Soaring today. Meg tirrell with details. The bar was very high for moderna after pfizers efficacy last week. Mad earn moderna met the 94 percent efficacy and will seek the fda emergency authorization in the coming weeks. We just talked to the doctor who has been leading the vaccine and Drug Development as part of operation warp speed about the significance of this moment, really seeing two vaccines in a row at this high level of efficacy heres what he said. Its an extraordinary outcome, frankly, to have two different vaccines tested in different conditions by two Different Companies developed independently yield very similar outcomes this gives a huge confidence into the data obtained and really suggests that the 90 percent and more efficacy is true and real. But of course, melissa, as were getting this extremely good news it comes at a time in the pandemic when weve never been seeing more daily cases, were seeing 140,000 a day on average right now. And were seeing more and more people
Science literature but what im most interested in is, number one, how to help policymakers to make the decisions about Technology Policy and so that involves understanding the details of our Computer Systems and Network Systems work. And probably more importantly im really interested in how to give all our Computing Technology so that its more responsive to Public Policy needs. Ive been able to do that because ive worked with and continue to work with an Extraordinary Group of computer scientists and other researchers at mit and around the world. Host can you give one example of how you influenced policy . Guest the people are probably well aware as an example that theres a big debate about the use of Encryption Technology. We need encryption to protect our email exchanges, our financial transactions, political speech that goes on, we hope privately online when it needs to. Governments for decades have been concerned that the use of strong Encryption Technology would swarm the ability
Extraordinary group of computer scientists and my research in all that time has always been in the Computer Science literature but what im most interested in is number one how to help policymakers to make good decisions about Technology Policy and involves understanding the details of how Computer Systems and Network Systems work and probably more important they i am interested in how to evolve our Computing Technology so that its more responsive to Public Policy needs. Ive been able to do that because ive worked with and continue to work with an Extraordinary Group of computer scientists and other researchers at mit and around the world. Host can you give one example of how you influence policy . Guest people are probably well aware as an example that there is a big debate about the use of Encryption Technology and we need encryption to protect our email exchanges, our financial transactions, political speech that goes on we hope privately online when it needs to end government for de
W. I should say im actually trained as a lawyer originally. Ive been at m. I. T. For more than 20 years. And ive alwaysorked with an Extraordinary Group of computer scientists. My research in all that time has always been in the Computer Science literature. But what im really most interested in is number one, how do help policymakers to make good decisions about Technology Policy and so that involves understanding the details of how cputer systems and Network Systems work. And probably more importantly, im really interested in how to evolve our Computing Technology so its more responsive to Public Policy needs. And ive been able to do that because ive worked with and continue to work with an Extraordinary Group of computer scientists and other researchers at m. I. T. And around the world. Can you give one example of how youve influenced policy . Well, people are probably well aware as an example that theres a big debate about the use of encryption technology. We need encryption to prot
Importantly i am really interested in how to evolve our Computing Technology so that it is more responsive to Public Policy needs. We need encryption to protect our email exchanges, our financial transactions, political speech that goes on. We hope privately online what it needs to. Governments for decades have ofn concerned that the use strong Encryption Technology would thwart the ability of Law Enforcement to conduct electronic surveillance. From a technical perspective, we look at that question and while acknowledging that encryption and pose some barriers for the police, we have shown through Technical Research that if you try to force all encryption palpable or have upkdoors, then you will end harvesting the security of the millions of people around the world to use the internet and Computing Technology, so well this is an ongoing debate, even governments trying to control encryption have acknowledged that they should not do so in a way that introduces systemic weaknesses. At tha