Shawn Carolan is a managing director at Menlo Ventures.
Derek Chu is an Associate at Menlo Ventures.
A (native) advertisement for the Menlo Ventures portfolio companies and their investment direction in general. Something about the Don Draper character from the AMC’s television serial period-drama Mad Men, as a vision of greatness to which they aspire and to whose ideas they hew.
Claim: doubling time of new (scientific) journal creation is 15 years, 10x in 50 years.
Quote: “law of exponential increase, each [scientific] advance generates a new series of advances at a reasonably constant birth rate, so that the number of births is strictly proportional to the size of the population of discoveries at any given time.”
Quote: ”The ‘information explosion’ noted in recent years makes it essential that storage requirements for all information be kept to a minimum.”
Quote: “a fully automatic and rapid three-part compressor which can be used with ‘any’ body of information to greatly reduce slow external storage requirements and to increase the rate of information transmission through a computer.”
Quote: “Too many information handlers seem to measure a man by the number of bits of storage capacity his dossier will occupy.”
Japan, Ministry of Posts and Telecommunications, Information Flow Census
Term: “amount of words” (as a unit of measure of information)
Origin: uncited 1969 paper.
1975, (information) supply increasing faster than demand (consumption)
1978, demand is stagnant
Quote: (in 1978) “the demand for information provided by mass media, which are one-way communication, has become stagnant, and the demand for information provided by personal telecommunications media, which are characterized by two-way communications, has drastically increased…. Our society is moving toward a new stage… in which more priority is placed on segmented, more detailed information to meet individual needs, instead of conventional mass-reproduced conformed information.”
Quote: “Those associated with storage devices long ago realized that Parkinson’s First Law may be paraphrased to describe our industry—‘Data expands to fill the space available’…. I believe that large amounts of data are being retained because users have no way of identifying obsolete data; the penalties for storing obsolete data are less apparent than are the penalties for discarding potentially useful data.”
Hungary, Central Statistics Office
Claim: national information accounts, measuring in ‘bits’
1981, research project started
1993, manual for a standard system of information accounts; Istvan Dienes, chief scientist of Central Statistics Office
Area: growth trends in 17 major communications media from 1960 to 1977
Quote: “words made available to Americans (over the age of 10) through these media grew at a rate of 8.9 percent per year… words actually attended to from those media grew at just 2.9 percent per year…. In the period of observation, much of the growth in the flow of information was due to the growth in broadcasting… But toward the end of that period  the situation was changing: point-to-point media were growing faster than broadcasting.”
Tim O’Reilly; What is Web 2.0; In His Blog; 2005-09.
Quoted: “As Hal Varian remarked in a personal conversation last year, ‘SQL is the new HTML.’ Database management is a core competency of Web 2.0 companies, so much so that we have sometimes referred to these applications as ‘infoware’ rather than merely software.”
In recent years, hardware Trojans have drawn the attention of governments and industry as well as the scientific community. One of the main concerns is that integrated circuits, e.g., for military or criticalinfrastructure applications, could be maliciously manipulated during the manufacturing process, which often takes place abroad. However, since there have been no reported hardware Trojans in practice yet, little is known about how such a Trojan would look like, and how difficult it would be in practice to implement one. In this paper we propose an extremely stealthy approach for implementing hardware Trojans below the gate level, and we evaluate their impact on the security of the target device. Instead of adding additional circuitry to the target design, we insert our hardware Trojans by changing the dopant polarity of existing transistors. Since the modied circuit appears legitimate on all wiring layers (including all metal and polysilicon), our family of Trojans is resistant to most detection techniques, including ne-grain optical inspection and checking against “golden chips”. We demonstrate the effectiveness of our approach by inserting Trojans into two designs – a digital post-processing derived from Intel’s cryptographically secure RNG design used in the Ivy Bridge processors and a side-channel resistant SBox implementation – and by exploring their detectability and their effects on security.
The TLS protocol, and the SSL protocol 3.0 and possibly earlier, does not properly associate renegotiation handshakes with an existing connection, which allows man-in-the-middle attackers to insert data into HTTPS sessions, and possibly other types of sessions protected by TLS or SSL, by sending an unauthenticated request that is processed retroactively by a server in a post-renegotiation context, related to a “plaintext injection” attack, aka the “Project Mogul” issue.
Microsoft Internet Information Services (IIS) 7.0.
mod_ssl in the Apache HTTP Server 2.2.14 and earlier.
OpenSSL before 0.9.8l.
GnuTLS 2.8.5 and earlier.
Mozilla Network Security Services (NSS) 3.12.4 and earlier.
Society’s techno-social systems are becoming ever faster and more computer-orientated. However, far from simply generating faster versions of existing behaviour, we show that this speed-up can generate a new behavioural regime as humans lose the ability to intervene in real time. Analyzing millisecond-scale data for the world’s largest and most powerful techno-social system, the global financial market, we uncover an abrupt transition to a new all-machine phase characterized by large numbers of subsecond extreme events. The proliferation of these subsecond events shows an intriguing correlation with the onset of the system-wide financial collapse in 2008. Our findings are consistent with an emerging ecology of competitive machines featuring ‘crowds’ of predatory algorithms, and highlight the need for a new scientific theory of subsecond financial phenomena.
Robots take over; press release; On EurekAlert; 2013-09-09.
Teaser: University of Miami researchers discover the sudden rise of a global ecology of interacting robots that trade on the global markets at speeds too fast for humans.
CPU and GPU:
Freescale iMX6 CPU — same footprint can support dual-lite and quad versions:
Kevin D. Haggerty, Richard V. Ericson; The Surveillant Assemblage; In British Journal of Sociology; Vol. 51, No. 4; 2000-12; 18 pages.
George Orwell’s ‘Big Brother’ and Michel Foucault’s ‘panopticon’ have dominated discussion of contemporary developments in surveillance. While such metaphors draw our attention to important attributes of surveillance, they also miss some recent dynamics in its operation. The work of Gilles Deleuze and Félix Guattari is used to analyse the convergence of once discrete surveillance systems. The resultant ‘surveillant assemblage’ operates by abstracting human bodies from their territorial settings, and separating them into a series of discrete flows. These flows are then reassembled in different locations as discrete and virtual ‘data doubles’. The surveillant assemblage transforms the purposes of surveillance and the hierarchies of surveillance, as well as the institution of privacy.