1. Has the concept of a “rising” met its end?I recently came across the term “rising China” for what felt like the umpteenth time. For some…View Post

    Has the concept of a “rising” met its end?

    I recently came across the term “rising China” for what felt like the umpteenth time. For some…

    View Post

  2. Choosing Healthfully: Nudges to Death

    The book, Nudge, focuses on how to prompt healthful choices (how to be a choice architect). A nudge…

    “is any aspect of the choice architecture that alters people’s behavior in a predictable way without forbidding any options or significantly changing…

    View Post

  3. Best. China. Social. Media. Analysis. Ever.

    For a couple years now, social scientists have spoken to the potential political analysis possible in analyzing social media content. I’ve seen a couple of these attempts and until recently did not see anything worth repeating. Results of the studies were…

    View Post

  4. Stuffing the Genie Back in the Bottle: Can Threats to the IT Supply Chain Be Mitigated? →

    The global information technology (IT) supply chain has been on the forefront of cyber security concerns for several years.  First initiated by the Bush administration’s 2008 Comprehensive National Cybersecurity Initative (CNCI), the U.S. government identified the need to develop a multi-pronged approach for global supply chain risk management, a theme that has since been underscored by the White House’s January 2012 National Strategy for Global Supply Chain Security.  Both documents agree that the globalization of the IT marketplace has created opportunities for hostile actors to compromise the confidentiality, integrity, and availability of IT products and services.  The global IT marketplace is composed of multiple businesses, vendors, and relationships that span countries, regions, and time zones.  Federal government agencies must rely on these vendors and commercial-off-the-shelf products to satisfy their IT requirements, which have politicians and security experts clamoring for supply chain oversight.  As evidenced by the recent House of Representative report on the Chinese telecommunications companies Huawei and ZTE, the U.S. government fears the possibilities of IT supply chain exploitation by foreign IT companies although it cannot attribute acts of espionage or intentional compromise. This raises two important questions:  1) Is the supply chain threat blown out of proportion as the U.S. government continues to purchase commercial products; and 2) If not, is it too late to mitigate the threats to fragmented global enterprise?  Ultimately, securing the global supply chain is as difficult as trying to secure the global Internet and for many of the same reasons.  More attention should be spent on ensuring the quality of products being integrated into networks rather than trying to find out if an adversary is going to use this cumbersome global supply chain monolith as a viable means to commit espionage.

  5. Hackers in China Attacked The Times for Last 4 Months →

  6. New Yorker - The Making of Richard Nixon →

  7. Podcast: Simon Rich Discusses Funny Writing →

    newyorker:

    This week Simon Rich’s new novella “Sell Out” is being serialized on newyorker.com. It’s the story of Simon Rich’s great-great-grandfather, who falls into a pickle barrel and emerges, one hundred years later, into hipster Brooklyn. On the podcast this week, Rich reads excerpts from the first installment, and then talks with Susan Morrison about the inspiration for his novella, his experiences writing for Saturday Night Live, and his love of the comedic premise, as practiced by Roald Dahl, T. C. Boyle, Douglas Adams, Kurt Vonnegut, and others. Listen now: http://nyr.kr/122n043

  8. How to use your iPhone, iPad or Mac to borrow ebooks from the library  →

  9. Brainpickings - The Science of Love: How Positivity Resonance Shapes the Way We Connect →

  10. Half a Million DVDs of Data Stored in Gram of DNA →

    Paleontologists routinely resurrect and sequence DNA from woolly mammoths and other long-extinct species. Future paleontologists, or librarians, may do much the same to pull up Shakespeare’s sonnets, listen to Martin Luther King Jr.’s “I have a dream” speech, or view photos. Researchers in the United Kingdom report today that they’ve encoded these works and others in DNA and later sequenced the genetic material to reconstruct the written, audio, and visual information.

    image