71
71
Aug 13, 2017
08/17
by
CSPAN2
tv
eye 71
favorite 0
quote 0
we are metadata this configuration is best described the what a jury of the graph. whether it actualizes through technology but more appropriately to be there by the rhetoric. that code represents not just us but they celebrate the world and that goes hand-in-hand with but but that seems like the one that stays late at the office with a partnership. the yet that voice-over copy is more substantial so then the world changes. with those ideas and how it is organized. with the knowledge of how that is defined or connected of course, we don't have to use microsoft products to of the shower potential but they will critique the role that technology has to determine who might become. and then to play second fiddle with citizenship celebrity they become the author of who we are and it classifies us it did those classifications carry immense weight. and racine in gender mean. it needs the central argument but then to say i am john without full comprehension. in this is the political astilbe of 84. how much the present controls the past. everything that comes before so what h
we are metadata this configuration is best described the what a jury of the graph. whether it actualizes through technology but more appropriately to be there by the rhetoric. that code represents not just us but they celebrate the world and that goes hand-in-hand with but but that seems like the one that stays late at the office with a partnership. the yet that voice-over copy is more substantial so then the world changes. with those ideas and how it is organized. with the knowledge of how...
36
36
Aug 6, 2017
08/17
by
BLOOMBERG
tv
eye 36
favorite 0
quote 0
because likely metadata exists. metadata, if you are putting together a profile, is very important. emily: can we assume that apple is always working to make encryption even stronger? tim: the reality is that the cyberattacks on people and governments -- i mean, it is happening left and right everywhere -- these affect your safety, your security. so it is not just privacy. it is not privacy versus security. it is privacy and security versus security. and so, we are always working to try to stay one step ahead of these hackers that, frankly speaking, have gone from the guy in the basement that is a kind of hobbyist to a sophisticated enterprise. and it takes all that we can do to do it, and we do not think our users should have to think through all of this stuff. it is not practical for people, and so we try to stand up for users and stay one step ahead of these guys. emily: you said cars are an area ripe for disruption. how important is it that apple not miss out on cars? ♪ emily: let's talk about the world's second
because likely metadata exists. metadata, if you are putting together a profile, is very important. emily: can we assume that apple is always working to make encryption even stronger? tim: the reality is that the cyberattacks on people and governments -- i mean, it is happening left and right everywhere -- these affect your safety, your security. so it is not just privacy. it is not privacy versus security. it is privacy and security versus security. and so, we are always working to try to stay...
86
86
Aug 1, 2017
08/17
by
KTVU
tv
eye 86
favorite 0
quote 1
officers were able to track him down from metadata in those emails. >>> the open ace have treated their top pitcher. the 27-year-old pitcher will go to new york in exchange for three top prospects. >>> you are watching ktvu fox2 news at 6:30. >>> a vascular surgeon pleaded not guilty in federal court today. we were in court today and here is what happened. >> reporter: dr. christopher owens walked out of the courthouse avoiding questions. the 50-year-old ucsf vascular surgeon entered a not guilty plea monday on charges he unlawfully prescribed oxycodone 36w2 people who weren't under his care. >> my wife was one of the people that he was writing these fraudulent prescriptions to. >> reporter: the 35-year-old worked at the medical center with owen's and she mysteriously died last june and what investigator stop was at drug overdose. >> she had become involved with chris. she was found deceased and he was the last person that was with her. >> reporter: once was placed on leave. he was fired five months later after he was booked on drug charges. those charges with the san francisco das offi
officers were able to track him down from metadata in those emails. >>> the open ace have treated their top pitcher. the 27-year-old pitcher will go to new york in exchange for three top prospects. >>> you are watching ktvu fox2 news at 6:30. >>> a vascular surgeon pleaded not guilty in federal court today. we were in court today and here is what happened. >> reporter: dr. christopher owens walked out of the courthouse avoiding questions. the 50-year-old ucsf...
44
44
tv
eye 44
favorite 0
quote 0
how do we know it was a link and not a hack well first of all the metadata shows that the download speeds are too fast for an online transfer the download happened at least twenty two point seven megabytes per second and therefore they stays what we've been calling the hack is impossible not now after the nation article came out some people argue that twenty two point seven is obtainable though rarely but it doesn't really matter because the investigators have since found that a more detailed analysis shows that the peak copy speeds were in the range of thirty eight megabytes per second which is impossible for an internet transfer next timestamps throughout the method data suggest the transfer was done in the eastern time zone third these former n.s.a. and c.s.a. specialists know that if it were over the internet the n.s.a. would have only have proof of it so the fact the n.s.a. hasn't presented any proof is very telling. fourth. quarter. your lies in the layers of matter data the investigators have found that the first five files grew too for made public at each point run through a singl
how do we know it was a link and not a hack well first of all the metadata shows that the download speeds are too fast for an online transfer the download happened at least twenty two point seven megabytes per second and therefore they stays what we've been calling the hack is impossible not now after the nation article came out some people argue that twenty two point seven is obtainable though rarely but it doesn't really matter because the investigators have since found that a more detailed...
44
44
tv
eye 44
favorite 0
quote 0
the speed of the hack even from the maximum achievable speeds the article states timestamps in the metadata indicate the download occurred somewhere on the east coast of the united states not russia romania or anywhere else outside of the eastern time zone to determine the maximum achievable speed friends of k. to recently ran a test download of the comparable transfer rate forty miles away from his computer through a server that was twenty miles away and came up with us. eleven point eight megabytes per second half of what the d.n.c. operation would need if it in fact were a hoc further investigation is needed but if there are four proves to be true the former n.s.a. computer engineers claims that this will be the first piece of hard evidence in the d.n.c. hack reporting in new york trinity chavez r.t. and a new article in the nation magazine questions the allegations that russia hacked the d.n.c. computers while most of the mainstream media blamed russia immediately intelligence professionals continue to question these claims as the evidence increasingly points to an internal leak and not
the speed of the hack even from the maximum achievable speeds the article states timestamps in the metadata indicate the download occurred somewhere on the east coast of the united states not russia romania or anywhere else outside of the eastern time zone to determine the maximum achievable speed friends of k. to recently ran a test download of the comparable transfer rate forty miles away from his computer through a server that was twenty miles away and came up with us. eleven point eight...
33
33
tv
eye 33
favorite 0
quote 0
the speed of a hack even from the maximum achievable speeds the article states timestamps in the metadata indicate the download occurred somewhere on the east coast of the united states not russia romania or anywhere else outside of the eastern time zone to determine the maximum achievable speed friends of kate a recently ran a test download of the comparable transfer rate forty miles away from his computer through a server that was twenty miles away and came up with the speed of eleven point eight megabytes per second half of what the d.n.c. operation would need if it in fact were a hack further investigation is needed but if there are four proves to be true the former n.s.a. computer engineers claims that this will be the first piece of hard evidence in the d.n.c. hack reporting in new york trinity chavez r.t. . and now trinity is joining us live from our new york studio trinity there have been countless investigations some of which are still going on but it's resulted in little to no hard evidence here what's the likelihood this report will prove to be true good evening simone there ar
the speed of a hack even from the maximum achievable speeds the article states timestamps in the metadata indicate the download occurred somewhere on the east coast of the united states not russia romania or anywhere else outside of the eastern time zone to determine the maximum achievable speed friends of kate a recently ran a test download of the comparable transfer rate forty miles away from his computer through a server that was twenty miles away and came up with the speed of eleven point...
31
31
Aug 25, 2017
08/17
by
CSPAN2
tv
eye 31
favorite 0
quote 0
. >> metadata say great question and i think about quite a bit because it is the question that if i am wrong about the data or mistaken then of course, my conclusions will be different. one of the things that we do is try to use survey currently. the other thing is when we build the models we take into account the ef scale was implemented so as a statistician to put that in my model not in the laboratory since but a statistical sense so live able to capture quite a bit there's all kinds of stuff but it is random variation but if there is any systematic the models will catch it that is the nature of statistical models to leave that random variation as a residual. but i could interpret to signal the wrong way trying to work with folks and i am aware of a lot of the changes that those are legitimate concerns. >> so people have said had you ever quantified that? so by doing that stake plot i can quantify in such a way that it is unlikely to have any population bias i can do distance to the nearest road way i put that network in there and say does that give me better coverage? so that is wh
. >> metadata say great question and i think about quite a bit because it is the question that if i am wrong about the data or mistaken then of course, my conclusions will be different. one of the things that we do is try to use survey currently. the other thing is when we build the models we take into account the ef scale was implemented so as a statistician to put that in my model not in the laboratory since but a statistical sense so live able to capture quite a bit there's all kinds...
24
24
tv
eye 24
favorite 0
quote 0
and the lock the method data ok ok now this is the key wipe that the metadata show. the method data showed that on the fifth of july last year. information copied onto an extra storage device like a thumb drive at a speed that was so fast they could never have been a hack it had to be a copy and only and they. you know you know physics and the capabilities of the internet the known capabilities are at that time you know why and so we said wow let's see if we can research this and so we have in-house capability it won't quit bill binnie others you know their previous n.s.a. technical directors and all kinds of stuff like that i would trust their expertise in this matter a little bit i certainly would have no me show you what the data said was it was this idea that when it was it was copied at a speed that could have only come from having a direct connection to that server at that not only that the method data also showed where it was done guess where where the eastern time zone. of russia not the most stock going to be washington bangor miami the eastern time zone eas
and the lock the method data ok ok now this is the key wipe that the metadata show. the method data showed that on the fifth of july last year. information copied onto an extra storage device like a thumb drive at a speed that was so fast they could never have been a hack it had to be a copy and only and they. you know you know physics and the capabilities of the internet the known capabilities are at that time you know why and so we said wow let's see if we can research this and so we have...
45
45
Aug 15, 2017
08/17
by
CSPAN
tv
eye 45
favorite 0
quote 0
its metadata at us, we are in a lot of trouble gets mad at us, we are in a lot of trouble. i want to thank all the staff who does such extraordinary work and in such a extraordinary way in our region, not just prince george county, but washington, d.c., the region. some people said they were living in virginia. that is fine because we are obviously a community in the washington metropolitan area. here, we had i was a rally out front and a lot of people there, talking about treating people fairly. treating people in the best interest of our country. not just of their best interest, but of our country. i want to get your viewpoint, your story, what the impact of steps in washington would be to you and your families and to .our employers claudia is particularly focused on these issues. i want to thank -- who does such an extraordinary job and all the volunteers. i want to thank the volunteers as well or maybe some of you are volunteers and you stay you are -- you say you are on the staff. when my staff leave and go to another job, almost always making more money, i say you can
its metadata at us, we are in a lot of trouble gets mad at us, we are in a lot of trouble. i want to thank all the staff who does such extraordinary work and in such a extraordinary way in our region, not just prince george county, but washington, d.c., the region. some people said they were living in virginia. that is fine because we are obviously a community in the washington metropolitan area. here, we had i was a rally out front and a lot of people there, talking about treating people...
43
43
Aug 27, 2017
08/17
by
CSPAN2
tv
eye 43
favorite 0
quote 0
. >> a metadata is a level playing field. and the cable they can enjoy the advantage and with public opinion but to what joy that strategic advantage , it is about building that strategy for the future with the president or a senator so far these political debates are all a round of the short-term or with those midterm elections that is not the way to move forward such a combat that comprehensive vision of the future. because we can make it happen and looking for a long term strategic solutions to the problems that are popping up all the time. >> i will take the opportunity to quote from your book that you trust job people growing up with technology to be smart about this and your advice is a hope you'll take this as an invitation to take an active role to create the future you want to seek. >> i a appreciated to and how that changes that in the wrong direction. >> a kid to do gary kasparov of. [applause] former world the chess champion and author of the new book and keep thinking. -- a deep thinking also thinks for your grea
. >> a metadata is a level playing field. and the cable they can enjoy the advantage and with public opinion but to what joy that strategic advantage , it is about building that strategy for the future with the president or a senator so far these political debates are all a round of the short-term or with those midterm elections that is not the way to move forward such a combat that comprehensive vision of the future. because we can make it happen and looking for a long term strategic...
125
125
Aug 17, 2017
08/17
by
CNBC
tv
eye 125
favorite 0
quote 0
of shirt it is, whether it's a men's shirt, women's shirt, or v-neck, and then it applies that as metadata in the system so it becomes searchable and organized on your image content. we're just starting with images today. you can imagine with video content, with audio files, all of the unstructured information that our customers store, we want to be able to apply machine learning and artificial intelligence to help them make more sense of their information and unlock way more value out of the data they have >> how about documents >> yes actually, we already do a bit of the documents. when you upload a document in box, we already make it searchable you can build certain kinds of work flows on this but we also want to be able to extract data from the document and be able to summarize it, be able to help you glean more insights from your documents any kind of data that's stored in box, we want to help you get the most amount of value from that when it's an hour platform versus any other platform out there. box stores over 30 billion files for our customers. so you can imagine all of the infor
of shirt it is, whether it's a men's shirt, women's shirt, or v-neck, and then it applies that as metadata in the system so it becomes searchable and organized on your image content. we're just starting with images today. you can imagine with video content, with audio files, all of the unstructured information that our customers store, we want to be able to apply machine learning and artificial intelligence to help them make more sense of their information and unlock way more value out of the...
134
134
Aug 31, 2017
08/17
by
MSNBCW
tv
eye 134
favorite 0
quote 0
according to people familiar with the review, its experts were shown metadata for the communicationst took place. the content of the messages were not available to the reviewers. quote, without a much deeper forensic examination, the review could not determine the purpose of the communications between the two servers. the resulting report was carefully hedged, noting that without more study, it could not give the bank a clean bill of health. nevertheless, the bank used that report to make the case that it had been exonerated. nice trick, right? somebody turns up something fishy in your behavior, you say, oh, i'm shocked to hear those terrible allegations, i'll look into it. and then you don't at all look into it, but you produce a report and you wave it around, and you tell everybody it exonerates you, nothing to see her, i checked it out, it's fine. the alfa bank server story is absolutely still live. first, we're aware russian banks are coming up over and over and over again when it comes to contacts and the trump organization and trump campaign, contact with the trump side has bee
according to people familiar with the review, its experts were shown metadata for the communicationst took place. the content of the messages were not available to the reviewers. quote, without a much deeper forensic examination, the review could not determine the purpose of the communications between the two servers. the resulting report was carefully hedged, noting that without more study, it could not give the bank a clean bill of health. nevertheless, the bank used that report to make the...
68
68
Aug 8, 2017
08/17
by
BLOOMBERG
tv
eye 68
favorite 0
quote 0
as you tv.it, 30 second 40% has come from digital activities, whether it be in advertising, media metadatans, social. ,f you look at the history now the first question you go abroad and the answer is no. same thing applies to technology and data and digital. margins are resistant. in a way, it becomes more labor-intensive for laborers. input becomes more important. therefore, margins are quite strong. so no. the third force a lot of people talk about, which is the counter to google and the dominance of google and facebook, could come from amazon. it could come from snap. it could come from the company we invested in at nexus. we own 60% of that. probably going to ipo at some point in time in the future. everyone is looking for a third force of balance. amazon may well prove to be that third force. julia: that was martin on "bloomberg daybreak: americas." scarlet: we have headlines from president trump. he is warning north korea not to threaten the u.s. this after he tweeted about north korea this morning.president trump speaking, saying he has warned north korea to not threaten the u.s. ju
as you tv.it, 30 second 40% has come from digital activities, whether it be in advertising, media metadatans, social. ,f you look at the history now the first question you go abroad and the answer is no. same thing applies to technology and data and digital. margins are resistant. in a way, it becomes more labor-intensive for laborers. input becomes more important. therefore, margins are quite strong. so no. the third force a lot of people talk about, which is the counter to google and the...
31
31
tv
eye 31
favorite 0
quote 0
the second half of our interview with former cia analyst ray mcgovern about the newly discovered metadata . what he had find out what he has to say about the d.n.c. hacks of twenty sixteen and finally we preview this week's latest edition of redacted tonight are your dad always enlightening whenever he's around they've got to tune in for that beverly thank you so much to you. that does it for me for right now for more on the stories we just covered go to youtube dot com forward slash r t america check out our web site r t dot com slash america you can also follow me on twitter at manilla channel remember to question him or have a great weekend. i'm john harshman i'll give you what the mainstream media can't the big picture. and when you push more what you're looking for this. will go deeper investigate and debate all so you can get the big picture. politico is the news outlet it has a new series of articles called five things trump did while you weren't looking they just released their eighth installment of it so it's been going on for a while and apparently the purpose of the series is t
the second half of our interview with former cia analyst ray mcgovern about the newly discovered metadata . what he had find out what he has to say about the d.n.c. hacks of twenty sixteen and finally we preview this week's latest edition of redacted tonight are your dad always enlightening whenever he's around they've got to tune in for that beverly thank you so much to you. that does it for me for right now for more on the stories we just covered go to youtube dot com forward slash r t...
32
32
tv
eye 32
favorite 0
quote 0
how do we know it was a leak and not a hack well first of all the metadata shows that the download speeds are too fast for an online transfer the download happened at least twenty two point seven megabytes per second and therefore they stays what we've been calling the hack is impossible now now after the nation article came out some people argue that twenty two point seven is obtainable though rarely but it doesn't really matter because the investigators have since found that a more detailed analysis shows that the peak copy speeds were in the range of thirty eight megabytes per second which is impossible for an internet transfer next timestamps throughout the method data suggest the transfer was done in the eastern time zone third these former n.s.a. and c.s.i. specialists know that if it were over the internet the n.s.a. would have only have proof of it so the fact the n.s.a. hasn't presented any proof is very telling. fourth. wall analyzing the layers of matter data the investigators found that the first five files grew to for made public at each point run through a single template th
how do we know it was a leak and not a hack well first of all the metadata shows that the download speeds are too fast for an online transfer the download happened at least twenty two point seven megabytes per second and therefore they stays what we've been calling the hack is impossible now now after the nation article came out some people argue that twenty two point seven is obtainable though rarely but it doesn't really matter because the investigators have since found that a more detailed...
262
262
Aug 24, 2017
08/17
by
FOXNEWSW
tv
eye 262
favorite 0
quote 0
this is a guy in 2013 was up under oath and lied to senator about the collection of metadata. long island guy? queens guy, we're never as rich as the manhattan guys never as tough as the bronx guys. they always have this i have to be better than them. that's trump. when you understand he's a queens guy, that all makes sense. clapper doesn't get him, he's a fighter. he's a queens guy. brian: so he's not mentally unhealthy. >> no. i'm from queens. and, you know, people -- a lot of people out there who are liberals. brian: the russia investigation and then you say overturn it, and now they're saying he's mentally unfit. i've never seen anything like this, called bernstein, among others who are really worried. >> you have a commentator on another cable network who said he possibly had dementia. how grotesquely inappropriate. but they think it's great because it's great for their ratings. steve: so is that what's going on? you have the queens guy and then mitch mcconnell? >> yeah. you have the bow tie wearing swamp creature mitch mcconnell, and he doesn't understand he's from queen
this is a guy in 2013 was up under oath and lied to senator about the collection of metadata. long island guy? queens guy, we're never as rich as the manhattan guys never as tough as the bronx guys. they always have this i have to be better than them. that's trump. when you understand he's a queens guy, that all makes sense. clapper doesn't get him, he's a fighter. he's a queens guy. brian: so he's not mentally unhealthy. >> no. i'm from queens. and, you know, people -- a lot of people...