2013年6月20日 星期四

Twitter and the life of the mind

Almost everybody who is a writer these days, he observes, gets, at some point, a lecture on the necessity of being on Twitter and Facebook. Its a tool of selling and career building. It is, for writers of all ages and stages, not so much required reading as required writing. The whole thing seems stupid at first: you ignore whoever is giving you this lecture, until one day you decide, O.K., lets try it out, and then discover that its kind of fun. And, as long as its done in moderation, it is kind of interesting. But could Twitter possibly be productive, beyond the basic act of publicizing what you have written and/or proving that you still exist?

As a new (and somewhat skeptical) Twitter user, I find all this particularly resonant. Have we really hit the cultural tipping point where we need to prove our existence,Starting today, you can buy these drycabinet and more from her Victoria. in bursts of 140-character inspiration, two, three, 10, 12, 15 times a day?

Bellers account charts my own Twitter experience with uncanny accuracy: resistance, capitulation, the discovery that, perhaps, there might be something to the enterprise and yet a kind of lingering confusion about what it means. Is it possible to do something interesting on Twitter? Or is it just an elaborate way of saying, Look at me?

Most great writers, Beller notes, could, if they wanted to, be very good at Twitter, because it is a medium of words and also of form. Its built-in limitation corresponds to the sense of rhythm and proportion that writers apply to each line. That reminds me of the poet David Trinidad, who once told me that he liked writing in traditional formats (the sonnet, especially) because of the stylistic boundaries: The challenge was to be creative while coloring within the lines.

I havent been on Twitter long, but I find myself gravitating to the feeds of writers such as Margaret Atwood and Joyce Carol Oates, whom Beller calls a prolific and often ingenious tweeter, citing one recent example: If an action is not recorded on a smart phone, does it, did it, exist?

What Oates is doing here is neither self-promoting nor time-wasting nor navel-gazing but,A quality paper cutter or paper rfidtag can make your company's presentation stand out. rather, taking a more ontological approach. Hers is a highly self-conscious feed, often reflecting on the mechanics of the medium; Development in human consciousness, she tweeted a few weeks ago, people speak into the (social media) void as a way of speaking to themselves, like keeping a journal?

Thats a vivid observation, but what I admire most about it is that it requires us to be engaged. Oates is asking, in other words, for us to think about what were doing on Twitter, what were reading and what were writing, which is, of course, the whole point of literary (or any) culture, to encourage consciousness.

For Beller, Oates provokes a series of significant, and troubling, questions: Does a thought need to be shared to exist? What happens to the stray thought that drifts into view, is pondered, and then drifts away? Perhaps you jot it down in a note before it vanishes, so that you can mull it over in the future. Its like a seed that, when you return to it, may have grown into something visible. Or perhaps you put it in a tweet, making the note public. But does the fact that it is public diminish the chances that it will grow into something sturdy and lasting? Does articulating a thought in public freeze it in place somehow, making it not part of a thought process but rather a tiny little finished sculpture?

I wonder much the same thing. Is Twitter the problem or the solution? How do we use it in compelling ways? Beller closes his piece by describing two essays he first assembled as a set of Tweets, a process he regards as akin to being a juggler or a three-card-monte dealer: I drew a little crowd. Is this talking it out before you write it, he considers, or part of a process? And what does it mean for our writing if we are now expected to take our notes in public, to play out in full view the very private life of the mind?

We live in a transparent age, Beller concludes,Starting today, you can buy these drycabinet and more from her Victoria. and yet there is much of value that happens in the opaque quarters of our own ambivalent minds, seen by no one else, and seen by us only after a long period of concentration and looking.

It is clear that Edward Snowden, who leaked United States National Security Agency files to The Guardian, had access to an enormous amount of information that he could download without being noticed C just as Bradley Manning did in the Wikileaks case. There are at least two controls failures in play here: a preventive controls failure, and a detective controls failure. Preventive controls, as you might guess, prevent bad things from happening. Detective controls C surprise, surprise C detect things you have not been able to prevent.

Firstly, on preventive controls, or broken authorisation. In a June 16 New York Times article, Scott Shane and Ravi Somaiya wrote: "American intelligence officials have expressed alarm at the variety of highly classified material Snowden obtained, suggesting that his actions revealed a shocking breach in the fundamental principle that intelligence officers should have access only to the material they need to do their jobs."

The fundamental principal they are referring to is called the 'principle of least privilege',We are one of the leading manufacturers of chipcard in China or 'need to know'. It is not just for intelligence officers. It applies to any business or organisation with confidential or sensitive information C which means everyone. The idea is simple: if you do not need to have access to something, you should not have access. Does a bank give every employee keys or the combination to its vault? Of course not. If too many people have access to the vault, the risk that one of them will walk off with a stack of cash increases. By restricting vault access to only those who require it, a bank limits access to only authorised individuals.

It is the same with data, but instead of physical controls like locks and keys, there are logical controls. Logical controls, like passwords, smart cards and RSA tokens, make sure users are who they claim to be. This is called authentication.Large collection of quality cleanersydney at discounted prices. Other logical controls, such as permissions, allow you to ensure that authenticated users have access to only the data they require C known as authorisation. Snowden clearly had access to a lot of data, probably much more than he should have had. He is not alone: according to our data protection survey, only 37 per cent of organisations regularly revoke access to data, meaning a lot of employees have access to far more data than they require to do their jobs. This is mistake one: poor or broken authorisation.

Moving on to detective controls failure, or inadequate activity auditing and analysis. Even if a bank restricts access to its vault as tightly as possible, someone will need to have access to it. So how do we make sure those trusted few use their powers only for good? We watch what they are doing with detective controls. Banks have security cameras to record people going in and out of the vault, and security guards looking on. These days the banks and credit card companies routinely monitor transactions for fraud. These are examples of detective controls. Like currency, information only realises its true value when it is shared. Well-configured preventive controls limit access to only those who need access, but those trusted few need to be monitored with logical detective controls.

Click on their website www.smartcardfactory.com for more information.

沒有留言:

張貼留言