Pages

Saturday 21 December 2013

The fortune teller

Is it possible for a song to influence economic theory? The fortune teller (Chartorichtra) is a Greek song, performed with the beautiful voice of Lizeta Kalimeri. The song tells a story, about a mystery woman from Libya, a fortune teller named Amina who arrived silently at night at the port of Chania in Crete, at February 1959 after destruction, probably war that she predicted. Amina was disappeared up to the Cretan mountains rarely seen, she is wearing her silk dress and staring at the East after every huge destruction.

This song can be interpreted in many ways, but for me, vividly demonstrates the unique geographical position of Greece and the influence from Middle East countries on commerce, economy, trading and migration for centuries. 

Bhimani on Internet Security

Anish Bhimani is the Managing Director and Chief Information Risk Officer of JP Morgan Chase. In this role he has global responsibility for ensuring the security, controls and resiliency of the firm's technology environment. It is always a pleasure to learn about future trends and challenges in security and privacy, in such a relaxed speech!




Monday 16 December 2013

The critical factors for sustainable development

For some time now, an intense debate in Greece and the European Union has broken out, regarding the sustainable development model in relation to the proposed agenda. But it is clear by all sides that any development model cannot be sustainable when you disregard, science and technology. 

Through the use of the appropriate, modern technologies, sciences, structures and human resources, and when you ensure access especially in sensitive social groups, you have good chances to fulfill the main criterion to improve the living standards of your country. Moreover, the society as a whole enjoys the benefits of tiered productivity increase and thus by increasing the disposable income of a country.

Source: Article by Constantine Kalentis in Greek for apopseis.gr. The full article can be found in Greek here  

Monday 2 December 2013

The evolution of Cyber Warfare


For those of us who study the evolution of cyber warfare over the years, it is terrifying to investigate the extreme power, the tactics, the methods and the dogma of current attacks. 

Key and Certificate based attacks - Code signing certificates - Weak Crypto exploits - SSH Key theft - APT1 - Malicious Executable - Server Key theft...

No shooting just clicking!