You go to a theater, you're in a darkened room, and you watch someone that you don't really know how many children they have or what their father's nickname might be; you don't have references and databases and rumors and half-truths - you're just transported by their storytelling.
In baseball, you can do something poorly and still get credit. A pitcher could throw a bad ball, the batter hit a screaming line drive, and an outfielder make a fantastic diving catch. Yet, when you look at historical databases, 80% of the time when a ball is struck with that trajectory and velocity, it is a hit.
Vast databases of names and personal information, sold to thieves by large publicly traded companies, have put almost anyone within reach of fraudulent telemarketers.
The reason why there is more pessimism about technology in Europe has to do with history, the use of databases to keep track of people in the camps, ecological disasters.
Computer scientists have built a set of massive DNS databases, which provide fragmentary histories of communications flows, in part to create an archive of malware: a kind of catalog of the tricks bad actors have tried to pull, which often involve masquerading as legitimate actors.
Curating our data is valuable. Like 23andMe - while selling us the chance to know whether we're Vikings or whatever, they're amassing these huge DNA databases that are unimaginably valuable. Get people to pay you to add their DNA to this database. Genius!
We're not advertisement-driven, so we don't need personal databases.
Second, we're spending a huge amount of money on technology so that everyone can check out laptops and portable phones. We're spending more money to write our existing information into databases or onto CD-ROM.
I thought a company that provides mutual-fund information could be a great business, because you could construct an effective moat by building large financial databases and customer lists and a strong brand name.
U.S. computer networks and databases are under daily cyber attack by nation states, international crime organizations, subnational groups, and individual hackers.