The new compromise on the draft data law, seen by EURACTIV, further refines the protection of trade secrets and clarifies the relationship with data protection rules and the application of the cloud-switching provisions.
2018
Amazon is the leading cloud provider for the United States intelligence community. In 2013, Amazon entered into a $600 million contract with the CIA to build a cloud for use by intelligence agencies working with information classified as Top Secret. Then, in 2017, Amazon announced the AWS Secret Region, which allows storage of data classified up to the Secret level by a broader range of agencies and companies. Amazon also operates a special GovCloud region for US Government agencies hosting unclassified information.
Andreas Whittam Smith 16.12.10: comparison of of al-qaida and anonymous "it is global, it is networked and it is decentralised", but: "Anonymous seems to lack a command structure (al-Qa'ida "central", as it is known, undoubtedly does have one)" "Mr Bobbitt didn't feel the need to explain "informational", but the WikiLeaks publications of US State Department cables and the subsequent so-called cyber war show what he had in mind. Who controls information is now a central issue... Mr Bobbitt's larger point is that the terrorism of the age always closely reflects the existing constitutional arrangements."
Posted: 9 January 14 Martin Upchurch - WBC, Web-based communication - RFID armbands on workers - system for monitoring student performance (SIMS-schools information management system) - the Quantified Self movement whereby individuals constantly self-track their vital health signs - blogging about work - clicktivism
Military's 'sock puppet' software creates fake online identities to spread pro-American propaganda Jeff Jarvis: Washington shows the morals of a clumsy spammer Nick Fielding and Ian Cobain The Guardian, Thursday 17 March 2011 "The multiple persona contract is thought to have been awarded as part of a programme called Operation Earnest Voice (OEV), which was first developed in Iraq as a psychological warfare weapon against the online presence of al-Qaida supporters and others ranged against coalition forces. Since then, OEV is reported to have expanded into a $200m programme and is thought to have been used against jihadists across Pakistan, Afghanistan and the Middle East."
by Felix Stalder, Zurich University of the Arts and one of the moderators of the mailing list nettime. He lives in Vienna, travels abroad and archives his public output at http://felix.openflows.com
Pamela Jones 20 August 2013: "The owner of Lavabit tells us that he's stopped using email and if we knew what he knew, we'd stop too. Oddly, if everyone did that, leap off the Internet, the world's economy would collapse, I suppose. I can't really hope for that. But for me, the Internet is over... So this is the last Groklaw article. I won't turn on comments. Thank you for all you've done. I will never forget you and our work together. I hope you'll remember me too. I'm sorry I can't overcome these feelings, but I yam what I yam, and I tried, but I can't. "
Si le filtrage du moteur Google.cn était un arrangement d’ordre pratique avec un pouvoir qui entend lutter contre le free flow of information, Google a fini par reconnaître que les exigences du gouvernement chinois entraient de manière fondamentale en con
Hervé Bourlard, from Idiap Research Institute ("an independent, non-profit research foundation specializing in multimedia information management and in multimodal man-machine interaction").