While lack of funding killed the awards, the show had a problem that money couldn’t resolve: It was an award show created for a new technological form, yet judged on literary merit. That created confusion, especially because, as critics pointed out, many of the judges were unfamiliar with the new technology.
We understand that the people who release open source code might not have time to work on it, or might simply lose interest in it over time, but that’s precisely why version control systems exist – to take the burden off the developer and let the contributions of the community pick up the slack in an open, organized manner.
“Describing new species is not a trivial task,” Silveira said. Many sang different songs, or had different genetic sequences than previously known birds. “We considered a bird as a new species when at least two of the three criteria – plumage, voice, and genetics – were consistently different from some previously known and closely related, already described species.”
Even at ground level, the DSS taps every advantage, including new mobile devices that “transmit situational awareness of their agents and points-of-interest,” even in low-bandwidth situations. “We do try to employ as much technology as possible,” Colón said. “It’s a big enabler, in addition to our personnel. We use multiple communication technologies in order to make it as fluid as possible.”
Experts across numerous privacy and security fields agree that the solution to the over-collection and over-use of SSNs isn’t one particular replacement, but a diverse array of authentications like individual codes (similar to passwords), biometrics, and even physical tokens to create more variation in the ID process. Some also argue that the government likely won’t be the driving force behind the shift. “We have a government that works at a glacial pace in the best of times,” says Brenda Sharton, who chairs the Privacy & Cybersecurity practice at the Goodwin law firm, which has worked on data privacy breach investigations since the early 2000s. “There will reach a point where SSN [exposure] becomes untenable. And it may push us in the direction of having companies require multi-factor authentication. Change may come from enterprise and private companies responding to the threat by requiring additional identifiers.”
Typically, automakers test their design with limited production using lower grade equipment that can be modified slightly to address problems. When most of the kinks are worked out, they order the final equipment.
“It’s a very nice study, well designed, and the questions they ask are good,” said Clifford Nass, a co-founder of Stanford’s CarLab, an interdisciplinary research institute. He was not part of the study.
Outside the scientific sessions, there was more than a whiff of grooviness around. Outside the main ballroom, beyond a slatted fence, a “smoking area” and traveling tea room sat in a parking lot. Three young hippie women in classic garb wandered barefoot around the psychedelic art exhibits, and two young guys wandered around asking “Anyone know where the greens are?” There was software for tracking astrological phenomenon for sale and various herbal drinks that came in vials. People played the didgeridoo next to hot tubs under the intoxicating San Jose sun. It did not seem as if it would be difficult to conduct an uncontrolled experiment or two with a little help from some friends.
10:36 Jony Ive is talking about “starting again” to design this product. “When you really need to change things, you open up a whole new world of design,” a Bob Mansfield says in the video.
But Goner does feature an interesting Catch-22. Once inside a system it roots around and disables any antiviral software that it locates. Of course, if the antiviral application had kept the worm out of the system in the first place – as many assume it should have done – Goner’s little party trick really wouldn’t be an issue.