Air Force Association’s CyberPatriot National High School Cyber Defense Competition

CyberPatriot is the Air Force Association’s National High School Cyber Defense Competition

Western Digital Red WD30EFRX, Green WD20EARX, WD20EARS, WD30EZRX


Product Line

  • WD Caviar Blue => Value and reliability for everyday computing
  • WD Caviar Green => Cool, quiet, eco-friendly (slow rotation, 5400 rpm)
  • WD Caviar Red => NAS-Specific (seems to be Green without spindown, no RVS)
  • WD Caviar Black => Maximum performance for power computing


WD${NN} for ${NN} 100-GB (e.g. 30 is 3TB)


  • EAR => Green
  • EFR => Red
  • WD30EARX => SATA 6Gb/s
  • WD20EARX => SATA 6Gb/s
  • WD20EARS => SATA 3Gb/s



Based on information and belief

  • Manuel Masiero, Achim Roos; Western Digital Red: NAS-Specific SATA 6Gb/s Drives, Reviewed; In Tom’s Hardware; 2012-07-23.

    • It’s a benchmark and spec recitation article
    • Enterprise and nearline drives
      • Characteristics
        • Up to five platters
        • Spin at 7200 RPM or more.
        • Have rotational vibration sensors (RV, RVS)
        • Operate up to 8760 hours per year (equivalent to 24×7).
      • Examples
        • Hitachi’s Ultrastar
        • Seagate’s Constellation
        • Western Digital’s RE4 family.
    • Desktop drives
      • Characteristics
        • 2400 power-on-hours per year
      • Examples
        • Seagate’s Barracuda 7200.14
  • StephenB; Re: WD20 EFRX: Claim To Fame?; In NETGEAR ReadyNAS Forum; 2013-01-30.
    <quote>The RED drives don’t have RVS, they do have a “3D Active Balance Plus” feature that WDC claims reduces vibration. RVS is usually only found in enterprise-class drives, which are quite a bit more money than the REDs.</quote> 

Waving Goodbuy: Facebook’s Big Whiff on Traffic of Commercial Intent | Hunter Walk

Hunter Walk; Waving Goodbuy: Facebook’s Big Whiff on Traffic of Commercial Intent; In His Blog (on Linked In); 2013-06-29.

Via: backfill


  • Generalized bitching about Facebook (performed on LinkedIn where the Facebookers can’t read it)
  • Wishes there were a way to buy stuff on Facebook
  • Reminder about dark social severing the direct referral attribution
  • Two words: elf boobs


  • ; Dark Social: We Have the Whole History of the Web Wrong; In The Atlantic; 2012-10-12.
    <quote>tl;dr version

    1. The sharing you see on sites like Facebook and Twitter is the tip of the ‘social’ iceberg. We are impressed by its scale because it’s easy to measure.
    2. But most sharing is done via dark social means like email and IM that are difficult to measure.
    3. According to new data on many media sites, 69% of social referrals came from dark social. 20% came from Facebook.
    4. Facebook and Twitter do shift the paradigm from private sharing to public publishing. They structure, archive, and monetize your publications.</quote>

Or does Facebook just like showing me elf boobs instead of Apple ads?
I don’t like games or cartoon boobs. Stop showing me this.

Bruce Schneier: Talks at Google, at DEFCON 20

Bruce Schneier; Talks at Google, at Google; On YouTube; 2012-06-19; 55:23.


  • Insights about Technology and Power
  • Security isn’t part of products as sold today; products today aren’t “complete.”
  • Four Trends
    1. The Cloud
      • Computers owned by someone else.
      • Located somewhere else.
      • 3rd party holds “your data.”
    2. Locked-down Endpoints (Closed CPE)
      • More closed is more successful for the host of the ecosystem.
      • Mobile is lockdown.
      • Desktop (Windows 8, Mountain Lion) is moving to lockdown.
      • Curated “stores” for executables.
  • Trust
    • Users have to trust vendors
    • Users give up control in return for functionality.
  • Cost of Computing drives architecture, product definition and social configuration of usage.
  • Feudal Security
    • Big Host takes care of Users.
    • Users are not customers.
    • Vendors can act arbitrarily.
    • Vendors are allowed to make “mistakes.”
    • Vendors can shade the rules (cheat) to tie users to the system even more strongly.
    • Based on deceit on many dimensions.
    • Based on power and the exercise of it.
  • Agenda of the Net
    • The natural laws of the internet
    • Exhibits quotes as a flavor of the thinking “back then”
    • John Perry Barlow, 1996; Declaration of Independence of Cyberspace
    • John Gilmore, 1993; <quote>the internet interprets censorship as damage and routes around it</quote>
  • Theory of Power and Technologyrelative to The Internet
    • The Internet magnifies power
    • The powerless got some, they got it fast.
    • The powerful got more, but they were very very slow.
  • Four classes of the use of power
    • have dual use; police/military as well as market/consumer
    • The List
      1. Censorship / Content Filter
      2. Propaganda / Marketing
      3. Surveillance / Track-N-Targ (the business model of The Internet)
      4. Use Control / DRM & AppStores & Code Licensing
  • Comingling of the corporate and governance
    • Charlies Stros => The End of Pre-History (where we save everything)
    • Changing the social norms: sharing.
    • Industry lobbies for laws that benefits their business model.
  • Cybernationalism
    • ITU wants to “take over the Internet”
  • Militarization of Cyberspace
    • Something about Snowden.
    • Something about China.
    • Something about ARAMCO attack attributed to Iran.
  • Legal Theory
    • Two types of law
      1. Constitutional Law (limits government acts)
      2. Business Law (regulation limits business acts)
    • Each side uses the laws/regulations of their domain to control the “consumer in the middle.”
    • Facebook CIA Onion satire is now truth.
      CIA’s ‘Facebook’ Program Dramatically Cut Agency’s Costs
    • Thought Experiments (what if government said…; what if private industry said…)
      • Each citizen must carry a continuous tracking device
        yet cellphones
      • Each citizen must register each new contact (friend) each time an acquaintance is made
        yet Facebook
      • Business can reach out and destroy data that does not suit them
        Yet RIAA proposes a law “attack back” to destroy rogue copies of files “out there.”
  • Military Strategic Theory / Social Theory
    • Attackers have an advantage with technology (usually mil-theory says that defenders are considered to have a 3:1 advantage).
    • Analogies are cited: cars for bank robbers vs police.
    • Cybercime took a decade before police understood it.
    • Security Gap is the time before The Establishment figures out how to use it.
  • The Classes
    • The Nimble (The Dissidents)
    • The Powerful (The Establishment)
    • The Rest of Us (users in the middle)
  • Complex Social Questions which are power struggles
    • an Algorithms Judge
    • Can information be corrected
    • Can information be forgotten
    • Can certain data files be prevented from being executed
      • Music files
      • Design files: Gun designs, Barbie Dolls, Mickey Mouse
    • Weapons of Mass Destruction
      • If they exist in the wrong hands, what level of control is warranted?
  • Claim:
    • The powerful are winning right now.
    • Need innovative solutions.
    • This isn’t where government can be involved.
  • The Internet, origins and future
    • Technolibertarian origins
    • Geopolitical regulatory now
  • Suggestions
    • Researchers: study more the 4 dual use technologies
      • Areas
        1. Censorship
        2. Propaganda
        3. Surveillance
        4. Use Control
      • Examples
        • Fake yelp reviews
        • Fake Amazon reviews
        • Astroturfing on Twitter?
      • Need
        • Safe places to anonymously publish
        • Wikileaks is not safe
        • Strongbox New Yorker is under review
      • Vendors: every technology is dual-use
        • Blue Coat
        • Social network monitoring
        • FBI wants CALEA-II in the U.S., but not abroad
    • Policy
      • Keep circumvention legal
      • Keep network neutrality
      • Can’t have both ways: privacy at home requires privacy abroad
    • Laws will come, and they will be bad. Maybe they can be headed off
    • Power must be leveled; as was the case in the Rise of the Nation State
      • Rights & Responsibilities
      • Limitations on Use
      • Transparency on Rules
  • Power, coded in
    • Money
    • Social Control
    • Marketing (Advertising)

Via: backfill


The basic theme of the Feudalism metaphor is one of prognostication; future prediction.  Its premise is that history repeats itself in fundamental ways (rhymes) and so if we all agree to choose and understand the appropriate metaphor for the current time then we can by implication predict the outcome in the future.

Doesn’t Mention

  • Marc Davis who has been using this metapor for a while: Digital Feudalism. c.f. slides especially slides
  • Doc Searls who has a calf/cow metaphor for client/server in the VRM activism; c.f. blog
  • Tim Wu who has the same basic idea in his popularization and some academic output.
  • Anil Dash, who talks about online entertainment systems  using the metaphor of the legal structure of privately-owned public spaces (POPS); c.f. notes and notes


DEFCON 20 Bruce Schneier Answers Your Questions; On YouTube; 2013-06-14; 47:52; also here (with better audio)
The DEFCON talk is much more freeform but is the same basic material. The Google talk is structured and positioned as the input material for his next book. This is a promotional tour for Liars & Outliers or maybe not since the book has been out for a year.

IPv6 Transition Schemes: tunnels, 6over4, 6to4, 6rd


  • RFC 5969 IPv6 Rapid Deployment on IPv4 Infrastructures (6rd) — Protocol Specification; IETF; ISSN: 2070-1721; W. Townsley, O. Troan (Cisco); 2010-08.
  • RFC 5569 IPv6 Rapid Deployment on IPv4 Infrastructures (6rd); IETF; ISSN: 2070-1721; R. Despres (RD-IPtech); 2010-01.


  • Protocol 41
  • 6rd is modified 6to4
  • CPE
    • IPv6 => address as prefix:V4ADDR::/64 (with prefix padded to /32)
    • IPv4 => tunnel endpoint is ISP link-level routable; e.g. public or RFC 1918
  • ISP
    • IPv6 => prefix is /32-or smaller and ISP-specific
      i.e. not 2002::/16 as that is shared by all ISPs
    • IPv4 => tunnel endpoint is anycast
      e.g., but not of 6to4


  • RFC 3964 Security Considerations for 6to4; IETF; P. Savola (CSC/FUNET), C. Patel (All Play, No Work); 2004-12.
  • RFC 3068 An Anycast Prefix for 6to4 Relay Routers; IETF; C. Huitema; 2001-06.
  • RFC 3056 Connection of IPv6 Domains via IPv4 Clouds; IETF; B. Carpenter, K. Moore; 2001-02.


  • Protocol 41
  • CPE
    • IPv6 => addressed as 2002:CPEv4ADDR::/48
    • IPv4 => CPEv4ADDR (however that is assigned).
  • ISP
    • IPv6 => prefix is 2002::/16
      • unicast => 2002:ISPv4ADDR::/48 for configured ISPv4ADDR
      • anycast => 2002:c058:6301::/48
    • IPv4 => tunnel endpoint is a unicast or anycast address
      • unicast => any link-level routable address, as seen from the CPE
      • anycast => in, but

6over4 – General Transition Mechanisms

  • RFC 2893 Transition Mechanisms for IPv6 Hosts and Routers; R. Gillian (FreeGate), E. Nordmark (Sun); 2000-08.
  • RFC 2529 Transmission of IPv6 over IPv4 Domains without Explicit Tunnels, B. Carpenter (IBM), C. Jung (3Com); 1999-03.
  • RFC 1933 Transition Mechanisms for IPv6 Hosts and Routers; R. Gilligan, E. Nordmark (Sun); 1999-04; obsoleted by RFC 2893


  • Protocol 41
  • Scope <quote snip=”true”>
    • Dual IP layer (also known as Dual Stack): complete support for IPv4 and IPv6 at hosts & routers.
    • Configured tunneling of IPv6 over IPv4: Point-to-point tunnels made by encapsulating IPv6 packets within IPv4 headers to carry them over IPv4 routing infrastructures.
    • IPv4-compatible IPv6 addresses: An IPv6 address format embedding embedded IPv4 addresses.
    • Automatic tunneling of IPv6 over IPv4: IPv4-compatible addresses to automatically tunnel IPv6 packets over IPv4 networks.</quote>
  • IPv4 address embedded in IPv6 at 0::/96
    • IPv4 => IPv4ADDR/32
    • IPv6 => 0::IPv4ADDR/128
  • Node Classes
    • IPv4-only node
    • IPv4/IPv6 node (also considered an IPv6 node)
    • IPv6 node
  • Address Cases
    • IPv4-compatible IPv6 address (i.e. within. 0::/96)
    • IPv6-native address
  • Tunnels
  • Rules with IPv4 address space embedded into IPv6 at 0::/96
    • routing
    • DNS
    • DHCP
    • BOOTP
    • RARP
    • ICMP
  • “regular” IPv6 address assignment
  • IPv4 is a link-level transport
  • “regular” link routing & gateway management

5th Annual REFUEL Clean Power Motorsports Event at Mazda Raceway Laguna Seca, Sunday 2013-06-30

Official Press Release


Speed Ventures presents the 5th Annual REFUEL Clean Power Motorsports Event at Mazda Raceway Laguna Seca, Sunday June 30, 2013.




Quick UDP Internet Connections (QUIC)



  • about:flags (in Chrome)
  • Alexa Top 5000 (source of published dictionary of “trusted” or “known” root certs).
  • WebRTC
  • draft-tuexen-tsvwg-sctp-dtls-encaps-00 DTLS Encapsulation of SCTP Packets for RTCWEB; IETF Draft; R. Jessup (WorldGate), S. Oreto (Ericsson), R. Stewart (Adara), M. Tuexen (Muenster University); 2012-03-04, expires: 2012-09-05.


  • AEAD => Authenticated Encryption with Associated Data
  • CA => Certificate Authority
  • DNS
  • DTLS
  • FEC => Forward Error Correction
  • FNV-1a
  • GUID
  • HKDF
  • HMAC
  • HTTP
  • UIKM => Input Key Material
  • IV => Initialization Vector
  • MTU
  • NACK
  • NAT
  • RSA
  • RST
  • RTT
    • 0-RTT
    • 1-RTT
    • 2-RTT
  • SCTP
  • SHA-256
  • SPDY
  • SYN
  • TCP
  • TCP Cubic
  • TLS
  • UDP


(quoted, or not) From any of the documents.

  • SCTP (alone) appears to require 1 full round trip in connection establishment prior to any data transfer.  See section 5 of the SCTP RFC 4960 for a discussion of this requirement.
  • DTLS appears to routinely require 3 round trips in its connection establishment.  DTLS is modeled after TLS, which defaults to a 2 RTT HELLO exchange at connection establishment.  As noted in section 8.1 of DTLS’s description<snip/>
  • There are some efforts to add FEC beneath SCTP,<snip/>
  • Recent work to extend TCP with TCP Fast Open offers promising strategies for evolving TCP to include data in the initial SYN packet, with plausibly acceptable controls on DOS attacks.
  • Techniques used in SSL Snap Start will be used for this construction, so as to mitigate replay attacks.
  • One known attack on TCP that could potentially be worse for QUIC is the Optimistic ACK Attack.
  • This “self DOS” attack can be used to DOS other users on the same downstream links. This is also possible in TCP; c.f. UMD-CS-TR-4737
  • Within SPDY
    • to specify always-use-QUIC
      Alternate-Protocol: 123:quic
    • to specify never-use-QUIC
      Alternate-Protocol-Required: 443:https


From the Crypto Specification

  • SCID => Server Config ID
  • KEXS => Key Exchange Algorithms
    • C255 => Curve25519
    • P256 => P-256
  • AEAD => Authenticated encryption Algorithms
    • AESG=> AES-GCM
    • S20P => Salsa20
  • PUBS => Public Values
  • ORBT => Orbit
  • EXPY => Expiry (time)
  • VERS => Versions
  • CETV => Client Encrypted Tag Values
    • CIDK => ChannelID Key
    • CIDS => ChannelID Signature


Via: backfill

How Google, Yahoo!, Apple, Facebook, and Amazon track you | Baynote

Baynote; Big Brother is a Technology Company; In Their Blog; 2013-06-25?


  • <irony><quote>Baynote provides personalized customer experience solutions for multi-channel retailers.</quote></irony>; 1st sentence in the blog post.
  • <quote>We do this by observing shopper search terms, behavior and context  <snip/></quote>; they do this by monitoring search terms.


Via backfill


Via: BayNote

Via: VentureBeat

CyanogenMod to end Tegra 2 support

Status Update: Tegra 2 Support; CyanogenMod on G+; 2013-06-25.





  • The “next Android release” (unstated time)


  • Tegra 2 no NEON
  • Tegra 3 have NEON



  • Atrix uses outdated nvidia hal (and old kernel), not made for ics and jelly bean, but there was a recent port to Linux 3

The Digital Future Project, 2013

The 2013 Digital Future Report: Surveying The Digital Future, Year Eleven ; World Internet Project, Center for the Digital Future, USC Annenberg School; 2013-06; 181 pages.


  • Jeffrey I. Cole, Ph.D., Director, Founder and Organizer, World Internet Project
  • Michael Suman, Ph.D., Research Director
  • Phoebe Schramm, Associate Director
  • Liuning Zhou, Ph.D., Research Associate
  • Andromeda Salvador, Research Assistant


  1. Surveying The Digital Future – Year Eleven
  2. Internet Users and Non-Users: Who is Online? Who is Not?
  3. What are Users Doing Online?
  4. Internet Access and Use
  5. America on the Internet
  6. Internet non-users
  7. Media use and trust
  8. Consumer behavior
  9. Buying online
  10. Communication patterns
  11. Online bullying and harassment
  12. Social effects: online communities
  13. Social networking and video sharing sites
  14. Children and the Internet
  15. The Internet and the political process
  16. The Internet and free speech about politics and government
  17. Millennials: A Closer Look
  18. The 2013 Digital Future Project: trends and issues


New Ways Marketers Are Manipulating Data to Influence You |

Tanzina Vega; New Ways Marketers Are Manipulating Data to Influence You; In The New York Times (NYT); 2013-06-19.


  • Annalect
  • Proclivity Media
    • Sheldon Gilbert, founder, CEO
  • Facebook
    • Sean Bruich, the “head” of measurement research and development and partnerships, Facebook (actual title?)
  • eMarketer
    • Debra Williamson, principal analyst, eMarketer
    • color quotes

Via backfill

Google’s ‘Moto X’ Phone Rumor Roundup | Phone Arena



  • Names
    • Motorola XT1056, XT1058, XT1060
    • Moto X
    • Motorola X Phone
    • XFON (probably an AT&T specific branding)
    • Ghost
  • Display:
    • 4.7″ or maybe 4.6″ or maybe 4.5″
      (older rumors had 4.8″ and a maybe a small variant)
    • OLED
    • Resolution: 720p (720 x 1280; older rumors had 1196 x 720)
  • Basics
    • 1.7GHz dual-core Snapdragon (Qualcomm Snapdragon S4 Pro)
    • RAM: 2GB
    • Storage (internal, “native” flash storage)
      • 16GB
      • (maybe) 32GB
  • Cameras
    • 10MP rear-facing camera
    • 2MP front-facing camera
  • Radios
    • NFC
    • Bluetooth 4.0 with Low Energy, Enhanced Data Rate
    • 802.11ac (a/b/g/n/ac
    • Telecom
      • AT&T => <quote>something</quote>
      • Sprint => <quote>The device has LTE Band 25, which is only used by Sprint. Interestingly, it also has certification for HSPA+ 21 Mbps on the 850, 1900, and 2100MHz bands, but the documentation says that the device will be SIM-locked for all US carriers. </quote> source
      • Verizon => <quote>something</quote>
  • Battery
    • (maybe) Removable battery
    • (maybe) Buitin Battery
  • Android
    • Android 4.2.2
    • a.k.a. a Jelly Bean variant
    • (expected) stock Android with no MotoBlur,
    • (maybe) Google Edition, Google Experience Device
  • Branding
    • (probably) a single one-off device
      • (probably-not) a family of devices
    • Something about how this is the “last Motorola device” after which Motorola will “disappear” while they retool for some vague relaunch in the future with different branding, trade dress, theming.  Something like that.
  • Colors
  • Released 2013-08-01 (maybe)
  • Availability
    • (maybe) Sold from Google Play Store
    • (unclear) Carrier lockin contracts
  • Assembly
    • “in USA”
    • <quote>Some components will still come from Taiwan and Korea, but manufacturing of the handset will happen just outside of Fort Worth, Texas at a 500,000 sq. ft. plant that is had been used by Nokia for manufacturing phones. Ultimately, about 70% of the manufacturing will be done in Texas.</quote> source
  • Carriers:
    • AT&T => expected from the XFON trial rumor
    • Sprint => expected from the LTE tests, source of the leaked photos
    • Verizon => maybe, maybe confirmed


  • BGR sources from Phone Arena
  • Phone Arena sources from Android Authority, All Things D, Droid Life, evleaks, Mobile Syrup


In archaeological order, therefore repurposed posts appear prior to original reporting.


  • Dennis Woodside, CEO, Motorola, division of Google

Via: Daniel P.; Mysterious Motorola X phone picture pops up, testing as the XT1056 on Sprint’s LTE; In Phone Arena; 2013-06-26.

Via: ; Google’s ‘Moto X’ phone revealed in leaked photo; In BGR; 2013-06-26; repasted from the Phone Arena piece.

Analytics Media Group (AMG) and the origins in Obama 2012



A hagiography of the winning team.


  • Analytics Media Group
  • Chauncey McLean
    • COO, Analytics Media Group (AMG)
    • Age 31
    • Democrat
    • Director of Media Tracking for Obama 2012
  • Larry Grisolano
    • Oversaw ad spend, for Obama 2012.
    • Second to David Axelrod “for years” (meaning in Obama 2008?)
    • Most of the article seems to be sourced from him.
      <quote>But after the election, in February, he began to describe his new business venture to me in detail.</quote>
  • Terry Walsh
    • with Larry Grisolano on Obama 2012.
  • Pete Giangreco
    • with Larry Grisolano on Obama 2012.
  • Jeff Link
    • Iowa caucus veteran
    • An outside adviser for Obama 2012.
  • Erik Smith
    • An advertising consultant for Obama 2012.
  • Jim Messina
    • campaign manager, Obama 2012
    • <quote>innovative campaign manager — and ardent tech advocate</quote>
  • Sasha Issenberg
  • Dan Wagner
    • Age 24
    • Analytics & Scoring for Obama 2008.
    • “his own venture” instead of joining AMG.
  • David Axelrod
    • founding strategist, Obama (2008?).
  • Ken Strasma
    • Analytics & Scoring for Obama 2008.
  • Martha Coakley
    • An old-line election prognosticator.
  • Peggy Noonan
    • Oped in The Wall Street Journal in which  described a job posting of Wagner’s as “politics as done by Martians.”
  • Gaurav Shirole
    • Age 23
    • Analytics
    • Graduate, B-School, the University of California, Berkeley
  • Joel Benenson
    • Official national pollster, Obama 2008.
  • Rayid Ghani
    • Age 35
    • Research scientist
    • ex-Accenture Labs.
    • Credited with suggesting <quote>sifting through self-described supporters’ Facebook pages in search of friends who might be on the campaign’s list of the most persuadable voters?</quote>
  • Will St. Clair
    • Age 25
    • Now at AMG
    • <quote>The computer code alone was thousands of lines</quote>
    • “It would take us 5 to 10 seconds to get a friends list and match it against the voter list.”
  • Nielsen Media Research
  • Amy Gershkoff
    • Age 30
    • Ph.D., Princeton University (WHEN?)
    • <quote>had developed software that was making political ad buying more efficient</quote>
    • Matching Nielsen data against voter registration lists.
    • Channel optimization, media mix optimization.
    • Director of Media Planning, Obama 2012
      • reporting to Jim Messina
    • 2011-12 she left Obama 2012, due to a family emergency.
    • (Currently) Director of Global Analytics, Burson-Marsteller (PR & Ads).
  • Jim Margolis
    • the senior Obama strategist
    • “run by” credit for GMMB; he’s CEO, owner, partner, important-dude?
      • GMMB was the official media buying shop for Obama 2012.
  • Rentrak
    • A nonpartisan data vendor.
    • Offered services to Romney 2012 but was rejected.
      • Sara Fagey says they “chose not to use it.”
    • Competitor: Nielsen Media Research
    • Source: buys up real-time & raw viewing data directly from cable and satellite companies.
      • Size: “nearly” 20 million set-top boxes in eight million homes.
  • Carol Davidsen
    • Age 37.
      • <quote>looks younger than her 37 years — “no kids”</quote>
    • Analytics, specializing in set-top box data.
    • Prior to Obama 2012, Navic Networks (term?)
    • <quote>And she was one of the early programmers to figure out how to make a television, designed as a one-way path for sending programming into American homes, relay information back about what exactly a viewer was watching.</quote>
  • Navic Networks
    • Interactive targeted TV Ads.
    • Acquired by Microsoft 2008-06-17.
  • Technique: 3rd party anonymizes the data
  • Daniel Jester
    • Media Buyer, GMMB.
    • “the head” credit, “the head media buyer.”
  • Sara Fagen
    • Developed an “optimizer” for Romney 2012.
    • Former Bush (2008?) strategist.
    • Used TargetPoint for Romney 2012.
    • With others from TargetPoint, founded Deep Root Analytics
  • TargetPoint
  • Deep Root Analytics
  • Stuart Stevens
    • chief strategist, Romney 2012
  • National Media
    • (a) Republican ad buyer
  • Kantar Media CMAG
    • an ad-monitoring firm
  • Eric Schmidt
    • Executive Chairman, Google
    • A technology adviser to Obama 2012.
  • Civic Analytics
    • Founder: Dan Wagner
    • Investment: Eric Schmidt
    • Client: The College Board, to identify low income kids who will do well on SATs.



Motorola Atrix HD to Jelly Bean 4.2.2 with CyanogenMod 10.1

Marius Maria; Update Motorola Atrix HD to Jelly Bean 4.2.2 with CM10.1 Custom ROM; In Some Blog entitled Android Geeks; 2013-04-29.


Via backfill

Tech companies fret over loss of consumers’ trust after NSA revelations | The Hill’s Hillicon Valley

Jennifer Martinez; Tech companies fret over loss of consumers’ trust after NSA revelations; In Hillicon Valley; 2013-06-24.


  • Ron Bonjean, Singer Bonjean Strategies
    • partner, Singer Bonjean Strategies
    • a Republican strategist
    • Singer Bonjean Strategies is a public affairs advice boutique
  • Consumer Entertainment Internet
    • Facebook
    • Apple
    • Yahoo!
    • Google
  •  Mike Rogers
    • R-MI
    • Chairman, House Intelligence
  • Foreign Intelligence Surveillance Act (FISA)
  • David Drummond
    • Google
    • their “top attorney” (title?)
  • Keith Alexander
    • General Keith Alexander
    • Director, NSA
    • <quote>The TechAmerica Foundation, the non-profit educational arm of the Washington, D.C., trade group Tech America that represents tech companies like Google and Microsoft, gave NSA Director Gen. Keith Alexander its “Government Executive of the Year” award last Thursday for his efforts on cybersecurity and protecting the U.S. from hacker attacks. Alexander has also traveled to the annual Defcon conference in Las Vegas to recruit skilled hackers to work for the agency.</quote>
  • Adam Schiff
    • D-CA
    • Member, House Intelligence Committee.
    • <quote>“I’m sure it’s the worst of all worlds for them at the moment. [The PRISM scandal also brings up questions] about what they’re doing with their own data — not just whether they’re providing it to the government in terrorism cases, but are they providing it to advertisers?</quote>
  • Amie Stepanovich
    • Director, Domestic Surveillance Project at the Electronic Privacy Information Center (EPIC)
    • <quote>“The problem is [companies are] using this information for their own financial means, which means it’s vulnerable for government interception, I think that’s really the basic point that needs to be made here. <snip/> There are technological solutions that these companies could start looking at and engaging in … [and] change their business models to lead to greater privacy protections for all users.”

Via backfill

CuBox by SolidRun



  • 3W
  • external 5V power supply
  • 3.2oz (91 g)
  • 1080p HDMI
  • infra-red receiver
  • gigabit ethernet port
  • eSata 3Gbps
  • 2x USB 2.0 ports
  • micro-SD, contains the filesystem
  • 1GB or 2GB memory
    • 300MB dedicated to video (so 0.7GB or 1.7GB)
  • Marvell Armada 510 SoC.
  • 800MHz dual issue ARM PJ4
  • 32bit ARMv7 architecture and instruction set
    • iwmmxt SIMD
    • VFP hardware floating point.


Really?  Seems that the (closed) installer will only download from their cloud. Really?

<quote>Download the CuBox Installer and save it to a USB thumb drive. Then insert the thumb drive into the CuBox, connect it to network and TV, then power the device on. While CuBox boots, it downloads a list of installations, and will prompt you to select one from a number of options.</quote>

<quote>For developers, adding an item to the CuBox installer is easy too! Just write a plug-in script and upload it online. Have SolidRun add that script to the latest distribution list and everyone can access your work through the CuBox Installer!</quote>

CuBox Installer; Video 7:45

The video mentions a special keyboard+mouse USB “dongle” that is necessary to support keyboard+mouse on the same USB; there being only two USB devices supported(?)


Operating Systems



Source Code

Fedora (Fedora 17)

  • graphics does not work, frame buffer support; yet Ubuntu does?
  • manual assembly & install
  • recipe updated 2013-03-04


  • 1GB => $119.99
  • 2GB => $159.99


  • Rabeeh Khoury, CTO, SolidRun


Publish Subscribe, Persistent Messaging, Real-Tme Low-Latency Filters

Aggregations & Synthesis