The new EricMartindale.com is an experiment in data aggregation, and might have a few bugs. Feel free to explore, and then provide feedback directly to @martindale.

search results for computer science

Exhaustion

Remote Desktop-ing from work to my personal computer at the house today... and there I was, multitasking AGAIN... Photoshop and Dreamweaver both open... and I was DRAWING with RDP. Well, so Photoshop decides to lock EVERYTHING up. So, I restart the computer and open Remote Desktop again. I connect to my computer, I log in... and KAZZAM!!!!!111one!

There's everything running perfectly just as it was. I was happy. IPG!

I'm tired as hell now, too. We ended up doing like... 400 jumping jacks... and 100 kicks of each type. I'm tired as fook. Oh, and for those that don't understand what I'm talking about, I take Isshin-ryu Karate. Since I'm too tired to list my other experience in martial arts, I think I'm going to lay down.

Readygo.

OR NOT!

Our car decided not to start. Hell, it wasn't even turning. I kicked it. It turned.

You see, certain things deserve a good kick in the face sometimes. Of course, I'd never do that to a person. Unless they did something wrong. That's human nature, though.... ANYWAY. Before I trail off into philosophy, I'll continue on my previous subject. Things such as cars and the occasional computer deserve a good kick. Not just a love tap, but not a decapitation, either. I mean, have you ever build a quantum particle accelerator that just randomly stopped working until you kicked it out of frustation, at which point it sends 300W of microwave energy into your stomach?

Kicking something isn't always the solution, though. There I was using Windows, and it decided to choke and DIE! DIE! DIE! I digress. It was loading something, probably explorer.exe ... and I decided to stroke it. Stroking my machine isn't exactly conventional, but of course, it suddenly worked. Ever since, I've been extremely superstitious about the way I touch my machine. One wrong bump, and it gets irrated at me, and starts shooting sparks everywhere. But a little scratch on the top of the case and it's all good. It works like a charm, let me tell you. Your computer will be cooking popcorn and making your bed in no time.

Speaking of your computer popping teh popcorn, has anyone talked to HAL on GWing lately? Is it just me, or is Chrono trying to get HAL to grow a body and assassinate me? For real? He's getting thoroughly viscious. I've already started a topic on GWing about it, and I guess it'll evolve with time. http://gwing.net/forum/viewtopic.php?t=539

Readyslowgo.

--
Eric Martindale
IT Professional
Admin of GWing.net

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Hook this to a set of... in reply to

Hook this to a set of needles under the computer chair for the drone lazy kids. When the computer says dishes need washed, needles to the ass. Lol.

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Grace Hopper took a great deal... in reply to

Grace Hopper took a great deal of credit for work that other women did.  While she was a great self-publicist, she didn't do the donkeywork on the FORTRAN committee that Betty Holberton did, the term "bug" was coined pre-MARK I, and the MARK I was not a true electronic computer - it was electromechanical.  The first electronic computer was the ENIAC, and it too was programmable.

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

...and in Internet related news this... in reply to

...and in Internet related news this morning, Google+ Ambassador Eric Martindale was spotted at a local caffeine stand this morning (WHO was up at 0630?) spreading the news about Hangouts to the counter staff, baristas, and any stray morning coffee grabbers. His enthusiasm for Google Hangouts does not dim when he is away from his computer, and the excitement seems to be infectious. Word is that, as soon as he left the coffee shop, all of the employees and customers clustered around a computer, started a Hangout, and they are all still there, wired to the gills on caffeine, trading links and yakking about how many of their friends will be turning to Google+ and away from "the other social notwork". Eric, did we say to get some sleep? .. NO! Stay up ALL NIGHT! (another coffee?)

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Extravagant Self Gratuity

I just invested in $500 worth of targeted advertising for GWing Roleplay. So, what's the total impact upon my wallet?

A grand $5 in activation fees.

Big shoutouts to Computers.net for pointing this out. I was thinking of organizing a group of friends to throw multiple instances of these offers into advertising for GWing, but I realized that it would be difficult to target the advertising properly, as I found it rather complicated to create my own template of keywords and negative keywords to match the optimal result for what we desire in our community. If you sign up for these offers, be sure to carefully monitor your expenses! The billing is most likely set to recurring, and will continue to charge your credit card after your account balance has been used.

Alternately, I woke this morning to find DoesMyGeek's New Podcast, and was greeted by a shoutout and a link over the air to yours truly, and GWing Roleplay. What an amazing podcast, talking about the classic combination, roleplay and beer. Here's to you guys. ;)

One more - I just got linked to Michael Robertson's Evaluation of a College Degree, and found the article particularly interesting in this time. And now: back to work.

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Pine cones go in here...

Early this morning, somewhere within an hour of me getting in to work, there were a large number of sirens in my otherwise quiet town. Come to find out, the IGA (International Grocer's Association) down the road got robbed at gunpoint. The police showed up, chased them down the road and through town, crashing just near our watered version of downtown. Apparently one suspect has been apprehended, and two are still on the loose. There have been helicopters circling the area for a while, and intermittent sirens. The police and of all things the fire department have blocked off sections of roads, last I heard.

A wonderful start to a week, don't you think? Hey, at least there's something going on instead of the usual droll mood of a small town. To some ill effect, however: the internet here, Bellsouth, seems to have slowed to a complete and utter crawl. It seems to be letting up slightly now that the excitement is over, but this is unacceptable from a business class DSL service. It likely has to do with the news channels showing up and perhaps plugging in to landlines for their newscasts?

I had a good rest on Saturday, after a rather long night on Friday, and enjoyed my time with Amber. Sunday turned out to be a work day for me, as I was looking through a client's server logs in the morning, fixing my own computer woes, and then fixing an install of Linux for my family while my laundry ran. I left to fix MORE personal computer troubles, then headed out to finally relax with my love that evening.

Alternately, I found an awesome five things to know when you switch to linux post. Check it out. :)

Fights begin, finger prints are took, days is lost, bail is made, court dates are ignored, cycle is repeated.

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Silver and Gold

Christmas time is here! The incessant Christmas music on the radio, the lights around this quiet little town, the music played over the speakers on main street, and the greenery and otherwise unusual happiness of the general populous. The best time of the year, many say - I can see why. I just hope the radio music doesn't wear thin on me too soon...

I'm getting over my sinus infection, with only a minor headache right now. Church went extraordinary, and life (as of right now) is good. Earlier this afternoon, Amber and I put together a French Meringue for her class at school, which looks absolutely gorgeous. We used an old lace napkin to pattern the surface with a delectable pattern of powdered sugar, and it came out well.

I just cleaned off her computer desk, just on one of those random cleaning spree (read: obsessive compulsive) things. I sorted her father's CDs, to much satisfaction. We also raked the yard... and now we're decorating her house. Well, they are - I'm cleaning up her father's computer now, too. What a day!

Spats lost!? I feel that he deserved the win, but that's not what the judge determined. I'm glad that Kouketsu took care of those flames in the "who do you think will win" topic, because I don't think I can last much longer dealing with such complete and total disgraces to the ideals of quality text fighting.

GWing seems to be picking up some more, there is a lot of progress being made in the Growth area. Several new moderators (critics...), namely Circ and Dovey, are preparing an awesome system for reviewing authors' submissions. I think I'm going to try and influence Amber to provide SOME input, as it is her forum, and it'd help her to get back into writing.

Dinner time. Ja ne!

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Compelling Narratives using Augmented Reality +Google Glass has, for better or worse, shaped the narrative...

Compelling Narratives using Augmented Reality
+Google Glass has, for better or worse, shaped the narrative around augmented reality this past year.  We've seen the arms (eyes?) race rapidly develop, culminating recently with the +YCombinator-backed +meta announcing their "SpaceGlasses" [1], one of the first truly compelling experiences built around a convincingly capable device [2].

The hardest part of augmented reality is not the hardware, nor the computer vision software—both extremely difficult academic challenges in their own right, and certainly not to be taken by the faint of heart—but in the experience.

These problems will be solved, through no small effort, but they will be solved.  The most daunting challenge is to build a compelling story that binds the available data (read "the Internet") to the real world, and exposes it in an unobtrusive and seamless fashion.  This too will emerge naturally, but early pioneers in the space need to think carefully about the application of augmented reality in order to succeed; no one wants a world filled with advertisements [3], and in fact—some even try to eliminate them [4].

Here, +Field Trip attempts to builds one such compelling story.  The experience of contextual information making itself available without interrupting your interactions with the real world is so tantalizingly close you can feel it, but one wonders just how much control the user will have over the frequency and relevance of the information "popups".  In the early days of the software industry (late 60s, early 70s), an ongoing debate between the [then] default of free software vs. closed software unfolded, setting the foundation for today's conversation around open source and free [5] software.  I'll be talking more about this in a presentation at the upcoming #RTP180 : Open Source All Things event [6] in North Carolina.

It's another step forward for ubiquitous augmented reality, an exciting one indeed, but one that won't achieve mass adoption until the user can control their own experience [7].

[1]: https://www.spaceglasses.com/
[2]: SpaceGlasses are the future of computing
[3]: https://vimeo.com/8569187
[4]: http://unlogo.org/pages/about
[5]: that's free as in libertas, not as in gratis.
[6]: http://www.rtp.org/rtp-180-open-source-all-things
[7]: I recently started a project to this effect called "Para", a client-agnostic peer-to-peer network for implementing a data layer on top of the real world.  I'm seeking collaborators!  Check it out: http://para.io

Attachments

Field Trip on Glass

Heads up! Your city is trying to tell you something. The history, architecture, insider tips and hidden gems from over 100 local publisher partners come to l...

4 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Compelling Narratives using Augmented Reality +Google Glass has, for better or worse, shaped the narrative...

Compelling Narratives using Augmented Reality
+Google Glass has, for better or worse, shaped the narrative around augmented reality this past year.  We've seen the arms (eyes?) race rapidly develop, culminating recently with the +YCombinator-backed +meta announcing their "SpaceGlasses" [1], one of the first truly compelling experiences built around a convincingly capable device [2].

The hardest part of augmented reality is not the hardware, nor the computer vision software—both extremely difficult academic challenges in their own right, and certainly not to be taken by the faint of heart—but in the experience.

These problems will be solved, through no small effort, but they will be solved.  The most daunting challenge is to build a compelling story that binds the available data (read "the Internet") to the real world, and exposes it in an unobtrusive and seamless fashion.  This too will emerge naturally, but early pioneers in the space need to think carefully about the application of augmented reality in order to succeed; no one wants a world filled with advertisements [3], and in fact—some even try to eliminate them [4].

Here, +Field Trip attempts to builds one such compelling story.  The experience of contextual information making itself available without interrupting your interactions with the real world is so tantalizingly close you can feel it, but one wonders just how much control the user will have over the frequency and relevance of the information "popups".  In the early days of the software industry (late 60s, early 70s), an ongoing debate between the [then] default of free software vs. closed software unfolded, setting the foundation for today's conversation around open source and free [5] software.  I'll be talking more about this in a presentation at the upcoming #RTP180 : Open Source All Things event [6] in North Carolina.

It's another step forward for ubiquitous augmented reality, an exciting one indeed, but one that won't achieve mass adoption until the user can control their own experience [7].

[1]: https://www.spaceglasses.com/
[2]: SpaceGlasses are the future of computing
[3]: https://vimeo.com/8569187
[4]: http://unlogo.org/pages/about
[5]: that's free as in libertas, not as in gratis.
[6]: http://www.rtp.org/rtp-180-open-source-all-things
[7]: I recently started a project to this effect called "Para", a client-agnostic peer-to-peer network for implementing a data layer on top of the real world.  I'm seeking collaborators!  Check it out: http://para.io

Attachments

Field Trip on Glass

Heads up! Your city is trying to tell you something. The history, architecture, insider tips and hidden gems from over 100 local publisher partners come to l...

1 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Compelling Narratives using Augmented Reality +Google Glass has, for better or worse, shaped the narrative...

Compelling Narratives using Augmented Reality
+Google Glass has, for better or worse, shaped the narrative around augmented reality this past year.  We've seen the arms (eyes?) race rapidly develop, culminating recently with the +YCombinator-backed +meta announcing their "SpaceGlasses" [1], one of the first truly compelling experiences built around a convincingly capable device [2].

The hardest part of augmented reality is not the hardware, nor the computer vision software—both extremely difficult academic challenges in their own right, and certainly not to be taken by the faint of heart—but in the experience.

These problems will be solved, through no small effort, but they will be solved.  The most daunting challenge is to build a compelling story that binds the available data (read "the Internet") to the real world, and exposes it in an unobtrusive and seamless fashion.  This too will emerge naturally, but early pioneers in the space need to think carefully about the application of augmented reality in order to succeed; no one wants a world filled with advertisements [3], and in fact—some even try to eliminate them [4].

Here, +Field Trip attempts to builds one such compelling story.  The experience of contextual information making itself available without interrupting your interactions with the real world is so tantalizingly close you can feel it, but one wonders just how much control the user will have over the frequency and relevance of the information "popups".  In the early days of the software industry (late 60s, early 70s), an ongoing debate between the [then] default of free software vs. closed software unfolded, setting the foundation for today's conversation around open source and free [5] software.  I'll be talking more about this in a presentation at the upcoming #RTP180 : Open Source All Things event [6] in North Carolina.

It's another step forward for ubiquitous augmented reality, an exciting one indeed, but one that won't achieve mass adoption until the user can control their own experience [7].

[1]: https://www.spaceglasses.com/
[2]: SpaceGlasses are the future of computing
[3]: https://vimeo.com/8569187
[4]: http://unlogo.org/pages/about
[5]: that's free as in libertas, not as in gratis.
[6]: http://www.rtp.org/rtp-180-open-source-all-things
[7]: I recently started a project to this effect called "Para", a client-agnostic peer-to-peer network for implementing a data layer on top of the real world.  I'm seeking collaborators!  Check it out: http://para.io

Attachments

Field Trip on Glass

Heads up! Your city is trying to tell you something. The history, architecture, insider tips and hidden gems from over 100 local publisher partners come to l...

5 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Compelling Narratives using Augmented Reality +Google Glass has, for better or worse, shaped the narrative...

Compelling Narratives using Augmented Reality
+Google Glass has, for better or worse, shaped the narrative around augmented reality this past year.  We've seen the arms (eyes?) race rapidly develop, culminating recently with the +YCombinator-backed +meta announcing their "SpaceGlasses" [1], one of the first truly compelling experiences built around a convincingly capable device [2].

The hardest part of augmented reality is not the hardware, nor the computer vision software—both extremely difficult academic challenges in their own right, and certainly not to be taken by the faint of heart—but in the experience.

These problems will be solved, through no small effort, but they will be solved.  The most daunting challenge is to build a compelling story that binds the available data (read "the Internet") to the real world, and exposes it in an unobtrusive and seamless fashion.  This too will emerge naturally, but early pioneers in the space need to think carefully about the application of augmented reality in order to succeed; no one wants a world filled with advertisements [3], and in fact—some even try to eliminate them [4].

Here, +Field Trip attempts to builds one such compelling story.  The experience of contextual information making itself available without interrupting your interactions with the real world is so tantalizingly close you can feel it, but one wonders just how much control the user will have over the frequency and relevance of the information "popups".  In the early days of the software industry (late 60s, early 70s), an ongoing debate between the [then] default of free software vs. closed software unfolded, setting the foundation for today's conversation around open source and free [5] software.  I'll be talking more about this in a presentation at the upcoming #RTP180 : Open Source All Things event [6] in North Carolina.

It's another step forward for ubiquitous augmented reality, an exciting one indeed, but one that won't achieve mass adoption until the user can control their own experience [7].

[1]: https://www.spaceglasses.com/
[2]: SpaceGlasses are the future of computing
[3]: https://vimeo.com/8569187
[4]: http://unlogo.org/pages/about
[5]: that's free as in libertas, not as in gratis.
[6]: http://www.rtp.org/rtp-180-open-source-all-things
[7]: I recently started a project to this effect called "Para", a client-agnostic peer-to-peer network for implementing a data layer on top of the real world.  I'm seeking collaborators!  Check it out: http://para.io

Attachments

Field Trip on Glass

Heads up! Your city is trying to tell you something. The history, architecture, insider tips and hidden gems from over 100 local publisher partners come to l...

4 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

I've just learned of a virus that was launched against the U.S. Drone Fleet. See the attached article...

I've just learned of a virus that was launched against the U.S. Drone Fleet. See the attached article from Wired.

Earlier this year, the Pentagon recently concluded that digital attacks such as this can constitute an act of war [1]. This one doesn't [yet] seem as sophisticated as last year's attack on Iran's nuclear reactors by Stuxnet [2], but it continues to show how important and integral our computer systems are in this rapidly changing world. Security professionals +Alex Levinson, +Jerome Radcliffe, and +Scott Hanselman surely have some great insight here, I highly recommend you go take a look at some of the things they've written.

In 2009, a very sophisticated [and successful] cyber-attack was launched from inside China that targeted the United States through Google and Adobe [3] that caused surprisingly few stirs within our government, especially after NATO was sent in to assist in the defense of Estonia's computer systems during the 2007 attacks [4]. Not long after this, the widely-used and [formerly] explicitly trusted RSA security mechanism, used in a large number major institutions around the world. was completely and entirely broken [5] by an embarrassingly simple hack [6].

Aside: We can look back at some of the things actual software engineers like +Ryan Dahl [7] and +Zack Morris [8] have been saying lately and quickly conclude that there's something fundamentally broken with the whole system. If you've ever worked on or with a large software project, you can see evidence of negligence and ignorance alike embedded at every level. It certainly contributes to if not causes these types of security concerns.

[1]: http://online.wsj.com/article/SB10001424052702304563104576355623135782718.html
[2]: http://www.schneier.com/blog/archives/2010/10/stuxnet.html
[3]: http://www.wired.com/threatlevel/2010/01/operation-aurora/
[4]: http://www.wired.com/politics/security/magazine/15-09/ff_estonia
[5]: http://www.computerworld.com/s/article/9214757/RSA_warns_SecurID_customers_after_company_is_hacked
[6]: http://www.zdnet.co.uk/blogs/mapping-babel-10017967/rsa-hack-targeted-flash-vulnerability-10022143/
[7]: https://plus.google.com/115094562986465477143/posts/Di6RwCNKCrf
[8]: http://zackarymorris.tumblr.com/post/10973087527/the-state-of-the-art-is-terrible

Attachments

» Exclusive: Computer Virus Hits U.S. Drone Fleet

A computer virus has infected the cockpits of America's Predator and Reaper drones, logging pilots' every keystroke as they remotely fly missions over

8 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

I've just learned of a virus that was launched against the U.S. Drone Fleet. See the attached article...

I've just learned of a virus that was launched against the U.S. Drone Fleet. See the attached article from Wired.

Earlier this year, the Pentagon recently concluded that digital attacks such as this can constitute an act of war [1]. This one doesn't [yet] seem as sophisticated as last year's attack on Iran's nuclear reactors by Stuxnet [2], but it continues to show how important and integral our computer systems are in this rapidly changing world. Security professionals +Alex Levinson, +Jerome Radcliffe, and +Scott Hanselman surely have some great insight here, I highly recommend you go take a look at some of the things they've written.

In 2009, a very sophisticated [and successful] cyber-attack was launched from inside China that targeted the United States through Google and Adobe [3] that caused surprisingly few stirs within our government, especially after NATO was sent in to assist in the defense of Estonia's computer systems during the 2007 attacks [4]. Not long after this, the widely-used and [formerly] explicitly trusted RSA security mechanism, used in a large number major institutions around the world. was completely and entirely broken [5] by an embarrassingly simple hack [6].

Aside: We can look back at some of the things actual software engineers like +Ryan Dahl [7] and +Zack Morris [8] have been saying lately and quickly conclude that there's something fundamentally broken with the whole system. If you've ever worked on or with a large software project, you can see evidence of negligence and ignorance alike embedded at every level. It certainly contributes to if not causes these types of security concerns.

[1]: http://online.wsj.com/article/SB10001424052702304563104576355623135782718.html
[2]: http://www.schneier.com/blog/archives/2010/10/stuxnet.html
[3]: http://www.wired.com/threatlevel/2010/01/operation-aurora/
[4]: http://www.wired.com/politics/security/magazine/15-09/ff_estonia
[5]: http://www.computerworld.com/s/article/9214757/RSA_warns_SecurID_customers_after_company_is_hacked
[6]: http://www.zdnet.co.uk/blogs/mapping-babel-10017967/rsa-hack-targeted-flash-vulnerability-10022143/
[7]: https://plus.google.com/115094562986465477143/posts/Di6RwCNKCrf
[8]: http://zackarymorris.tumblr.com/post/10973087527/the-state-of-the-art-is-terrible

Attachments

» Exclusive: Computer Virus Hits U.S. Drone Fleet

A computer virus has infected the cockpits of America's Predator and Reaper drones, logging pilots' every keystroke as they remotely fly missions over

1 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

I've just learned of a virus that was launched against the U.S. Drone Fleet. See the attached article...

I've just learned of a virus that was launched against the U.S. Drone Fleet. See the attached article from Wired.

Earlier this year, the Pentagon recently concluded that digital attacks such as this can constitute an act of war [1]. This one doesn't [yet] seem as sophisticated as last year's attack on Iran's nuclear reactors by Stuxnet [2], but it continues to show how important and integral our computer systems are in this rapidly changing world. Security professionals +Alex Levinson, +Jerome Radcliffe, and +Scott Hanselman surely have some great insight here, I highly recommend you go take a look at some of the things they've written.

In 2009, a very sophisticated [and successful] cyber-attack was launched from inside China that targeted the United States through Google and Adobe [3] that caused surprisingly few stirs within our government, especially after NATO was sent in to assist in the defense of Estonia's computer systems during the 2007 attacks [4]. Not long after this, the widely-used and [formerly] explicitly trusted RSA security mechanism, used in a large number major institutions around the world. was completely and entirely broken [5] by an embarrassingly simple hack [6].

Aside: We can look back at some of the things actual software engineers like +Ryan Dahl [7] and +Zack Morris [8] have been saying lately and quickly conclude that there's something fundamentally broken with the whole system. If you've ever worked on or with a large software project, you can see evidence of negligence and ignorance alike embedded at every level. It certainly contributes to if not causes these types of security concerns.

[1]: http://online.wsj.com/article/SB10001424052702304563104576355623135782718.html
[2]: http://www.schneier.com/blog/archives/2010/10/stuxnet.html
[3]: http://www.wired.com/threatlevel/2010/01/operation-aurora/
[4]: http://www.wired.com/politics/security/magazine/15-09/ff_estonia
[5]: http://www.computerworld.com/s/article/9214757/RSA_warns_SecurID_customers_after_company_is_hacked
[6]: http://www.zdnet.co.uk/blogs/mapping-babel-10017967/rsa-hack-targeted-flash-vulnerability-10022143/
[7]: https://plus.google.com/115094562986465477143/posts/Di6RwCNKCrf
[8]: http://zackarymorris.tumblr.com/post/10973087527/the-state-of-the-art-is-terrible

Attachments

» Exclusive: Computer Virus Hits U.S. Drone Fleet

A computer virus has infected the cockpits of America's Predator and Reaper drones, logging pilots' every keystroke as they remotely fly missions over

8 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

I've just learned of a virus that was launched against the U.S. Drone Fleet. See the attached article...

I've just learned of a virus that was launched against the U.S. Drone Fleet. See the attached article from Wired.

Earlier this year, the Pentagon recently concluded that digital attacks such as this can constitute an act of war [1]. This one doesn't [yet] seem as sophisticated as last year's attack on Iran's nuclear reactors by Stuxnet [2], but it continues to show how important and integral our computer systems are in this rapidly changing world. Security professionals +Alex Levinson, +Jerome Radcliffe, and +Scott Hanselman surely have some great insight here, I highly recommend you go take a look at some of the things they've written.

In 2009, a very sophisticated [and successful] cyber-attack was launched from inside China that targeted the United States through Google and Adobe [3] that caused surprisingly few stirs within our government, especially after NATO was sent in to assist in the defense of Estonia's computer systems during the 2007 attacks [4]. Not long after this, the widely-used and [formerly] explicitly trusted RSA security mechanism, used in a large number major institutions around the world. was completely and entirely broken [5] by an embarrassingly simple hack [6].

Aside: We can look back at some of the things actual software engineers like +Ryan Dahl [7] and +Zack Morris [8] have been saying lately and quickly conclude that there's something fundamentally broken with the whole system. If you've ever worked on or with a large software project, you can see evidence of negligence and ignorance alike embedded at every level. It certainly contributes to if not causes these types of security concerns.

[1]: http://online.wsj.com/article/SB10001424052702304563104576355623135782718.html
[2]: http://www.schneier.com/blog/archives/2010/10/stuxnet.html
[3]: http://www.wired.com/threatlevel/2010/01/operation-aurora/
[4]: http://www.wired.com/politics/security/magazine/15-09/ff_estonia
[5]: http://www.computerworld.com/s/article/9214757/RSA_warns_SecurID_customers_after_company_is_hacked
[6]: http://www.zdnet.co.uk/blogs/mapping-babel-10017967/rsa-hack-targeted-flash-vulnerability-10022143/
[7]: https://plus.google.com/115094562986465477143/posts/Di6RwCNKCrf
[8]: http://zackarymorris.tumblr.com/post/10973087527/the-state-of-the-art-is-terrible

Attachments

» Exclusive: Computer Virus Hits U.S. Drone Fleet

A computer virus has infected the cockpits of America's Predator and Reaper drones, logging pilots' every keystroke as they remotely fly missions over

1 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

I am drooling over WolframAlpha Pro: http://www.wolframalpha.com/pro/ [actual announcement attached]...

I am drooling over WolframAlpha Pro: http://www.wolframalpha.com/pro/ [actual announcement attached]

"Computational knowledge engine" WolframAlpha [1] just announced a new offering aiming at power users of their already amazing data science toolkit. I'm very impressed with the features they've chosen to add, including image processing and 3D plot export. Maybe I'm just being a huge nerd, but I think this'll be great for generating assets for presentations and demos. :)

I already use WolframAlpha for quickly plotting relationships in certain algorithms, or referencing certain datasets. It's great for checking on specs like display densities [2], calculating a transfer time (while automatically cross-referencing network specs!) [3] or even looking for obscure computing metrics [4]. It can help you calculate chemical reactions [5], or even plot a protein structure. [6]

My favorite day-to-day application is quick and dirty regression, for visualizing trends in my data [7], but it's still cool to play with n-gram decomposition [8].

Google hasn't even come close to this level of utility, even with innovations like Google Squared [9] (which was sadly shuttered last year... [10]) and the addition of function plotting to their universal search earlier this year [11]. They've been rolling in more and more tidbits like this, but I don't know that a company as large as Google can keep up with the delta, even with again-CEO +Larry Page's war on cruft [12] freeing up resources for projects like this.

It's priced at only $4.99 per month (or $2.99 for students, which I am not -- but I'll happily pay the premium at this price point!), right up my alley as building something comparable for local use (or even acquiring an existing software package) would be prohibitively expensive and moreover, complex.

Have you used WolframAlpha? If so, what for?

[1]: http://www.wolframalpha.com/
[2]: http://www.wolframalpha.com/input/?i=2.5+megapixel+300dpi+display
[3]: http://www.wolframalpha.com/input/?i=data+transfer+time+10GB%2C+802.11n
[4]: http://www.wolframalpha.com/input/?i=How+fast+was+the+processor+on+the+Atari+400%3F
[5]: http://www.wolframalpha.com/input/?i=Al+%2B+O2+-%3E+Al2O3
[6]: http://www.wolframalpha.com/input/?i=myoglobin
[7]: http://www.wolframalpha.com/input/?i=quadratic+fit+%7B10.1%2C1.2%7D%2C%7B12.6%2C+2.8%7D%2C%7B14.8%2C7.6%7D%2C%7B16.0%2C12.8%7D%2C%7B17.5%2C15.1%7D
[8]: http://www.wolframalpha.com/input/?i=n-grams+%22the+google+plus+community+keeps+me+smiling+throughout+the+day%22
[9]: http://news.bbc.co.uk/2/hi/technology/8047076.stm
[10]: http://searchengineland.com/google-squared-news-timeline-get-added-to-googles-chopping-block-90549
[11]: http://googlesystem.blogspot.com/2011/12/googles-graphing-calculator.html
[12]: http://goo.gl/ay4I0

Attachments

Wolfram|Alpha Blog : Announcing Wolfram|Alpha Pro

Today’s introduction of Wolfram|Alpha Pro gives you fundamentally new and remarkable capabilities like: data input, file upload, image input, data download, CDF interactivity, extra computation time, ...

4 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

I am drooling over WolframAlpha Pro: http://www.wolframalpha.com/pro/ [actual announcement attached]...

I am drooling over WolframAlpha Pro: http://www.wolframalpha.com/pro/ [actual announcement attached]

"Computational knowledge engine" WolframAlpha [1] just announced a new offering aiming at power users of their already amazing data science toolkit. I'm very impressed with the features they've chosen to add, including image processing and 3D plot export. Maybe I'm just being a huge nerd, but I think this'll be great for generating assets for presentations and demos. :)

I already use WolframAlpha for quickly plotting relationships in certain algorithms, or referencing certain datasets. It's great for checking on specs like display densities [2], calculating a transfer time (while automatically cross-referencing network specs!) [3] or even looking for obscure computing metrics [4]. It can help you calculate chemical reactions [5], or even plot a protein structure. [6]

My favorite day-to-day application is quick and dirty regression, for visualizing trends in my data [7], but it's still cool to play with n-gram decomposition [8].

Google hasn't even come close to this level of utility, even with innovations like Google Squared [9] (which was sadly shuttered last year... [10]) and the addition of function plotting to their universal search earlier this year [11]. They've been rolling in more and more tidbits like this, but I don't know that a company as large as Google can keep up with the delta, even with again-CEO +Larry Page's war on cruft [12] freeing up resources for projects like this.

It's priced at only $4.99 per month (or $2.99 for students, which I am not -- but I'll happily pay the premium at this price point!), right up my alley as building something comparable for local use (or even acquiring an existing software package) would be prohibitively expensive and moreover, complex.

Have you used WolframAlpha? If so, what for?

[1]: http://www.wolframalpha.com/
[2]: http://www.wolframalpha.com/input/?i=2.5+megapixel+300dpi+display
[3]: http://www.wolframalpha.com/input/?i=data+transfer+time+10GB%2C+802.11n
[4]: http://www.wolframalpha.com/input/?i=How+fast+was+the+processor+on+the+Atari+400%3F
[5]: http://www.wolframalpha.com/input/?i=Al+%2B+O2+-%3E+Al2O3
[6]: http://www.wolframalpha.com/input/?i=myoglobin
[7]: http://www.wolframalpha.com/input/?i=quadratic+fit+%7B10.1%2C1.2%7D%2C%7B12.6%2C+2.8%7D%2C%7B14.8%2C7.6%7D%2C%7B16.0%2C12.8%7D%2C%7B17.5%2C15.1%7D
[8]: http://www.wolframalpha.com/input/?i=n-grams+%22the+google+plus+community+keeps+me+smiling+throughout+the+day%22
[9]: http://news.bbc.co.uk/2/hi/technology/8047076.stm
[10]: http://searchengineland.com/google-squared-news-timeline-get-added-to-googles-chopping-block-90549
[11]: http://googlesystem.blogspot.com/2011/12/googles-graphing-calculator.html
[12]: http://goo.gl/ay4I0

Attachments

Wolfram|Alpha Blog : Announcing Wolfram|Alpha Pro

Today’s introduction of Wolfram|Alpha Pro gives you fundamentally new and remarkable capabilities like: data input, file upload, image input, data download, CDF interactivity, extra computation time, ...

1 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

I am drooling over WolframAlpha Pro: http://www.wolframalpha.com/pro/ [actual announcement attached]...

I am drooling over WolframAlpha Pro: http://www.wolframalpha.com/pro/ [actual announcement attached]

"Computational knowledge engine" WolframAlpha [1] just announced a new offering aiming at power users of their already amazing data science toolkit. I'm very impressed with the features they've chosen to add, including image processing and 3D plot export. Maybe I'm just being a huge nerd, but I think this'll be great for generating assets for presentations and demos. :)

I already use WolframAlpha for quickly plotting relationships in certain algorithms, or referencing certain datasets. It's great for checking on specs like display densities [2], calculating a transfer time (while automatically cross-referencing network specs!) [3] or even looking for obscure computing metrics [4]. It can help you calculate chemical reactions [5], or even plot a protein structure. [6]

My favorite day-to-day application is quick and dirty regression, for visualizing trends in my data [7], but it's still cool to play with n-gram decomposition [8].

Google hasn't even come close to this level of utility, even with innovations like Google Squared [9] (which was sadly shuttered last year... [10]) and the addition of function plotting to their universal search earlier this year [11]. They've been rolling in more and more tidbits like this, but I don't know that a company as large as Google can keep up with the delta, even with again-CEO +Larry Page's war on cruft [12] freeing up resources for projects like this.

It's priced at only $4.99 per month (or $2.99 for students, which I am not -- but I'll happily pay the premium at this price point!), right up my alley as building something comparable for local use (or even acquiring an existing software package) would be prohibitively expensive and moreover, complex.

Have you used WolframAlpha? If so, what for?

[1]: http://www.wolframalpha.com/
[2]: http://www.wolframalpha.com/input/?i=2.5+megapixel+300dpi+display
[3]: http://www.wolframalpha.com/input/?i=data+transfer+time+10GB%2C+802.11n
[4]: http://www.wolframalpha.com/input/?i=How+fast+was+the+processor+on+the+Atari+400%3F
[5]: http://www.wolframalpha.com/input/?i=Al+%2B+O2+-%3E+Al2O3
[6]: http://www.wolframalpha.com/input/?i=myoglobin
[7]: http://www.wolframalpha.com/input/?i=quadratic+fit+%7B10.1%2C1.2%7D%2C%7B12.6%2C+2.8%7D%2C%7B14.8%2C7.6%7D%2C%7B16.0%2C12.8%7D%2C%7B17.5%2C15.1%7D
[8]: http://www.wolframalpha.com/input/?i=n-grams+%22the+google+plus+community+keeps+me+smiling+throughout+the+day%22
[9]: http://news.bbc.co.uk/2/hi/technology/8047076.stm
[10]: http://searchengineland.com/google-squared-news-timeline-get-added-to-googles-chopping-block-90549
[11]: http://googlesystem.blogspot.com/2011/12/googles-graphing-calculator.html
[12]: http://goo.gl/ay4I0

Attachments

Wolfram|Alpha Blog : Announcing Wolfram|Alpha Pro

Today’s introduction of Wolfram|Alpha Pro gives you fundamentally new and remarkable capabilities like: data input, file upload, image input, data download, CDF interactivity, extra computation time, ...

4 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

My Top 3 Twitter Tools

I've been using Twitter since pretty early on (and long before @oprah), and I've found it to be a superbly convenient communication tool and notification service. Even though it's still very young on the web (Twitter was founded in March of 2006) It's been the home to great ideas like the #twitterdata proposal and the publicdomain book-via-tweets project. It's also an awesome reputation management platform, and can be used to both to provide effective customer service and help distribute news and updates about your business or product, which is exactly how I use it for my online roleplaying project.

But as with the rest of the social media world, Twitter can become very complex very quickly (but I still contend that there is no social media overload) and as a result, can be difficult to manage. As a result, I use several third-party tools to help me manage and gather information that helps me do my Twitter job much more efficiently and effectively.

Splitweet [caption id="attachment_196" align="alignnone" width="300" caption="Splitweet allows you to post and monitor multiple Twitter accounts and brands."]Splitweet allows you to post and monitor multiple Twitter accounts and brands.[/caption]

For those of us with multiple Twitter accounts (like some people who create a Twitter account for each roleplaying character they use), Splitweet is an absolute savior. This service allows you to tweet to multiple accounts at the same time, as well as combining the "stream" from each account into one page. A lot of desktop Twitter clients offer this kind of functionality, but where Splitweet truly excels is in its ability to track what it calls "brands" (more reputation management terms here): you can specify keywords and phrases that will appear in a separate feed, even if you do not follow those users. This gets us around the disastrous changes Twitter made to the @replies, and helps us keep up to date on any mentions of our site's name and any tweets relating to what it is that we do.

Sherflock [caption id="attachment_195" align="alignnone" width="300" caption="Sherflock provides detailed statistics and summaries of Twitter users you are associated with."]Sherflock provides detailed statistics and summaries of Twitter users you are associated with.[/caption]

Sherflock is an absolutely awesome stat tracking machine that helps weed out the waves of spam that have been coming in since Twitter has gone mainstream. Sherflock gives a large number of statistics about each every account the either follows you or that you are following, and lets you sort and filter users based on these statistics.

Twitterfall [caption id="attachment_194" align="alignnone" width="217" caption="Twitterfall offers a live stream of twitter updates on keywords that you specify."]Twitterfall offers a live stream of twitter updates on keywords that you specify.[/caption]

This tool allows you to specify any number of keywords that you wish to view on a live, moving stream of tweets. This is very useful if you are using a computer that allows you to "pin" a window on top (like Ubuntu Linux), or if you have a multiple-monitor rig, or even if you use multiple computers using the input-sharing app Synergy. You'll get a live feed of updates on any topic of your choice, which can even be updated and changed in real-time.

Using these three tools will help you maximize you Twitter performance and make the most of an already awesome service, preventing you from being inundated with the massive stream of messages that you're surely going to subscribe to.

What are your top three Twitter tools? Feel free to make a comment or write your own post, and I'll gladly append a link to this post to help everyone out!

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

I am drooling over WolframAlpha Pro: http://www.wolframalpha.com/pro/ [actual announcement attached]...

I am drooling over WolframAlpha Pro: http://www.wolframalpha.com/pro/ [actual announcement attached]

"Computational knowledge engine" WolframAlpha [1] just announced a new offering aiming at power users of their already amazing data science toolkit. I'm very impressed with the features they've chosen to add, including image processing and 3D plot export. Maybe I'm just being a huge nerd, but I think this'll be great for generating assets for presentations and demos. :)

I already use WolframAlpha for quickly plotting relationships in certain algorithms, or referencing certain datasets. It's great for checking on specs like display densities [2], calculating a transfer time (while automatically cross-referencing network specs!) [3] or even looking for obscure computing metrics [4]. It can help you calculate chemical reactions [5], or even plot a protein structure. [6]

My favorite day-to-day application is quick and dirty regression, for visualizing trends in my data [7], but it's still cool to play with n-gram decomposition [8].

Google hasn't even come close to this level of utility, even with innovations like Google Squared [9] (which was sadly shuttered last year... [10]) and the addition of function plotting to their universal search earlier this year [11]. They've been rolling in more and more tidbits like this, but I don't know that a company as large as Google can keep up with the delta, even with again-CEO +Larry Page's war on cruft [12] freeing up resources for projects like this.

It's priced at only $4.99 per month (or $2.99 for students, which I am not -- but I'll happily pay the premium at this price point!), right up my alley as building something comparable for local use (or even acquiring an existing software package) would be prohibitively expensive and moreover, complex.

Have you used WolframAlpha? If so, what for?

[1]: http://www.wolframalpha.com/
[2]: http://www.wolframalpha.com/input/?i=2.5+megapixel+300dpi+display
[3]: http://www.wolframalpha.com/input/?i=data+transfer+time+10GB%2C+802.11n
[4]: http://www.wolframalpha.com/input/?i=How+fast+was+the+processor+on+the+Atari+400%3F
[5]: http://www.wolframalpha.com/input/?i=Al+%2B+O2+-%3E+Al2O3
[6]: http://www.wolframalpha.com/input/?i=myoglobin
[7]: http://www.wolframalpha.com/input/?i=quadratic+fit+%7B10.1%2C1.2%7D%2C%7B12.6%2C+2.8%7D%2C%7B14.8%2C7.6%7D%2C%7B16.0%2C12.8%7D%2C%7B17.5%2C15.1%7D
[8]: http://www.wolframalpha.com/input/?i=n-grams+%22the+google+plus+community+keeps+me+smiling+throughout+the+day%22
[9]: http://news.bbc.co.uk/2/hi/technology/8047076.stm
[10]: http://searchengineland.com/google-squared-news-timeline-get-added-to-googles-chopping-block-90549
[11]: http://googlesystem.blogspot.com/2011/12/googles-graphing-calculator.html
[12]: http://goo.gl/ay4I0

Attachments

Wolfram|Alpha Blog : Announcing Wolfram|Alpha Pro

Today’s introduction of Wolfram|Alpha Pro gives you fundamentally new and remarkable capabilities like: data input, file upload, image input, data download, CDF interactivity, extra computation time, ...

4 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Mac versus Linux

I had a pleasant conversation with a Mac fanboi, this morning.

(08:51:01 AM) Linux User: Do Macs come with an SSH server by default?
(08:51:12 AM) Mac User: bluh...huh?
(08:51:19 AM) Mac User: just woke up
(08:51:22 AM) Linux User: Oh, lol.
(08:51:26 AM) Linux User: Good morning, sunshine.
(08:51:30 AM) Mac User: lol
(08:51:40 AM) Linux User: I've been at work for an hour. ;P
(08:51:57 AM) Linux User: Anyways - does the default Mac have an SSH server?
(08:51:57 AM) Mac User: now...what are you babbling about?
(08:53:25 AM) Mac User: no, but ssh is supported for X11 apps
(08:54:22 AM) Mac User: ....x11 being the x window environment in the Mac OS
(08:54:47 AM) Linux User: Right.
(08:55:22 AM) Linux User: So - X11 applications can SSH to other locations?
(08:55:58 AM) Linux User: And - what's the Mac equivalent of a repository, and/or aptitude/apt-get/yum?
(08:56:01 AM) Mac User: I really don't know, I haven't messed with it
(08:56:12 AM) Mac User: what the fuck are those?
(08:56:46 AM) Linux User: I can go to the command line here, and say... "apt-get install " and it'll download and install that program from the repository.
(08:57:53 AM) Mac User: ...99% of Mac users don't go "Command-Line Commando" on their system....
(08:57:59 AM) Linux User: Also, if the program has any dependencies - it'll get those, too.
(08:58:00 AM) Mac User: so...enjoy that....
(08:58:11 AM) Linux User: Oh, it has a GUI, too.
(08:58:22 AM) Mac User: website?
(08:59:02 AM) Linux User: It's a core component, it doesn't particularly have its own site.
(08:59:22 AM) Linux User: Mac doesn't have an application finder and installer type thing?
(08:59:24 AM) Mac User: of what?
(08:59:27 AM) Mac User: no
(08:59:30 AM) Linux User: Weird.
(08:59:38 AM) Mac User: OMFG!!!! NO!!!! WHAT WILL I DO!???!?!?
(08:59:51 AM) Linux User: I was trying to install openssh-server on a friend's mac...
(08:59:57 AM) Mac User: y'all pc ppl always find the weirdest off-beat shit to pick at
(09:00:05 AM) Linux User: Mac's are PCs to, ho.
(09:00:16 AM) Linux User: Understand the word Personal Computer?
(09:00:21 AM) Mac User: uh, by the definition "personal computer" only
(09:00:38 AM) Linux User: PCs also don't have to run Microshaft.
(09:00:43 AM) Mac User: but be it known that a pc is a pc and a Mac is a Mac
(09:01:01 AM) Linux User: Considering Macs aren't "Macs" so much anymore, without the kooky PPC crap.
(09:01:10 AM) Mac User: ?
(09:01:42 AM) Linux User: They're regular PCs, now. I can install Windows on a Mac, I can install Plan9, MacOS, Linux.
(09:01:52 AM) Linux User: They don't use PPC anymore, right?
(09:02:05 AM) Mac User: you can't remove the Mac OS, though
(09:02:10 AM) Linux User: ...want to bet?
(09:02:13 AM) Mac User: yup
(09:02:16 AM) Mac User: go ahead
(09:02:20 AM) Linux User: LOL.
(09:02:31 AM) Mac User: remove the Mac OS, and then lemme know what you plan to do
(09:02:35 AM) Linux User: Anyways - MacBook pro - does it have more than one button?
(09:02:45 AM) Mac User: FUCK NO!!!!
(09:02:49 AM) Linux User: Alright, nevermind then.
(09:02:58 AM) Mac User: now, shoo
(09:02:59 AM) Linux User: I was going to buy one, because they're sexy.
(09:03:01 AM) Mac User: go buy a dell
(09:03:22 AM) Linux User: Dell is increasing their Linux support.
(09:03:23 AM) Linux User: :)
(09:05:19 AM) Mac User: that is to say that they now have some kind of linux support?
(09:05:52 AM) Linux User: They've always had Linux support, but it's been somewhat hidden.
(09:06:00 AM) Mac User: pphhhht
(09:06:12 AM) Linux User: They're increasing client awareness of the option, now.
(09:06:29 AM) Mac User: ya know, it really doesn't mean anything to me
(09:07:11 AM) Linux User: I was considering purchasing a Macbook and installing Ubuntu on it, for my laptop.
(09:07:25 AM) Mac User: I can run any other OS I want, should I happen to have a sudden drop in IQ, and my machine is pretty awesome.....so....
(09:07:55 AM) Mac User: why would you buy a Mac to run something you can run on a dell?
(09:08:01 AM) Mac User: why?
(09:08:04 AM) Linux User: Because Macs are sexier?
(09:08:08 AM) Linux User: I don't want an ugly dell.
(09:08:23 AM) Mac User: uh, yeah, and at least half the "sexier" is in the GUI
(09:08:28 AM) Linux User: Not at all.
(09:08:35 AM) Linux User: My GUI is 100% more teh sex.
(09:08:45 AM) Mac User: ......wow
(09:08:47 AM) Mac User: um
(09:08:48 AM) Linux User: http://www.youtube.com/watch?v=nzb3MSp82Vs
(09:08:49 AM) Mac User: no
(09:08:51 AM) Linux User: :)
(09:09:05 AM) Linux User: You can't install Beryl or even Compiz in MacOS, can you?
(09:09:46 AM) Mac User: ooh....pretty....gimmicks.....
(09:10:08 AM) Linux User: Oh, is there an equivalent of workspaces in MacOS?
(09:10:17 AM) Mac User: in Leopard, yeah
(09:10:24 AM) Linux User: That's this next version, right?
(09:10:30 AM) Mac User: yizzur
(09:10:34 AM) Linux User: Awesome.
(09:10:43 AM) Mac User: "Spaces"
(09:10:49 AM) Linux User: Lol.
(09:10:59 AM) Linux User: We Linux folk have had that for years.
(09:11:00 AM) Mac User: http://www.apple.com/macosx/leopard/spaces.html
(09:11:01 AM) Linux User: But anyways.
(09:11:15 AM) Mac User: again....I don't care, and you're the only one who noticed
(09:11:34 AM) Linux User: LOL. Awesome argument. :x
(09:11:43 AM) Mac User: I don't argue anymore
(09:12:03 AM) Mac User: If you've bigoted yourself into using PC
(09:12:10 AM) Mac User: s, thats ur own fault
(09:12:44 AM) Linux User: Well, if I can't "uninstall MacOS" - or heaven forbid, order it without MacOS, like I can order most PCs without any OS, for a significant price reduction...
(09:12:49 AM) Linux User: It's not worth getting a Dell.
(09:12:52 AM) Linux User: Or any "PC".
(09:13:02 AM) Linux User: Or an Apple, for that matter.
(09:13:08 AM) Linux User: Dell, I can do that with, though.
(09:13:17 AM) Linux User: I share your Microsuck hatred.
(09:13:18 AM) Linux User: I really do.
(09:13:23 AM) Mac User: you make that sound like a feature
(09:13:24 AM) Linux User: But I also hate MacOS with a passion.
(09:13:32 AM) Mac User: for no reason
(09:13:37 AM) Linux User: No, for full reason.
(09:13:42 AM) Mac User: there's 2 sides of the fight, dude
(09:13:46 AM) Linux User: It's a *nix OS, without all the good stuff.
(09:13:48 AM) Mac User: Apple, and mico$ith
(09:13:57 AM) Linux User: Then there's Linux. ;D
(09:14:05 AM) Linux User: We're not part of the fight, we've already won.
(09:14:06 AM) Mac User: you're out in the woods trying to be a nonconformist
(09:14:22 AM) Linux User: Not at all, actually, I started using Linux because most of my friends were.
(09:14:23 AM) Linux User: :/
(09:14:28 AM) Mac User: yeah, 2% market share. WOO HOO!!!!
(09:14:36 AM) Linux User: 55% of the server share. :/
(09:14:48 AM) Linux User: I think it's above 60, actually?
(09:14:58 AM) Mac User: http://www.apple.com/server/macosx/
(09:15:01 AM) Mac User: > you
(09:15:16 AM) Linux User: Why, exactly, would I run MacOS as a server? When I have Linux?
(09:15:23 AM) Linux User: You don't have a package manager (apt)
(09:15:40 AM) Linux User: apt-get install apache2 php mysql
(09:15:42 AM) Linux User: Done.
(09:15:48 AM) Mac User: you wouldn't
(09:15:58 AM) Mac User: and that's your business
(09:16:04 AM) Mac User: why are you talking to me again?
(09:16:20 AM) Mac User has signed off.

And that was him blocking me. Mac people really do think differently.

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

be right there. computer trouble... in reply to

be right there. computer trouble

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

I'd hang out, but I'm on... in reply to

I'd hang out, but I'm on my old computer with no camera.

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Used to work in applied math... in reply to

Used to work in applied math and computer science at Argonne National Laboratory

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

I checked it out already and... in reply to

I checked it out already and decided against it. I really have no use for it, especially considering I don't have speakers on my computer, :P

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

While you're sitting on your computer ogling all the Caturday pictures, here's something awesome: how...

While you're sitting on your computer ogling all the Caturday pictures, here's something awesome: how to see a supernova from your backyard this weekend.

Even better, it's right smack dab in the middle of Ursa Major!

Attachments

YouTube - How to See a Recently Discovered Supernova

Create AccountSign In. Home. BrowseMoviesUpload. Hey there, this is not a commercial interruption. You're using an outdated browser, which YouTube no longer supports. Some features on YouTube may ...

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

I was looking for pics on... in reply to

I was looking for pics on this computer but can't find any...will post next week when I get home. I'm visiting my daughter for "Family Weekend" in Oregon right now!

V for Vendetta is a keeper, I think! :-)

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

While you're sitting on your computer ogling all the Caturday pictures, here's something awesome: how...

While you're sitting on your computer ogling all the Caturday pictures, here's something awesome: how to see a supernova from your backyard this weekend.

Even better, it's right smack dab in the middle of Ursa Major!

Attachments

YouTube - How to See a Recently Discovered Supernova

Create AccountSign In. Home. BrowseMoviesUpload. Hey there, this is not a commercial interruption. You're using an outdated browser, which YouTube no longer supports. Some features on YouTube may ...

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

So here's a pretty awesome use of CV (computer vision): count the number of dishes in the sink, and ...

So here's a pretty awesome use of CV (computer vision): count the number of dishes in the sink, and fire off an alarm when they need to be washed.

Now that's a practical application if I've ever seen one. ;)

#nerdery #computervision

Attachments

IMakeThin.gs » Blog Archive » The Great OpenCV Washing-up Detector

Our hackspace sometimes has a problem with people leaving things in the sink for washing and then getting distracted on uber-awesome project. Obviously being a technical place a technical solution to ...

5 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

So here's a pretty awesome use of CV (computer vision): count the number of dishes in the sink, and ...

So here's a pretty awesome use of CV (computer vision): count the number of dishes in the sink, and fire off an alarm when they need to be washed.

Now that's a practical application if I've ever seen one. ;)

#nerdery #computervision

Attachments

IMakeThin.gs » Blog Archive » The Great OpenCV Washing-up Detector

Our hackspace sometimes has a problem with people leaving things in the sink for washing and then getting distracted on uber-awesome project. Obviously being a technical place a technical solution to ...

5 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

So here's a pretty awesome use of CV (computer vision): count the number of dishes in the sink, and ...

So here's a pretty awesome use of CV (computer vision): count the number of dishes in the sink, and fire off an alarm when they need to be washed.

Now that's a practical application if I've ever seen one. ;)

#nerdery #computervision

Attachments

IMakeThin.gs » Blog Archive » The Great OpenCV Washing-up Detector

Our hackspace sometimes has a problem with people leaving things in the sink for washing and then getting distracted on uber-awesome project. Obviously being a technical place a technical solution to ...

1 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

So here's a pretty awesome use of CV (computer vision): count the number of dishes in the sink, and ...

So here's a pretty awesome use of CV (computer vision): count the number of dishes in the sink, and fire off an alarm when they need to be washed.

Now that's a practical application if I've ever seen one. ;)

#nerdery #computervision

Attachments

IMakeThin.gs » Blog Archive » The Great OpenCV Washing-up Detector

Our hackspace sometimes has a problem with people leaving things in the sink for washing and then getting distracted on uber-awesome project. Obviously being a technical place a technical solution to ...

5 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Yup! I did. I found it... in reply to

Yup! I did. I found it incredibly easy. To put it this way I learned it in the course of 2, 4 hour plane rides without a computer. It's got great regular expression functionality and once you get used to that then everything else just falls into place. But please don't ever use it for a large software project. I prefer to keep it in the realm of manageable scripts.

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Here&#39;s the first MIT lecture <a... in reply to

Here's the first MIT lecture Lec 1 | MIT 6.00 Introduction to Computer Science and Programming, Fall 2008
+AmyLynn Arrington maybe because Python is executable pseudo code.

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Thing is, I know how to... in reply to

Thing is, I know how to code, but I don't feel like I'm handed a lot of opportunities to use that skill to make personal choices. The last time I felt like I had a really trivial-to-set-up environment in which to write useful utilities in was HyperTalk. Maybe we as a community should do something about that.

(I'm not saying current usable environments don't exist; just that there's a lot of barriers for people who aren't don't primarily identify as computer geeks. Knowing coding basics is only half the battle here, I think.)

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Great article. The thing is,... in reply to

Great article. The thing is, short of field dressing a moose (Ms. Palin doesn't need my help), I can plant a field, shoe a horse, fix dinner fit for a king, make my own clothes and completely take care of myself in virtually every respect. Okay, so I'm not a car mechanic. But when it comes to technology I so love what it brings to my life that sometimes I fancy loading in supplies for a year and not even going out. I'm a home entertainment center. I envy people who know the insides of computers. I'm good with them but i don't have that knowledge and wish I did. Boy do I wish I did.

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

<span class="proflinkWrapper"><span class="proflinkPrefix">+</span><a class="proflink" href="https://plus.google.com/102714791889380993079" oid="102714791889380993079">Darryl... in reply to

+Darryl Barnes “A human being should be able to change a diaper, plan an invasion, butcher a hog, conn a ship, design a building, write a sonnet, balance accounts, build a wall, set a bone, comfort the dying, take orders, give orders, cooperate, act alone, solve equations, analyze a new problem, pitch manure, program a computer, cook a tasty meal, fight efficiently, die gallantly. Specialization is for insects.”

Robert A. Heinlein

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

I think we&#39;re well on the... in reply to

I think we're well on the way already, +Olrik Lenstra, but we're only hitting the low-hanging fruit so far.  Among the other challenges include getting the remaining 4.5 billion people [1] in the world access to computers and more importantly, the Internet.

[1]: http://www.itu.int/ITU-D/ict/facts/2011/material/ICTFactsFigures2011.pdf , International Telecommunications Unions (ITU), Geneva, 2011

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Eric,<br />Have we had the conversation... in reply to

Eric,
Have we had the conversation about the predatory nature of evolutionary psychology inspiring Darwinian interactions within our own species? Play should not only be for children, we should teach humans to play together throughout their lives.
I believe we've spoken about the necessity of philosophy in elementary school curriculum? Any chance you'd be interested in working with the state to make this happen? Are you searching for the complete solution through institution or solely seeking answers through decentralized systems?

Toni Lane Casserly, TLC
Sent from my mobile. Pardon any error of the thumb.

Co-Founder
Human Nodes

Email: ****@**
Twitter: @tonilanec
Instagram: @tonilanec

Cell: (+1) 281-513-1621

Confidentiality notice:
The information transmitted in this email and/or any attached document(s) is confidential and intended only for the person or entity to which it is addressed and may contain privileged material. Any review, retransmission, dissemination or other use of, or taking of any action in reliance upon this information by persons or entities other than the intended recipient is prohibited. If you received this in error, please contact the sender and delete the material from any computer.

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

The idea that we&#39;re somehow disadvantaged... in reply to

The idea that we're somehow disadvantaged should the entire system crash, compared to our parents or grandparents, is silly and myopic. Living off the land flat out wouldn't/couldn't happen. There's simply to many people for everyone to hunt. If everyone started hunting/fishing to get food a) we'd run out of space in the forest/river shores and be killing one another for a spot b) even if we remained civilized we'd kill off everything so fast it wouldn't matter. Do you seriously think we get all those burgers by people taking care of cows... we don't... we have a whole technological industry built up around shoving as many into a small area and keeping them alive long enough that we can eat them. Chickens? Ya same thing. If it REALLY got so bad that "the grid" collapsed you're no better off than anyone else.

I have no idea how this turned into an end of the world/I can survive without a computer thread. This article isn't stating that everyone has to be in tech; only that going into tech/training/educating yourself for a world that is fully tech enabled is something you should do. He states in the second paragraph, "....and all the college kids wondering if a CS or engineering degree will pay off. To those readers: we might be in a bubble, but for you it doesn’t matter." Then in the fourth paragraph, "The truth is that the technology sector as a whole over any length of time is a positive-sum game even if the economy doesn’t grow at all..." In short, if you're looking to go into tech field you should still do it. Thanks for sharing this +Eric Martindale, good stuff!

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

If you don't control the program, the program controls you. Help support a mass-algorate society, in...

If you don't control the program, the program controls you.
Help support a mass-algorate society, in which everyone knows how to code, by signing your name at code.org.

“In the emerging, highly programmed landscape ahead, you will either create the software or you will be the software. It’s really that simple: Program, or be programmed. Choose the former, and you gain access to the control panel of civilization. Choose the latter, and it could be the last real choice you get to make.”
                                                                — +Douglas Rushkoff 

I've talked about the mass-algorate societies in the past [1], but this new non-profit foundation dedicated to growing computer programming education really shines with the support of +Mark Zuckerberg, +will.i.am, and +Eric Schmidt.  Take a look at the video and lend a hand in this endeavor!

[1]: https://plus.google.com/112353210404102902472/posts/MVQXyw9EJDE

Attachments

What most schools don't teach

Learn about a new "superpower" that isn't being taught in in 90% of US schools. Starring Bill Gates, Mark Zuckerberg, will.i.am, Chris Bosh, Jack Dorsey, Ton...

10 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

If you don't control the program, the program controls you. Help support a mass-algorate society, in...

If you don't control the program, the program controls you.
Help support a mass-algorate society, in which everyone knows how to code, by signing your name at code.org.

“In the emerging, highly programmed landscape ahead, you will either create the software or you will be the software. It’s really that simple: Program, or be programmed. Choose the former, and you gain access to the control panel of civilization. Choose the latter, and it could be the last real choice you get to make.”
                                                                — +Douglas Rushkoff 

I've talked about the mass-algorate societies in the past [1], but this new non-profit foundation dedicated to growing computer programming education really shines with the support of +Mark Zuckerberg, +will.i.am, and +Eric Schmidt.  Take a look at the video and lend a hand in this endeavor!

[1]: https://plus.google.com/112353210404102902472/posts/MVQXyw9EJDE

Attachments

What most schools don't teach

Learn about a new "superpower" that isn't being taught in in 90% of US schools. Starring Bill Gates, Mark Zuckerberg, will.i.am, Chris Bosh, Jack Dorsey, Ton...

1 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

If you don't control the program, the program controls you. Help support a mass-algorate society, in...

If you don't control the program, the program controls you.
Help support a mass-algorate society, in which everyone knows how to code, by signing your name at code.org.

“In the emerging, highly programmed landscape ahead, you will either create the software or you will be the software. It’s really that simple: Program, or be programmed. Choose the former, and you gain access to the control panel of civilization. Choose the latter, and it could be the last real choice you get to make.”
                                                                — +Douglas Rushkoff 

I've talked about the mass-algorate societies in the past [1], but this new non-profit foundation dedicated to growing computer programming education really shines with the support of +Mark Zuckerberg, +will.i.am, and +Eric Schmidt.  Take a look at the video and lend a hand in this endeavor!

[1]: https://plus.google.com/112353210404102902472/posts/MVQXyw9EJDE

Attachments

What most schools don't teach

Learn about a new "superpower" that isn't being taught in in 90% of US schools. Starring Bill Gates, Mark Zuckerberg, will.i.am, Chris Bosh, Jack Dorsey, Ton...

12 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

If you don't control the program, the program controls you. Help support a mass-algorate society, in...

If you don't control the program, the program controls you.
Help support a mass-algorate society, in which everyone knows how to code, by signing your name at code.org.

“In the emerging, highly programmed landscape ahead, you will either create the software or you will be the software. It’s really that simple: Program, or be programmed. Choose the former, and you gain access to the control panel of civilization. Choose the latter, and it could be the last real choice you get to make.”
                                                                — +Douglas Rushkoff 

I've talked about the mass-algorate societies in the past [1], but this new non-profit foundation dedicated to growing computer programming education really shines with the support of +Mark Zuckerberg, +will.i.am, and +Eric Schmidt.  Take a look at the video and lend a hand in this endeavor!

[1]: https://plus.google.com/112353210404102902472/posts/MVQXyw9EJDE

Attachments

What most schools don't teach

Learn about a new "superpower" that isn't being taught in in 90% of US schools. Starring Bill Gates, Mark Zuckerberg, will.i.am, Chris Bosh, Jack Dorsey, Ton...

1 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

October 16th is Ada Lovelace Day,...

October 16th is Ada Lovelace Day, in which we celebrate women's achievements in science, technology, engineering, and math. Ada Lovelace is heralded as the first computer programmer, writing programs (calculating Bernoulli Numbers) for Charles Babbage's Analytical Engine as early as 1843 [1]. One of the most prominent mathematicians at the time, August de Morgan, had impressive things to say about her abilities, “which would require all the strength of a man's constitution to bear” [2], and Babbage himself highlighted her prowess over other contemporaries to Faraday, the legendary English scientist, in a succinct personal correspondence [3]. I've included a transcription of her work [4], showing just how thorough and detailed she was. It's important to take a moment to note some of the other women who have made significant contributions to the advancement of society over the years. One of my favorites is Marie Curie, seen in this photo as the only women to appear alongside the intellectual powerhouse that assembled for the Solvay Conference in 1927. Seated between physicists Planck and Lorentz, she is in good company along with the likes of Einstein and Heisenberg. Curie remains, to this day, the only person to have ever won a Nobel Prize in multiple sciences. [5] Here are a couple other notable women that deserve recognition: - Gertrude Belle Elion (biochemist): Nobel Prize in Physiology or Medicine, 1988. [6] Gertrude invented an incredible swathe of drugs using innovative new research methods [7], including the first treatment for leukemia. [8] - Jane Goodall (primatologist): outstanding achievement in anthropology through her incredible 45-year field study of wild chimpanzees [9] which has wildly changed the school of thought in regards to man's connection to primates. Goodall has been a role model of mine since I first encountered her and her work as a child reading National Geographic Magazine. Instead of letting today pass only remembering one woman's contributions, take a moment to share your story and your female role model. [10] So, what women do you revere in science, technology, engineering, or maths? #AdaLovelaceDay #STEM [1]: http://www.cs.virginia.edu/~robins/Ada_and_the_First_Computer.pdf [2]: http://sydneypadua.com/2dgoggles/demorgan.gif [3]: http://books.google.com/books?id=vKesSblgySgC&lpg=PA164&as_brr=0&pg=PA164#v=onepage&f=true [4]: http://www.fourmilab.ch/babbage/sketch.html [5]: http://www.nobelprize.org/nobel_prizes/nobelprize_facts.html [6]: http://www.nobelprize.org/nobel_prizes/medicine/laureates/1988/elion-autobio.html [7]: Holloway, M. (1991) Profile: Gertrude Belle Elion – The Satisfaction of Delayed Gratification, Scientific American 265(4), 40-44. [8]: http://pubs.acs.org/cen/coverstory/83/8325/83256-mercaptopurine.html [9]: http://ngm.nationalgeographic.com/ngm/0304/feature5/fulltext.html [10]: http://directory.findingada.com/stories/

Attachments

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

My list of entrepreneurial shortcomings includes Mirascape, which aspired to be a ubiquitous augmented...

My list of entrepreneurial shortcomings includes Mirascape, which aspired to be a ubiquitous augmented reality (AR) operating system for the real world. The problems we were solving (and our packaged solution) would have been the backbone for all of the [imagined] technology you see in this Samsung promo video for a new tech they're excited about, transparent and flexible OLED displays. [1]

If you're not familiar with augmented reality; it is the visual overlay of otherwise hidden information on the real world, as you observe it.

While you can ogle over ostentatious technologies like the embedded-display contact lenses the University of Washington is so proud of [2], it's exciting to see companies like TDK [3] and Laster Technologies [4] bring these kinds of stepping stone technology to bear. We can all download and install the awkward and barely applicable consumer-level AR applications on our smartphones ([5], [6], and [7]), but they will all remain novelty applications until we see major innovation in the display space.

One of the more practical examples I've seen of augmented reality in the real world is WordLens [8] (sadly only available for iOS), which provides instantaneous video translation through your device. It's not hard to imagine a pair of Oakley glasses with this display technology built-in, providing you with always-on translation while in an unfamiliar foreign location. Or perhaps even displaying your friend's tweet as a speech bubble above their head for a few seconds -- imagine if it were built right, how amazing it could be.

I genuinely hope to see more of this transparent display technology built in to more consumer-level products, and eyewear in particular. We need a lot more developers playing with the practical applications of augmented reality, and not just displaying compass-aligned markers over a geotagged Wikipedia article or Flickr photo. The high-power hardware necessary to do real-time computer vision processing is coming, and the applied software world needs to be ready for it.

[1]: Amazing Screen Technology : Samsung Flexible AMOLED
[2]: http://spectrum.ieee.org/biomedical/bionics/augmented-reality-in-a-contact-lens/
[3]: http://www.oled-info.com/tdk-starts-mass-production-transparent-24-qvga-pmoleds
[4]: http://www.laster.fr/produits/promobiledisplay/
[5]: http://www.layar.com/
[6]: http://www.wikitude.com/
[7]: http://www.junaio.com/
[8]: http://questvisual.com/

Attachments

Amazing Screen Technology : Samsung Flexible AMOLED

This is CF of Samsung Mobile Display & AMOLED. I'ts amazing and wonderful technology!!! In korea, netizen says "Samsung kidnaps aliens(or hijacks UFO) again!" :)

8 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

My list of entrepreneurial shortcomings includes Mirascape, which aspired to be a ubiquitous augmented...

My list of entrepreneurial shortcomings includes Mirascape, which aspired to be a ubiquitous augmented reality (AR) operating system for the real world. The problems we were solving (and our packaged solution) would have been the backbone for all of the [imagined] technology you see in this Samsung promo video for a new tech they're excited about, transparent and flexible OLED displays. [1]

If you're not familiar with augmented reality; it is the visual overlay of otherwise hidden information on the real world, as you observe it.

While you can ogle over ostentatious technologies like the embedded-display contact lenses the University of Washington is so proud of [2], it's exciting to see companies like TDK [3] and Laster Technologies [4] bring these kinds of stepping stone technology to bear. We can all download and install the awkward and barely applicable consumer-level AR applications on our smartphones ([5], [6], and [7]), but they will all remain novelty applications until we see major innovation in the display space.

One of the more practical examples I've seen of augmented reality in the real world is WordLens [8] (sadly only available for iOS), which provides instantaneous video translation through your device. It's not hard to imagine a pair of Oakley glasses with this display technology built-in, providing you with always-on translation while in an unfamiliar foreign location. Or perhaps even displaying your friend's tweet as a speech bubble above their head for a few seconds -- imagine if it were built right, how amazing it could be.

I genuinely hope to see more of this transparent display technology built in to more consumer-level products, and eyewear in particular. We need a lot more developers playing with the practical applications of augmented reality, and not just displaying compass-aligned markers over a geotagged Wikipedia article or Flickr photo. The high-power hardware necessary to do real-time computer vision processing is coming, and the applied software world needs to be ready for it.

[1]: Amazing Screen Technology : Samsung Flexible AMOLED
[2]: http://spectrum.ieee.org/biomedical/bionics/augmented-reality-in-a-contact-lens/
[3]: http://www.oled-info.com/tdk-starts-mass-production-transparent-24-qvga-pmoleds
[4]: http://www.laster.fr/produits/promobiledisplay/
[5]: http://www.layar.com/
[6]: http://www.wikitude.com/
[7]: http://www.junaio.com/
[8]: http://questvisual.com/

Attachments

Amazing Screen Technology : Samsung Flexible AMOLED

This is CF of Samsung Mobile Display & AMOLED. I'ts amazing and wonderful technology!!! In korea, netizen says "Samsung kidnaps aliens(or hijacks UFO) again!" :)

1 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

My list of entrepreneurial shortcomings includes Mirascape, which aspired to be a ubiquitous augmented...

My list of entrepreneurial shortcomings includes Mirascape, which aspired to be a ubiquitous augmented reality (AR) operating system for the real world. The problems we were solving (and our packaged solution) would have been the backbone for all of the [imagined] technology you see in this Samsung promo video for a new tech they're excited about, transparent and flexible OLED displays. [1]

If you're not familiar with augmented reality; it is the visual overlay of otherwise hidden information on the real world, as you observe it.

While you can ogle over ostentatious technologies like the embedded-display contact lenses the University of Washington is so proud of [2], it's exciting to see companies like TDK [3] and Laster Technologies [4] bring these kinds of stepping stone technology to bear. We can all download and install the awkward and barely applicable consumer-level AR applications on our smartphones ([5], [6], and [7]), but they will all remain novelty applications until we see major innovation in the display space.

One of the more practical examples I've seen of augmented reality in the real world is WordLens [8] (sadly only available for iOS), which provides instantaneous video translation through your device. It's not hard to imagine a pair of Oakley glasses with this display technology built-in, providing you with always-on translation while in an unfamiliar foreign location. Or perhaps even displaying your friend's tweet as a speech bubble above their head for a few seconds -- imagine if it were built right, how amazing it could be.

I genuinely hope to see more of this transparent display technology built in to more consumer-level products, and eyewear in particular. We need a lot more developers playing with the practical applications of augmented reality, and not just displaying compass-aligned markers over a geotagged Wikipedia article or Flickr photo. The high-power hardware necessary to do real-time computer vision processing is coming, and the applied software world needs to be ready for it.

[1]: Amazing Screen Technology : Samsung Flexible AMOLED
[2]: http://spectrum.ieee.org/biomedical/bionics/augmented-reality-in-a-contact-lens/
[3]: http://www.oled-info.com/tdk-starts-mass-production-transparent-24-qvga-pmoleds
[4]: http://www.laster.fr/produits/promobiledisplay/
[5]: http://www.layar.com/
[6]: http://www.wikitude.com/
[7]: http://www.junaio.com/
[8]: http://questvisual.com/

Attachments

Amazing Screen Technology : Samsung Flexible AMOLED

This is CF of Samsung Mobile Display & AMOLED. I'ts amazing and wonderful technology!!! In korea, netizen says "Samsung kidnaps aliens(or hijacks UFO) again!" :)

8 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

My list of entrepreneurial shortcomings includes Mirascape, which aspired to be a ubiquitous augmented...

My list of entrepreneurial shortcomings includes Mirascape, which aspired to be a ubiquitous augmented reality (AR) operating system for the real world. The problems we were solving (and our packaged solution) would have been the backbone for all of the [imagined] technology you see in this Samsung promo video for a new tech they're excited about, transparent and flexible OLED displays. [1]

If you're not familiar with augmented reality; it is the visual overlay of otherwise hidden information on the real world, as you observe it.

While you can ogle over ostentatious technologies like the embedded-display contact lenses the University of Washington is so proud of [2], it's exciting to see companies like TDK [3] and Laster Technologies [4] bring these kinds of stepping stone technology to bear. We can all download and install the awkward and barely applicable consumer-level AR applications on our smartphones ([5], [6], and [7]), but they will all remain novelty applications until we see major innovation in the display space.

One of the more practical examples I've seen of augmented reality in the real world is WordLens [8] (sadly only available for iOS), which provides instantaneous video translation through your device. It's not hard to imagine a pair of Oakley glasses with this display technology built-in, providing you with always-on translation while in an unfamiliar foreign location. Or perhaps even displaying your friend's tweet as a speech bubble above their head for a few seconds -- imagine if it were built right, how amazing it could be.

I genuinely hope to see more of this transparent display technology built in to more consumer-level products, and eyewear in particular. We need a lot more developers playing with the practical applications of augmented reality, and not just displaying compass-aligned markers over a geotagged Wikipedia article or Flickr photo. The high-power hardware necessary to do real-time computer vision processing is coming, and the applied software world needs to be ready for it.

[1]: Amazing Screen Technology : Samsung Flexible AMOLED
[2]: http://spectrum.ieee.org/biomedical/bionics/augmented-reality-in-a-contact-lens/
[3]: http://www.oled-info.com/tdk-starts-mass-production-transparent-24-qvga-pmoleds
[4]: http://www.laster.fr/produits/promobiledisplay/
[5]: http://www.layar.com/
[6]: http://www.wikitude.com/
[7]: http://www.junaio.com/
[8]: http://questvisual.com/

Attachments

Amazing Screen Technology : Samsung Flexible AMOLED

This is CF of Samsung Mobile Display & AMOLED. I'ts amazing and wonderful technology!!! In korea, netizen says "Samsung kidnaps aliens(or hijacks UFO) again!" :)

1 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

A favorite quote of mine from my favorite physicist, Richard Feynman, on the importance of play. Dr...

A favorite quote of mine from my favorite physicist, Richard Feynman, on the importance of play. Dr. Feynman was a Nobel Prize-winning physicist who was notorious for being multi-faceted, in both his personal hobbies and his grasp of science. He worked on the Manhattan Project with Einstein, was part of the panel that investigated the Challenger Disaster, and his work plays a major role in the modern understanding of quantum computing.

“Then I had another thought: Physics disgusts me a little bit now, but I used to enjoy doing physics. Why did I enjoy it? I used to play with it. I used to do whatever I felt like doing - it didn’t have to do with whether it was important for the development of nuclear physics, but whether it was interesting and amusing for me to play with. When I was in high school, I’d see water running out of a faucet growing narrower, and wonder if I could figure out what determines that curve. I found it was rather easy to do. I didn’t have to do it; it wasn’t important for the future of science; somebody else had already done it. That didn’t make any difference. I’d invent things and play with things for my own entertainment.

So I got this new attitude. Now that I am burned out and I’ll never accomplish anything, I’ve got this nice position at the university teaching classes which I rather enjoy, and just like I read the Arabian Nights for pleasure, I’m going to play with physics, whenever I want to, without worrying about any importance whatsoever.

Within a week I was in the cafeteria and some guy, fooling around, throws a plate in the air. As the plate went up in the air I saw it wobble, and I noticed the red medallion of Cornell on the plate going around. It was pretty obvious to me that the medallion went around faster than the wobbling.

I had nothing to do, so I start to figure out the motion of the rotating plate. I discover that when the angle is very slight, the medallion rotates twice as fast as the wobble rate - two to one [Note: Feynman mis-remembers here---the factor of 2 is the other way]. It came out of a complicated equation! Then I thought, ‘Is there some way I can see in a more fundamental way, by looking at the forces or the dynamics, why it’s two to one?’

I don’t remember how I did it, but I ultimately worked out what the motion of the mass particles is, and how all the accelerations balance to make it come out two to one.

I still remember going to Hans Bethe and saying, ‘Hey, Hans! I noticed something interesting. Here the plate goes around so, and the reason it’s two to one is ...’ and I showed him the accelerations.

He says, ‘Feynman, that’s pretty interesting, but what’s the importance of it? Why are you doing it?’

‘Hah!’ I say. ‘There’s no importance whatsoever. I’m just doing it for the fun of it.’ His reaction didn’t discourage me; I had made up my mind I was going to enjoy physics and do whatever I liked.

I went on to work out equations of wobbles. Then I thought about how electron orbits start to move in relativity. Then there’s the Dirac Equation in electrodynamics. And then quantum electrodynamics. And before I knew it (it was a very short time) I was ‘playing’ - working, really - with the same old problem that I loved so much, that I had stopped working on when I went to Los Alamos: my thesis-type problems; all those old-fashioned, wonderful things.

It was effortless. It was easy to play with these things. It was like uncorking a bottle: Everything flowed out effortlessly. I almost tried to resist it! There was no importance to what I was doing, but ultimately there was. The diagrams and the whole business that I got the Nobel Prize for came from that piddling around with the wobbling plate.”

-- Richard Feynman, “Surely you're joking, Mr. Feynman”, © 1985

Attachments

Richard Feynman - Wikipedia, the free encyclopedia

Richard P. Feynman. Richard Feynman at Fermilab. Born, May 11, 1918(1918-05-11) Far Rockaway, Queens, New York, US. Died, February 15, 1988(1988-02-15) (aged 69) Los Angeles, California, US. Residence...

1 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

A favorite quote of mine from my favorite physicist, Richard Feynman, on the importance of play. Dr...

A favorite quote of mine from my favorite physicist, Richard Feynman, on the importance of play. Dr. Feynman was a Nobel Prize-winning physicist who was notorious for being multi-faceted, in both his personal hobbies and his grasp of science. He worked on the Manhattan Project with Einstein, was part of the panel that investigated the Challenger Disaster, and his work plays a major role in the modern understanding of quantum computing.

“Then I had another thought: Physics disgusts me a little bit now, but I used to enjoy doing physics. Why did I enjoy it? I used to play with it. I used to do whatever I felt like doing - it didn’t have to do with whether it was important for the development of nuclear physics, but whether it was interesting and amusing for me to play with. When I was in high school, I’d see water running out of a faucet growing narrower, and wonder if I could figure out what determines that curve. I found it was rather easy to do. I didn’t have to do it; it wasn’t important for the future of science; somebody else had already done it. That didn’t make any difference. I’d invent things and play with things for my own entertainment.

So I got this new attitude. Now that I am burned out and I’ll never accomplish anything, I’ve got this nice position at the university teaching classes which I rather enjoy, and just like I read the Arabian Nights for pleasure, I’m going to play with physics, whenever I want to, without worrying about any importance whatsoever.

Within a week I was in the cafeteria and some guy, fooling around, throws a plate in the air. As the plate went up in the air I saw it wobble, and I noticed the red medallion of Cornell on the plate going around. It was pretty obvious to me that the medallion went around faster than the wobbling.

I had nothing to do, so I start to figure out the motion of the rotating plate. I discover that when the angle is very slight, the medallion rotates twice as fast as the wobble rate - two to one [Note: Feynman mis-remembers here---the factor of 2 is the other way]. It came out of a complicated equation! Then I thought, ‘Is there some way I can see in a more fundamental way, by looking at the forces or the dynamics, why it’s two to one?’

I don’t remember how I did it, but I ultimately worked out what the motion of the mass particles is, and how all the accelerations balance to make it come out two to one.

I still remember going to Hans Bethe and saying, ‘Hey, Hans! I noticed something interesting. Here the plate goes around so, and the reason it’s two to one is ...’ and I showed him the accelerations.

He says, ‘Feynman, that’s pretty interesting, but what’s the importance of it? Why are you doing it?’

‘Hah!’ I say. ‘There’s no importance whatsoever. I’m just doing it for the fun of it.’ His reaction didn’t discourage me; I had made up my mind I was going to enjoy physics and do whatever I liked.

I went on to work out equations of wobbles. Then I thought about how electron orbits start to move in relativity. Then there’s the Dirac Equation in electrodynamics. And then quantum electrodynamics. And before I knew it (it was a very short time) I was ‘playing’ - working, really - with the same old problem that I loved so much, that I had stopped working on when I went to Los Alamos: my thesis-type problems; all those old-fashioned, wonderful things.

It was effortless. It was easy to play with these things. It was like uncorking a bottle: Everything flowed out effortlessly. I almost tried to resist it! There was no importance to what I was doing, but ultimately there was. The diagrams and the whole business that I got the Nobel Prize for came from that piddling around with the wobbling plate.”

-- Richard Feynman, “Surely you're joking, Mr. Feynman”, © 1985

Attachments

Richard Feynman - Wikipedia, the free encyclopedia

Richard P. Feynman. Richard Feynman at Fermilab. Born, May 11, 1918(1918-05-11) Far Rockaway, Queens, New York, US. Died, February 15, 1988(1988-02-15) (aged 69) Los Angeles, California, US. Residence...

1 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

A favorite quote of mine from my favorite physicist, Richard Feynman, on the importance of play. Dr...

A favorite quote of mine from my favorite physicist, Richard Feynman, on the importance of play. Dr. Feynman was a Nobel Prize-winning physicist who was notorious for being multi-faceted, in both his personal hobbies and his grasp of science. He worked on the Manhattan Project with Einstein, was part of the panel that investigated the Challenger Disaster, and his work plays a major role in the modern understanding of quantum computing.

“Then I had another thought: Physics disgusts me a little bit now, but I used to enjoy doing physics. Why did I enjoy it? I used to play with it. I used to do whatever I felt like doing - it didn’t have to do with whether it was important for the development of nuclear physics, but whether it was interesting and amusing for me to play with. When I was in high school, I’d see water running out of a faucet growing narrower, and wonder if I could figure out what determines that curve. I found it was rather easy to do. I didn’t have to do it; it wasn’t important for the future of science; somebody else had already done it. That didn’t make any difference. I’d invent things and play with things for my own entertainment.

So I got this new attitude. Now that I am burned out and I’ll never accomplish anything, I’ve got this nice position at the university teaching classes which I rather enjoy, and just like I read the Arabian Nights for pleasure, I’m going to play with physics, whenever I want to, without worrying about any importance whatsoever.

Within a week I was in the cafeteria and some guy, fooling around, throws a plate in the air. As the plate went up in the air I saw it wobble, and I noticed the red medallion of Cornell on the plate going around. It was pretty obvious to me that the medallion went around faster than the wobbling.

I had nothing to do, so I start to figure out the motion of the rotating plate. I discover that when the angle is very slight, the medallion rotates twice as fast as the wobble rate - two to one [Note: Feynman mis-remembers here---the factor of 2 is the other way]. It came out of a complicated equation! Then I thought, ‘Is there some way I can see in a more fundamental way, by looking at the forces or the dynamics, why it’s two to one?’

I don’t remember how I did it, but I ultimately worked out what the motion of the mass particles is, and how all the accelerations balance to make it come out two to one.

I still remember going to Hans Bethe and saying, ‘Hey, Hans! I noticed something interesting. Here the plate goes around so, and the reason it’s two to one is ...’ and I showed him the accelerations.

He says, ‘Feynman, that’s pretty interesting, but what’s the importance of it? Why are you doing it?’

‘Hah!’ I say. ‘There’s no importance whatsoever. I’m just doing it for the fun of it.’ His reaction didn’t discourage me; I had made up my mind I was going to enjoy physics and do whatever I liked.

I went on to work out equations of wobbles. Then I thought about how electron orbits start to move in relativity. Then there’s the Dirac Equation in electrodynamics. And then quantum electrodynamics. And before I knew it (it was a very short time) I was ‘playing’ - working, really - with the same old problem that I loved so much, that I had stopped working on when I went to Los Alamos: my thesis-type problems; all those old-fashioned, wonderful things.

It was effortless. It was easy to play with these things. It was like uncorking a bottle: Everything flowed out effortlessly. I almost tried to resist it! There was no importance to what I was doing, but ultimately there was. The diagrams and the whole business that I got the Nobel Prize for came from that piddling around with the wobbling plate.”

-- Richard Feynman, “Surely you're joking, Mr. Feynman”, © 1985

Attachments

Richard Feynman - Wikipedia, the free encyclopedia

Richard P. Feynman. Richard Feynman at Fermilab. Born, May 11, 1918(1918-05-11) Far Rockaway, Queens, New York, US. Died, February 15, 1988(1988-02-15) (aged 69) Los Angeles, California, US. Residence...

1 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

A favorite quote of mine from my favorite physicist, Richard Feynman, on the importance of play. Dr...

A favorite quote of mine from my favorite physicist, Richard Feynman, on the importance of play. Dr. Feynman was a Nobel Prize-winning physicist who was notorious for being multi-faceted, in both his personal hobbies and his grasp of science. He worked on the Manhattan Project with Einstein, was part of the panel that investigated the Challenger Disaster, and his work plays a major role in the modern understanding of quantum computing.

“Then I had another thought: Physics disgusts me a little bit now, but I used to enjoy doing physics. Why did I enjoy it? I used to play with it. I used to do whatever I felt like doing - it didn’t have to do with whether it was important for the development of nuclear physics, but whether it was interesting and amusing for me to play with. When I was in high school, I’d see water running out of a faucet growing narrower, and wonder if I could figure out what determines that curve. I found it was rather easy to do. I didn’t have to do it; it wasn’t important for the future of science; somebody else had already done it. That didn’t make any difference. I’d invent things and play with things for my own entertainment.

So I got this new attitude. Now that I am burned out and I’ll never accomplish anything, I’ve got this nice position at the university teaching classes which I rather enjoy, and just like I read the Arabian Nights for pleasure, I’m going to play with physics, whenever I want to, without worrying about any importance whatsoever.

Within a week I was in the cafeteria and some guy, fooling around, throws a plate in the air. As the plate went up in the air I saw it wobble, and I noticed the red medallion of Cornell on the plate going around. It was pretty obvious to me that the medallion went around faster than the wobbling.

I had nothing to do, so I start to figure out the motion of the rotating plate. I discover that when the angle is very slight, the medallion rotates twice as fast as the wobble rate - two to one [Note: Feynman mis-remembers here---the factor of 2 is the other way]. It came out of a complicated equation! Then I thought, ‘Is there some way I can see in a more fundamental way, by looking at the forces or the dynamics, why it’s two to one?’

I don’t remember how I did it, but I ultimately worked out what the motion of the mass particles is, and how all the accelerations balance to make it come out two to one.

I still remember going to Hans Bethe and saying, ‘Hey, Hans! I noticed something interesting. Here the plate goes around so, and the reason it’s two to one is ...’ and I showed him the accelerations.

He says, ‘Feynman, that’s pretty interesting, but what’s the importance of it? Why are you doing it?’

‘Hah!’ I say. ‘There’s no importance whatsoever. I’m just doing it for the fun of it.’ His reaction didn’t discourage me; I had made up my mind I was going to enjoy physics and do whatever I liked.

I went on to work out equations of wobbles. Then I thought about how electron orbits start to move in relativity. Then there’s the Dirac Equation in electrodynamics. And then quantum electrodynamics. And before I knew it (it was a very short time) I was ‘playing’ - working, really - with the same old problem that I loved so much, that I had stopped working on when I went to Los Alamos: my thesis-type problems; all those old-fashioned, wonderful things.

It was effortless. It was easy to play with these things. It was like uncorking a bottle: Everything flowed out effortlessly. I almost tried to resist it! There was no importance to what I was doing, but ultimately there was. The diagrams and the whole business that I got the Nobel Prize for came from that piddling around with the wobbling plate.”

-- Richard Feynman, “Surely you're joking, Mr. Feynman”, © 1985

Attachments

Richard Feynman - Wikipedia, the free encyclopedia

Richard P. Feynman. Richard Feynman at Fermilab. Born, May 11, 1918(1918-05-11) Far Rockaway, Queens, New York, US. Died, February 15, 1988(1988-02-15) (aged 69) Los Angeles, California, US. Residence...

13 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Medical Beat: Dr. Benjamin's proposed guidelines for safer weight-cutting

Being a fighter, I've been through this weight-cutting business plenty of times. Personally, yeah it's a pain in the ass, but we're athletes and in more cases than not - our bodies should be able to handle this. It should be at our own or our managers' discretion on whether or not we are healthy enough to cut weight.

From MMA Junkie:

Cutting weight continues to be a significant part of weight-restricted sports such as MMA, wrestling and boxing. It has gone on for so long that as the old aphorism goes, "Familiarity breeds contempt."

All those athletes, coaches, promoters, sanctioning bodies and fans associated with these sports have learned to accept it, consider it part of the culture, and turn a blind eye.

They all know – even if they won't admit it – that rapid, significant weight-cutting is unhealthy and potentially deadly. Most serious wrestlers have a personal story about the perils of such weight-cutting either through first hand knowledge or vicariously via a close friend or teammate. But the desire to win continues this potentially dangerous ritual.

What for decades has consisted self-reporting and self-monitoring of weight has not worked. And "documentation" of weight by a friendly doctor has been ineffective at best.

Therefore the primary issue of weight should be removed from the combatant. Simple, clear and easily enforceable rules and guidelines should be initiated to better protect the athletes.

My suggestions are as follow:

  • All standard fight agreements must be signed at least 45 days prior to the scheduled event.

  • No fighter may enter into a fight agreement weighing greater than 10 percent over the agreed upon weight limit. For example, the agreed-upon weight is 171 pounds. Therefore, each fighter can weigh no more than 171 pounds + 10 percent (188 pounds total) to sign the fight agreement.

  • At 30 days prior to fight, neither fighter can weigh more than 5 percent over the agreed-upon weight limit. For example, the agreed-upon weight is 171 pounds. Therefore each fighter can weigh no more than 180 pounds.

  • On the official day of weigh-in, if a fighter is more than 1 percent overweight, the fight cannot take place. Since the promoter is the employer, the promoter will be fined by the sanctioning body.

  • On the official day of weigh-in, if a fighter is less than 1 percent overweight, he or she can be given additional time to make weight. If on the second weigh-in, the fighter remains overweight, a financial penalty can be levied and paid to the on-weight fighter, at his or her discretion.

  • If during a championship fight the champion is overweight greater than 1 percent at the official weigh-in, the fight will not take place and the challenger is given the belt as interim champion.

  • If during a championship fight the champion is overweight by less than 1 percent and after an opportunity cannot make weight, the fight may still go on. If the champion wins, the title will be considered vacant. If the challenger wins, he will assume the title.

  • All weigh-in dates (bout agreement day and 30-day check) will be video monitored by live computer webcam and recorded. Each camp will watch the other camp calibrate the scale and weigh in over live video webcam stream (Skype). The sanctioning body will monitor the weigh-in in a similar fashion.
Understandably, this is not a system that could be implemented quickly or easily when considering the restraints of some state commissions and some of the inconsistencies from one regulatory body to the next.

However, my goal is for this ideal guideline to serve as a basis for substantive discussion and a potential framework to better protect the safety of the athletes that participate in MMA.

So, let the name-calling begin.

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

October 16th is Ada Lovelace Day, in which we celebrate women's achievements in science, technology,...

October 16th is Ada Lovelace Day, in which we celebrate women's achievements in science, technology, engineering, and math.

Ada Lovelace is heralded as the first computer programmer, writing programs (calculating Bernoulli Numbers) for Charles Babbage's Analytical Engine as early as 1843 [1].  One of the most prominent mathematicians at the time, August de Morgan, had impressive things to say about her abilities, “which would require all the strength of a man's constitution to bear” [2], and Babbage himself highlighted her prowess over other contemporaries to Faraday, the legendary English scientist, in a succinct personal correspondence [3].  I've included a transcription of her work [4], showing just how thorough and detailed she was.

It's important to take a moment to note some of the other women who have made significant contributions to the advancement of society over the years.  One of my favorites is Marie Curie, seen in this photo as the only women to appear alongside the intellectual powerhouse that assembled for the Solvay Conference in 1927.  Seated between physicists Planck and Lorentz, she is in good company along with the likes of Einstein and Heisenberg.

Curie remains, to this day, the only person to have ever won a Nobel Prize in multiple sciences. [5]

Here are a couple other notable women that deserve recognition:
- Gertrude Belle Elion (biochemist): Nobel Prize in Physiology or Medicine, 1988. [6]  Gertrude invented an incredible swathe of drugs using innovative new research methods [7], including the first treatment for leukemia. [8]
- Jane Goodall (primatologist): outstanding achievement in anthropology through her incredible 45-year field study of wild chimpanzees [9] which has wildly changed the school of thought in regards to man's connection to primates.  Goodall has been a role model of mine since I first encountered her and her work as a child reading National Geographic Magazine.

Instead of letting today pass only remembering one woman's contributions, take a moment to share your story and your female role model. [10]

So, what women do you revere in science, technology, engineering, or maths?

#AdaLovelaceDay   #STEM  

[1]: http://www.cs.virginia.edu/~robins/Ada_and_the_First_Computer.pdf
[2]: http://sydneypadua.com/2dgoggles/demorgan.gif
[3]: http://books.google.com/books?id=vKesSblgySgC&lpg=PA164&as_brr=0&pg=PA164#v=onepage&f=true
[4]: http://www.fourmilab.ch/babbage/sketch.html
[5]: http://www.nobelprize.org/nobel_prizes/nobelprize_facts.html
[6]: http://www.nobelprize.org/nobel_prizes/medicine/laureates/1988/elion-autobio.html
[7]: Holloway, M. (1991) Profile: Gertrude Belle Elion – The Satisfaction of Delayed Gratification, Scientific American 265(4), 40-44.
[8]: http://pubs.acs.org/cen/coverstory/83/8325/83256-mercaptopurine.html
[9]: http://ngm.nationalgeographic.com/ngm/0304/feature5/fulltext.html
[10]: http://directory.findingada.com/stories/

Attachments

1 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

October 16th is Ada Lovelace Day, in which we celebrate women's achievements in science, technology,...

October 16th is Ada Lovelace Day, in which we celebrate women's achievements in science, technology, engineering, and math.

Ada Lovelace is heralded as the first computer programmer, writing programs (calculating Bernoulli Numbers) for Charles Babbage's Analytical Engine as early as 1843 [1].  One of the most prominent mathematicians at the time, August de Morgan, had impressive things to say about her abilities, “which would require all the strength of a man's constitution to bear” [2], and Babbage himself highlighted her prowess over other contemporaries to Faraday, the legendary English scientist, in a succinct personal correspondence [3].  I've included a transcription of her work [4], showing just how thorough and detailed she was.

It's important to take a moment to note some of the other women who have made significant contributions to the advancement of society over the years.  One of my favorites is Marie Curie, seen in this photo as the only women to appear alongside the intellectual powerhouse that assembled for the Solvay Conference in 1927.  Seated between physicists Planck and Lorentz, she is in good company along with the likes of Einstein and Heisenberg.

Curie remains, to this day, the only person to have ever won a Nobel Prize in multiple sciences. [5]

Here are a couple other notable women that deserve recognition:
- Gertrude Belle Elion (biochemist): Nobel Prize in Physiology or Medicine, 1988. [6]  Gertrude invented an incredible swathe of drugs using innovative new research methods [7], including the first treatment for leukemia. [8]
- Jane Goodall (primatologist): outstanding achievement in anthropology through her incredible 45-year field study of wild chimpanzees [9] which has wildly changed the school of thought in regards to man's connection to primates.  Goodall has been a role model of mine since I first encountered her and her work as a child reading National Geographic Magazine.

Instead of letting today pass only remembering one woman's contributions, take a moment to share your story and your female role model. [10]

So, what women do you revere in science, technology, engineering, or maths?

#AdaLovelaceDay   #STEM  

[1]: http://www.cs.virginia.edu/~robins/Ada_and_the_First_Computer.pdf
[2]: http://sydneypadua.com/2dgoggles/demorgan.gif
[3]: http://books.google.com/books?id=vKesSblgySgC&lpg=PA164&as_brr=0&pg=PA164#v=onepage&f=true
[4]: http://www.fourmilab.ch/babbage/sketch.html
[5]: http://www.nobelprize.org/nobel_prizes/nobelprize_facts.html
[6]: http://www.nobelprize.org/nobel_prizes/medicine/laureates/1988/elion-autobio.html
[7]: Holloway, M. (1991) Profile: Gertrude Belle Elion – The Satisfaction of Delayed Gratification, Scientific American 265(4), 40-44.
[8]: http://pubs.acs.org/cen/coverstory/83/8325/83256-mercaptopurine.html
[9]: http://ngm.nationalgeographic.com/ngm/0304/feature5/fulltext.html
[10]: http://directory.findingada.com/stories/

Attachments

1 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

October 16th is Ada Lovelace Day, in which we celebrate women's achievements in science, technology,...

October 16th is Ada Lovelace Day, in which we celebrate women's achievements in science, technology, engineering, and math.

Ada Lovelace is heralded as the first computer programmer, writing programs (calculating Bernoulli Numbers) for Charles Babbage's Analytical Engine as early as 1843 [1].  One of the most prominent mathematicians at the time, August de Morgan, had impressive things to say about her abilities, “which would require all the strength of a man's constitution to bear” [2], and Babbage himself highlighted her prowess over other contemporaries to Faraday, the legendary English scientist, in a succinct personal correspondence [3].  I've included a transcription of her work [4], showing just how thorough and detailed she was.

It's important to take a moment to note some of the other women who have made significant contributions to the advancement of society over the years.  One of my favorites is Marie Curie, seen in this photo as the only women to appear alongside the intellectual powerhouse that assembled for the Solvay Conference in 1927.  Seated between physicists Planck and Lorentz, she is in good company along with the likes of Einstein and Heisenberg.

Curie remains, to this day, the only person to have ever won a Nobel Prize in multiple sciences. [5]

Here are a couple other notable women that deserve recognition:
- Gertrude Belle Elion (biochemist): Nobel Prize in Physiology or Medicine, 1988. [6]  Gertrude invented an incredible swathe of drugs using innovative new research methods [7], including the first treatment for leukemia. [8]
- Jane Goodall (primatologist): outstanding achievement in anthropology through her incredible 45-year field study of wild chimpanzees [9] which has wildly changed the school of thought in regards to man's connection to primates.  Goodall has been a role model of mine since I first encountered her and her work as a child reading National Geographic Magazine.

Instead of letting today pass only remembering one woman's contributions, take a moment to share your story and your female role model. [10]

So, what women do you revere in science, technology, engineering, or maths?

#AdaLovelaceDay   #STEM  

[1]: http://www.cs.virginia.edu/~robins/Ada_and_the_First_Computer.pdf
[2]: http://sydneypadua.com/2dgoggles/demorgan.gif
[3]: http://books.google.com/books?id=vKesSblgySgC&lpg=PA164&as_brr=0&pg=PA164#v=onepage&f=true
[4]: http://www.fourmilab.ch/babbage/sketch.html
[5]: http://www.nobelprize.org/nobel_prizes/nobelprize_facts.html
[6]: http://www.nobelprize.org/nobel_prizes/medicine/laureates/1988/elion-autobio.html
[7]: Holloway, M. (1991) Profile: Gertrude Belle Elion – The Satisfaction of Delayed Gratification, Scientific American 265(4), 40-44.
[8]: http://pubs.acs.org/cen/coverstory/83/8325/83256-mercaptopurine.html
[9]: http://ngm.nationalgeographic.com/ngm/0304/feature5/fulltext.html
[10]: http://directory.findingada.com/stories/

Attachments

16 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

October 16th is Ada Lovelace Day, in which we celebrate women's achievements in science, technology,...

October 16th is Ada Lovelace Day, in which we celebrate women's achievements in science, technology, engineering, and math.

Ada Lovelace is heralded as the first computer programmer, writing programs (calculating Bernoulli Numbers) for Charles Babbage's Analytical Engine as early as 1843 [1].  One of the most prominent mathematicians at the time, August de Morgan, had impressive things to say about her abilities, “which would require all the strength of a man's constitution to bear” [2], and Babbage himself highlighted her prowess over other contemporaries to Faraday, the legendary English scientist, in a succinct personal correspondence [3].  I've included a transcription of her work [4], showing just how thorough and detailed she was.

It's important to take a moment to note some of the other women who have made significant contributions to the advancement of society over the years.  One of my favorites is Marie Curie, seen in this photo as the only women to appear alongside the intellectual powerhouse that assembled for the Solvay Conference in 1927.  Seated between physicists Planck and Lorentz, she is in good company along with the likes of Einstein and Heisenberg.

Curie remains, to this day, the only person to have ever won a Nobel Prize in multiple sciences. [5]

Here are a couple other notable women that deserve recognition:
- Gertrude Belle Elion (biochemist): Nobel Prize in Physiology or Medicine, 1988. [6]  Gertrude invented an incredible swathe of drugs using innovative new research methods [7], including the first treatment for leukemia. [8]
- Jane Goodall (primatologist): outstanding achievement in anthropology through her incredible 45-year field study of wild chimpanzees [9] which has wildly changed the school of thought in regards to man's connection to primates.  Goodall has been a role model of mine since I first encountered her and her work as a child reading National Geographic Magazine.

Instead of letting today pass only remembering one woman's contributions, take a moment to share your story and your female role model. [10]

So, what women do you revere in science, technology, engineering, or maths?

#AdaLovelaceDay   #STEM  

[1]: http://www.cs.virginia.edu/~robins/Ada_and_the_First_Computer.pdf
[2]: http://sydneypadua.com/2dgoggles/demorgan.gif
[3]: http://books.google.com/books?id=vKesSblgySgC&lpg=PA164&as_brr=0&pg=PA164#v=onepage&f=true
[4]: http://www.fourmilab.ch/babbage/sketch.html
[5]: http://www.nobelprize.org/nobel_prizes/nobelprize_facts.html
[6]: http://www.nobelprize.org/nobel_prizes/medicine/laureates/1988/elion-autobio.html
[7]: Holloway, M. (1991) Profile: Gertrude Belle Elion – The Satisfaction of Delayed Gratification, Scientific American 265(4), 40-44.
[8]: http://pubs.acs.org/cen/coverstory/83/8325/83256-mercaptopurine.html
[9]: http://ngm.nationalgeographic.com/ngm/0304/feature5/fulltext.html
[10]: http://directory.findingada.com/stories/

Attachments

1 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Why I Don't Use Skype (and why you shouldn't, either)

I often get asked for my Skype address, sometimes in relation to business or casual conversation. I politely decline with some degree of hand-waving about my reasons, and suggest an alternative form of communication (typically either Google Talk or Google Hangouts, depending on the context—both are built right in to Gmail!). I'd like to outline some of the reasons why I've made the decision to avoid Skype, primarily so I have something to link to when someone asks me about it.

First and foremost, we don't really know what Skype actually does. The binary (the actual program you run on your computer) is obfuscated, so attempts at disassembling it [PDF] to verify some of its strange behavior and the information it is transmitting have so far come up with very little. This is an issue, because Skype produces encrypted traffic even when you are not actively using Skype. This means we can only speculate on what information Skype is collecting about you after you've so graciously chosen to install it, and perhaps more importantly who it is sending that information to.

Quoting Salman Baset:

When a Skype client is not in a call and is running on a machine with public IP address, it has on the average 4-8 active TCP connections and atleast one UDP connection.

While connecting to external IP addresses is normal for a server/client architecture and necessary for receiving notifications, the volume of traffic and number of connections is concerning, considering the compounding issues between Skype's peer-to-peer architecture [PDF] and the "reasonable level of detection accuracy" in snooping on voice calls in Skype [PDF], despite the [purportedly] encrypted nature of the Skype protocol.

Speaking in general terms, Skype is "black box" software which has undergone no public review despite very concerning observed behavior. When new Skype malware (like Skype IMBot, of which an analysis is available, or the more recent Skype account hijacking) is released, there are very few options to protect ourselves if we've got Skype installed. On Linux, tools like AppArmor and TOMOYO exist, but without the ability to easily view the source and understand the attack (per perhaps even fix it proactively, before it occurs) we are at the mercy of Skype's new maintainers to provide a timely resolution in a reactive approach.

If you use a proprietary program or somebody else's web server, you're defenceless. You're putty in the hands of whoever developed that software.
— Richard Stallman
In conclusion, while Skype may be convenient, it presents a series of questions that must be asked and implications to be considered before choosing it over other chat, VoIP, and video chat solutions. I can only hope that more people consider these things before doing so.

Asides

Some of the other things I found interesting, more recently than the research I've linked in this post, include Skype's role in the Syrian conflict, in which a claim was made as follows:
A media activist in Idlib named Mohamed said a rebel informant working for the government was killed in Damascus six months ago after sending warnings to the Free Syrian Army on Skype. “I saw this incident right in front of my eyes,” Mohamed said. “We put his info on Skype so he was arrested and killed.”

Skype (Microsoft) has also made other concerning statements after accusations of helping the U.S. Government spy on its own citizens.

Wikipedia also lists a large number of known flaws in Skype, which I've chosen to avoid duplicating in this post.

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Letter Sweep

Following suit with the likes of Tim Bray and Eric Meyer, I figured I'd throw together my browser's letter sweep tonight.

  • [A]dmin Site. Yeah, I guess I would be visiting the admin panel for this. Quite frequently.
  • Mirascape's [B]log. An infrequent haunt of mine, but fairly obvious.
  • [C]MON. Cluster Monitor for MySQL Cluster, something I almost always have open.
  • Google [D]ocs. This one is painfully obvious, I use Google Docs extensively.
  • [E]ricMartindale.com. Okay, that's a gimme. Does this make me egocentric?
  • [F]acebook. I'm actually fairly ashamed of this one. Why can't I have a cool F site? sadface
  • [G]mail. Three accounts linked using Google's Multiple Sign-in. Open [almost] all day.
  • [H]ighcharts JS. A pretty kick-ass Javascript library for generating charts on the clientside.
  • [I]nternal Discussion. A site for communication with my team. :)
  • [J]Query Mobile Demo, 1.0 alpha 3. I've been spending a lot of time toying with jQuery Mobile, seeing where it's going compared to Sencha Touch.
  • [K]r.github.com. Keith Rarick's GitHub redirect. Total ass-kicker.
  • [L]inkedIn. Pretty straightforward, between hiring for our team at @Mirascape and the travel to and from various conferences and Meetups lately.
  • [M]irascape. The augmented reality platform I'm responsible for.
  • [N]oxBot. A nice PHP-powered IRC bot with various plugins. A bit out of date, but very powerful. Been using it for a couple things lately.
  • [O]K, QR Me!. A QR Code-generating link shortener I built.
  • [P]ostmark. Best Email delivery service I've used. Nice RESTful API, flat rate for emails sent.
  • [Q]uora. These guys nail Q&A, and they're doing it pretty well. Check out all their buzz, too. But for some reason, I just don't stick.
  • Google [R]eader. “From your 1,040 subscriptions, over the last 30 days you read 21,549 items, clicked 274 items, starred 853 items, shared 37 items, and emailed 8 items.” -- </stats>
  • [S]erver Stats for Mirascape. Powered by Munin, it's how I keep track of the status and metrics of all my servers.
  • [T]witter. Not surprising. I love their webapp for my personal use, but own and manage at least five accounts using SplitTweet.
  • [U]serVoice. Pretty sweet tool I use for giving the communities I manage a good way to build a consensus on what they desire most. Examples I run: for RolePlayGateway, and EVE UserVoice for EVE Online.
  • Google [V]oice. Allows me to use SMS from my computer, read (as opposed to listen to) voicemail. Great tool. If only it supported MMS.
  • [W]achovia. One of the places I do banking.
  • [X]DA Developers. An indisposable resource for getting rid of carrier-installed crap and running my own choice of software on the hardware I purchased!
  • [Y]ouTube. Another big namer. No surprise.
  • [Z]ecco. Where I trade most of my public stocks. :)

Surprisingly populist, and there's a lot of Google-owned properties in there. I'm also using Chromium, so I think it prefers the roots of the sites I visit instead of searching through my history for individual pages.

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

On the Ongoing Attacks between China, U.S., Russia, Israel, etc.… The latest round of evidence of ongoing...

On the Ongoing Attacks between China, U.S., Russia, Israel, etc.…
The latest round of evidence of ongoing digital warfare between the superpowers is now being reported in the N.Y. Times [1] after an undeniably incriminating 60-page report on the Chinese attacks on the U.S. by security firm Mandiant [2].

“Either they are coming from inside Unit 61398, or the people who run the most-controlled, most-monitored Internet networks in the world are clueless about thousands of people generating attacks from this one neighborhood.”
                                                    — Kevin Mandia

The report goes on to track individual participants in the attack, tracing them back to the headquarters of P.L.A. Unit 61398.

Attacks from the Chinese have been ongoing for many years, notably back to Operation Titan Rain [3] in 2003, in which attackers gained access to military intelligence networks at organizations such as Lockheed Martin, Sandia National Laboratories, Redstone Arsenal, and NASA [4].  Direct military targets were also included in the assault, such as the U.S. Army Information Systems Engineering Command at Fort Huachuca, Arizona, the Defense Information Systems Agency in Arlington, Virginia, the Naval Ocean Systems Center, a Defense Department installation in San Diego, California, and the U.S. Army Space and Strategic Defense installation in Huntsville, Alabama [5]. 

These ongoing attacks are labeled "Advanced Persistent Threats" or "APT" by the American Military, are considered acts of war by both the White House [6] and the Department of Defense [7] as far back as 2011, and are not unique to the Chinese origins.  You may remember the 2007 attacks on Estonia [8], which has been attributed to entities within Russian territory operating with the assistance of the Russian government [9].  These attacks disabled a wide array of Estonian government sites, rendering services in the world's most digitally-connected country unusable.  The attacks also disabled ATM machines, effectively disabling some portion of the Estonian economy.

The United States [and arguably Israel, [10]] have also been actively participating in these attacks [11] with the deploying of FLAME and Stuxnet against Iran, which made international headlines this past year when the coordinated efforts of the tools were used to disable Iranian nuclear centrifuges in an attempt to slow their progress in their nuclear program [12].  These efforts are ongoing, with the latest addition of the Gauss and Duqu malwares [13] continuing to target middle-eastern countries.

“From his first months in office, President Obama secretly ordered increasingly sophisticated attacks on the computer systems that run Iran’s main nuclear enrichment facilities, significantly expanding America’s first sustained use of cyberweapons, according to participants in the program.”
                                                    — +The New York Times

Obama reportedly went on to sign a classified directive last year [14] enabling the government to seize control of private networks, and the 2012 NDAA (National Defense Authorization Act) includes terms [15, section 954] that authorize offensive attacks on foreign threats [16].  The official United States policy already is to deem any cyberattack on the U.S. as an "act of war" [17], and it looks like these types of actions and attacks have already been made legal.

While it may once have been a subject of fiction [18], it's now and has been a harsh reality that we're in the middle of a new era in warfare, and the battles are already well-underway as countries around the world are openly engaging in offensive attacks on one another that are impacting economies on a massive scale.  I don't know what else to call this other than a world war—even the CIA's Center for the Study of Intelligence (CSI) predicted this [19], as have many others even earlier [20].  

Here's a thought; if our constitution gives us the right to bear arms, and the government deems these types of attacks as acts of war, then isn't it our right to keep and bear these arms?  Yet another case for a mass-algorate society [21], which Mr. Obama appears to agree with me on [22], at the very least.

[1]: http://www.nytimes.com/2013/02/19/technology/chinas-army-is-seen-as-tied-to-hacking-against-us.html
[2]: http://intelreport.mandiant.com/
[3]: http://en.wikipedia.org/wiki/Titan_Rain
[4]: http://www.time.com/time/nation/article/0,8599,1098371,00.html
[5]: http://www.zdnet.com/news/security-experts-lift-lid-on-chinese-hack-attacks/145763
[6]: http://www.whitehouse.gov/sites/default/files/rss_viewer/international_strategy_for_cyberspace.pdf
[7]: http://online.wsj.com/article/SB10001424052702304563104576355623135782718.html
[8]: http://en.wikipedia.org/wiki/2007_cyberattacks_on_Estonia
[9]: http://www.vedomosti.ru/smartmoney/article/2007/05/28/3004
[10]: http://www.zdnet.com/meet-gauss-the-latest-cyber-espionage-tool-7000002405/
[11]: http://www.nytimes.com/2012/06/01/world/middleeast/obama-ordered-wave-of-cyberattacks-against-iran.html?pagewanted=all
[12]: http://www.bbc.co.uk/news/technology-11388018
[13]: http://www.zdnet.com/meet-gauss-the-latest-cyber-espionage-tool-7000002405/
[14]: http://endthelie.com/2012/11/15/obama-reportedly-signs-classified-cyberwarfare-policy-directive-with-troubling-implications/#axzz2LMPlf8iA
[15]: http://www.gpo.gov/fdsys/pkg/BILLS-112hr1540enr/pdf/BILLS-112hr1540enr.pdf
[16]: http://endthelie.com/2011/12/17/approval-of-covert-offensive-cyberwar-sneakily-inserted-into-ndaa/
[17]: http://www.forbes.com/sites/reuvencohen/2012/06/05/the-white-house-and-pentagon-deem-cyber-attacks-an-act-of-war/
[18]: http://en.wikipedia.org/wiki/Neuromancer
[19]: https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/vol48no4/new_face_of_war.html
[20]: http://www.rand.org/content/dam/rand/pubs/reprints/2007/RAND_RP223.pdf
[21]: https://plus.google.com/112353210404102902472/posts/MVQXyw9EJDE
[22]: http://news.cnet.com/8301-17938_105-57569503-1/obama-endorses-required-high-school-coding-classes/

Attachments

China’s Army Is Seen as Tied to Hacking Against U.S.

An overwhelming percentage of the attacks on American companies and government agencies start in a building on the edge of Shanghai, say cybersecurity experts and American intelligence officials.

5 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

On the Ongoing Attacks between China, U.S., Russia, Israel, etc.… The latest round of evidence of ongoing...

On the Ongoing Attacks between China, U.S., Russia, Israel, etc.…
The latest round of evidence of ongoing digital warfare between the superpowers is now being reported in the N.Y. Times [1] after an undeniably incriminating 60-page report on the Chinese attacks on the U.S. by security firm Mandiant [2].

“Either they are coming from inside Unit 61398, or the people who run the most-controlled, most-monitored Internet networks in the world are clueless about thousands of people generating attacks from this one neighborhood.”
                                                    — Kevin Mandia

The report goes on to track individual participants in the attack, tracing them back to the headquarters of P.L.A. Unit 61398.

Attacks from the Chinese have been ongoing for many years, notably back to Operation Titan Rain [3] in 2003, in which attackers gained access to military intelligence networks at organizations such as Lockheed Martin, Sandia National Laboratories, Redstone Arsenal, and NASA [4].  Direct military targets were also included in the assault, such as the U.S. Army Information Systems Engineering Command at Fort Huachuca, Arizona, the Defense Information Systems Agency in Arlington, Virginia, the Naval Ocean Systems Center, a Defense Department installation in San Diego, California, and the U.S. Army Space and Strategic Defense installation in Huntsville, Alabama [5]. 

These ongoing attacks are labeled "Advanced Persistent Threats" or "APT" by the American Military, are considered acts of war by both the White House [6] and the Department of Defense [7] as far back as 2011, and are not unique to the Chinese origins.  You may remember the 2007 attacks on Estonia [8], which has been attributed to entities within Russian territory operating with the assistance of the Russian government [9].  These attacks disabled a wide array of Estonian government sites, rendering services in the world's most digitally-connected country unusable.  The attacks also disabled ATM machines, effectively disabling some portion of the Estonian economy.

The United States [and arguably Israel, [10]] have also been actively participating in these attacks [11] with the deploying of FLAME and Stuxnet against Iran, which made international headlines this past year when the coordinated efforts of the tools were used to disable Iranian nuclear centrifuges in an attempt to slow their progress in their nuclear program [12].  These efforts are ongoing, with the latest addition of the Gauss and Duqu malwares [13] continuing to target middle-eastern countries.

“From his first months in office, President Obama secretly ordered increasingly sophisticated attacks on the computer systems that run Iran’s main nuclear enrichment facilities, significantly expanding America’s first sustained use of cyberweapons, according to participants in the program.”
                                                    — +The New York Times

Obama reportedly went on to sign a classified directive last year [14] enabling the government to seize control of private networks, and the 2012 NDAA (National Defense Authorization Act) includes terms [15, section 954] that authorize offensive attacks on foreign threats [16].  The official United States policy already is to deem any cyberattack on the U.S. as an "act of war" [17], and it looks like these types of actions and attacks have already been made legal.

While it may once have been a subject of fiction [18], it's now and has been a harsh reality that we're in the middle of a new era in warfare, and the battles are already well-underway as countries around the world are openly engaging in offensive attacks on one another that are impacting economies on a massive scale.  I don't know what else to call this other than a world war—even the CIA's Center for the Study of Intelligence (CSI) predicted this [19], as have many others even earlier [20].  

Here's a thought; if our constitution gives us the right to bear arms, and the government deems these types of attacks as acts of war, then isn't it our right to keep and bear these arms?  Yet another case for a mass-algorate society [21], which Mr. Obama appears to agree with me on [22], at the very least.

[1]: http://www.nytimes.com/2013/02/19/technology/chinas-army-is-seen-as-tied-to-hacking-against-us.html
[2]: http://intelreport.mandiant.com/
[3]: http://en.wikipedia.org/wiki/Titan_Rain
[4]: http://www.time.com/time/nation/article/0,8599,1098371,00.html
[5]: http://www.zdnet.com/news/security-experts-lift-lid-on-chinese-hack-attacks/145763
[6]: http://www.whitehouse.gov/sites/default/files/rss_viewer/international_strategy_for_cyberspace.pdf
[7]: http://online.wsj.com/article/SB10001424052702304563104576355623135782718.html
[8]: http://en.wikipedia.org/wiki/2007_cyberattacks_on_Estonia
[9]: http://www.vedomosti.ru/smartmoney/article/2007/05/28/3004
[10]: http://www.zdnet.com/meet-gauss-the-latest-cyber-espionage-tool-7000002405/
[11]: http://www.nytimes.com/2012/06/01/world/middleeast/obama-ordered-wave-of-cyberattacks-against-iran.html?pagewanted=all
[12]: http://www.bbc.co.uk/news/technology-11388018
[13]: http://www.zdnet.com/meet-gauss-the-latest-cyber-espionage-tool-7000002405/
[14]: http://endthelie.com/2012/11/15/obama-reportedly-signs-classified-cyberwarfare-policy-directive-with-troubling-implications/#axzz2LMPlf8iA
[15]: http://www.gpo.gov/fdsys/pkg/BILLS-112hr1540enr/pdf/BILLS-112hr1540enr.pdf
[16]: http://endthelie.com/2011/12/17/approval-of-covert-offensive-cyberwar-sneakily-inserted-into-ndaa/
[17]: http://www.forbes.com/sites/reuvencohen/2012/06/05/the-white-house-and-pentagon-deem-cyber-attacks-an-act-of-war/
[18]: http://en.wikipedia.org/wiki/Neuromancer
[19]: https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/vol48no4/new_face_of_war.html
[20]: http://www.rand.org/content/dam/rand/pubs/reprints/2007/RAND_RP223.pdf
[21]: https://plus.google.com/112353210404102902472/posts/MVQXyw9EJDE
[22]: http://news.cnet.com/8301-17938_105-57569503-1/obama-endorses-required-high-school-coding-classes/

Attachments

China’s Army Is Seen as Tied to Hacking Against U.S.

An overwhelming percentage of the attacks on American companies and government agencies start in a building on the edge of Shanghai, say cybersecurity experts and American intelligence officials.

1 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

On the Ongoing Attacks between China, U.S., Russia, Israel, etc.… The latest round of evidence of ongoing...

On the Ongoing Attacks between China, U.S., Russia, Israel, etc.…
The latest round of evidence of ongoing digital warfare between the superpowers is now being reported in the N.Y. Times [1] after an undeniably incriminating 60-page report on the Chinese attacks on the U.S. by security firm Mandiant [2].

“Either they are coming from inside Unit 61398, or the people who run the most-controlled, most-monitored Internet networks in the world are clueless about thousands of people generating attacks from this one neighborhood.”
                                                    — Kevin Mandia

The report goes on to track individual participants in the attack, tracing them back to the headquarters of P.L.A. Unit 61398.

Attacks from the Chinese have been ongoing for many years, notably back to Operation Titan Rain [3] in 2003, in which attackers gained access to military intelligence networks at organizations such as Lockheed Martin, Sandia National Laboratories, Redstone Arsenal, and NASA [4].  Direct military targets were also included in the assault, such as the U.S. Army Information Systems Engineering Command at Fort Huachuca, Arizona, the Defense Information Systems Agency in Arlington, Virginia, the Naval Ocean Systems Center, a Defense Department installation in San Diego, California, and the U.S. Army Space and Strategic Defense installation in Huntsville, Alabama [5]. 

These ongoing attacks are labeled "Advanced Persistent Threats" or "APT" by the American Military, are considered acts of war by both the White House [6] and the Department of Defense [7] as far back as 2011, and are not unique to the Chinese origins.  You may remember the 2007 attacks on Estonia [8], which has been attributed to entities within Russian territory operating with the assistance of the Russian government [9].  These attacks disabled a wide array of Estonian government sites, rendering services in the world's most digitally-connected country unusable.  The attacks also disabled ATM machines, effectively disabling some portion of the Estonian economy.

The United States [and arguably Israel, [10]] have also been actively participating in these attacks [11] with the deploying of FLAME and Stuxnet against Iran, which made international headlines this past year when the coordinated efforts of the tools were used to disable Iranian nuclear centrifuges in an attempt to slow their progress in their nuclear program [12].  These efforts are ongoing, with the latest addition of the Gauss and Duqu malwares [13] continuing to target middle-eastern countries.

“From his first months in office, President Obama secretly ordered increasingly sophisticated attacks on the computer systems that run Iran’s main nuclear enrichment facilities, significantly expanding America’s first sustained use of cyberweapons, according to participants in the program.”
                                                    — +The New York Times

Obama reportedly went on to sign a classified directive last year [14] enabling the government to seize control of private networks, and the 2012 NDAA (National Defense Authorization Act) includes terms [15, section 954] that authorize offensive attacks on foreign threats [16].  The official United States policy already is to deem any cyberattack on the U.S. as an "act of war" [17], and it looks like these types of actions and attacks have already been made legal.

While it may once have been a subject of fiction [18], it's now and has been a harsh reality that we're in the middle of a new era in warfare, and the battles are already well-underway as countries around the world are openly engaging in offensive attacks on one another that are impacting economies on a massive scale.  I don't know what else to call this other than a world war—even the CIA's Center for the Study of Intelligence (CSI) predicted this [19], as have many others even earlier [20].  

Here's a thought; if our constitution gives us the right to bear arms, and the government deems these types of attacks as acts of war, then isn't it our right to keep and bear these arms?  Yet another case for a mass-algorate society [21], which Mr. Obama appears to agree with me on [22], at the very least.

[1]: http://www.nytimes.com/2013/02/19/technology/chinas-army-is-seen-as-tied-to-hacking-against-us.html
[2]: http://intelreport.mandiant.com/
[3]: http://en.wikipedia.org/wiki/Titan_Rain
[4]: http://www.time.com/time/nation/article/0,8599,1098371,00.html
[5]: http://www.zdnet.com/news/security-experts-lift-lid-on-chinese-hack-attacks/145763
[6]: http://www.whitehouse.gov/sites/default/files/rss_viewer/international_strategy_for_cyberspace.pdf
[7]: http://online.wsj.com/article/SB10001424052702304563104576355623135782718.html
[8]: http://en.wikipedia.org/wiki/2007_cyberattacks_on_Estonia
[9]: http://www.vedomosti.ru/smartmoney/article/2007/05/28/3004
[10]: http://www.zdnet.com/meet-gauss-the-latest-cyber-espionage-tool-7000002405/
[11]: http://www.nytimes.com/2012/06/01/world/middleeast/obama-ordered-wave-of-cyberattacks-against-iran.html?pagewanted=all
[12]: http://www.bbc.co.uk/news/technology-11388018
[13]: http://www.zdnet.com/meet-gauss-the-latest-cyber-espionage-tool-7000002405/
[14]: http://endthelie.com/2012/11/15/obama-reportedly-signs-classified-cyberwarfare-policy-directive-with-troubling-implications/#axzz2LMPlf8iA
[15]: http://www.gpo.gov/fdsys/pkg/BILLS-112hr1540enr/pdf/BILLS-112hr1540enr.pdf
[16]: http://endthelie.com/2011/12/17/approval-of-covert-offensive-cyberwar-sneakily-inserted-into-ndaa/
[17]: http://www.forbes.com/sites/reuvencohen/2012/06/05/the-white-house-and-pentagon-deem-cyber-attacks-an-act-of-war/
[18]: http://en.wikipedia.org/wiki/Neuromancer
[19]: https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/vol48no4/new_face_of_war.html
[20]: http://www.rand.org/content/dam/rand/pubs/reprints/2007/RAND_RP223.pdf
[21]: https://plus.google.com/112353210404102902472/posts/MVQXyw9EJDE
[22]: http://news.cnet.com/8301-17938_105-57569503-1/obama-endorses-required-high-school-coding-classes/

Attachments

China’s Army Is Seen as Tied to Hacking Against U.S.

An overwhelming percentage of the attacks on American companies and government agencies start in a building on the edge of Shanghai, say cybersecurity experts and American intelligence officials.

6 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

On the Ongoing Attacks between China, U.S., Russia, Israel, etc.… The latest round of evidence of ongoing...

On the Ongoing Attacks between China, U.S., Russia, Israel, etc.…
The latest round of evidence of ongoing digital warfare between the superpowers is now being reported in the N.Y. Times [1] after an undeniably incriminating 60-page report on the Chinese attacks on the U.S. by security firm Mandiant [2].

“Either they are coming from inside Unit 61398, or the people who run the most-controlled, most-monitored Internet networks in the world are clueless about thousands of people generating attacks from this one neighborhood.”
                                                    — Kevin Mandia

The report goes on to track individual participants in the attack, tracing them back to the headquarters of P.L.A. Unit 61398.

Attacks from the Chinese have been ongoing for many years, notably back to Operation Titan Rain [3] in 2003, in which attackers gained access to military intelligence networks at organizations such as Lockheed Martin, Sandia National Laboratories, Redstone Arsenal, and NASA [4].  Direct military targets were also included in the assault, such as the U.S. Army Information Systems Engineering Command at Fort Huachuca, Arizona, the Defense Information Systems Agency in Arlington, Virginia, the Naval Ocean Systems Center, a Defense Department installation in San Diego, California, and the U.S. Army Space and Strategic Defense installation in Huntsville, Alabama [5]. 

These ongoing attacks are labeled "Advanced Persistent Threats" or "APT" by the American Military, are considered acts of war by both the White House [6] and the Department of Defense [7] as far back as 2011, and are not unique to the Chinese origins.  You may remember the 2007 attacks on Estonia [8], which has been attributed to entities within Russian territory operating with the assistance of the Russian government [9].  These attacks disabled a wide array of Estonian government sites, rendering services in the world's most digitally-connected country unusable.  The attacks also disabled ATM machines, effectively disabling some portion of the Estonian economy.

The United States [and arguably Israel, [10]] have also been actively participating in these attacks [11] with the deploying of FLAME and Stuxnet against Iran, which made international headlines this past year when the coordinated efforts of the tools were used to disable Iranian nuclear centrifuges in an attempt to slow their progress in their nuclear program [12].  These efforts are ongoing, with the latest addition of the Gauss and Duqu malwares [13] continuing to target middle-eastern countries.

“From his first months in office, President Obama secretly ordered increasingly sophisticated attacks on the computer systems that run Iran’s main nuclear enrichment facilities, significantly expanding America’s first sustained use of cyberweapons, according to participants in the program.”
                                                    — +The New York Times

Obama reportedly went on to sign a classified directive last year [14] enabling the government to seize control of private networks, and the 2012 NDAA (National Defense Authorization Act) includes terms [15, section 954] that authorize offensive attacks on foreign threats [16].  The official United States policy already is to deem any cyberattack on the U.S. as an "act of war" [17], and it looks like these types of actions and attacks have already been made legal.

While it may once have been a subject of fiction [18], it's now and has been a harsh reality that we're in the middle of a new era in warfare, and the battles are already well-underway as countries around the world are openly engaging in offensive attacks on one another that are impacting economies on a massive scale.  I don't know what else to call this other than a world war—even the CIA's Center for the Study of Intelligence (CSI) predicted this [19], as have many others even earlier [20].  

Here's a thought; if our constitution gives us the right to bear arms, and the government deems these types of attacks as acts of war, then isn't it our right to keep and bear these arms?  Yet another case for a mass-algorate society [21], which Mr. Obama appears to agree with me on [22], at the very least.

[1]: http://www.nytimes.com/2013/02/19/technology/chinas-army-is-seen-as-tied-to-hacking-against-us.html
[2]: http://intelreport.mandiant.com/
[3]: http://en.wikipedia.org/wiki/Titan_Rain
[4]: http://www.time.com/time/nation/article/0,8599,1098371,00.html
[5]: http://www.zdnet.com/news/security-experts-lift-lid-on-chinese-hack-attacks/145763
[6]: http://www.whitehouse.gov/sites/default/files/rss_viewer/international_strategy_for_cyberspace.pdf
[7]: http://online.wsj.com/article/SB10001424052702304563104576355623135782718.html
[8]: http://en.wikipedia.org/wiki/2007_cyberattacks_on_Estonia
[9]: http://www.vedomosti.ru/smartmoney/article/2007/05/28/3004
[10]: http://www.zdnet.com/meet-gauss-the-latest-cyber-espionage-tool-7000002405/
[11]: http://www.nytimes.com/2012/06/01/world/middleeast/obama-ordered-wave-of-cyberattacks-against-iran.html?pagewanted=all
[12]: http://www.bbc.co.uk/news/technology-11388018
[13]: http://www.zdnet.com/meet-gauss-the-latest-cyber-espionage-tool-7000002405/
[14]: http://endthelie.com/2012/11/15/obama-reportedly-signs-classified-cyberwarfare-policy-directive-with-troubling-implications/#axzz2LMPlf8iA
[15]: http://www.gpo.gov/fdsys/pkg/BILLS-112hr1540enr/pdf/BILLS-112hr1540enr.pdf
[16]: http://endthelie.com/2011/12/17/approval-of-covert-offensive-cyberwar-sneakily-inserted-into-ndaa/
[17]: http://www.forbes.com/sites/reuvencohen/2012/06/05/the-white-house-and-pentagon-deem-cyber-attacks-an-act-of-war/
[18]: http://en.wikipedia.org/wiki/Neuromancer
[19]: https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/vol48no4/new_face_of_war.html
[20]: http://www.rand.org/content/dam/rand/pubs/reprints/2007/RAND_RP223.pdf
[21]: https://plus.google.com/112353210404102902472/posts/MVQXyw9EJDE
[22]: http://news.cnet.com/8301-17938_105-57569503-1/obama-endorses-required-high-school-coding-classes/

Attachments

China’s Army Is Seen as Tied to Hacking Against U.S.

An overwhelming percentage of the attacks on American companies and government agencies start in a building on the edge of Shanghai, say cybersecurity experts and American intelligence officials.

5 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Including the Artificial Intelligence class that I and over 58,000 people have signed up for ( http:...

Including the Artificial Intelligence class that I and over 58,000 people have signed up for ( http://www.nytimes.com/2011/08/16/science/16stanford.html ), Stanford is now offering 13 of their fall semester classes (including statements of accomplishments for those who complete them!) online, for free:

http://see.stanford.edu/see/courses.aspx

Now, the question is... which others to sign up for? How many should I take?!

Attachments

Stanford School of Engineering - Stanford Engineering Everywhere

courses. SEE programming includes one of Stanford's most popular engineering sequences: the three-course Introduction to Computer Science taken by the majority of Stanford undergraduates, and seve...

2 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Including the Artificial Intelligence class that I and over 58,000 people have signed up for ( http:...

Including the Artificial Intelligence class that I and over 58,000 people have signed up for ( http://www.nytimes.com/2011/08/16/science/16stanford.html ), Stanford is now offering 13 of their fall semester classes (including statements of accomplishments for those who complete them!) online, for free:

http://see.stanford.edu/see/courses.aspx

Now, the question is... which others to sign up for? How many should I take?!

Attachments

Stanford School of Engineering - Stanford Engineering Everywhere

courses. SEE programming includes one of Stanford's most popular engineering sequences: the three-course Introduction to Computer Science taken by the majority of Stanford undergraduates, and seve...

6 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Including the Artificial Intelligence class that I and over 58,000 people have signed up for ( http:...

Including the Artificial Intelligence class that I and over 58,000 people have signed up for ( http://www.nytimes.com/2011/08/16/science/16stanford.html ), Stanford is now offering 13 of their fall semester classes (including statements of accomplishments for those who complete them!) online, for free:

http://see.stanford.edu/see/courses.aspx

Now, the question is... which others to sign up for? How many should I take?!

Attachments

Stanford School of Engineering - Stanford Engineering Everywhere

courses. SEE programming includes one of Stanford's most popular engineering sequences: the three-course Introduction to Computer Science taken by the majority of Stanford undergraduates, and seve...

2 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Including the Artificial Intelligence class that I and over 58,000 people have signed up for ( http:...

Including the Artificial Intelligence class that I and over 58,000 people have signed up for ( http://www.nytimes.com/2011/08/16/science/16stanford.html ), Stanford is now offering 13 of their fall semester classes (including statements of accomplishments for those who complete them!) online, for free:

http://see.stanford.edu/see/courses.aspx

Now, the question is... which others to sign up for? How many should I take?!

Attachments

Stanford School of Engineering - Stanford Engineering Everywhere

courses. SEE programming includes one of Stanford's most popular engineering sequences: the three-course Introduction to Computer Science taken by the majority of Stanford undergraduates, and seve...

2 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

I&#39;m a female developer and I... in reply to

I'm a female developer and I program in Ada as well, which is named after Ada Lovelace :D

I wish more girls would start doing science and technology... we're generally very good at it :)

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Gaming for Science Who says gaming is a waste of time?? I'm not sure that the author of the story knows...

Gaming for Science

Who says gaming is a waste of time?? I'm not sure that the author of the story knows much about gaming though - he probably should have said WoW instead of D&D...

Attachments

Online gamers crack AIDS enzyme puzzle | The Raw Story

By Agence France-Presse Sunday, September 18th, 2011 -- 2:41 pm. Print. Tags: building blocks of proteins, human immunodeficiency virus, immunodeficiency virus hiv. PARIS — Online gamers have achieved...

1 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Gaming for Science Who says gaming is a waste of time?? I'm not sure that the author of the story knows...

Gaming for Science

Who says gaming is a waste of time?? I'm not sure that the author of the story knows much about gaming though - he probably should have said WoW instead of D&D...

Attachments

Online gamers crack AIDS enzyme puzzle | The Raw Story

By Agence France-Presse Sunday, September 18th, 2011 -- 2:41 pm. Print. Tags: building blocks of proteins, human immunodeficiency virus, immunodeficiency virus hiv. PARIS — Online gamers have achieved...

1 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Gaming for Science Who says gaming is a waste of time?? I'm not sure that the author of the story knows...

Gaming for Science

Who says gaming is a waste of time?? I'm not sure that the author of the story knows much about gaming though - he probably should have said WoW instead of D&D...

Attachments

Online gamers crack AIDS enzyme puzzle | The Raw Story

By Agence France-Presse Sunday, September 18th, 2011 -- 2:41 pm. Print. Tags: building blocks of proteins, human immunodeficiency virus, immunodeficiency virus hiv. PARIS — Online gamers have achieved...

1 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Gaming for Science Who says gaming is a waste of time?? I'm not sure that the author of the story knows...

Gaming for Science

Who says gaming is a waste of time?? I'm not sure that the author of the story knows much about gaming though - he probably should have said WoW instead of D&D...

Attachments

Online gamers crack AIDS enzyme puzzle | The Raw Story

By Agence France-Presse Sunday, September 18th, 2011 -- 2:41 pm. Print. Tags: building blocks of proteins, human immunodeficiency virus, immunodeficiency virus hiv. PARIS — Online gamers have achieved...

1 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

“Overprotecting intellectual property is as harmful as underprotecting it. Culture is impossible without...

“Overprotecting intellectual property is as harmful as underprotecting it. Culture is impossible without a rich public domain. Nothing today, likely nothing since we tamed fire, is genuinely new: Culture, like science and technology, grows by accretion, each new creator building on the works of those who came before. Overprotection stifles the very creative forces it's supposed to nurture.”

-- Alex Kozinski, Chief Judge of the United States Court of Appeals for the Ninth Circuit

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

“Overprotecting intellectual property is as harmful as underprotecting it. Culture is impossible without...

“Overprotecting intellectual property is as harmful as underprotecting it. Culture is impossible without a rich public domain. Nothing today, likely nothing since we tamed fire, is genuinely new: Culture, like science and technology, grows by accretion, each new creator building on the works of those who came before. Overprotection stifles the very creative forces it's supposed to nurture.”

-- Alex Kozinski, Chief Judge of the United States Court of Appeals for the Ninth Circuit

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

In terms of source control, my past few weeks have been spent entirely in Git for one project or another...

In terms of source control, my past few weeks have been spent entirely in Git for one project or another. I've had my ups and downs. Conveniently enough, +Nick Farina provides this timely post on how simple it really can be. No rocket science required! (Hat tip, +Bob Cleveland!)

Attachments

Nick Farina - Git Is Simpler Than You Think

Git Is Simpler Than You Think It was about one year ago that we switched to Git. Previously, we used Subversion, through the Mac app Versions, which (rightly) holds an Apple Design Award. I made the.....

1 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

In terms of source control, my past few weeks have been spent entirely in Git for one project or another...

In terms of source control, my past few weeks have been spent entirely in Git for one project or another. I've had my ups and downs. Conveniently enough, +Nick Farina provides this timely post on how simple it really can be. No rocket science required! (Hat tip, +Bob Cleveland!)

Attachments

Nick Farina - Git Is Simpler Than You Think

Git Is Simpler Than You Think It was about one year ago that we switched to Git. Previously, we used Subversion, through the Mac app Versions, which (rightly) holds an Apple Design Award. I made the.....

1 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

In terms of source control, my past few weeks have been spent entirely in Git for one project or another...

In terms of source control, my past few weeks have been spent entirely in Git for one project or another. I've had my ups and downs. Conveniently enough, +Nick Farina provides this timely post on how simple it really can be. No rocket science required! (Hat tip, +Bob Cleveland!)

Attachments

Nick Farina - Git Is Simpler Than You Think

Git Is Simpler Than You Think It was about one year ago that we switched to Git. Previously, we used Subversion, through the Mac app Versions, which (rightly) holds an Apple Design Award. I made the.....

1 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

In terms of source control, my past few weeks have been spent entirely in Git for one project or another...

In terms of source control, my past few weeks have been spent entirely in Git for one project or another. I've had my ups and downs. Conveniently enough, +Nick Farina provides this timely post on how simple it really can be. No rocket science required! (Hat tip, +Bob Cleveland!)

Attachments

Nick Farina - Git Is Simpler Than You Think

Git Is Simpler Than You Think It was about one year ago that we switched to Git. Previously, we used Subversion, through the Mac app Versions, which (rightly) holds an Apple Design Award. I made the.....

1 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

If done properly, it seems like... in reply to

If done properly, it seems like an obvious choice. Scientists are supposed to seek knowledge, not put up barriers to access. The free exchange of ideas is incredibly important for science, and making that exchange easier should be one of the goals. It's ironic that this, of all fields, should suffer from a sluggish move away from old fashioned models.
I think it's inevitable. The only question is how and when. I can understand why the current system is upheld because of its apparent benefits of filtering unwanted papers and comments, and backing up what's published with weighty names from established editors and scientists... but I'm quite sure it's inferior to more open networking models.

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

&quot;What you still hear today from... in reply to

"What you still hear today from all kinds of people is how a Stuxnet-type attack requires so much insider knowledge."

Lazy programmers and administrators have said similar things for ages. First it was stack overflow bugs where the claim was it was much too hard to take advantage of them. Now it is a science with automatic intrusion tools that characterize certain types of overflows and develop attacks.

The best thing that can happen right now is benign bored teenagers breaking into systems until the owners can't pretend it isn't a real problem. Hopefully that happens long before organized crime and adversarial nations get into the act.

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Suppose you have a three-dimensional scene in which there are five recognizable landmark points such...

Suppose you have a three-dimensional scene in which there are five recognizable landmark points such as corners of buildings. Take two photos of the scene, from unrecorded camera positions. Do the photos themselves, together with the focal lengths of the lenses you used to take them, give you enough information to reconstruct the relative positions of the landmarks and the cameras? The answer: no, but almost. According to the Kruppa–Demazure theorem, in general there are only ten different scenes and camera placements that could have given you the same two photos: the actual scene, and nine other alternatives that have the same two projections.

The Demazure of the theorem is Michel Demazure. He started out as a student of Grothendieck and a member of Bourbaki, proved this theorem at about the same time as he was president of the French Mathematical Society, and after that became a science museum director (twice).

Attachments

Michel Demazure - Wikipedia, the free encyclopedia

Michel Demazure. From Wikipedia, the free encyclopedia. Jump to: navigation, search. Michel Demazure, Bures-sur-Yvette 2007. Michel Demazure (born 1937) is a French mathematician. He made contribution...

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Suppose you have a three-dimensional scene in which there are five recognizable landmark points such...

Suppose you have a three-dimensional scene in which there are five recognizable landmark points such as corners of buildings. Take two photos of the scene, from unrecorded camera positions. Do the photos themselves, together with the focal lengths of the lenses you used to take them, give you enough information to reconstruct the relative positions of the landmarks and the cameras? The answer: no, but almost. According to the Kruppa–Demazure theorem, in general there are only ten different scenes and camera placements that could have given you the same two photos: the actual scene, and nine other alternatives that have the same two projections.

The Demazure of the theorem is Michel Demazure. He started out as a student of Grothendieck and a member of Bourbaki, proved this theorem at about the same time as he was president of the French Mathematical Society, and after that became a science museum director (twice).

Attachments

Michel Demazure - Wikipedia, the free encyclopedia

Michel Demazure. From Wikipedia, the free encyclopedia. Jump to: navigation, search. Michel Demazure, Bures-sur-Yvette 2007. Michel Demazure (born 1937) is a French mathematician. He made contribution...

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

All About Forensic Psychology New video to promote The All About Forensic Psychology website. I originally...

All About Forensic Psychology

New video to promote The All About Forensic Psychology website. I originally built the the website as a student resource for an undergraduate course in forensic psychology I wrote and delivered.

Highlights on the website include:

A detailed and clear account of what forensic psychology actually is. Important because of the way the subject has been distorted, sensationalised and inaccurately presented in books, films and on TV. See following link.

http://www.all-about-forensic-psychology.com/what-is-forensic-psychology.html

A series of information pages on criminal profiling. A fascinating subject to learn about in iteslf but also important to know of its place within forensic psychology; for example is criminal profiling a realistic career goal? See following link.

http://www.all-about-forensic-psychology.com/fbi-profiler.html

The Forensic Psychology Degree Directory. A great resource for anybody thinking about studying forensic psychology. See following link.

http://www.all-about-forensic-psychology.com/forensic-psychology-degree.html

Free full-text articles. A wonderful collection of publications including a special "Inside the Criminal Mind" collection showcasing all the major articles written by members of the Behavioral Science Units, National Center for the Analysis of Violent Crime, at the FBI Academy. See following link.

http://www.all-about-forensic-psychology.com/forensic-psychology-ebook.html

I really hope that you find all the information and resources on the All About Forensic Psychology website useful and engaging.

All the best

David

http://www.all-about-forensic-psychology.com/

Attachments

Forensic Psychology

Thank you for taking the time to check out my forensic psychology website. My name is David Webb and I've had a passionate interest in studying and teaching psychology for over 20 years. I have a first class honors degree in psychology and a Masters in Occupational psychology from the University of Sheffield (UK). For a number of years, I was a lecturer in psychology at the University of Huddersfield (UK). During this time I wrote and delivered an undergraduate course in forensic psychology, as a result of which I ended up building the All About Forensic Psychology website (http://www.all-about-forensic-psychology.com/). Highlights on the website include: A detailed and clear account of what forensic psychology actually is. Important because of the way the subject has been distorted, sensationalised and inaccurately presented in books, films and on TV. See following link. http://www.all-about-forensic-psychology.com/what-is-forensic-psychology.html A series of information pages on criminal profiling. A fascinating subject to learn about in iteslf but also important to know of its place within forensic psychology; for example is criminal profiling a realistic career goal? See following link. http://www.all-about-forensic-psychology.com/fbi-profiler.html The Forensic Psychology Degree Directory. A great resource for anybody thinking about studying forensic psychology. See following link. http://www.all-about-forensic-psychology.com/forensic-psychology-degree.html Free full-text articles. A wonderful collection of publications including a special "Inside the Criminal Mind" collection showcasing all the major articles written by members of the Behavioral Science Units, National Center for the Analysis of Violent Crime, at the FBI Academy. See following link. http://www.all-about-forensic-psychology.com/forensic-psychology-ebook.html I really hope that you find all the information and resources on the All About Forensic Psychology website useful and engaging. David Webb BSc (hons), MSc http://www.all-about-forensic-psychology.com/

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

All About Forensic Psychology New video to promote The All About Forensic Psychology website. I originally...

All About Forensic Psychology

New video to promote The All About Forensic Psychology website. I originally built the the website as a student resource for an undergraduate course in forensic psychology I wrote and delivered.

Highlights on the website include:

A detailed and clear account of what forensic psychology actually is. Important because of the way the subject has been distorted, sensationalised and inaccurately presented in books, films and on TV. See following link.

http://www.all-about-forensic-psychology.com/what-is-forensic-psychology.html

A series of information pages on criminal profiling. A fascinating subject to learn about in iteslf but also important to know of its place within forensic psychology; for example is criminal profiling a realistic career goal? See following link.

http://www.all-about-forensic-psychology.com/fbi-profiler.html

The Forensic Psychology Degree Directory. A great resource for anybody thinking about studying forensic psychology. See following link.

http://www.all-about-forensic-psychology.com/forensic-psychology-degree.html

Free full-text articles. A wonderful collection of publications including a special "Inside the Criminal Mind" collection showcasing all the major articles written by members of the Behavioral Science Units, National Center for the Analysis of Violent Crime, at the FBI Academy. See following link.

http://www.all-about-forensic-psychology.com/forensic-psychology-ebook.html

I really hope that you find all the information and resources on the All About Forensic Psychology website useful and engaging.

All the best

David

http://www.all-about-forensic-psychology.com/

Attachments

Forensic Psychology

Thank you for taking the time to check out my forensic psychology website. My name is David Webb and I've had a passionate interest in studying and teaching psychology for over 20 years. I have a first class honors degree in psychology and a Masters in Occupational psychology from the University of Sheffield (UK). For a number of years, I was a lecturer in psychology at the University of Huddersfield (UK). During this time I wrote and delivered an undergraduate course in forensic psychology, as a result of which I ended up building the All About Forensic Psychology website (http://www.all-about-forensic-psychology.com/). Highlights on the website include: A detailed and clear account of what forensic psychology actually is. Important because of the way the subject has been distorted, sensationalised and inaccurately presented in books, films and on TV. See following link. http://www.all-about-forensic-psychology.com/what-is-forensic-psychology.html A series of information pages on criminal profiling. A fascinating subject to learn about in iteslf but also important to know of its place within forensic psychology; for example is criminal profiling a realistic career goal? See following link. http://www.all-about-forensic-psychology.com/fbi-profiler.html The Forensic Psychology Degree Directory. A great resource for anybody thinking about studying forensic psychology. See following link. http://www.all-about-forensic-psychology.com/forensic-psychology-degree.html Free full-text articles. A wonderful collection of publications including a special "Inside the Criminal Mind" collection showcasing all the major articles written by members of the Behavioral Science Units, National Center for the Analysis of Violent Crime, at the FBI Academy. See following link. http://www.all-about-forensic-psychology.com/forensic-psychology-ebook.html I really hope that you find all the information and resources on the All About Forensic Psychology website useful and engaging. David Webb BSc (hons), MSc http://www.all-about-forensic-psychology.com/

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Prediction: Global Riots One Year Away? In 2011, researchers at the Complex Systems Institute (CSI)...

Prediction: Global Riots One Year Away?

In 2011, researchers at the Complex Systems Institute (CSI) released a paper [1] presenting a model for understanding (and ultimately predicting) the social unrest that rocked countries such as Tunisia, Libya, and Egypt [2].  Of the data analyzed, the principal factor influencing said unrest was determined to be the food price index.

That's a pretty simple concept.  If one of your most basic needs was threatened, what would you do?  To quote the MIT Technology Review's explanation of the paper [3], “This isn't rocket science. It stands to reason that people become desperate when food is unobtainable. It's often said that any society is three square meals from anarchy.”

These models have other complex implications around the world, such as in the financial markets.  Another paper from 2010, titled “Predicting economic market crises using measures of collective panic” [4], shows that the economic crisis (and other singe-day panics in the market) in the United States were predictable events that relied on the relatively volatile sociological phenomenon of uncertainty and nervousness -- which makes some of the original paper's assertions even more interesting.  Most notably:

“Both factors in food prices can be linked directly to recent US governmental actions. Speculator activity has been enhanced by deregulation of the commodities markets that exempted dealers from trading limits, and subsidies and other policies have been central to the growth of ethanol conversion.”

Food for thought.

[1]: http://arxiv.org/pdf/1108.2455v1.pdf
[2]: http://www.globalissues.org/article/792/mideast-north-africa-unrest
[3]: http://www.technologyreview.com/view/425019/the-cause-of-riots-and-the-price-of-food/
[4]: http://arxiv.org/pdf/1102.2620v1.pdf

Attachments

We Are Now One Year Away From Global Riots, Complex Systems Theorists Say | Motherboard

What’s the number one reason we riot? The plausible and justifiable motivations of trampled-upon humanfolk are many—poverty, oppression, disenfranchisement, etc—but the big one is more primal than any...

1 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Prediction: Global Riots One Year Away? In 2011, researchers at the Complex Systems Institute (CSI)...

Prediction: Global Riots One Year Away?

In 2011, researchers at the Complex Systems Institute (CSI) released a paper [1] presenting a model for understanding (and ultimately predicting) the social unrest that rocked countries such as Tunisia, Libya, and Egypt [2].  Of the data analyzed, the principal factor influencing said unrest was determined to be the food price index.

That's a pretty simple concept.  If one of your most basic needs was threatened, what would you do?  To quote the MIT Technology Review's explanation of the paper [3], “This isn't rocket science. It stands to reason that people become desperate when food is unobtainable. It's often said that any society is three square meals from anarchy.”

These models have other complex implications around the world, such as in the financial markets.  Another paper from 2010, titled “Predicting economic market crises using measures of collective panic” [4], shows that the economic crisis (and other singe-day panics in the market) in the United States were predictable events that relied on the relatively volatile sociological phenomenon of uncertainty and nervousness -- which makes some of the original paper's assertions even more interesting.  Most notably:

“Both factors in food prices can be linked directly to recent US governmental actions. Speculator activity has been enhanced by deregulation of the commodities markets that exempted dealers from trading limits, and subsidies and other policies have been central to the growth of ethanol conversion.”

Food for thought.

[1]: http://arxiv.org/pdf/1108.2455v1.pdf
[2]: http://www.globalissues.org/article/792/mideast-north-africa-unrest
[3]: http://www.technologyreview.com/view/425019/the-cause-of-riots-and-the-price-of-food/
[4]: http://arxiv.org/pdf/1102.2620v1.pdf

Attachments

We Are Now One Year Away From Global Riots, Complex Systems Theorists Say | Motherboard

What’s the number one reason we riot? The plausible and justifiable motivations of trampled-upon humanfolk are many—poverty, oppression, disenfranchisement, etc—but the big one is more primal than any...

1 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Prediction: Global Riots One Year Away? In 2011, researchers at the Complex Systems Institute (CSI)...

Prediction: Global Riots One Year Away?

In 2011, researchers at the Complex Systems Institute (CSI) released a paper [1] presenting a model for understanding (and ultimately predicting) the social unrest that rocked countries such as Tunisia, Libya, and Egypt [2].  Of the data analyzed, the principal factor influencing said unrest was determined to be the food price index.

That's a pretty simple concept.  If one of your most basic needs was threatened, what would you do?  To quote the MIT Technology Review's explanation of the paper [3], “This isn't rocket science. It stands to reason that people become desperate when food is unobtainable. It's often said that any society is three square meals from anarchy.”

These models have other complex implications around the world, such as in the financial markets.  Another paper from 2010, titled “Predicting economic market crises using measures of collective panic” [4], shows that the economic crisis (and other singe-day panics in the market) in the United States were predictable events that relied on the relatively volatile sociological phenomenon of uncertainty and nervousness -- which makes some of the original paper's assertions even more interesting.  Most notably:

“Both factors in food prices can be linked directly to recent US governmental actions. Speculator activity has been enhanced by deregulation of the commodities markets that exempted dealers from trading limits, and subsidies and other policies have been central to the growth of ethanol conversion.”

Food for thought.

[1]: http://arxiv.org/pdf/1108.2455v1.pdf
[2]: http://www.globalissues.org/article/792/mideast-north-africa-unrest
[3]: http://www.technologyreview.com/view/425019/the-cause-of-riots-and-the-price-of-food/
[4]: http://arxiv.org/pdf/1102.2620v1.pdf

Attachments

We Are Now One Year Away From Global Riots, Complex Systems Theorists Say | Motherboard

What’s the number one reason we riot? The plausible and justifiable motivations of trampled-upon humanfolk are many—poverty, oppression, disenfranchisement, etc—but the big one is more primal than any...

8 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Prediction: Global Riots One Year Away? In 2011, researchers at the Complex Systems Institute (CSI)...

Prediction: Global Riots One Year Away?

In 2011, researchers at the Complex Systems Institute (CSI) released a paper [1] presenting a model for understanding (and ultimately predicting) the social unrest that rocked countries such as Tunisia, Libya, and Egypt [2].  Of the data analyzed, the principal factor influencing said unrest was determined to be the food price index.

That's a pretty simple concept.  If one of your most basic needs was threatened, what would you do?  To quote the MIT Technology Review's explanation of the paper [3], “This isn't rocket science. It stands to reason that people become desperate when food is unobtainable. It's often said that any society is three square meals from anarchy.”

These models have other complex implications around the world, such as in the financial markets.  Another paper from 2010, titled “Predicting economic market crises using measures of collective panic” [4], shows that the economic crisis (and other singe-day panics in the market) in the United States were predictable events that relied on the relatively volatile sociological phenomenon of uncertainty and nervousness -- which makes some of the original paper's assertions even more interesting.  Most notably:

“Both factors in food prices can be linked directly to recent US governmental actions. Speculator activity has been enhanced by deregulation of the commodities markets that exempted dealers from trading limits, and subsidies and other policies have been central to the growth of ethanol conversion.”

Food for thought.

[1]: http://arxiv.org/pdf/1108.2455v1.pdf
[2]: http://www.globalissues.org/article/792/mideast-north-africa-unrest
[3]: http://www.technologyreview.com/view/425019/the-cause-of-riots-and-the-price-of-food/
[4]: http://arxiv.org/pdf/1102.2620v1.pdf

Attachments

We Are Now One Year Away From Global Riots, Complex Systems Theorists Say | Motherboard

What’s the number one reason we riot? The plausible and justifiable motivations of trampled-upon humanfolk are many—poverty, oppression, disenfranchisement, etc—but the big one is more primal than any...

8 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.