The Big Picture |
- WaPo: Anticipating the Next Black Swan
- Handspring Puppet Company: The genius puppetry behind War Horse
- How Much Damage Can Malicious HFT/Malware Cause?
- Update on Japan’s Nuclear Crisis
- Craig Newmark Revealed
WaPo: Anticipating the Next Black Swan Posted: 03 Apr 2011 09:00 AM PDT My latest Washington Post column is out in the Sunday Business section. Regular readers will recognize some of the behavioral and cyclical elements, but overall, its the first time I have combined these together all in one piece:
Check out the entire piece here. > Source: |
Handspring Puppet Company: The genius puppetry behind War Horse Posted: 03 Apr 2011 06:00 AM PDT More wicked cool stuff: |
How Much Damage Can Malicious HFT/Malware Cause? Posted: 03 Apr 2011 05:55 AM PDT Here is a question for the paranoics out there: Can we tell any difference between High frequency trading and cyberattacks? We have previously discussed how the NYSE allowing co-located HFT servers is the equivalent of turning our national security over to Skynet. We now have a new Robot Uprising: It is becoming increasingly difficult for exchanges to tell the difference between ordinary market disfunctions caused by High frequency trading and purposeful attacks:
Eric Hunsader, founder of Nanex, who blamed the Flash Crash on HFT, has a new concern about the latest algorithmic funny business. Some are instantly buying or selling E-mini contracts in huge quantities in about 50 milliseconds. Another algo is rapidly changing order sizes in about 20 – 40 stocks on Nasdaq for a “few milliseconds several times a day. (Each stock is traded anywhere from 2,000 to 4,000 times a second, double to quadruple the norm). The exchanges, which get paid by HFT traders, seem unconcerned. The activity has so far flooded the quote system, but has caused no harm. Yet. I am VERY curious: What security procedures occur prior to a co-located server being installed? What rules govern which overseas firms can buy a co-located HFT shop? Given the damage the creator (US/Israel/Germany/whoever) of the Stuxnet worm did to the Iranian Nuclear program, what can an HFT firm dedicated to damaging the US economy do if they attempted so? What security measures are in place to prevent this? How much mischief can HFT/malware accomplish . . . ? > Sources: Robots Rattle Data Guru |
Update on Japan’s Nuclear Crisis Posted: 03 Apr 2011 05:37 AM PDT Washington's Blog strives to provide real-time, well-researched and actionable information. George – the head writer at Washington's Blog – is a busy professional and a former adjunct professor. ~~~ The situation at the Fukushima Daiichi nuclear complex is getting worse in many ways, but better in some ways. Here’s a quick roundup. Reactor 1 Energy Secretary Steven Chu said that roughly 70 percent of the core of reactor number 1 suffered severe damage. In other words, it came very close to a total meltdown. But things appear now to be stabilizing:
Reactor 2 Tepco announced that there is a crack in the concrete pit of reactor number 2 that is leaking radiation into the ocean from a crippled reactor:
Reuters noted that workers were attempting to plug the crack with concrete, but were facing challenges:
Reactor 3 As previously noted, CNN reported:
The New York Times pointed out:
And NHK notes that a giant crane fell over and probably crushed spent fuel rods at in Fukushima reactor number 3, which contain a plutonium-uranium mix: (starting around 1:40 into video). Reactor 4 Nuclear engineer Arnie Gundersen notes that the spent fuel rods in reactor number 4 have no water, and the rods are exposed: As can be seen from the following aerial photograph, there is severe damage at several of the reactors (click the images for larger, high-res versions): ~~~
Other Developments Localized nuclear reactions (“re-criticalities”) have re-started at Fukushima causing “blue flashes” above the plant: Greenpeace has measured very high levels of radiation some 40 killometers from Fukushima: |
Posted: 03 Apr 2011 05:00 AM PDT “Bloomberg Game Changers” profiles Craigslist founder Craig Newmark. This program features interviews with Newmark; David Vinjamuri, author of "Accidental Branding;" Christina Murphy, founder of CM Recruiting; Mark Rasch of Secure IT Experts; Peter Zollman, founder of AIM Group; Tom Rosenstiel, director of the Pew Center’s Project for Excellence in Journalism; Matt Zimmerman, senior staff attorney for Electronic Frontier Foundation; and Brad Stone, senior writer for Bloomberg Businessweek. video after the jump
March 24 (Bloomberg) |
You are subscribed to email updates from The Big Picture To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
Google Inc., 20 West Kinzie, Chicago IL USA 60610 |
0 comments:
Post a Comment