Search For formation In Quotes 298

I knew from the beginning that privacy was going to be a huge issue especially with regard to applying Total Information Awareness in counterterrorism. Because if the technology development was successful a logical place to apply it was inside the United States.

Computer games tend to be boys' games warlike games with more violence. We have not spent enough time thinking through how to encourage more girls to be involved in computing before coming to college so they can see a possible career in information technology.

Developments in information technology and globalised media mean that the most powerful military in the history of the world can lose a war not on the battlefield of dust and blood but on the battlefield of world opinion.

I am a technological activist. I have a political agenda. I am in favor of basic human rights: to free speech to use any information and technology to purchase and use recreational drugs to enjoy and purchase so-called 'vices' to be free of intruders and to privacy.

The rapid dissemination of technology and information offers entirely new ways of production but it can also bring the spectre of more states developing weapons of mass destruction.

At a minimum the majority of search dollars will flow to a social media model because people care most about what their peers think and the technology is there for that information to be quickly shared on products and services.

One of the biggest challenges to medicine is the incorporation of information technology in our practices.

The demographic weight of countries such as China and India exercise a massive pressure on our wages and salaries. They have accomplished massive technological advances and the revolution in information technology has reduced the costs of transport.

Second we're spending a huge amount of money on technology so that everyone can check out laptops and portable phones. We're spending more money to write our existing information into databases or onto CD-ROM.

The U.S. government knew that China wanted to acquire sensitive U.S. technology and instead of implementing a policy to prevent them from acquiring the information the government all but gave them an invitation to take our equipment and designs.