Siren Servers

How computers make poverty is a big picture event that local government has not addressed.  Big business collects information and data from billions of people and uses super computers and algorithms to calculate how to profit from that data. For example if people on social networks are talking about the big tailgate party in Oxford Walmart will stock up on ice and charge more for it that weekend. It gets much more complicated than that as the MIT graduates hired to write code of these algorithms that skirt the SEC laws and take advantage of the trading rules to do about the same thing as a card counter at a casino. Their higher mathematics is always a step ahead of the government.

The result in the present system in the big picture will produce short term profits and long term unemployment as this information edge concentrates wealth from the middle class to a few Siren Server controllers. It moves the middle class to poor and the poor never have a chance no matter what government builds or provides.  It becomes a feudal system not a fair democracy. No job is safe when computers move labor to the lowest cost. Without an income the game loses consumers.

We can not let anyone collect information about us without payment for that information. That includes all movements when carrying a cell phone, all security cameras, all GPS systems, all money transactions and every keystroke on the web.

5 Responses to “Siren Servers”

  1. Lisa says:

    The harvesting of what is called nonpublic information is one of the secretive arts of Washington, where power resides in staying ahead of developments and profiting from inside information. The absolute masters of this murky enterprise have come to be known as political intelligence operatives — a growing specialty of former congressional members and staffers and veterans of the executive branch who make regular rounds to schmooze with well-situated acquaintances and discover what is in the works that is not yet on the public radar.

  2. Lisa says:

    Cornell University and its partner, the Technion – Israel Institute of Technology, had won a bid for a new applied sciences and technology campus in order to increase entrepreneurship and job growth in the city’s technology sector.
    Economic Development Corporation awarded the project to Cornell NYC Tech rather than to Stanford University. The curriculum that is planned for the school is said to be unique, that will be dealing with technological issues and challenges. The progress will be overseen by both an academic adviser and an industry adviser.
    The campus, and in particular the collaboration with the Technion, has drawn opposition and protests. Opponents of Cornell’s partnership with Technion, including faculty and students at Cornell as well as activists in New York City, point to Technion’s alleged implication with the Israeli occupation as well as to the lack of procedural transparency involved in planning the project.

    Tupelo builds a swimming pool for economic growth.

  3. Lisa says:

    Edward Snowden, 29, is described by the paper as an ex-CIA technical assistant, currently employed by defense contractor Booz Allen Hamilton.
    He told the paper: “I don’t want to live in a society that does these sort of things… I do not want to live in a world where everything I do and say is recorded.”

    That report was followed by revelations in both the Washington Post and Guardian that the NSA tapped directly into the servers of nine internet firms including Facebook, Google, Microsoft and Yahoo to track online communication in a programme known as Prism.
    All the internet companies deny giving the US government access to their servers.
    Prism is said to give the NSA and FBI access to emails, web chats and other communications directly from the servers of major US internet companies.

  4. Lisa says:

    Companies, like civilisations, advance by leaps and bounds when genius is let loose, not when genius is locked away and deemed too out of the mainstream of data-driven knowledge.
    The inability to understand or capture the human element — that personal, even idiosyncratic, thinking that drives genius — in business is the biggest danger that comes from big data. Has there ever been a major breakthrough whose origin doesn’t reside in the brain of a man or a woman? Imagine in the not-too- distant future a brilliant person, a genius, proclaiming a new way of thinking that is contrary to big data. What would happen to her ideas if she bucked the orthodoxy of big data to suggest a different view of the world not consistent with the dominant digitally derived solution? We might lock up her ideas. If anyone paid attention to what she said, she would be denounced as uninformed.

    What if Albert Einstein lived today and not 100 years ago? What would big data say about the general theory of relativity, about quantum theory? There was no empirical support for his ideas at the time — that’s why we call them breakthroughs.
    Today, Einstein might be looked at as a curiosity, an “interesting” man whose ideas were so out of the mainstream that a blogger would barely pay attention. Come back when you’ve got some data to support your point.

  5. Lisa says:

    “We can remotely install software on a handset that operates completely independently from your phone,” warned Nohl, who said he managed the entire operation in less than two minutes using a standard PC. “We can spy on you. We know your encryption keys for calls. We can read your SMSs. More than just spying, we can steal data from the SIM card, your mobile identity, and charge to your account.”

Leave a Reply

You must be logged in to post a comment.

Dansette