Meanwhile, historian Sean Wilentz wrote in The New Republic that NSA leaker Edward Snowden and former Guardian journalist Glenn Greenwald aren’t truth-telling fighters for constitutional rights but rather enemies of “the liberal state.” Snowden also took a variety of questions in an online Q&A Thursday. In the U.K., The Guardian‘s editor, Alan Rusbridger, accused Parliament of complacency on surveillance issues. WNYC’s Brian Lehrer collected a list of the mass intelligence-gathering capabilities we know the NSA currently has.Ĭolumbia Journalism Review‘s Lauren Kirchner documented the ongoing FOIA fight over NSA-related documents. An independent review board in the executive branch determined the phone data collection program is illegal and called for it to end. The Big ConversationĮven without a major revelation this week, the NSA has still been the subject of many in-depth analyses. (He didn’t say that, we’re just assuming.) KQED’s Amy Standen tries to make a helicopter fly using only her mind and a brain-controlled headset, but her Jedi-like powers have limited success. Alan Yu reports that your smartphone might soon be able to detect gamma radiation.Īnd your weekly gaming fix! NPR’s gaming guru Steve Mullis reviews Nidhogg, a two-player game reminiscent of the good ol’ arcade days, when Steve would make strangers cry by beating them on a Joust cabinet. I found that it’s proving harder than it seems - partly because mobile computing is getting so powerful.
#Nidhogg nsa mac#
Mac aisle, the once-acclaimed Windows XP just turned 12, and Microsoft wants the stragglers to switch over to an operating system that wasn’t developed in the previous millennium.
Steve Henn has a retrospective on its plucky beginnings. The original Macintosh is celebrating an important birthday Friday: It’s now old enough for run for U.S. And Laura Sydell writes that the breach brought to light the inconsistent laws around the country concerning how quickly companies are required to alert customers that sensitive data was stolen. to start using cards with encrypted chips because industry leaders know that current cards with magnetic stripes are outdated and easily exploitable. Elise Hu reports that this might finally force the U.S. Well, that’s not good… The blog took some time this week to look at the broader implications of the massive security breach at Target, Neiman Marcus and, potentially, other merchants. I'm fully aware that if we grow much larger I'll have to swap the system out, but until then, screw it, our server room sounds AWESOME.It may have been a slow news week - no national security flaws or revelations, no more signs that Google is trying to take over the world - but we had plenty of content to feed your tech appetite here on All Tech Considered. Yeah, my lowest-tier guy has a chart he uses because he so rarely has to access any of the servers directly he can't remember what ANY of them do. Needless to say, the first set of servers was easier to work with. The second group was Aztec gods and Mayan references Tulum, Huixtocihuatl, Tlaloc. one was biblical names: Solomon, David, Saul. I worked with a company that had two sets of servers (that I worked with). This is what happens when someone working on a Ph.D in history accidentally becomes an IT director. Our Oracle servers are Vulcanus, Hephaestus, and Sethlans, depending on the location. Our domain controllers are Hera, Juno, Astarte, and Uni, for example. Servers are named after gods from the chosen mythology, and if they're clustered / shared services the deities are equivalents. We have different locations, and each of them is assigned a pantheon. My work scheme is more interesting though. For personal use I have Delirium, Delight, Destiny, Dream, Death.