Skip to main content

My 2016 sum up

My top of the year 2016

Intox: a fact of life: new media, new businesses, same old game!

  There is no escape to critical thinking and doubts, because there is no true source of true or relevant source of relevance. (Might be God, but then faith apply, not trust.)  
  Do you trust the social media? the "wisdom of the crowd"? the scientist in white coat? the traditional media? the big data and its algorithms? even yourself? Because none of these are free of biases. And Social Networks are not worse than traditional media, papers and books. They have different characteristics, at least, they have been an eye opener. This ability to quickly reveal the "intox issue" IS a good feature compared to encyclopedias that feature no updates.  
  The solution is not to reject everything, but to cope with it. 
  You will make mistakes, you will doubt, you will live in uncertainty, but there is no escape to critically thinking. At least avoid to spread "information", in social network or in coffee corners, just because you "like" it. And again Social Networks are just another form of the old "lynch mob".  
  We don't have time to check all the news, especially as we read so (too) much news. But you know the source, or you know the source is unknown, you have an idea of the biases, how much credits you give it ... so be aware. Information does not comes for free, you are buying it one way or another, watching advertising, giving your personal information, curating information or even explicitly paying traditional money.  
  Be conscious that you are part of the information, you are concerned, responsible and as much prone to error as the one who produced the information.
  • Balance doubts. Scientists are confronted with "marketing spreading doubts". It hurts both ways! NN Taleb in "The Black Swan" cites the work of Simon Foucher about the Art of Doubting and how to position ourselves between doubting and believing "One needs to exit doubt in order to produce science".
  • "Attention economy": information is a business.
    • "L'information c'est vous qui la vivez, c'est nous qui en vivons" 
    • Again Nassim Nicholas Taleb exited all news reading activities and only felt better.
    • As a Facebook user/client, the more you play, the more money they make.
    • Wearing a white coat is not enough anymore, doubts and hoaxes have to be fight at a large scale.
  • User trust in Facebook is also surprisingly high. Social Media exacerbated the fact that you can trust no one, not even you or the traditional media (cf. Noam Chomsky). Just be critical of everything, and think before retweeting!
  • Don't even trust yourself: Linda Rising "Who do you trust? Beware of Your Brain"
  • Worse, we avoid thinking critically! We blindly trust any solution that release us from thinking: "Weapons of Math Destruction" by Cathy O'Neil
    • Notice also that AI is used in security applications (facial recognition typically, but also logs monitoring ...) but was not designed to withstand security attack and can be fooled in unexpected ways.

Drawing, Handwriting, Sketching are fundamental skills

Blockchain is still hot

  • BitCoin is the new Gold, winning the cryptocurrency competition.
  • Blockchain still needs to get down the hype, but its features as a distributed ledger technology (DLT) will find real world applications.
  • I expect some serious bashing and debunking in 2017 or 2018 ...

API slowly and pervasively being a thing.

No buzzword here, but an important trend nonetheless.


  • YouTube Artists: Leo Morachiolli ; Mateus Asato (from Brasil, like Sergio and odair Assad!) ; Adam Neely (Not only on YouTube!)
  • Tal Wilkenfeld (and her baritone guitar) - Corner Painter

Trends & rewards

  • RadioLab seems to be almost gone, also many good people passed away
  • Rewards: in the end, asking myself what brings reward? A silent hoover? A good book? A good song, making music,  but certainly not reading tons of news!
  • I use mostly Twitter, but I am also on Facebook, Instagram, Google+, LinkedIn ...
  • I use a lot!


Popular posts from this blog

VirtualBox, CentOS, Network and Template

I have been working with VirtualBox and CentOS recently, here are some notes about this experience.
I used VirtualBox 4.2 and CentOS 6.3, but most of this should work with other products too. I created the first headless, minimal CentOS via NetInstall.
I cover two points: create a template machine and configure the Network.
Configure the NetworkWe want Internet access and a LAN local to the host.
For background information read: Networking in VirtualBox by Fat Bloke on June 2012.
The easiest is to enable two Network Adapters: One will be "Host-only" and the second "Nat". In the "Preference" menu you can see the DHCP server range for the Host-only Network. So you may set fixed addresses outside this range.
Next: start the guest. There may be various results at first, depending on a lot of things. Some problem might be solved by rm -f /etc/udev/rules.d/70-persistent-net.rules and a reboot.
Anyway, configure the two interfaces (set your own IP and MAC addresses)…

One in six IT projects ends up ‘out of control’

A surprisingly high number of projects are 'ticking time bombs', according to researchers at the University of Oxford. They analysed 1,500 global projects that had revamped their information technology systems within the last 10 years. They discovered that one in six projects in the sample went over budget by an average of 200 per cent (in real terms) or over ran by an average of almost 70 per cent.

Their conclusion is similar to previous studies:

TLS: Disabling legacy cipher suites

First: "cipher suite is a named combination of authentication, encryption, and message authentication code (MAC) algorithms".If you are using TLS (for HTTPS typicaly) you may want to remove some Cipher Suites.You maybe a little bit less compatible, but also a bit more secure. Things will be better when TLS1.2 is implemented everywhere.You can also claim to be FIPS 140 compliant: !How to do it:From the command line: code: Look at the "ciphers" attribute in someone knows how to do it on the IBM J9 via configuration, I am interested.