08/12/31 Doctor Who: Timelash
08/12/30 Doctor Who: Arc of infinity
08/12/26 Unrelated linkage
08/12/25 Unrelated linkage
08/12/24 Unrelated linkage
08/12/14 Unrelated linkage
08/12/13 Unrelated linkage
08/12/11 Unrelated linkage
08/12/09 Unrelated linkage
The one everyone loves to hate.
This serial was first broadcast between 9 - 16 March 1985. A brief and somewhat spoiler-ish summary of the plot: when the Doctor and Peri decide to go on holiday they end up in an episode of "Blake's 7" and meet H.G. Wells.
Though this isn't a good serial, it's not entirely bad either. Some good things:
Some still somewhat good things:
The big problem, however:
My verdict:
Kind of fun, in a weird sort of way.
More Doctor Who reviews:
Doctor Who reviews
The latest version of this review:
Timelash (1985)
Doctor Who goes to Amsterdam.
This serial was first broadcast between 3rd - 12th January 1983. A brief and somewhat spoiler-ish summary of the plot: after his execution, the Doctor doesn't go to heaven but to Amsterdam...
Like in 'Time-flight', in 'Arc of Infinity' we have (beware, spoiler ahead) a renegade Time Lord who is able to do his mischief by means of a lot of dodgy technology, and it's interesting to compare and contrast the way this is dealt with in both serials. The main difference with 'Time-flight' is that in 'Arc' Omega has a reason to do what he does, he has relationships with the other characters and the conflicts that arise from this are what drives the plot. While 'Time-flight' was about science and technology, 'Arc of infinity' is about character and relationships which makes it a much better story.
Some good things about this serial:
The less good news:
The fun fact about this serial:
My verdict:
I have a bit of a weakness for this serial since part of it was filmed in Amsterdam, a city I know extremely well, and some of it was shot at Frankendael which is a location that I'm quite fond of. Although I realise 'Arc of infinity' is far from 'Doctor who for the ages' I do think it's a sweet little story.
More Doctor Who reviews:
Doctor Who reviews
The latest version of this review:
Arc of infinity (1983)
Catching up for the last time in 2008.
Thinking about privacy.
Times Online: The dangerous temptations of instant truth
The Guardian: We know where you live
CSC Leading edge forum 2008: Digital disruptions (PDF)
Information security.
Schneier on Security: Audit
Wired threat level: Fed Blotter - three charged with international bank trojan scheme
Blog critics: Is the CheckFree hack a new information theft trend?
Center for Strategic and International Studies: Securing cyberspace for the 44th presidency
Wired Threat Level blog: Computer malware the new 'weapon of mass destruction'
Anonymity online.
Techdirt: Yet another state court explores right to anonymity in online posting
Biometric identification.
Cnet: Vietnamese security firm - your face is easy to fake
Securiteam blogs: Fooling biometric face recognition
The DNA database and human rights.
Nature: UK DNA database needs overhaul
Nature: Watching Big Brother
Blogzilla: Controlling the DNA database
UK blocks Wikipedia page.
Blogzilla: The great firewall of Britain
Techdirt: UK ISP's block Wikipedia page; cause problem with UK editing
Wired threat level blog: Wikipedia blocks British editors amid censorship flap
Techdirt: should internet censors be responsible for breaking stuff?
Wired Threat Level blog: Censorship group removes Wikipedia blacklisting
BBC News: IWF backs down on Wiki censorship
European legislation.
EDRI: Changes in the Telecom package adopted by the Council
EDRI: UK rejected data breach notification law
Everything else.
Times Online: Google Earth accused of aiding terrorists
Techdirt: Indian court wants to ban Google Earth in the wake of Mumbai attacks
Cloud security: Privacy in the cloud: show me the money
Technorati: State of the blogosphere 2008
Techdirt: Reminder - not everyone online is a jerk
David Lacey's security blog: Managing security in outsourcing and off-shoring
Techdirt: More votes lost by Diebold; discovered by unique voting transparency project
Wired Threat Level blog: Student who created Facebook group critical of teacher sues high school over suspension
Catching up: the sequel.
European legislation.
Techdirt: European Council rejects EU Parliament's amendment against three strikes rule
Privacy?
NYT: You're leaving a digital trail - what about privacy?
Robin Wilton's esoterica: the identity and privacy debate matures... gradually
DNA database.
BBC News: DNA database 'breach of rights'
Robin Wilton's esoterica: When to register DNA profiles?
Google.
NYT: Google's gatekeepers
Techdirt: Google as benevolent dictator - the gatekeeper and the data collector
Information security.
Symantec: Internet security threat report - analysis of worldwide Internet threat activity
Symantec: Symantec report on the underground economy, July 07 - June 08 (PDF)
Ars Technica: Underground cybercrime economy booming
Concurring opinions: The booming cybercrime economy
Computing: HMRC data loss was preventable, says government advisor
Everything else.
RFID weblog: RFID sniff tag - comination of pet monitoring device and social networking tool
Catching up even more.
Privacy by design.
Information Commisioner's Office: Privacy by Design - providing a proactive approach to privacy protection
The privacy, identity and consent blog: Information Commissioner publishes Privacy by Design report
NTOUK: Mind the gap - technology and policy
The BNP data leak.
Schneier on security: BNP database leaked
Information governance.
Eurim: The directors roundtable on information governance
Stuart King's risk management blog: EURIM on information governance
RFID.
Tech-On!: Orizin launches "world's smallest" active asset RFID tag (note: the page is in English and you don't need to download any character sets to access it)
Everything else.
Blogzilla: Privacy and behavioural targetting
Cnet: Report - Obama's cell records improperly accessed
Techdirt: No surprise here - telco employees acc ess Obama's phone records
NYTimes: Online age verification for children brings privacy worries
Schneier on security: Online age verification
National Intelligence Council: Global trends 2025
David Lacey's security blog: Global trends are not all bad
BBC News: New privacy group to shape policy
Catching up once more.
Information security.
Networkworld: Myth or truism? Security experts judge conventional wisdom
Risk assessment.
Risktical ramblings: Security template exception (part 1) - the scenario
Risktical ramblings: Security template exception (part 2) - the assessment
Stuart King's Risk management blog: Rambling on about risk assessment
Risktical ramblings: Stuart King - risk assessment rebuttal
Risktical ramblings: Managing risk to the "unexpected loss"
Social engineering.
Psychology today blogs: How to run a con
Schneier on security: The neuroscience of cons
The war on terror.
John D. Michaels: All the president's spies - Private-public intelligence partnerships in the war on terror (SSRN)
Concurring opinions: Uncle Sam's corporate helpers in the war on terror
BNP data breach.
BBC News: Police and teachers on BNP list
Stuart King's Risk management blog: BNP data breach
RFID DIY.
Instructables: RFID Reader detactor and tilt-sensitive RFID tag
Instructables: How to block / kill RFID chips
Everything else.
Kim Cameron's Identity weblog: Protecting the Internet through minimal disclosure
Digital identity forum: Children and identy theft
Growth Business: Fines likely for data breaches
The privacy, identity and consent blog: Crunch time for privacy?
RFID weblog: RFID sniffer - sniffs out tagged objects
Venture Beat: AdmitOne Security finds way to track web account sharing
Catching up again.
Anti-terror mission creep.
Mail Online: March of the dustbin Stasi - Half of councils use anti-terror laws to watch people putting rubbish out on the wrong day
Schneier on security: Anti-terror mission creep in the UK
Everything else.
Concurring opinions: Killing for leverage
Concurring opinions: Obama and technology
Still catching up.
US politics.
Wired threat level blog: Propelled by internet, Barack Obama wins presidency
Data breaches.
ICO: Speech to RSA Conference Europe on data breaches, Richard Thomas, Information Commissioner, - 29 October 2008 (PDF)
David Lacey's security blog: Data breaches will continue until we take the right action
Identity fraud.
The Consumerist: How outsourced call centers are costing millions in identity theft
Schneier on security: Horrible identity theft story
Everything else.
Kim Cameron's Identity weblog: Project Geneva - part 1
Kim Cameron's Identity weblog: Project Geneva - part 2
Kim Cameron's Identity weblog: Project Geneva - part 3
David Lacey's security blog: The advancing science of anti-forensics
The Guardian: Bebo kids will value privacy when they see adults do too
Blogzilla: Bebo kids will value privacy when adults do
Unwired view: Apple looks forward to add RF communications to everything
Gizmodo: Apple patent foresees gadget RF connectivity everywhere, from shirts to cars
Schneier on security: Understanding terrorist behavior
Ceci n'est pas un Bob: The end of taxation
Catching up.
Government surveillance.
BBC News: Giant database plan 'Orwellian'
Antivirus programs.
Dark reading: Test shows shortcomings of antivirus programs
On this page Transitional HTML 4.01 and CSS 1 are used. If you're seeing this text you either have CSS switched off in your browser, or you're using a browser that can't handle CSS. If you're using an older browser version, you might want to consider upgrading.