How far can simulations go versus live flying?

This article has links to how the US uses simulators and what their capabilities are. They talk about training for UAV’s, the network centric way in which they’re trying to link up simulators globally, how they’re used to train for large force employments, using them to practice 4 ship formations and of course, the limitations of the system in basic airmanship.

How far can simulations go versus live flying? – The DEW Line.

Piracy and Movie Revenues: Box office sales went down after they closed MegaUpload

Exogenous variation comes from the unexpected shutdown of the popular file hosting platform Megaupload.com on January 19, 2012. The estimation strategy is based on a quasi difference-in-differences approach. We compare box office revenues before and after the shutdown to a matched control group of movies unaffected by the shutdown.

We find that the shutdown had a negative, yet insignificant effect on box office revenues

via Piracy and Movie Revenues: Evidence from Megaupload by Christian Peukert, Jörg Claussen :: SSRN.

Megaupload framed by FBI claims Kim Dotcom

Evidence has emerged showing the Department of Homeland Security served a search warrant on Mr Dotcom’s file-sharing company Megaupload in 2010 which he claims forced it to preserve pirated movies found in an unrelated piracy investigation.

The 39 files were identified during an investigation into the NinjaVideo website, which had used Megaupload’s cloud storage to store pirated movies.

When the FBI applied to seize the Megaupload site in 2012, it said the company had failed to delete pirated content and cited the earlier search warrant against the continued existence of 36 of the same 39 files.

Dotcom: We've hit the jackpot – National – NZ Herald News.

An insight into CIA burglary

The CIA is not in the habit of discussing its clandestine operations, but the agency’s purpose is clear enough. As then-chief James Woolsey said in a 1994 speech to former intelligence operatives: “What we really exist for is stealing secrets.” Indeed, the agency declined to comment for this article, but over the course of more than 80 interviews, 25 people—including more than a dozen former agency officers—described the workings of a secret CIA unit that employed Groat and specialized in stealing codes, the most guarded secrets of any nation.

The CIA Burglar Who Went Rogue | History & Archaeology | Smithsonian Magazine.

A good explanation of homomorphic encryption

Homomorphic encryption is where one party (Alice) encrypts data and passes it to another (Bob) with an encrypted key. This means that Bob can’t read the data, but can perform computations on it, and pass the encrypted results (which Bob can’t read) to Alice, so that she can decrypt it with her key. This is especially useful in the age of cloud computing, webservices, SaaS and private records.

Alice and Bob in Cipherspace » American Scientist.