The Behavioral Economics of Why Executives Underinvest in Cybersecurity – Harvard Business Review

Executive Summary

Human judgment is often biased in predictably problematic ways. In the case of cybersecurity, some decision makers use the wrong mental models to help them determine how much investment is necessary. These mental models treat cybersecurity as a finite problem that can be solved, rather than as the ongoing process that it is. Our research points to steps that security executives and other cybersecurity professionals can take to work around CEOs human biases and motivate decision makers to invest more in cyber infrastructure. Appeal to the emotions of financial decision makers. Replace your CEOs mental model with new success metrics. Survey your peers to help curb overconfidence. You are the weakest link. By turning the lens of behavioral science onto cybersecurity challenges, CISOs can identify new ways to approach old problems, and maybe improve their budgets at the same time.

Determining the ROI for any cybersecurity investment, from staff training to AI-enabled authentication managers, can best be described as an enigma shrouded in mystery. The digital threat landscape changes constantly, and its very difficult to know the probability of any given attack succeeding or how big the potential losses might be. Even the known costs, such as penalties for data breaches in highly regulated industries like health care, are a small piece of the ROI calculation. In the absence of good data, decision makers must use something less than perfect to weigh the options: their judgment.

But insights from behavioral economics and psychology show that human judgment is often biased in predictably problematic ways. In the case of cybersecurity, some decision makers use the wrong mental models to help them determine how much investment is necessary and where to invest. For example, they may think about cyber defense as a fortification process if you build strong firewalls, with well-manned turrets, youll be able to see the attacker from a mile away. Or they may assume that complying with a security framework like NIST or FISMA is sufficient security just check all the boxes and you can keep pesky attackers at bay. They may also fail to consider the counterfactual thinking We didnt have a breach this year, so we dont need to ramp up investment when in reality they probably either got lucky this year or are unaware that a bad actor is lurking in their system, waiting to strike.

The problem with these mental models is that they treat cybersecurity as a finite problem that can be solved, rather than as the ongoing process that it is. No matter how fortified a firm may be, hackers, much like water, will find the cracks in the wall. Thats why cybersecurity efforts have to focus on risk management, not risk mitigation. But this pessimistic outlook makes for a very tough sell. How can security executives get around the misguided thinking that leads to underinvestment, and secure the resources they need?

Over the past year, my behavioral science research and design firm, ideas42, has been interviewing experts across the cybersecurity space and conducting extensive research to identify human behavioral challenges at the levels of engineers, end users, IT administrators, and executives. Weve uncovered insights about why people put errors into code, fail to install software updates, and poorly manage access permissions. (We delve into these challenges in Deep Thought: A Cybersecurity Story, a research-based novella.) Our findings point to steps that security executives and other cybersecurity professionals can take to work around CEOs human biases and motivate decision makers to invest more in cyber infrastructure.

Appeal to the emotions of financial decision makers. The way that information is conveyed to us has a huge effect on how we receive and act on it. For cybersecurity professionals, its intuitive to describe cyber risk in terms of the integrity and availability of data, or with quantifiable metrics like packet loss, but these concepts arent likely to resonate with decision makers who think about risk very differently. Instead, cybersecurity professionals should take into account peoples tendency to overweight information that portrays consequences vividly and tugs at their emotions. To leveragethis affect bias, security professionals should explain cyber risk by using clear narratives that connect to risk areas that high-level decision makers are familiar with and already care deeply about. For example, your companys risk areas may include customer data loss as well as the regulatory costs and PR fallout that can affect the companys reputation. Its not just about data corruption its also about how the bad data will reduce operational efficiency and bring production lines to a standstill.

Replace your CEOs mental model with new success metrics. Everyone uses mental models to distill complexity into something manageable. Having the wrong mental model about what a cybersecurity program is supposed to do can be the difference between a thwarted attack and a significant breach. Some CEOs may think that security investments are for building an infrastructure, that creating a fortified castle is all thats needed to keep a company safe. With this mental picture, the goals of a financial decision maker will always be oriented toward risk mitigation instead of risk management.

To get around this, CISOs should work with boards and financial decision makers to reframe metrics for success in terms of the number of vulnerabilities that are found and fixed. No cybersecurity system will ever be impenetrable, so working to find the cracks will shift leaders focus from building the right system to building the right process. Counterintuitively, a firms security team uncovering more vulnerabilities should be considered a positive sign. All systems have bugs, and all humans can be hacked, so treating vulnerabilities as shortcomings will create an unintended incentive for an internal security team to hide them. Recognize that the stronger the security processes and team capabilities are, the more vulnerabilities theyll discover (and be able to fix).

Survey your peers to help curb overconfidence. Overconfidence is a pervasive bias, and it can be a big problem if it clouds leaders judgment about cybersecurity investment. Our research found that many C-level executives believe that their own investments in cybersecurity are sufficient but that few of their peers are investing enough (a belief that, given how widespread it is, cant possible be true). One way that CISOs can overcome a CEOs overconfidence is to compare the companys performance with a baseline from similar firms in other words, confront the problem head-on. You can accomplish this by regularly polling CISOs and executives about how well organizations in your industry are managing cybersecurity infrastructure, prompting them to be as specific as possible about what theyare doing well and what theyre not, and asking those same CISOs to help determine how well your own firm is doing. This way, CISOs can provide clearer information to CEOs about how they are actually performing relative to their industry peers.

You are the weakest link. In her essay Regarding the Pain of Others, Susan Sontag wrote, To photograph is to frame, and to frame is to exclude. Human attention functions quite similarly. People concentrate on certain aspects of information in their environment while ignoring others; what a CEO chooses to invest in can be thought of in a similar light. For instance, in the wake of a newsworthy hack, CEOs may push their teams to ramp up investment in cyber infrastructure to prot
ect against external threats. But in doing so they may be inattentive to unwitting internal threats that may be just as costly employees clicking on bad links, or falling for phishing attacks.

How can a CISO work around a decision makers inattention? No one likes to be embarrassed, but negative feedback can sometimes be an effective remedy for inattention. Security teams should regularly try to break their own systems through penetration testing, and the CEO should be the biggest target. After all, thats how outside hackers would see it. By making the CEO the victim of an internally initiated (and safe) attack, it might be possible to draw their attention to potential risks that already exist and motivate leaders to increase their investment in cyber infrastructure.

If the focus of cybersecurity programs continues to be on designing better technologies to combat the growing menace of cyberattacks, well continue to neglect the most important aspect of security the person in the middle. By turning the lens of behavioral science onto cybersecurity challenges, CISOs can identify new ways to approach old problems, and maybe improve their budgets at the same time.

Excerpt from:
The Behavioral Economics of Why Executives Underinvest in Cybersecurity - Harvard Business Review

UL Lafayette to offer online General Studies degree program – KATC.com | Continuous News Coverage | Acadiana … – KATC Lafayette News

LAFAYETTE, La. -

The University of Louisiana at Lafayette is launching a new online degree program in general studies designed for working professionals.

In a press release, the university says their aim for this new online degree is to entice former students who did not graduate,to finish earning their degrees. The program has been designed for working professionals to take classes at their own pace while balancing other obligations.

"The purpose of the degree program is to provide an avenue for those adult students who have 'stopped out' of higher education. The online venue provides an opportunity that is affordable, flexible and student-centered," said Dr. Bobbie B. DeCuir, dean of University College.

Three concentrations will be offered in the General Studies degree program including arts and humanities, behavioral science and applied science. Classes will range from a number of departments at the university and will allow for customization to class schedules.

"While many new jobs require specialized training in technology-related areas, there is a need for graduates who are broadly trained to think analytically and critically while also demonstrating effective communication skills," Decuir added.

Those looking to enroll in these classes must have completed at least 45 credit hours and maintained a minimum 2.0 GPA. UL Lafayette will continue to offer a bachelor's degree in general studies in a traditional classroom setting.

The application deadline is July 15. Visit onlinedegrees.louisiana.edu for more information.

The rest is here:
UL Lafayette to offer online General Studies degree program - KATC.com | Continuous News Coverage | Acadiana ... - KATC Lafayette News

Can You Actually Die From Too Much Caffeine? – BOSS Magazine

Share on Pinterest Pin it

Share on Google Plus Plus

Too much caffeine caused the death of a 16-year-old high school student from South Carolina who collapsed during class last month, according to the county coroner. Davis Allen Cripe died from a caffeine-induced cardiac event causing a probable arrhythmia.

During an arrhythmia, or abnormal heart rhythm, the heart may not be able to pump enough blood to the body, and lack of blood flow affects the brain, heart and other organs. The teen consumed three caffeine-laced drinksa cafe latte, large Diet Mountain Dew and an energy drinkin a two-hour period before collapsing in his classroom at Spring Hill High School on April 26, Watts said.

So where does this tragic news leave adultjava lovers?

How much caffeine can I drink a day? Most people can safely take in about 400 milligrams of caffeine daily or about 4 cups of coffee, says Dr. Christopher Calapai D.O., a New York City Osteopathic Physician board certified in family and anti-aging medicine.

He adds that the limit varies from person to person. Its difficult to assign an exact amount for everyone because people can have different sensitivities or reactions to caffeine based on age, medical history, and tolerance. However, there is enough research available to make a recommendation based on an individuals weight.

To keep it safe, health experts recommend a maximum daily dose of 400 mg. To see what this means for you, check out the caffeine in some of these common drinks:

Starbucks Coffee (16 fl oz): 320 mg caffeine 5-hour energy (1.93 fl oz): 207 mg caffeine Dunkin Donuts regular (16 fl oz): 203 mg caffeine Starbucks Latte (16 fl oz): 150 mg caffeine Coffee, brewed (8 fl oz): 133 mg caffeine Red Bull Energy Shot (2 fl oz): 80 mg caffeine Red Bull (8 fl oz): 80 mg caffeine Tea (8 fl oz): 53 mg caffeine

But how, exactly, can the worlds most popular drug kill? Like other stimulants, caffeine raises blood pressure, boosts heart rate and temporarily shrinks blood vessels.

Dr. Calapai explains, In excess, the effects can be deadly by causing a heart attack, stroke or other cardio-vascular-related problem. Researchers think daily caffeine intake can increase the risk of coronary heart disease, but the results so far have been inconclusive.

Its also important to realize that medical conditions can affect sensitivity to caffeine. If you have anxiety, panic disorder, heart arrhythmia, high blood pressure, diabetes, take medication or have any sort of medical condition, then you may tolerate less caffeine and should speak to a doctor, says Dr. Calapai.

Here are crucial caffeine overdose symptoms to watch for: Jitters, Restlessness, and Nervousness Increased heartbeat Nausea Anxiety Heart palpitations (cardiac arrhythmia) Insomnia Sweating Dizziness Vomiting Cardiac arrest

Read more from the original source:
Can You Actually Die From Too Much Caffeine? - BOSS Magazine

Detonation; Enthusiastic Racing – TruckTrend Network

As a fan of things that go fast, I have drag racing near the top of my must-watch motorsports list. I have been fortunate enough to attend some Outlaw Diesel Super Series events, and Ive noticed that Im definitely not the only one enjoying the thrill of the drags. The number of people who come out to spectate continues to grow, as does the total count of competitors who enter each event. More and more diesel jockeys are eager to see what they and their rigs can do on the strip. This ever-increasing enthusiasm for diesel drag racing is amazing to witness, and its definitely growing the sportin both popularity and competiveness.

In April 2017, I attended the Rudys Diesel Performance season-opening event at Piedmont Raceway in Julian, North Carolina. It was a great two days of diesel madness, highlighted by the Outlaw Diesel Super Series drawing 165 competitors to the venue to wage war in six different drag-racing classes. The category with the largest turnout was our own (well, ours and ATS Diesel Performances) 7.70 Index Class, with 62 truckers reporting to the staging lanes for the first round of eliminations. For every race across all classes, the stands were packed to near capacity with cheering spectators watching vehicles roar down the eighth-mile.

As the enthusiasm continues to increase for this type of drag racing and the competition gets more heated, drivers willingness and desire to push themselves and their vehicles to the next level will rise. Competitive people want to winthey will not voluntarily let themselves sit idly or settle for second best. Their free time is spent at the track testing and racing, or in the garage prepping and building.

It is not an easy endeavor to put the right combination of components together. The engine alone has so many different ways it can be manipulated for power. Combine that with the complexity of the rest of the drivetrain, and you have a lot to get right. Getting everything to sync together and perform at its peak is a chess game. One move can take you forward or set you back. But that desire to be on top pushes people to keep trying and experimenting with new ideas.

Ingenuity and creativity are the things that really push motorsport technology forward. The guy or gal who can really think outside the box and bring something completely different to the table may have the key to winning. I understand there are rules in many classes that limit what can be done to an engine or vehicle, but he or she who has an ability to apply new concepts to the sport (a mechanical principle or technology that is not normally associated) could gain an advantage, and any edge, even a slight one, can be rewarded with a spot on the podium.

Racing has traditionally been the cornerstone for research and development of performance parts. That need and desire to go faster and win has stirred the creativity in many an individual and opened their eyes to ways of creating more power, speed, or efficiency from what is many times the simplest concept. Most ideas or theories have to be proven through trial and error. But, in the end, the sacrifice of time and energy (and money) proves it could definitely be worth it.

There is a reason auto and truck builders around the world support racing in one form or another and why they pump money into research and development. Racing is where a lot of new technology is born and where that technology is proven. Many of the advances made in competition will make it into what is driven on the road. The fastest production cars in the world owe much of their performance ability to peoples desire to race and win.

Even the new high-powered diesel pickup trucks on the market today owe much of their torque and power to racers and enthusiasts desires to improve their engines. Manufacturers pay attention to what is being done to the powerplants they produce, and then analyze what works and what doesnt perform as expected.

As more people continue to enjoy the excitement of racing diesels, the more the technology will develop, which will continue to push the industry and racing to new levels. Im waiting to see what the next big step forward is and where it comes from. Never count the little guy out.

Continued here:

Detonation; Enthusiastic Racing - TruckTrend Network

Workday Phenomenon Goes Global As Cloud Computing Goes Mainstream – Forbes


Forbes
Workday Phenomenon Goes Global As Cloud Computing Goes Mainstream
Forbes
(Note: After an award-winning career in the media business covering the tech industry, Bob Evans was VP of Strategic Communications at SAP in 2011, and Chief Communications Officer at Oracle from 2012 to 2016. He now runs his own firm, Evans Strategic ...

Read more:

Workday Phenomenon Goes Global As Cloud Computing Goes Mainstream - Forbes

What My Father Taught Me About Cloud Computing – Virtualization Review

In-Depth

Wells and city water have more in common with the cloud than you might think.

With Father's Day approaching, it got me thinking about my father, Darrel, and some of the great stories and lessons he shared with me while I was growing up. His father died when he was young, and although he had a loving mother, he had a hardscrabble childhood growing up in a small town in Utah. One lesson he inadvertently taught me when I was young that I would later reflect on was the importance of cloud computing.

As a kid, we used to visit the house he grew up in. One summer, my brother and I came across an old cemented water well on the property, and we started to talk to my dad about it. I thought that it was way cool to have this "free" source of water on the land that his family had complete dominion over. Then dad (as dads are apt to do) set me right.

Once, the well dried up and the well digger had to drill a deeper well to strike water. For the most part, we could pull water from the well on a regular basis, but during the hot Utah summers, the wind-powered well reliability was not optimal, and they had to use it judiciously.

They eventually moved to an electric well, but the cost of electricity to power the pump could get spendy. Money aside, dad said the worst part of having the well was worrying about potential health hazards; one autumn, the whole family became very ill and the doctor suspected that it had something to do with well water.

Taking these negative aspects of having a property well into account, my dad told me that it was a blessing when the city created a central water system by constructing a reservoir high up in the mountains. The city piped the water down to a station where it was monitored and treated. The vast majority of residents in the town jumped on the chance to join the new central water supply. Some agricultural and industrial users didn't cement up their wells, using them to supplement their city water; but for the most part, people found city water to be cheaper, more reliable and safer to use than well water.

So, how does my father's story about his family's well and city water relate to cloud computing? For the past 50 or so years, we've been using "well" technology in our datacenters. We put in our own servers, and although we sometimes get it right, we more than likely have to rely on getting professionals to help us set things up to make our servers efficient and workable.

We have a finite set of compute and storage resources that need to be closely monitored to prevent them from being used up. Even though we are diligent in preventing viruses and other security vulnerabilities, they still can get through the cracks and cause our datacenters great harm.

But just as a central city water supply solved problems for the citizens of my father's town, cloud computing can solve common issues and inconveniences in your datacenter. The cloud is a reservoir of compute and storage to draw upon as needed, and is almost impossible to deplete. Cloud compute centers are located near cheap, reliable power sources such as hydro-electric dams. Cloud providers can buy compute and storage devices by the boxcar load to get prices you can only dream about.

Due to the economy of scale, cloud centers can be staffed around the clock with dedicated professionals specialized in one aspect of the cloud, delivering a more reliable service. The staff can monitor compute and storage security, detecting and, more likely than not, preventing viruses and other security concerns from affecting your datacenter.

That's how my father taught me about the importance of cloud computing.

(In memory of my father, who taught me more than he realized, encouraged my curiosity, and loved his his wife and kids. He was a good man.)

About the Author

Tom Fenton works in VMware's Education department as a Senior Course Developer. He has a wealth of hands-on IT experience gained over the past 20 years in a variety of technologies, with the past 10 years focused on virtualization and storage. Before re-joining VMware, Tom was a Senior Validation Engineer with The Taneja Group, were he headed their Validation Service Lab and was instrumental in starting up its vSphere Virtual Volumes practice. He's on Twitter @vDoppler.

Read the original here:

What My Father Taught Me About Cloud Computing - Virtualization Review

IBM Losing Facebook’s WhatsApp as Cloud Customer, says CNBC – Barron’s


Barron's
IBM Losing Facebook's WhatsApp as Cloud Customer, says CNBC
Barron's
Shares of International Business Machines (IBM) are holding up alright despite a negative piece this morning from CNBC's Jordan Novet, who writes that Facebook (FB) intends to move its WhatsApp communications software off of IBM's cloud computing ...

and more »

See the rest here:

IBM Losing Facebook's WhatsApp as Cloud Customer, says CNBC - Barron's

CloudCheckr, cloud computing company expects rapid growth in Rochester – WXXI News

A local high tech company is expanding in Rochester, and they have big plans for future growth.

The company is called CloudCheckr, and they provide cloud computing services for various businesses.

Its CEO and co-founder Aaron Newman says they currently employ more than 100 people, about 75 in Rochester, and that number should double in a year.

In five years, Newman says the expectation is they can grow to about a thousand employees at their locations around the world, with many of those jobs located in Rochester where they have their headquarters. They are expanding at Village Gate.

Newman says one reason CloudCheckr wants to keep its headquarters in Rochester is because of the access they have to good talent.

Specifically around kind of the high tech space that RIT is just so great at, providing talented individuals and thats people that are coming fresh out of school."

Newman says the relatively low cost of living and easier commute compared to large cities is another reason his company is able to attract good talent.

Originally posted here:

CloudCheckr, cloud computing company expects rapid growth in Rochester - WXXI News

Cloudistics Announces New Cloud Computing Program That Enables High Margin Reoccurring Revenue Models for … – Marketwired (press release)

With Cloudistics StarterCloud and ReadyCloud, MSPs have new, cost-effective alternative to public clouds

NEW YORK, NY--(Marketwired - Jun 7, 2017) - Cloud Expo -- Today at the 20th International Cloud Expo at the Javits Center in New York City, Cloudistics, an on-premises cloud computing company, announced the launch of its North America Managed Service Providers (MSPs) Program, to meet growing demand from MSPs looking for an alternative to large hyperscale public clouds. The new program gives partners the opportunity to build recurring revenues by creating, hosting, and managing their own on-premises private cloud environments.

Now, MSPs can create their own high performance clouds using the Cloudistics platform. The Cloudistics platform comes with all the software and hardware needed to create your own private cloud. Recognized as an IDC 2017 Innovator and a Gartner 2017 Cool Vendor in Cloud Infrastructure, Cloudistics is the perfect platform for creating and hosting customer virtual datacenters, running resource intensive applications, or anything else your customer may need from the cloud. With native multi-tenancy built in, MSPs can create secure clouds for each customer, eliminating the need for costly dedicated environments.

Utility Datacenter, a leading data center technology integrator and cloud services provider based in Massachusetts, recently joined the Cloudistics Managed Service Provider program.

"We saw a real opportunity to offer our customers an alternative to the public cloud with the Cloudistics platform," said Joshua Opper, Managing Partner of Utility Datacenter. "With Cloudistics, we can build and host private virtual datacenters for each of our customers that deliver better performance and economics than the public cloud."

Cloudistics Managed Service Provider Program Benefits

Cloudistics gives MSPs all the tools they need to compete in the crowded cloud market:

"Cloudistics has made a commitment to help MSPs efficiently manage the specific priorities and business needs of their customers. Our dedicated team and specialized services, combined with Mimecast's cloud technology, save time, resources and cost," said Steve Conner, Cloudistics' Global VP of Sales. "It is our goal to streamline and improve the partner experience to make it the best it can be for each MSP."

The Managed Service Provider program consists of two main components:

About Utility Datacenter Utility Datacenter is a leading provider of cloud hosting, consulting and managed IT services. UDC provides architectural design, full and part time resources, implementation services, training, and strategic advice about a wide variety of IT disciplines, projects and platforms. UDC offers VM-Portal, a self-service product that allows customers to aggregate and manage their cloud, virtualization and bare metal infrastructure from a single interface.

About Cloudistics Cloudistics, an on-premises cloud computing company, delivers a complete public cloud experience with composable on-premises infrastructures to medium and large enterprises. Its software-defined technology natively converges network, storage, compute, virtualization, and management into a single platform to drive unprecedented simplicity in the datacenter. Customers can start with a base infrastructure and scale to multi-site and multi-geo infrastructures with predictable economics and performance. With open and secure virtual networking, elastic storage, application orchestration and SaaS management, Cloudistics is the blueprint for application-optimized on-premises cloud infrastructures. Learn more at http://www.cloudistics.com or follow @cloudistics on Twitter.

Continued here:

Cloudistics Announces New Cloud Computing Program That Enables High Margin Reoccurring Revenue Models for ... - Marketwired (press release)

Belmont Stakes Odds 2017: Latest Vegas Betting Lines Before Post Positions Draw – Bleacher Report

Even the most ardent horse racing fans would admit this year's Belmont Stakes is missing some of its usual luster since Kentucky Derby winner Always Dreaming and Preakness winner Cloud Computing are not in the field for Saturday's event.

What's more, Classic Empire's trainer Mark CassetoldAlicia Wincze Hughesof Blood Horse on Wednesday the horse won't race because of anabscess in his right front hoof.

However, it is still one of the marquee events on the racing calendar and features a $1.5 million purse and 1.5-mile length track at Belmont Park in Elmont, New York. Horses will be tested in the longest of the three Triple Crown races.

While Wednesday's post draw is sure to impact the lines as horses receive favorable and unfavorable starting spots, here is a look at the odds and a predicted winner for the famous race.

Odds

The odds are courtesy of OddsShark, as of Tuesday at 5:30 p.m. ET and had Classic Empire as the favorite at 2-1 before news of his withdrawal broke. That left Epicharis and Lookin At Lee as the favorites before Wednesday's post draw.

Epicharis 5-1

LookinAt Lee 5-1

Senior Investment 8-1

Irish War Cry 9-1

Tapwrit 10-1

Twisted Tom 14-1

Gormley16-1

Patch18-1

J Boys Echo20-1

Multiplier25-1

Meantime25-1

Hollywood Handsome *odds unavailable

Predicted Winner: Lookin At Lee

Before the abscess knocked him out, Classic Empire was the pick. After all, heappeared primed to compete for an eventual Triple Crown when he dominated as a juvenile in 2016, with victories at the Breeders' Futurity and Breeders' Cup Juvenile.

He even won the Arkansas Derby after struggling with the foot abscess during a third-place finish at the Holy Bull Stakes andappeared to be in fine form for the majority of the Preakness when he battled Kentucky Derby winner Always Dreaming for the lead nearly throughout before Cloud Computing made a late charge and left Classic Empire in second place.

The absence of Cloud Computing and Always Dreaming,per the Associated Press (h/t USA Today), cleared the way for a win before Wednesday's news, andLookin At Lee looks the most likely to benefit.

Lookin At Lee has struggled against Classic Empire in the past, with a fourth-place finish in the G1 Breeders' Cup Juvenile andthird-place finish in the Arkansas Derby. He also placed in fourth at the Preakness and never truly challenged Classic Empire or eventual winner Cloud Computing.

Fortunately for trainer Steven M. Asmussen and jockey Irad Ortiz Jr., those top competitors are not in the way. What's more, Wednesday's post draw shouldn't represent much of a challenge either, considering Lookin At Lee already turned heads with a second-place finish at the Kentucky Derby despite drawing the unfavorable No. 1 post.

He didn't get caught on the rails and demonstrated his head-turning speed that will again be on full display Saturday.

Ortiz Jr. also gives Lookin At Lee an advantage since he won the Belmont last year atop Creator. Ortiz Jr. understands what it takes to win on this stage and will do so again against a lighter field Saturday.

View original post here:

Belmont Stakes Odds 2017: Latest Vegas Betting Lines Before Post Positions Draw - Bleacher Report

Quantum Computing Is Real, and D-Wave Just Open … – WIRED

Slide: 1 / of 1. Caption: Getty Images

Quantum computing is real. But its also hard. So hard that only a few developers, usually trained in quantum physics, advanced mathematics, or most likely both, can actually work with the few quantum computers that exist. Now D-Wave, the Canadian company behind the quantum computer that Google and NASA have been testing since 2013, wants to make quantum computing a bit easier through the power of open source software.

Traditional computers store information in bits, which can represent either a 1 or a 0. Quantum computing takes advantage of quantum particles in a strange state called superposition, meaning that the particle is spinning in two directions at once. Researchers have learned to take advantage of these particles to create what they call qubits, which can represent both a 1 and a 0 at the same time. By stringing qubits together, companies like D-Wave hope to create computers that are exponentially faster than todays machines.

IBM demonstrated a working quantum computer in 2000 and continues to improve on its technology. Google is working on its own quantum computer and also teamed up with NASA to test D-Waves system in 2013. Lockheed Martin and the Los Alamos National Laboratory are also working with D-Wave machines. But todays quantum computers still arent practical for most real-world applications. qubits are fragile and can be easily knocked out of the superposition state. Meanwhile, quantum computers are extremely difficult to program today because they require highly specialized knowledge.

D-Wave is driving the hardware forward, says D-Wave International president Bo Ewald. But we need more smart people thinking about applications, and another set thinking about software tools.

Thats where the companys new software tool Qbsolv comes in. Qbsolv is designed to help developers program D-Wave machines without needing a background in quantum physics. A few of D-Waves partners are already using the tool, but today the company released Qbsolv as open source, meaning anyone will be able to freely share and modify the software.

Not everyone in the computer science community realizes the potential impact of quantum computing, says Fred Glover, a mathematician at the University of Colorado, Boulder who has been working with Qbsolv. Qbsolv offers a tool that can make this impact graphically visible, by getting researchers and practitioners involved in charting the future directions of quantum computing developments.

Qbsolv joins a small but growing pool of tools for would-be quantum computer programmers. Last year Scott Pakin of Los Alamos National Laboratoryand one of Qbsolvs first usersreleased another free tool called Qmasm, which also eases the burden of writing code for D-Wave machines by freeing developers from having to worry about addressing the underlying hardware. The goal, Ewald says, is to kickstart a quantum computing software tools ecosystem and foster a community of developers working on quantum computing problems. In recent years, open source software has been the best way to build communities of both independent developers and big corporate contributors.

Of course to actually run the software you create with these tools, youll need access to one of the very few existing D-Wave machines. In the meantime, you can download a D-Wave simulator that will let you test the software on your own computer. Obviously this wont be the same as running it on a piece of hardware that uses real quantum particles, but its a start.

Last year, IBM launched a cloud-based service that enables people to run their own programs on the companys quantum computer. But at least for the moment, Qbsolv and Qmasm will only be useful for creating applications for D-Waves hardware. D-Waves machines take a radically different approach to computing than traditional computers, or even other quantum computing prototypes. While most computersranging from your smartphone to IBMs quantum computerare general purpose, meaning they can be programmed to solve all sort of problems, D-Waves machines are designed for a single purpose: solving optimization problems. The classic example is known as the traveling salesman problem: calculating the shortest route that passes through a list of specific locations.

In the early days, critics wondered whether D-Waves expensive machines were even quantum computers at all, but most researchers now seem to agree that the machines do exhibit quantum behavior. There are very few doubts left that there are indeed quantum effects at work and that they play a meaningful computational role, University of Southern California researcher Daniel Lidar told us in 2015 after Google and NASA released a research paper detailing some of their work with the D-Wave. The big question now is whether D-Waves are actually any faster than traditional computers, and if its unique approach is better than that taken by IBM and other researchers.

Pakin says his team are believers in D-Waves potential, even though they admit its systems might not yet offer performance improvements except in very narrow cases. He also explains that D-Waves computers dont necessarily provide the most efficient answers to an optimization problemor even a correct one. Instead, the idea is to provide solutions that are probably good, if not perfect solutions, and to do it very quickly. That narrows the D-Wave machines usefulness to optimization problems that need to be solved fast but dont need to be perfect. That could include many artificial intelligence applications.

Ideally, however, the hardware and software will improve to the point that other types of computing problems can be translated into optimization problems, and Qbsolv and Qmasm are steps towards building exactly that. But to get there, theyll need more than just open source software. Theyll need an open source community.

View original post here:

Quantum Computing Is Real, and D-Wave Just Open ... - WIRED

One step closer to the quantum internet by distillation – Phys.Org

June 6, 2017

Scientists all over the world are working towards new methods to realize an unhackable internet, an internet based on quantum entanglement an invisible quantum mechanical connection as networking links. The greatest challenge is scaling to large networks that share entangled links with many particles and network nodes. Researchers in Delft and Oxford have now managed to distil a strong entangled link by combining multiple weaker quantum links into one. This method is essential to realize a trustworthy quantum network between several quantum nodes. This innovative new work has now been published in Science magazine.

Spooky internet

Safe communication is one of today's greatest digital challenges. There is a world-wide scientific effort towards new methods to realize a truly safe internet based on the laws of quantum mechanics. With such networks, secret eavesdropping is fundamentally impossible. However, realizing strong links in a quantum network, based on the powerful but fragile principle of quantum entanglement, is a great scientific challenge.

"Entangled particles behave as one, independent of distance. Any observation of such entangled electrons result in correlated information," Professor Ronald Hanson explains. Measuring one particle therefore instantaneously influences the other, even when they are light-years apart. Albert Einstein did not believe such a connection could exist, but a carefully designed experiment from the group of Professor Hanson in Delft in 2015 reached the world press for showing that this really is the case. They were able to succeed at this long-standing challenge by entangling quantum information over distances of over a kilometre via light particles. Scientists are now working towards ground-breaking technologies based on entanglement. Strong connections via quantum entanglement can be the basis for information sharing. 'The information exists at both places and there is no need for sensitive information to travel in between," Hanson elaborates, "we expect fundamentally safe future networks based on entanglement between quantum nodes: a quantum internet." The power of quantum entanglement is that it is invisible for third parties: the information is impossible to eavesdrop.

Entanglement distillation

The research group of Ronald Hanson at QuTech is famous for realizing networking links based on quantum entanglement. They are now building on this work to construct the first quantum internet. Ronald Hanson: "We are now taking an important step forward. Whereas we first realized entangled information between two electrons in diamonds, we now also are using one of the nuclear spins present in each diamond to temporarily store the entangled information." With the information stored safely, the scientist can entangle the electrons again. Hanson: 'Now we have two entanglement links. By combining these in a smart way, we manage to generate one strongly entangled link using two weaker entangled links, just like distilling whisky out of lower-alcoholic ingredients." In principle, this process of entanglement distillation can be repeated over and over, until high-quality entanglement is obtained."

Extending possibilities

The demonstrated method is an important step towards the quantum internet. Norbert Kalb, one of the leading authors of the paper: "To realize such a network, we need all the ingredients of the current internet: a memory, a processor and networking links. Now we have demonstrated that nuclear spins can be employed as memories that are not disturbed by regenerating entanglement between the electron spins, the processors," says Kalb.

In this publication, Hanson and his team showed that entanglement can be stored in nuclear spins while regenerating entanglement between electron spins. Hanson explains the future possibilities: "We could now entangle electrons in additional quantum nodes such that we can extend the number of networking links towards a first real quantum network. Scientifically, a whole new world opens up." This entanglement distillation is essential for the future quantum internet, which requires multiple networking links of high quality. Hanson thinks the future is within reach: "In five years we will connect four Dutch cities in a rudimentary quantum network."

Explore further: Envisioning a future quantum internet

More information: Entanglement Distillation between Solid-State Quantum Network Nodes. Science, DOI: 10.1126/science.aan0070 , https://arxiv.org/abs/1703.03244

The quantum internet, which connects particles linked together by the principle of quantum entanglement, is like the early days of the classical internet no one can yet imagine what uses it could have, according to Professor ...

Quantum entanglement, one of the most intriguing features of multi-particle quantum systems, has become a fundamental building block in both quantum information processing and quantum computation. If two particles are entangled, ...

(Phys.org) Researchers at TU Delft in the Netherlands have managed to bring two electrons, three meters from each other, into a quantum- entangled state. This result marks a major step towards realizing a quantum network ...

(Phys.org)In a new study, physicists have shown a way to establish real entanglement between two identical particlesa topic that has been disputed until now. The results provide a better understanding of the fundamental ...

RMIT quantum computing researchers have developed and demonstrated a method capable of efficiently detecting high-dimensional entanglement.

Researchers at the Institute of Quantum Optics and Quantum Information, the University of Vienna, and the Universitat Autonoma de Barcelona have achieved a new milestone in quantum physics: they were able to entangle three ...

Magnetic materials form the basis of technologies that play increasingly pivotal roles in our lives today, including sensing and hard-disk data storage. But as our innovative dreams conjure wishes for ever-smaller and faster ...

Zhe Fei pointed to the bright and dark vertical lines running across his computer screen. This nano-image, he explained, shows the waves associated with a half-light, half-matter quasiparticle moving inside a semiconductor.

(Phys.org)A trio of researchers with Universit Paris-Est has discovered a new type of spherical bubblecalled a gas marble, it is similar to bubbles made with soap, but has a coating of much smaller polystyrene microspheres. ...

The different rates of neutrino and anti-neutrino oscillations recorded by an international collaboration of researchers in Japanincluding from Kavli IPMUis an important step in the search for a new source of asymmetry ...

Scientists all over the world are working towards new methods to realize an unhackable internet, an internet based on quantum entanglement an invisible quantum mechanical connection as networking links. The greatest ...

Researchers from North Carolina State University and Nanjing University have developed an "ultra-thin" sound diffuser that is 10 times thinner than the widely used diffusers found in recording studios, concert venues and ...

Adjust slider to filter visible comments by rank

Display comments: newest first

There's more to hacking than just listening in.

The other thing in the real world is that wiretapping is a small part of listening in, a large part is the backdoor which transmits the data out for 'debugging purposes' which 'accidentally' gets triggered by a hack, sending data to wherever. But its cool stuff nonetheless, just to have it be possible.

Also, quantum cryptography is still vulnerable to man-in-the-middle attacks. I think they're exaggerating with the unCRackable claims.

Please sign in to add a comment. Registration is free, and takes less than a minute. Read more

Continued here:

One step closer to the quantum internet by distillation - Phys.Org

James Comey just went nuclear on Donald Trump – CNN International

The testimony, which Comey is set to deliver Thursday in one of the most highly-anticipated Congressional hearing in decades, reads like a point-by-point dismissal of Trump's version of events -- casting Comey as wary from the get-go of a chief executive who seemed to presume too much and know too little.

In the wake of their first interaction, ever, on January 6, Comey decided that it was necessary to have written documentation of any time he spent with Trump.

"I felt compelled to document my first conversation with the President-Elect in a memo. To ensure accuracy, I began to type it on a laptop in an FBI vehicle outside Trump Tower the moment I walked out of the meeting. Creating written records immediately after one-on-one conversations with Mr. Trump was my practice from that point forward. This had not been my practice in the past. I spoke alone with President Obama twice in person (and never on the phone) -- once in 2015 to discuss law enforcement policy issues and a second time, briefly, for him to say goodbye in late 2016. In neither of those circumstances did I memorialize the discussions. I can recall nine one-on-one conversations with President Trump in four months -- three in person and six on the phone."

It only gets worse from there for Trump in Comey's opening statement.

Comey says that he was surprised to learn that a dinner invitation extended to him by Trump on Jan. 27 was for just the two of them ("It turned out to be just the two of us, seated at a small oval table in the center of the Green Room," Comey writes. "Two Navy stewards waited on us, only entering the room to serve food and drinks.") and that the goal of the meeting was "an effort to have me ask for my job and create some sort of patronage relationship."

Twice in that meeting Trump, recounted Comey, made a direct request for loyalty from the FBI director. "I need loyalty, I expect loyalty," Trump told Comey. Later, he returned to the subject. Here's Comey's recollection:

"He then said, 'I need loyalty.' I replied, 'You will always get honesty from me.' He paused and then said, 'That's what I want, honest loyalty.' I paused, and then said, 'You will get that from me.'"

Comey also confirmed in his written testimony that Trump directly asked him to "let go" of the investigation into deposed national security adviser Michael Flynn. Quoting Trump, Comey writes of the Feb. 14 meeting in the Oval Office: "I hope you can see your way clear to letting this go, to letting Flynn go. He is a good guy. I hope you can let this go."

I mean. Holy crap.

Then there is this, from Comey's after-action report of that meeting: "I had understood the President to be requesting that we drop any investigation of Flynn in connection with false statements about his conversations with the Russian ambassador in December."

While Comey noted that he did not believe Trump was asking for the entire Russia investigation to disappear, that the sitting FBI director did believe the sitting president was asking to have a federal investigation of any sort dropped is, well, stunning.

In their final conversation -- a phone call from Trump to Comey on April 11 -- the president again sought to secure Comey's loyalty, according to the former FBI Director's re-telling.

After Comey tells Trump that he should contact the deputy Attorney General's office in regards to his repeated request to "get out" the news that he was not a target of the federal investigation, here's how Comey remembers the president's response:

"He said he would do that and added, 'Because I have been very loyal to you, very loyal; we had that thing you know.' I did not reply or ask him what he meant by 'that thing.' I said only that the way to handle it was to have the White House Counsel call the Acting Deputy Attorney General. He said that was what he would do and the call ended."

"We had that thing you know."

If there is a single sentence that will become the symbol of Comey's testimony -- or even of Trump's broader interactions with the FBI director -- it's that. Trump trying to establish some rapport or, really, some sense of "you owe me" while Comey stares blankly.

The broader picture presented by Comey's testimony is deeply damaging to Trump.

That Trump and Comey had nine one-on-one conversations in the space of just over three months -- as opposed to the two one-on-one chats Comey had with Obama in eight years -- is hugely telling. And, in those conversations Trump is repeatedly cast as attempting to secure Comey's loyalty -- and, at times, suggesting his job depends on it. (FBI directors are appointed for 10 year terms but, as we know, can be fired at any time by a president.) That he asks for Comey to end the probe into Flynn is, at minimum a massive breach of protocol.

Trump and his allies will work to dismiss Comey's testimony -- and his answers in front of the Senate Intelligence Committee tomorrow -- as, at best, a "he said, he said" situation and, at worst, "fake news."

See the article here:

James Comey just went nuclear on Donald Trump - CNN International

Jeff Sessions committed the one sin Donald Trump can’t forgive – CNN

No more.

Why? It's simple: Sessions admitted he did something wrong. He made a concession that, in Trump's mind, is the root of many of the Russia-related problems he is now dealing with.

Apparently his decision caught Trump by surprise. And the President was not happy. You can tell that by reading the statement he put out at the time. Here it is:

"Jeff Sessions is an honest man. He did not say anything wrong. He could have stated his response more accurately, but it was clearly not intentional. This whole narrative is a way of saving face for Democrats losing an election that everyone thought they were supposed to win. The Democrats are overplaying their hand. They lost the election and now, they have lost their grip on reality. The real story is all of the illegal leaks of classified and other information. It is a total witch hunt!"

Remember -- because Jeff Sessions apparently didn't -- that one of the cardinal rules of Trumpism is that you never ever apologize or concede anything. Give them an inch and they'll take a mile -- and all that.

To Trump's mind, you can draw a straight line between what he believes was Sessions' very dumb decision to recuse himself and the fact that former FBI Director Robert Mueller is now leading a special counsel investigation into Russia's meddling and the possibility of collusion between the Russians and elements of the Trump campaign.

Sessions' recusal, in Trump's mind, led to then-FBI Director James Comey leading the investigation. Comey's aggressiveness on the Russia probe -- wholly misguided to Trump's mind -- led the President to fire him using the pretext of a memo bashing Comey written by deputy Attorney General Rod Rosenstein. And, because Rosenstein wrote that memo, he felt the need to appoint a special counsel to oversee the investigation for fear his reputation was on the line. Hence, Mueller.

See? It all makes sense! Right? Right???

Donald Trump is big on scapegoats. Usually the media fills that role nicely. But, as it relates to the trouble he finds himself in on Russia, it's Sessions who has become the fall guy for Trump.

The truth, of course, is that a large chunk of Trump's Russia problems are his own fault. Had he, from the start, welcomed the investigation with open arms or, I don't know, not fired the guy leading it, he would be in a much better place than he finds himself today.

It's a self-inflicted wound that Trump is blaming someone else for inflicting. Which, come to think of it, is the story of his presidency to date.

View original post here:

Jeff Sessions committed the one sin Donald Trump can't forgive - CNN

The Potemkin Policies of Donald Trump – The Atlantic

Its Infrastructure Week at the White House. Theoretically.

On Monday, the administration announced a plan to spend $200 billion on infrastructure and overhaul U.S. air traffic control. There was a high-profile signing in the East Wing before dozens of cheering lawmakers and industry titans. It was supposed to be the beginning of a weeklong push to fix Americas roads, bridges, and airports.

But in the next two days, Trump spent more energy burning metaphorical bridges than trying to build literal ones. He could have stayed on message for several hours, gathered Democrats and Republicans to discuss a bipartisan agreement, and announced a timeframe. Instead he quickly turned his attention to Twitter to accuse media companies of Fake News while undermining an alliance with Qatar based on what may be, fittingly, a fake news story.

Its a microcosm of this administrations approach to public policy. A high-profile announcement, coupled with an ambitious promise, subsumed by an unrelated, self-inflicted public-relations crisis, followed by nothing.

The secret of the Trump infrastructure plan is: There is no infrastructure plan. Just like there is no White House tax plan. Just like there was no White House health care plan. More than 120 days into Trumps term in a unified Republican government, Trumps policy accomplishments have been more in the subtraction category (e.g., stripping away environmental regulations) than addition. The president has signed no major legislation and left significant portions of federal agencies unstaffed, as U.S. courts have blocked what would be his most significant policy achievement, the legally dubious immigration ban.

The simplest summary of White House economic policy to date is four words long: There is no policy.

Consider the purported focus of this week. An infrastructure plan ought to include actual proposals, like revenue-and-spending details and timetables. The Trump infrastructure plan has little of that. Even the presidents speech on Monday was devoid of specifics. (An actual line was: We have studied numerous countries, one in particular, they have a very, very good system; ours is going to top it by a lot.) The ceremonial signing on Monday was pure theater. The president, flanked by politicians and businesspeople smiling before the twinkling of camera flashes, signed a paper that merely asks Congress to work on a bill. An assistant could have done that via email. Meanwhile, Congress isnt working on infrastructure at all, according to Politico, and Republicans have shown no interest in a $200 billion spending bill.

In short, this plan is not a plan, so much as a Potemkin policy, a presentation devised to show the press and the public that the president has an economic agenda. The show continued on Wednesday, as the president delivered an infrastructure speech in Cincinnati that criticized Obamacare, hailed his Middle East trip, and offered no new details on how his plan would work. Infrastructure Week is a series of scheduled performances to make it look as if the president is hard at work on a domestic agenda that cannot move forward because it does not exist.

Journalists are beginning to catch on. The administrations policy drought has so far been obscured by a formulaic bait-and-switch strategy one could call the Two-Week Two-Step. Bloomberg has compiled several examples of the president promising major proposals or decisions on everything from climate-change policy to infrastructure in two weeks. He has missed the fortnight deadline almost every time.

The starkest false promise has been taxes. Were going to be announcing something I would say over the next two or three weeks, Trump said of tax reform in early February. Eleven weeks later, in late April, the White House finally released a tax proposal. It was hardly one page long.

Arriving nine weeks late, the document was so vague that tax analysts marveled that they couldnt even say how it would work. Even its authors are confused: Treasury Secretary Steven Mnuchin has repeatedly declined to say whether the plan will cut taxes on the rich, even though cutting taxes on the rich is ostensibly the centerpiece. Perhaps its because he needs more help: None of the key positions for making domestic tax policy have been filled. There is no assistant secretary for tax policy, nor deputy assistant secretary for tax analysis, according to the Treasury Department.

Once again, the simplest summary of White House tax policy is: There is no plan. There isnt even a complete staff to compose one.

The story is slightly different for the White House budget, but no more favorable. The budget suffers, not from a lack of details, but from a failure of numeracy that speaks to the administrations indifference toward serious public policy. The authors double-counted a projected benefit from higher GDP growth, leading to $2 trillion math error, perhaps the largest ever in a White House proposal. The plan included hundreds of billions of dollars in revenue from the estate tax, which appears to be another mistake, since the White House has separately proposed eliminating it.

Does the presidents budget represent what the presidents policies will be? It should, after all. But asked this very question, Mick Mulvaney, the director of the Office of Management and Budget, made perhaps the strangest claim of all: I wouldnt take whats in the budget as indicative of what our proposals are, he said.

This haphazard approach extends to the repeal of Obamacare, which may yet pass the Senate, but with little help or guidance from the president. Trump has allowed House Speaker Paul Ryan to steer the Obamacare-replacement bill, even though it violates the presidents campaign promises to expand coverage and protect Medicaid. After its surprising passage in the House, he directly undercut it on Twitter by suggesting he wants to raise federal health spending. Even on the most basic question of health-care policyshould spending go up, or down?the presidents Twitter account and his favored law are irreconcilable. A law cannot raise and slash health care funding at the same time. The Trump health care plan does not exist.

It would be a mistake to call this a policy-free presidency. Trump has signed several executive orders undoing Obama-era regulations, removing environmental protections, and banning travel from several Muslim-majority countries. He has challenged NATO and pulled out of the Paris Accords. But these accomplishments all have one thing in common: Trump was able to do them alone. Signing executive orders and making a speech dont require the participation of anybody in government except for the president.

Its no surprise that a former chief executive of a private company would be more familiar with the presumption of omnipotence than the reality of divided powers. As the head of his own organization, Trump could make unilateral orders that subordinates would have to follow. But passing a law requires tireless persuasion and the cooperation of hundreds of representatives in the House and Senate who cannot be fired for insubordination. Being the president of the United States is nothing like being a CEO, especially not one of an eponymous family company.

Republicans in the House and Senate dont need the presidents permission to write laws, either. Still, they too have struggled to get anything done. Several GOP senators say they may not repeal Obamacare this yearor ever. It is as if, after seven years of protesting Obamacare, the party lost the muscle memory to publicly defend and enact legislation.

In this respect, Trump and his party are alikeunited in their antagonism toward Obama-era policies and united in their inability to articulate what should come next. Republicans are trapped by campaign promises that they cannot fulfill. The White House is trapped inside of the presidents perpetual campaign, a cavalcade of economic promises divorced from any effort to detail, advocate, or enact major economic legislation. With an administration that uses public policy as little more than a photo op, get ready for many sequels to this summers Infrastructure Week.

See the article here:

The Potemkin Policies of Donald Trump - The Atlantic

President Trump’s Approval Rating Hit Another New Low – TIME

President Donald Trump's approval rating has sunk to a new low at 34%, according to a recent poll.

According to a poll by Quinnipiac University , 34% of voters approve of Trump, while 57% disapprove, a dip from the university's previous survey on May 24, which found that the President had a 37% approval rating. The latest poll results are Trump's lowest scores so far in April, he hovered around 35% approval, according to Quinnipiac.

The poll found that 31% of voters think Trump did something illegal in his relationship with Russia, while 29% say that the president did something unethical, not illegal. About 32% of voters think Trump did nothing wrong. A majority of voters see Trump's general relationship with Russia as concerning 68% said they are "very concerned" or "somewhat concerned," while 54% said he is too friendly with the country.

Quinnipiac University polled 1,361 voters from May 31 to June 6. The poll has a margin of error of plus or minus 3.2 percentage points.

See more here:

President Trump's Approval Rating Hit Another New Low - TIME

Donald Trump will do whatever it takes to distract you from the Comey hearing – CNN

He came of age in the "Bright Lights, Big City" Manhattan. He was covered as a sort of bad boy of New York City gossip -- his every move consumed by the tabloids. He spent his last decade-plus creating "reality" TV in which he and his producers made extremely watchable TV out of human emotions and foibles.

It is impossible to see the move as anything other than Trump throwing some chum to the news gods -- and some news that tells a much more positive story for this White House than the testimony expected later today from deputy Attorney General Rod Rosenstein and, especially, from Comey on Thursday.

Trump has backed himself into a major corner with his full-scale denials about the reporting coming out of his conversations with Comey. And, when backed into a corner, Trump is doing what he has spent a lifetime doing: Try like hell to change the subject and focus of the media lens.

It's transparent -- and far from foolproof. But, it is working, at least somewhat.

But nominating Wray gives Trump a temporary respite from the relentless -- and negative -- coverage about Russia, Comey and the rest. It also gives him something to talk about in which he doesn't appear angry and defensive. (By the way, that's the same motivation behind Trump's speech bashing Obamacare in Cincinnati this afternoon.)

Manipulating media coverage -- and perceptions about him more generally -- is in Trump's DNA. It's who he is. It's what he does. Hence, the Wray nomination on the verge of what almost certainly will be one of the roughest two-day patches of his presidency to date.

Here is the original post:

Donald Trump will do whatever it takes to distract you from the Comey hearing - CNN

Donald Trump has a lot of feelings about fame – CNN

Trump "joked" that Kushner, who is married to Ivanka Trump and also serves as a White House strategist, has "become much more famous than me," adding: "I'm a little bit upset about that."

Ah ha ha ha. Ha. Ahem. Cough.

That's not to say Kushner will follow Comey's trajectory. He almost certainly won't -- because Trump values nothing as much as he values loyalty to family.

But even though Kushner isn't on his way out of the White House anytime soon, Trump's aside about his fame is revealing -- in two ways.

1. Trump views the entire world through the lens of fame and notoriety: Trump's measure of success is money, sure. But, even more importantly, it's fame. Lots of people are rich. Not all of those people are also cultural figures. He is. And he uses himself as a measuring stick by which to gauge others and his interactions with them.

Trump is a public figure who embraces that status with both arms. Fame is the way you can tell the winners from the losers in life.

2. Trump makes very little distinction between good press and bad press: Like most people who crave and court the spotlight, Trump isn't someone to split hairs about how positive or negative the coverage of him is.

Sure, he will thunder about how the media is so against him. But true defeat in Trumpworld is not bad press, it's no press.

Trump's asides and "jokes" -- not to mention his tweets -- are almost always more revealing than his formal speeches and statements. This "famous" comment is no exception.

Here is the original post:

Donald Trump has a lot of feelings about fame - CNN