Toggle light / dark theme

“The internet didn’t create this kind of story: in fact, it’s probably the oldest narrative form of all. This is narrative as a rolling multitude of voices; a story that has no controllable ending, fading instead into a network of other tales told by a network of other people. It is the narrative of everyday life, of friends we know well and not-so-well, and the ways we use their narratives to prop up our own. We know this kind of story as deeply as we know language. This has huge implications for writers. It reveals that we’re not as keen on neat narrative arcs and emotional closure as we thought we were.” Read more

Article: Harnessing “Black Holes”: The Large Hadron Collider – Ultimate Weapon of Mass Destruction

Posted in astronomy, big data, computing, cosmology, energy, engineering, environmental, ethics, existential risks, futurism, general relativity, governance, government, gravity, information science, innovation, internet, journalism, law, life extension, media & arts, military, nuclear energy, nuclear weapons, open source, particle physics, philosophy, physics, policy, posthumanism, quantum physics, science, security, singularity, space, space travel, supercomputing, sustainability, time travel, transhumanism, transparency, treatiesTagged , , , , , , , , , , , ,

Harnessing “Black Holes”: The Large Hadron Collider – Ultimate Weapon of Mass Destruction

Why the LHC must be shut down

CERN-Critics: LHC restart is a sad day for science and humanity!

Posted in astronomy, big data, complex systems, computing, cosmology, energy, engineering, ethics, existential risks, futurism, general relativity, governance, government, gravity, hardware, information science, innovation, internet, journalism, law, life extension, media & arts, military, nuclear energy, nuclear weapons, particle physics, philosophy, physics, policy, quantum physics, science, security, singularity, space, space travel, supercomputing, sustainability, time travel, transhumanism, transparency, treatiesTagged , , , , , , , , | 1 Comment on CERN-Critics: LHC restart is a sad day for science and humanity!

PRESS RELEASE “LHC-KRITIK”/”LHC-CRITIQUE” www.lhc-concern.info
CERN-Critics: LHC restart is a sad day for science and humanity!
These days, CERN has restarted the world’s biggest particle collider, the so-called “Big Bang Machine” LHC at CERN. After a hundreds of Million Euros upgrade of the world’s biggest machine, CERN plans to smash particles at double the energies of before. This poses, one would hope, certain eventually small (?), but fundamentally unpredictable catastrophic risks to planet Earth.
Basically the same group of critics, including Professors and Doctors, that had previously filed a law suit against CERN in the US and Europe, still opposes the restart for basically the same reasons. Dangers of: (“Micro”-)Black Holes, Strangelets, Vacuum Bubbles, etc., etc. are of course and maybe will forever be — still in discussion. No specific improvements concerning the safety assessment of the LHC have been conducted by CERN or anybody meanwhile. There is still no proper and really independent risk assessment (the ‘LSAG-report’ has been done by CERN itself) — and the science of risk research is still not really involved in the issue. This is a scientific and political scandal and that’s why the restart is a sad day for science and humanity.
The scientific network “LHC-Critique” speaks for a stop of any public sponsorship of gigantomanic particle colliders.
Just to demonstrate how speculative this research is: Even CERN has to admit, that the so called “Higgs Boson” was discovered — only “probably”. Very probably, mankind will never find any use for the “Higgs Boson”. Here we are not talking about the use of collider technology in medical concerns. It could be a minor, but very improbable advantage for mankind to comprehend the Big Bang one day. But it would surely be fatal – how the Atomic Age has already demonstrated — to know how to handle this or other extreme phenomena in the universe.
Within the next Billions of years, mankind would have enough problems without CERN.
Sources:
- A new paper by our partner “Heavy Ion Alert” will be published soon: http://www.heavyionalert.org/
- Background documents provided by our partner “LHC Safety Review”: http://www.lhcsafetyreview.org/

- Press release by our partner ”Risk Evaluation Forum” emphasizing on renewed particle collider risk: http://www.risk-evaluation-forum.org/newsbg.pdf

- Study concluding that “Mini Black Holes” could be created at planned LHC energies: http://phys.org/news/2015-03-mini-black-holes-lhc-parallel.html

- New paper by Dr. Thomas B. Kerwick on lacking safety argument by CERN: http://vixra.org/abs/1503.0066

- More info at the LHC-Kritik/LHC-Critique website: www.LHC-concern.info
Best regards:
LHC-Kritik/LHC-Critique

New Book: An Irreverent Singularity Funcyclopedia, by Mondo 2000’s R.U. Sirius.

Posted in 3D printing, alien life, automation, big data, bionic, bioprinting, biotech/medical, complex systems, computing, cosmology, cryptocurrencies, cybercrime/malcode, cyborgs, defense, disruptive technology, DNA, driverless cars, drones, economics, electronics, encryption, energy, engineering, entertainment, environmental, ethics, existential risks, exoskeleton, finance, first contact, food, fun, futurism, general relativity, genetics, hacking, hardware, human trajectories, information science, innovation, internet, life extension, media & arts, military, mobile phones, nanotechnology, neuroscience, nuclear weapons, posthumanism, privacy, quantum physics, robotics/AI, science, security, singularity, software, solar power, space, space travel, supercomputing, time travel, transhumanism

Quoted: “Legendary cyberculture icon (and iconoclast) R.U. Sirius and Jay Cornell have written a delicious funcyclopedia of the Singularity, transhumanism, and radical futurism, just published on January 1.” And: “The book, “Transcendence – The Disinformation Encyclopedia of Transhumanism and the Singularity,” is a collection of alphabetically-ordered short chapters about artificial intelligence, cognitive science, genomics, information technology, nanotechnology, neuroscience, space exploration, synthetic biology, robotics, and virtual worlds. Entries range from Cloning and Cyborg Feminism to Designer Babies and Memory-Editing Drugs.” And: “If you are young and don’t remember the 1980s you should know that, before Wired magazine, the cyberculture magazine Mondo 2000 edited by R.U. Sirius covered dangerous hacking, new media and cyberpunk topics such as virtual reality and smart drugs, with an anarchic and subversive slant. As it often happens the more sedate Wired, a watered-down later version of Mondo 2000, was much more successful and went mainstream.”

Read the article here >https://hacked.com/irreverent-singularity-funcyclopedia-mondo-2000s-r-u-sirius/

by — TechCrunch

Designing a good-looking website has never been easy, and while many services promise to let you build a site without ever having to touch any code, you quickly reach their limits if you want to have a more advanced site. The Grid, which is launching its crowdfunding campaign today, promises to do away with all of this. Instead of designing your site pixel by pixel yourself, The Grid team wants to use artificial intelligence to design your site based on your content and goals (more followers, more customers, higher sales, etc.).

Read more

By — Gizmag

The recently-unveiled Leia Display System (LDS) is a lot like a large touchscreen, but with one important difference: its screen is not solid, but rather made from mist. This means you can walk right through the screen, manipulate displayed images using hand gestures reminiscent of Minority Report, or even interact with the display using your whole body.

Read more

Preamble: Bitcoin 1.0 is currency — the deployment of cryptocurrencies in applications related to cash such as currency transfer, remittance, and digital payment systems. Bitcoin 2.0 is contracts — the whole slate of economic, market, and financial applications using the blockchain that are more extensive than simple cash transactions like stocks, bonds, futures, loans, mortgages, titles, smart property, and smart contracts

Bitcoin 3.0 is blockchain applications beyond currency, finance, and markets, particularly in the areas of government, health, science, literacy, culture, and art.

Read the article here » http://ieet.org/index.php/IEET/more/swan20141110

Julian Assange’s 2014 book When Google Met WikiLeaks consists of essays authored by Assange and, more significantly, the transcript of a discussion between Assange and Google’s Eric Schmidt and Jared Cohen.
As should be of greatest interest to technology enthusiasts, we revisit some of the uplifting ideas from Assange’s philosophy that I picked out from among the otherwise dystopian high-tech future predicted in Cypherpunks (2012). Assange sees the Internet as “transitioning from an apathetic communications medium into a demos – a people” defined by shared culture, values and aspirations (p. 10). This idea, in particular, I can identify with.
Assange’s description of how digital communication is “non-linear” and compromises traditional power relations is excellent. He notes that relations defined by physical resources and technology (unlike information), however, continue to be static (p. 67). I highlight this as important for the following reason. It profoundly strengthens the hypothesis that state power will also eventually recede and collapse in the physical world, with the spread of personal factories and personal enhancement technologies (analogous to personal computers) like 3-d printers and synthetic life-forms, as explained in my own techno-liberation thesis and in the work of theorists like Yannick Rumpala.
When Google Met Wikileaks tells, better than any other text, the story of the clash of philosophies between Google and WikiLeaks – despite Google’s Eric Schmidt assuring Assange that he is “sympathetic to you, obviously”. Specifically, Assange draws our attention to the worryingly close relationship between Google and the militarized US police state in the post-9/11 era. Fittingly, large portions of the book (p. 10–16, 205–220) are devoted to giving Assange’s account of the now exposed world-molesting US regime’s war on WikiLeaks and its cowardly attempts to stifle transparency and accountability.
The publication of When Google Met WikiLeaks is really a reaction to Google chairman Eric Schmidt’s 2013 book The New Digital Age (2013), co-authored with Google Ideas director Jared Cohen. Unfortunately, I have not studied that book, although I intend to pen a fitting enough review for it in due course to follow on from this review. It is safe to say that Assange’s own review in the New York Times in 2013 was quite crushing enough. However, nothing could be more devastating to its pro-US thesis than the revelations of widespread illegal domestic spying exposed by Edward Snowden, which shook the US and the entire world shortly after The New Digital Age’s very release.
Assange’s review of The New Digital Age is reprinted in his book (p. 53–60). In it, he describes how Schmidt and Cohen are in fact little better than State Department cronies (p. 22–25, 32, 37–42), who first met in Iraq and were “excited that consumer technology was transforming a society flattened by United States military occupation”. In turn, Assange’s review flattens both of these apologists and their feeble pretense to be liberating the world, tearing their book apart as a “love song” to a regime, which deliberately ignores the regime’s own disgraceful record of human rights abuses and tries to conflate US aggression with free market forces (p. 201–203).
Cohen and Schmidt, Assange tells us, are hypocrites, feigning concerns about authoritarian abuses that they secretly knew to be happening in their own country with Google’s full knowledge and collaboration, yet did nothing about (p. 58, 203). Assange describes the book, authored by Google’s best, as a shoddily researched, sycophantic dance of affection for US foreign policy, mocking the parade of praise it received from some of the greatest villains and war criminals still at large today, from Madeleine Albright to Tony Blair. The authors, Assange claims, are hardly sympathetic to the democratic internet, as they “insinuate that politically motivated direct action on the internet lies on the terrorist spectrum” (p. 200).
As with Cypherpunks, most of Assange’s book consists of a transcript based on a recording that can be found at WikiLeaks, and in drafting this review I listened to the recording rather than reading the transcript in the book. The conversation moves in what I thought to be three stages, the first addressing how WikiLeaks operates and the kind of politically beneficial journalism promoted by WikiLeaks. The second stage of the conversation addresses the good that WikiLeaks believes it has achieved politically, with Assange claiming credit for a series of events that led to the Arab Spring and key government resignations.
When we get to the third stage of the conversation, something of a clash becomes evident between the Google chairman and WikiLeaks editor-in-chief, as Schmidt and Cohen begin to posit hypothetical scenarios in which WikiLeaks could potentially cause harm. The disagreement evident in this part of the discussion is apparently shown in Schmidt and Cohen’s book: they alleged that “Assange, specifically” (or any other editor) lacks sufficient moral authority to decide what to publish. Instead, we find special pleading from Schmidt and Cohen for the state: while regime control over information in other countries is bad, US regime control over information is good (p. 196).
According to the special pleading of Google’s top executives, only one regime – the US government and its secret military courts – has sufficient moral authority to make decisions about whether a disclosure is harmful or not. Assange points out that Google’s brightest seem eager to avoid explaining why this one regime should have such privilege, and others should not. He writes that Schmidt and Cohen “will tell you that open-mindedness is a virtue, but all perspectives that challenge the exceptionalist drive at the heart of American foreign policy will remain invisible to them” (p. 35).
Assange makes a compelling argument that Google is not immune to the coercive power of the state in which it operates. We need to stop mindlessly chanting “Google is different. Google is visionary. Google is the future. Google is more than just a company. Google gives back to the community. Google is a force for good” (p. 36). It’s time to tell it how it is, and Assange knows just how to say it.
Google is becoming a force for bad, and is little different from any other massive corporation led by ageing cronies of the narrow-minded state that has perpetrated the worst outrages against the open and democratic internet. Google “Ideas” are myopic, close-minded, and nationalist (p. 26), and the corporate-state cronies who think them up have no intention to reduce the number of murdered journalists, torture chambers and rape rooms in the world or criticize the regime under which they live. Google’s politics are about keeping things exactly as they are, and there is nothing progressive about that vision.
To conclude with what was perhaps the strongest point in the book, Assange quotes NYT columnist Tom Friedman. We are warned by Friedman as early as 1999 that Silicon Valley is led less now by the mercurial “hidden hand” of the market than the “hidden fist” of the US state. Assange argues, further, that the close relations between Silicon Valley and the regime in Washington indicate Silicon Valley is now like a “velvet glove” on the “hidden fist” of the regime (p. 43). Similarly, Assange warns those of us of a libertarian persuasion that the danger posed by the state has two horns – one government, the other corporate – and that limiting our attacks to one of them means getting gored on the other. Despite its positive public image, Google’s (and possibly also Facebook’s) ties with the US state for the purpose of monitoring the US pubic deserve a strong public backlash.

Most of you will know that in December 2012, I wrote 4 blog posts here at the Lifeboat Foundation, explaining why Spaceport Colorado will be an enormous success. The blog posts are:

The Fabulous Spaceport Colorado (Part 1)

The Fabulous Spaceport Colorado (Part 2)

The Fabulous Spaceport Colorado (Part 3)

The Fabulous Spaceport Colorado (Part 4)

Here is the reason why I was able to do this. I spent many decades working in manufacturing companies and management consulting firms. I am now sharing this experience in a book titled “Reengineering Strategies & Tactics”. The book presents a new business model, the Holistic Business Model, that allows one to infer private information from public data.

If you have read the book, I would appreciate your feedback.

Book details are:
Title: Reengineering Strategies & Tactics
Sub Title: Know Your Company’s and Your Competitors’ Strategies and Tactics Using Public Information
Publisher: Universal Publishers
Date: July, 2014
Pages: 315
ISBN-10: 1627340157
ISBN-13: 9781627340151

Publisher’s Link: http://www.universal-publishers.com/book.php?method=ISBN&book=1627340157
1st 25 pages(free): http://www.bookpump.com/upb/pdf-b/7340157b.pdf

Synopsis:
The Holistic Business Model identifies, in a structured manner, the 48 structural positions and 32 strategies your company can effect, resulting in 2 million variations in your company’s strategic environment. This complexity is handled by three layers, consisting of the Operations Layer, the Revenue Transaction Layer and the Business Management Layer.

Strategy is the migration from one structural position to another in the Business Management Layer. Therefore, the Model prevents investors, business owners and corporate managers from making incorrect moves, while both, enabling them to see their future options, and enhancing the quality of their management decisions.

The Operations Layer explains why lean manufacturing (JIT and Kanbans) works when it does, when it does not, and the important considerations when setting up a manufacturing operation using lessons learned from the semiconductor and Fast Moving Consumer Goods industries. The Revenue Transaction Layer identifies how your company generates its revenue.

Based on 20+ years in manufacturing and management consulting in multinational, large, medium & small companies, Solomon invented the Holistic Business Model that only requires public information to determine your company’s and your competitors’ strategies. Four case studies are presented: a manufacturing operation, a home builder, a non-profit and a sea port.