategy○Supply chain risk management◑

      okay, answer to previous question above.

    2. Risk assessment

      Note the differences between risk assessment and risk management. The project would look towards risk assessment and then migrate its focus to risk management potentially, but what then? and how will this transition be smooth/original?

    3. none of them analyzed the threat of, and vulnerabilities to, a cyberattack spanning all three interconnections.


    4. Problem definition and risk assessment

      nice nice

    5. Problem definition and risk assessment.Addresses the particular national problems, assesses the risks to critical assets and operations—including the threats to, and vulnerabilities of, critical operations—and discusses the quality of data available regarding the risk assessment.

      This is the crux of what I should be looking at I guess This is in regards to national strategies. Is this what I need to do?

    6. Further, federal agencies have performed three assessments of the potential impacts of cyberattacks on the industrial control systems supporting the grid.

      Risk assessment or assessment of impact?

    7. The electric grid is becoming more vulnerable to cyberattacks via (1) industrial control systems, (2) consumer Internet of Things (IoT)45devices connected to the grid’s distribution network, and (3) the global positioning system (GPS).

      1) ICS 2) IOT 3) GPS

      worthwhile to assess one or all? Followed up question later

  4. Sep 2016
    1. A mathematical function does not execute any code — it just knows the answer. A Haskell function has to calculate the answer.
    2. you can’t have a set of all sets