Wednesday, March 30, 2011

Meet Somewhere In The Middle

Productive conversation between engaged and informed individuals is currently very difficult to simulate. Internet manipulation Is mightily challenged by those who trust each other and who have the right cloud tools.

America is private ... ?
There is a high correlation between systems breached by powerful organizations operating in secret and one company's operating systems. 

"Operating on both fronts simultaneously seems prudent. Not widely reported but nevertheless, quite significant: Rustock takedown. We are watching closely the activity near the border crossing at Windsor."

"Meanwhile, check this out - QIHU."

"You mean Qihoo, right? Is it true VPN end points are close to browsers?"

"These snippets would lead one to believe that the map, or at least a good part of it, is embedded in the log. The decoding key would most likely reside in a heuristic analog network of the type we have discussed."

Transitions between digital and analog are best when the highest fidelity is maintained. Practically speaking, the multi-modal nature of this interface needed a variety of tuning all with the usual artifactual baggage.

NOTE: Some of the foregoing in this BuzzTheHill post is not fictional. Consider it a public disclosure and as such, to the degree something novel and not obvious to those skilled in the art has been addressed, the specific intent was/is to put it in the PUBLIC DOMAIN

© 2011 Buzz Hill

No comments:

Post a Comment