The new EricMartindale.com is an experiment in data aggregation, and might have a few bugs. Feel free to explore, and then provide feedback directly to @martindale.

search results for online games

Choosing A Medium For Your Online Role Playing Game

Running a role playing game online presents a large of amount of flexibility in the way you run the game. You no longer need individual sessions where all players are present, and there are a plethora of options as to where you are going to run it - if you want to run it in any one place.

One of the number one questions I receive relates to the medium for online RPGs. There are tons of different ways of communicating online, mainly grouped into a few categories. We have instant messenger, chats, message boards, and emails. There are a few custom services out there, but I'm going to touch on the four that I've mentioned.

On RolePlayGateway, we have a set of roleplaying forums as well as a roleplaying chat. When you're running an RPG, there are a few items you should consider when deciding where you're going to keep everything.

Forums have the benefit of being static and always available - users can post to forums at any time during the day and be sure that other users (and roleplayers) can see their message. Forums are also very flexible, they allow you to embed images and other multimedia within your posts, allowing you to share any experience with your players. However, it is post based - forums are often not the quickest way to communicate, as it is not a live feed of information like a chat.

Chats, on the other hand, have the benefit of being real time. Games can be run in chat (and instant messenger) on a moment's notice, and work best when all of the players can be available at the same time. Because it is real time, short blip-based sessions such as character conversations and interactions work extraordinarily well with chats. Players can get the chance to interject into other player's actions and statements without the worry of too much time going by. It is for this reason that the longer posts, such as those that exceed a paragraph, are often too large and unwieldy for chats - players end up waiting too long for each post, and will get bored.

Longer posts do very well on forums, where writing an individual post can take half an hour or longer to refine and perfect - just enough time for the players to go look at other games and other topics before they come back and begin formulating their response.

If you're running a game with a detailed and/or complicated storyline or characters, it is always good to post something on a forum for player reference. This lets the players have a place to communicate out of character (OOC) - such as when they won't be able to make a chat session, or when they want to discuss plans for character interaction, growth, or development. Even if your game is already on a forum - it is a good idea to create a place for OOC discussion. For chat-based games - this gives a perfect opportunity for players to jump in at the middle of a game with little trouble, as they simply need to read over the history of the game on the forum, which they can do at any point in time, and less time is needed explaining the game to the player.

Instant messenger works well when dealing with one on one sessions, such as when two characters are the only ones in an interaction or a meeting needs to be private. These interactions can be summarized or written into a cinematic format and then posted to the forum, for other players to enjoy as well. Instant messenger (as well as Private Messages) does very well at asking questions of the other players, which is convenient when you have a question about how they're playing a role or a reference they made in character.

There are also emails - many games aren't run by email anymore, but email is still a very valuable tool. RolePlayGateway like many forums offers you the ability to subscribe to topics. Subscriptions will let you receive an immediate email update whenever someone replies to the thread. This is extraordinarily helpful when there's an RPG with only a few players that can only reply every once in a while, but it requires that people, y'know, actually check their email. RolePlayGateway also has the special ability to instant message you when there's an update to a subscribed thread. All you need is a Jabber account (GMail accounts work, too) and to set up the notifications. We'll send you a message as soon as there's an update.

What methods have you used to manage your online roleplaying games? Are you a fan of forum or chat? Both? What helps you determine where you're going to hold your game? Discuss!

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

The Great Gamer Championship

Jayme and I have decided to determine which one of us is the best at playing games.  We're in the process of choosing the games to be played to determine the best of the best.  (Or atleast between us two.)  We're trying to get an equal amount of games on both the console and the PC, since he's a console gamer, and I'm a PC gamer.  The winner of this will get bragging rights an' all that, but I think we'll need to write an agreement of some sort stating that the winner is final, no bitching about how the choices of games are sucky, and how lag killed you, and that when entering, you agree that it is FINAL.  So yeah.  Here's what we have so far, and by no means is this list final:

FPS (Console):  Halo 2 (XBOX)
RTS (PC): Starcraft w/ Expansion

Fighter (Console):  Guilty Gear (X or XX) - (Playstation/PS2) 
Simulation (PC): Mechwarrior 4:Mercenaries w/ MekTek's MekPak 3
Sports (PC?): Pong
Puzzle (Console): Tetris
Arcade (Arcade): Initial D v3+  -OR-  DDR

So that's a tally of 7 games so far, 3 console, 3 PC, and one arcade.   Of course,  I'd like to have two more, including a FPS for the PC, such as Unreal Tournament... and an additional game on the console to account for this.  Perhaps a 3D Fighter such as Tekken 4/5, Mortal Combat: Deception/Deadly Alliance, or King Of Fighters: Maximum Impact?

We'll see.

--
Eric Martindale
IT Professional
Admin of GWing.net

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

What I Do In My Spare Time...

Between work, my social life, and training, I play a game called EVE Online. It's the first game I've ever shelled out a monthly fee for, and it's well worth it. I came across this fan-made video for one of the in-game factions on CrazyKinux's blog.

Full screen this and play it in HD, while keeping in mind that this is made entirely of recorded gameplay video.

I'm the director of a group of players (called a "Corporation" as opposed to "Guild" in other MMORPGs), and if you're interested in playing with me, shoot me a line or message me in game as "Baeryn". You'll never find a game so perfect.

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Of Space, War, and Virtual Reality +CCP Games has always been on the right track with their most successful...

Of Space, War, and Virtual Reality
+CCP Games has always been on the right track with their most successful project, the single-server, fully persistent world of +EVE Online.  Having launched +DUST 514 as an extension that exists within the same game world, CCP has raised the bar of innovation already, and continues to carve out territory with the announcement of +EVE: Valkyrie.

Valkyrie is a virtual reality game originally designed for +Oculus VR [1].  If you're not familiar with Oculus, they're the makers of the Oculus Rift. The Rift is a 3D display device that you wear like a pair of glasses, and literally move your head to look around the space.  This interaction makes it feel like you are actually in the virtual space, and represents a huge step forward in immersion.

What interests me most about EVE is the fact that it's a truly alternative reality; a simulated universe, of which only one exists, and to which there will never be a sequel or a "version 2".  CCP has committed to simply improve the game over time rather than ever introduce an "EVE 2", building the universe iteratively over the past 10 years.   This means that the time you invest in the alternative reality has a degree of permanence and importance, rather than the transience and fragmentation of other sharded universes.

Let's hope this integrates directly into the EVE Universe, in the capacity of participating in actual fights, and not just "conquer this asteroid field to make it available to EVE players".  Anything less would be a grave disappointment and moreover, a potentially critical business mistake as the two games, EVE Online and Valkyrie, operate in the same space.

Either way, I'm looking forward to seeing how this pans out.

[1]: EVE-VR: Fanfest Trailer

Attachments

EVE: Valkyrie Announcement Trailer

EVE: Valkyrie (formerly EVE-VR) is a multiplayer dogfighting shooter set in the EVE universe that uses virtual reality to give players the sense of being a r...

3 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Of Space, War, and Virtual Reality +CCP Games has always been on the right track with their most successful...

Of Space, War, and Virtual Reality
+CCP Games has always been on the right track with their most successful project, the single-server, fully persistent world of +EVE Online.  Having launched +DUST 514 as an extension that exists within the same game world, CCP has raised the bar of innovation already, and continues to carve out territory with the announcement of +EVE: Valkyrie.

Valkyrie is a virtual reality game originally designed for +Oculus VR [1].  If you're not familiar with Oculus, they're the makers of the Oculus Rift. The Rift is a 3D display device that you wear like a pair of glasses, and literally move your head to look around the space.  This interaction makes it feel like you are actually in the virtual space, and represents a huge step forward in immersion.

What interests me most about EVE is the fact that it's a truly alternative reality; a simulated universe, of which only one exists, and to which there will never be a sequel or a "version 2".  CCP has committed to simply improve the game over time rather than ever introduce an "EVE 2", building the universe iteratively over the past 10 years.   This means that the time you invest in the alternative reality has a degree of permanence and importance, rather than the transience and fragmentation of other sharded universes.

Let's hope this integrates directly into the EVE Universe, in the capacity of participating in actual fights, and not just "conquer this asteroid field to make it available to EVE players".  Anything less would be a grave disappointment and moreover, a potentially critical business mistake as the two games, EVE Online and Valkyrie, operate in the same space.

Either way, I'm looking forward to seeing how this pans out.

[1]: EVE-VR: Fanfest Trailer

Attachments

EVE: Valkyrie Announcement Trailer

EVE: Valkyrie (formerly EVE-VR) is a multiplayer dogfighting shooter set in the EVE universe that uses virtual reality to give players the sense of being a r...

11 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Of Space, War, and Virtual Reality +CCP Games has always been on the right track with their most successful...

Of Space, War, and Virtual Reality
+CCP Games has always been on the right track with their most successful project, the single-server, fully persistent world of +EVE Online.  Having launched +DUST 514 as an extension that exists within the same game world, CCP has raised the bar of innovation already, and continues to carve out territory with the announcement of +EVE: Valkyrie.

Valkyrie is a virtual reality game originally designed for +Oculus VR [1].  If you're not familiar with Oculus, they're the makers of the Oculus Rift. The Rift is a 3D display device that you wear like a pair of glasses, and literally move your head to look around the space.  This interaction makes it feel like you are actually in the virtual space, and represents a huge step forward in immersion.

What interests me most about EVE is the fact that it's a truly alternative reality; a simulated universe, of which only one exists, and to which there will never be a sequel or a "version 2".  CCP has committed to simply improve the game over time rather than ever introduce an "EVE 2", building the universe iteratively over the past 10 years.   This means that the time you invest in the alternative reality has a degree of permanence and importance, rather than the transience and fragmentation of other sharded universes.

Let's hope this integrates directly into the EVE Universe, in the capacity of participating in actual fights, and not just "conquer this asteroid field to make it available to EVE players".  Anything less would be a grave disappointment and moreover, a potentially critical business mistake as the two games, EVE Online and Valkyrie, operate in the same space.

Either way, I'm looking forward to seeing how this pans out.

[1]: EVE-VR: Fanfest Trailer

Attachments

EVE: Valkyrie Announcement Trailer

EVE: Valkyrie (formerly EVE-VR) is a multiplayer dogfighting shooter set in the EVE universe that uses virtual reality to give players the sense of being a r...

3 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Of Space, War, and Virtual Reality +CCP Games has always been on the right track with their most successful...

Of Space, War, and Virtual Reality
+CCP Games has always been on the right track with their most successful project, the single-server, fully persistent world of +EVE Online.  Having launched +DUST 514 as an extension that exists within the same game world, CCP has raised the bar of innovation already, and continues to carve out territory with the announcement of +EVE: Valkyrie.

Valkyrie is a virtual reality game originally designed for +Oculus VR [1].  If you're not familiar with Oculus, they're the makers of the Oculus Rift. The Rift is a 3D display device that you wear like a pair of glasses, and literally move your head to look around the space.  This interaction makes it feel like you are actually in the virtual space, and represents a huge step forward in immersion.

What interests me most about EVE is the fact that it's a truly alternative reality; a simulated universe, of which only one exists, and to which there will never be a sequel or a "version 2".  CCP has committed to simply improve the game over time rather than ever introduce an "EVE 2", building the universe iteratively over the past 10 years.   This means that the time you invest in the alternative reality has a degree of permanence and importance, rather than the transience and fragmentation of other sharded universes.

Let's hope this integrates directly into the EVE Universe, in the capacity of participating in actual fights, and not just "conquer this asteroid field to make it available to EVE players".  Anything less would be a grave disappointment and moreover, a potentially critical business mistake as the two games, EVE Online and Valkyrie, operate in the same space.

Either way, I'm looking forward to seeing how this pans out.

[1]: EVE-VR: Fanfest Trailer

Attachments

EVE: Valkyrie Announcement Trailer

EVE: Valkyrie (formerly EVE-VR) is a multiplayer dogfighting shooter set in the EVE universe that uses virtual reality to give players the sense of being a r...

3 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Gaming for Science Who says gaming is a waste of time?? I'm not sure that the author of the story knows...

Gaming for Science

Who says gaming is a waste of time?? I'm not sure that the author of the story knows much about gaming though - he probably should have said WoW instead of D&D...

Attachments

Online gamers crack AIDS enzyme puzzle | The Raw Story

By Agence France-Presse Sunday, September 18th, 2011 -- 2:41 pm. Print. Tags: building blocks of proteins, human immunodeficiency virus, immunodeficiency virus hiv. PARIS — Online gamers have achieved...

1 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Gaming for Science Who says gaming is a waste of time?? I'm not sure that the author of the story knows...

Gaming for Science

Who says gaming is a waste of time?? I'm not sure that the author of the story knows much about gaming though - he probably should have said WoW instead of D&D...

Attachments

Online gamers crack AIDS enzyme puzzle | The Raw Story

By Agence France-Presse Sunday, September 18th, 2011 -- 2:41 pm. Print. Tags: building blocks of proteins, human immunodeficiency virus, immunodeficiency virus hiv. PARIS — Online gamers have achieved...

1 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Gaming for Science Who says gaming is a waste of time?? I'm not sure that the author of the story knows...

Gaming for Science

Who says gaming is a waste of time?? I'm not sure that the author of the story knows much about gaming though - he probably should have said WoW instead of D&D...

Attachments

Online gamers crack AIDS enzyme puzzle | The Raw Story

By Agence France-Presse Sunday, September 18th, 2011 -- 2:41 pm. Print. Tags: building blocks of proteins, human immunodeficiency virus, immunodeficiency virus hiv. PARIS — Online gamers have achieved...

1 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Gaming for Science Who says gaming is a waste of time?? I'm not sure that the author of the story knows...

Gaming for Science

Who says gaming is a waste of time?? I'm not sure that the author of the story knows much about gaming though - he probably should have said WoW instead of D&D...

Attachments

Online gamers crack AIDS enzyme puzzle | The Raw Story

By Agence France-Presse Sunday, September 18th, 2011 -- 2:41 pm. Print. Tags: building blocks of proteins, human immunodeficiency virus, immunodeficiency virus hiv. PARIS — Online gamers have achieved...

1 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Same Old Story

You know what I hate? Seeing the same story over the course of a few weeks as multiple blogs cover the same "hot" story. Case in point? Starcraft Origami.

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

A Brief History of Freeform Roleplay

Warning: Strong nerdery follows. Please be cautious of your fragile mind.

Since late 1997, in all of my pre-teen glory, I have been involved with something my friends and I simply called roleplay in our own little vernacular. Of course I've since learned that roleplay doesn't only refer to the peer-driven world of online roleplay, it refers to all sorts of real-world tabletop games, live acting, and various amounts of storytelling, but this particular post is written with the word roleplay referring to the freeform online roleplaying that I have always been so close to.

Freeform roleplay, or the idea that there is no GM (game master) or storyteller (as in Vampire: The Masquerade), and is instead driven solely by the players, with no concrete rules for battle, statistics, or progression of the story. Rules and guidelines were driven by common expectation, which developed as a sort of social justice system that remains effective, even today.

The very roots of this sort of roleplay stem from early chat systems, where one could adopt a simple moniker and create a personality around the idea of an "avatar", which in most cases consisted only of this name. Players, without defining themselves as such, would interact in an imaginative world that coalesced out of their collaborative imagination. Each would react to the other characters' actions and dialogue in a fashion that suited their own character's theoretical personality, and this would create a constantly evolving story arc.

As the web (and the young teen's perception of the web) evolved and grew, so did the concept of roleplay. Online forums became an entirely new beast, allowing users to write more and more into their in character posts, instead of being limited to the single lines that chat provided (of course, some chats had enough space for people to post a full paragraph, or even two - but this was limited at the time), they were able to expound upon their writing and even proofread their copy before sending it across the web for the other players to view.

Freeform roleplay had also grown to be very competitive at this point, with groups of players forming groups known as clans, guilds, or otherwise, and expanded their IC competitions from chat to the forums and message boards now provided by a few enterprising organizations (or individuals). It was this competitive banter and challenge that defined what many now call the golden age of roleplay, which is what really drove the forefront of this gaming medium.

There were plenty of players who had entered their late teens (and some even were adults at this point, gasp!) who moved away from chat, and who moved away from the conflict-driven world of this type of roleplay. They went on to create storyline-oriented games, with a small and select number of players in more of a collaborative fiction setting. These players often went on to become writers and editors, being driven more by the literary aspect of relaying a fiction onto the internet, and often have their own private niche where they can continue to do this with their long-standing playergroup.

And... that's where we are today. The freeform roleplay community is growing and changing, barely 15 years old at this point. We have the chance to nurture it, just as we have the chance to neglect it. Those of us who've been involved since the beginning have the greatest opportunity to influence the course of growth, and that's exactly what I'm hoping to do.

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Going Viral: A Guide

While marketing RolePlayGateway, one of the things we considered was the "virality" of our approach. Viral marketing is any marketing technique that induces Web sites or users to pass on a marketing message to other sites or users, creating a potentially exponential growth in the message's visibility and effect. We're going to guide you on the road to a truly viral campaign.

A successful viral push can be launched simply by following three simple rules.

  1. Don't spend everything you have on a single campaign.
  2. Don't rely entirely on one vehicle of viral marketing.
  3. Be different from everyone else; stand out.

While we're not nearly viral enough, part of our success so far has been the evangelism of our passionate users. And there you have it, one of the most important keys to successful viral marketing:

Passion: Users who are passionate about your service, your community, or your site. They will propagate, they will evangelize, and ultimately will generate more passionate users who will do the same thing for you. Dawn Anfuso calls these members Boomers - and it is important to not ignore them.

Make it easy for your users to share. Make it hard for them NOT to share. Add a feature on your site that encourages them to send an email to their friends about the service. Add blocks where they can copy and paste code straight to their social profiles on sites like MySpace, Facebook, and Bebo. Jeanne Jennings wrote an amazing article on Optimizing the "E-mail This" Marketing Opportunity, and I'd recommend you read it and implement the things you learn from it.

Widgetize: On that note, we arrive on one of our most powerful vehicles for viral marketing: Widgets. The list of sites that you can infect with widgets are endless. From iGoogle to individual sites, widgets encourage users to put your tool on their page. Be sure to incorporate other techniques here: Include encouragement to share it. Make it easy to post elsewhere and share.

One of the items that RolePlay Gateway could utilize to great success is the concept of game trailers. Many of the games on RPGateway are text-based, and have no real graphics. However, most of these games have amazing storylines, storylines which could be utilized to hitch audiences, or at least entertain them. Flash-based videos, or trailers, with pivotal content, captivating video and audio, and viral marketing elements such as "Email this!" or "Share This", would be an amazing leap forward. Take a look at how YouTube's video player works. Such trailers could even be uploaded to social networking sites, like YouTube and Google Video, and shared to millions of users with a touch of viral marketing magic.

Juice It Up: Include your URL everywhere you go. Facebook, MySpace. Everywhere. This generates user authority, even if the site you are on has nothing at all to do with your target market. Cross sections are a beautiful thing, and even if you don't get a drop of link juice in comments, market saturation is a very important, yet delicate, part of viral marketing.

Maintain a presence on every social networking site you can sustain. Extend your campaign to all of them. Create social groups for each of these sites, and publicize them. The more targets you hit, just like investing, the less committed you are to that particular market. Your assets are distributed, and while the workload may be unfathomably difficult (keeping up with so many social networking sites sucks... that's why we have ProfileLinker), the potential for success is incredible.

Reward: Another option is to provide tangible rewards for marketing. This can be in the form of prizes, such as in a contest, or to individual users. Incentives are very powerful, and drive many users to promote where they'd be otherwise apathetic. Things can be very simple, such as giving them tokens or credits, to very expensive, such as providing real cash per referral. This is probably the most effective, albeit expensive, method of encouraging users to infect others.

Don't Stop. Don't set these actions in motion and then hope they work. Get involved. Comment on profiles. Reply to messages. Enhance your viral effect. Make it tangible. If users can see that there is a real person there, they will be a lot more enthusiastic and encouraged to participate, and your viral marketing campaign will be more successful.

Other Resources!!! Web Marketing Today has an amazing list of resource articles that are sure to help you build your campaign.

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

<a href="http://games.yahoo.com/blogs/plugged-in/online-gamers-crack-aids-enzyme-puzzle-161920724.html" class="ot-anchor">http://games.yahoo.com/blogs/plugged-in/online-gamers-crack-aids-enzyme-puzzle-161920724.html</a>... in reply to

http://games.yahoo.com/blogs/plugged-in/online-gamers-crack-aids-enzyme-puzzle-161920724.html

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

“You want to be in the tech game, because in time it will be the only game in town.” — +Justin Kan ...

“You want to be in the tech game, because in time it will be the only game in town.”+Justin Kan

This is a spectacular article written from the perspective of recognizing the fundamental paradigm shift that the Internet has introduced to humanity.

Attachments

Maybe we're in a bubble but it doesn't matter by Justin Kan

Author: Justin Kan, Content: Lots of people are saying we are in a bubble. The IPO market caps for Groupon and Zynga are too high. The purchase price for Instagram is too high. Early stage valuations...

9 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

“You want to be in the tech game, because in time it will be the only game in town.” — +Justin Kan ...

“You want to be in the tech game, because in time it will be the only game in town.”+Justin Kan

This is a spectacular article written from the perspective of recognizing the fundamental paradigm shift that the Internet has introduced to humanity.

Attachments

Maybe we're in a bubble but it doesn't matter by Justin Kan

Author: Justin Kan, Content: Lots of people are saying we are in a bubble. The IPO market caps for Groupon and Zynga are too high. The purchase price for Instagram is too high. Early stage valuations...

1 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

“You want to be in the tech game, because in time it will be the only game in town.” — +Justin Kan ...

“You want to be in the tech game, because in time it will be the only game in town.”+Justin Kan

This is a spectacular article written from the perspective of recognizing the fundamental paradigm shift that the Internet has introduced to humanity.

Attachments

Maybe we're in a bubble but it doesn't matter by Justin Kan

Author: Justin Kan, Content: Lots of people are saying we are in a bubble. The IPO market caps for Groupon and Zynga are too high. The purchase price for Instagram is too high. Early stage valuations...

1 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

“You want to be in the tech game, because in time it will be the only game in town.” — +Justin Kan ...

“You want to be in the tech game, because in time it will be the only game in town.”+Justin Kan

This is a spectacular article written from the perspective of recognizing the fundamental paradigm shift that the Internet has introduced to humanity.

Attachments

Maybe we're in a bubble but it doesn't matter by Justin Kan

Author: Justin Kan, Content: Lots of people are saying we are in a bubble. The IPO market caps for Groupon and Zynga are too high. The purchase price for Instagram is too high. Early stage valuations...

9 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

The Weekend

I just found an awesome list of Open source applications for Windows, and thought I'd take the time to update.

I think I'm sick or getting sick from the weekend, which was awesome all in itself. Rode over to Ian's on Saturday, enjoyed a good night with some new friends, playing Unreal Tournament (the original, what else?) until somewhere around 3AM. Ah, good times. I woke up the next day in time to give Amber a call before she left for work. We got to gaming shortly after lunch, and for once, our ship didn't esplode! (partly because we left it behind for the majority of the game...)

Sunday we relaxed and watched football, both American and World. Poor poor Chelsea! I ended up rolling in at about 4PM, and proceeded to put together some home cooking for when Amber got off work. Unfortunately, my plans were foiled by her work schedule, and she got off at six instead of the planned five, denying us the opportunity of going to the park to eat while the sun set. We enjoyed ourselves nonetheless, and had a good cuddly evening.

Work today was a pain, though. Internet was out, and Bellsouth took until 5PM to bring us a mediocre solution. One of our major clients was having email problems, which I couldn't troubleshoot until the internet was up. Pity.

And, now I come home, GWing is having some people problems, and the GT League is bumbling along as usual. Now, about that roleplaying social reform...

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Eve Online Roleplaying: Journaling

I've always loved Eve Online. It's a space MMO, with ridiculous levels of immersion. They tout that it's the world's largest game universe, and let me tell you - it's absolutely huge.

One of our new members has posted her intentions to work on an Eve Online Roleplaying Journal. I think this is an incredibly awesome idea. It's not new, I've seen character journals before, but it just seems to fit in with Eve's extensive world and role playing experience.

Character journaling is a great way to extend the world of a game and add more depth to both the character and the plot. Be careful that you don't fall victim to the inactivity that often plagues real journaling! Stick to it, and you'll reap the benefits of fleshing out your character and having a solid history of the thought processes involved.

Be sure to check out Emywn's Journal from Eve Online Roleplaying. It looks like it's going to be something I'm going to have to follow using my trusty Google RSS Reader. Good luck, Kethro - and thanks for the idea!

P.S.: Google Reader is an amazing tool that lets you follow your favorite sites and their content without ever checking the page. You can check out my shared items list to see what sort of things I follow, but check out the official Google Reader page for more information.

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

i just lost the game. Thanks.... in reply to

i just lost the game. Thanks.

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Its actually more affordable than you... in reply to

Its actually more affordable than you would think. I'm game.

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Might wanna try using a PPA... in reply to

Might wanna try using a PPA or buying Crossover Games

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

NC State to Appear in the Bitcoin Bowl

Congratulations to my homestate team, NC State University, for making it into the #bitcoin Bowl! The BitPay team has put in a lot of effort to make this one of the most memorable Bowl Games of all time.

Attachments

2014 Bitcoin St. Petersburg Bowl

Knights will be back in the Bay Area to #TakeoverTampaBay as they face NC State at Tropicana Field!

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

I&#39;m actually not worried too much... in reply to

I'm actually not worried too much about direct Eve integration. Sure, it'd be fun, but the physics engines aren't at all compatible at this point in time, and EVR is a great game in its own right. I'm hoping for Valkyrie to be separate for several years until the technical hurdles can be overcome such that we can fly all of our Eve vessels this way.

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Interesting, certainly a relevant application for... in reply to

Interesting, certainly a relevant application for tourists and museum visitors.  I look forward to a slightly more immersive experience, where for instance ruins are overlaid with an image of what they used to look like.  Also, I want to wear google glasses while I bike/run/walk and play a video game at the same time, so I'm exercising outside and experiencing a "new world" at the same time. When is that coming?? ;)

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

The assumption that a technical infrastructure... in reply to

The assumption that a technical infrastructure like this is directly connected to the internet for control, and is vulnerable to cyber attacks is not quite robust. Totally isolated local networks and control systems can not be hacked by cyber warfare. I find it difficult to believe critical systems will be controlled through the net.

Distributed wars fought on very large number of fronts weaken the defences of a stronger player and give an advantage to a weaker attacker. Col Blotto's game!

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Elation Insomnia

There's an amazing feeling you get when you know there is a robot in your kitchen sweeping the floor for you.

So, I get in from gaming at about 3AM this morning, and on my table is this box that my roommate brought in, because it had been delivered. I knew immediately that it was my Roomba Discovery. I have charged it up for a bit, tested it out, watched it, and now I trust it not to get stuck or break anything. Problem is, I'm way too excited to get to sleep. Hello, 5:07 - I'm going to sleep now.

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Overgrown Tokyo Begs to be an RPG Setting

I just came across an artist's work of a futuristic fantasy Tokyo that is overgrown with vegetation, and is amid reclamation by nature. Immediately, I thought that these images demanded a roleplaying game to go along with them, perhaps of the walk-through nature.

They came from a blog called Tokyo Genso (Tokyo Fantasy) - which has some altogether amazing works of art, so go check them out. :)

[gallery]

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

<span class="proflinkWrapper"><span class="proflinkPrefix">+</span><a class="proflink" href="https://plus.google.com/108505558087127895508" oid="108505558087127895508">Summer... in reply to

+Summer Rose-Gonzalez I'm game. Vegas? +Johnny Roquemore can be my best man.   #BadDecisionsBestDecisions  

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

The Age of the Tech Presentation - It's nothing new to realize that tech companies have tried to mimic...

The Age of the Tech Presentation -

It's nothing new to realize that tech companies have tried to mimic Steve Jobs' presentation style. Some fail miserably (I'm looking at you +Mark Zuckerberg .) Others do a pretty good job, like Jeff Bezos when he presented the new Kindle lineup from Amazon. The trend has me wondering two things, though:

1) How much strategy goes into timing these announcements, particularly when rumors of other announcements are floating around? For example, is there a reason Amazon went just a week before Apple? If so, what was it? Just how much research goes into target dates and announcement dates when considering competitors' release schedules (or rumored release schedules?) It seems like an super-intense game of chess (or Starcraft.)

and 2) What style will Tim Cook adopt next week? Now that Steve Jobs has handed over the reins to the new CEO, will he ape Jobs' style, or will he innovate a bit? How much of Apple really is Steve Jobs, and how much can Cook make his own? Are we about to head into a new era of tech presentations? Straying from a successful formula could be dangerous, but is it necessary so that Cook can show the world that although he is not Steve Jobs, he is still the right man to carry the torch?

I'm excited to see what's in store for tech in the years to come. So many great announcements have come out this Summer/Fall. What do you expect to see from the evolution of these tech presentations?

Attachments

3 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

The Age of the Tech Presentation - It's nothing new to realize that tech companies have tried to mimic...

The Age of the Tech Presentation -

It's nothing new to realize that tech companies have tried to mimic Steve Jobs' presentation style. Some fail miserably (I'm looking at you +Mark Zuckerberg .) Others do a pretty good job, like Jeff Bezos when he presented the new Kindle lineup from Amazon. The trend has me wondering two things, though:

1) How much strategy goes into timing these announcements, particularly when rumors of other announcements are floating around? For example, is there a reason Amazon went just a week before Apple? If so, what was it? Just how much research goes into target dates and announcement dates when considering competitors' release schedules (or rumored release schedules?) It seems like an super-intense game of chess (or Starcraft.)

and 2) What style will Tim Cook adopt next week? Now that Steve Jobs has handed over the reins to the new CEO, will he ape Jobs' style, or will he innovate a bit? How much of Apple really is Steve Jobs, and how much can Cook make his own? Are we about to head into a new era of tech presentations? Straying from a successful formula could be dangerous, but is it necessary so that Cook can show the world that although he is not Steve Jobs, he is still the right man to carry the torch?

I'm excited to see what's in store for tech in the years to come. So many great announcements have come out this Summer/Fall. What do you expect to see from the evolution of these tech presentations?

Attachments

3 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

The Age of the Tech Presentation - It's nothing new to realize that tech companies have tried to mimic...

The Age of the Tech Presentation -

It's nothing new to realize that tech companies have tried to mimic Steve Jobs' presentation style. Some fail miserably (I'm looking at you +Mark Zuckerberg .) Others do a pretty good job, like Jeff Bezos when he presented the new Kindle lineup from Amazon. The trend has me wondering two things, though:

1) How much strategy goes into timing these announcements, particularly when rumors of other announcements are floating around? For example, is there a reason Amazon went just a week before Apple? If so, what was it? Just how much research goes into target dates and announcement dates when considering competitors' release schedules (or rumored release schedules?) It seems like an super-intense game of chess (or Starcraft.)

and 2) What style will Tim Cook adopt next week? Now that Steve Jobs has handed over the reins to the new CEO, will he ape Jobs' style, or will he innovate a bit? How much of Apple really is Steve Jobs, and how much can Cook make his own? Are we about to head into a new era of tech presentations? Straying from a successful formula could be dangerous, but is it necessary so that Cook can show the world that although he is not Steve Jobs, he is still the right man to carry the torch?

I'm excited to see what's in store for tech in the years to come. So many great announcements have come out this Summer/Fall. What do you expect to see from the evolution of these tech presentations?

Attachments

1 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

The Age of the Tech Presentation - It's nothing new to realize that tech companies have tried to mimic...

The Age of the Tech Presentation -

It's nothing new to realize that tech companies have tried to mimic Steve Jobs' presentation style. Some fail miserably (I'm looking at you +Mark Zuckerberg .) Others do a pretty good job, like Jeff Bezos when he presented the new Kindle lineup from Amazon. The trend has me wondering two things, though:

1) How much strategy goes into timing these announcements, particularly when rumors of other announcements are floating around? For example, is there a reason Amazon went just a week before Apple? If so, what was it? Just how much research goes into target dates and announcement dates when considering competitors' release schedules (or rumored release schedules?) It seems like an super-intense game of chess (or Starcraft.)

and 2) What style will Tim Cook adopt next week? Now that Steve Jobs has handed over the reins to the new CEO, will he ape Jobs' style, or will he innovate a bit? How much of Apple really is Steve Jobs, and how much can Cook make his own? Are we about to head into a new era of tech presentations? Straying from a successful formula could be dangerous, but is it necessary so that Cook can show the world that although he is not Steve Jobs, he is still the right man to carry the torch?

I'm excited to see what's in store for tech in the years to come. So many great announcements have come out this Summer/Fall. What do you expect to see from the evolution of these tech presentations?

Attachments

3 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

The idea that we&#39;re somehow disadvantaged... in reply to

The idea that we're somehow disadvantaged should the entire system crash, compared to our parents or grandparents, is silly and myopic. Living off the land flat out wouldn't/couldn't happen. There's simply to many people for everyone to hunt. If everyone started hunting/fishing to get food a) we'd run out of space in the forest/river shores and be killing one another for a spot b) even if we remained civilized we'd kill off everything so fast it wouldn't matter. Do you seriously think we get all those burgers by people taking care of cows... we don't... we have a whole technological industry built up around shoving as many into a small area and keeping them alive long enough that we can eat them. Chickens? Ya same thing. If it REALLY got so bad that "the grid" collapsed you're no better off than anyone else.

I have no idea how this turned into an end of the world/I can survive without a computer thread. This article isn't stating that everyone has to be in tech; only that going into tech/training/educating yourself for a world that is fully tech enabled is something you should do. He states in the second paragraph, "....and all the college kids wondering if a CS or engineering degree will pay off. To those readers: we might be in a bubble, but for you it doesn’t matter." Then in the fourth paragraph, "The truth is that the technology sector as a whole over any length of time is a positive-sum game even if the economy doesn’t grow at all..." In short, if you're looking to go into tech field you should still do it. Thanks for sharing this +Eric Martindale, good stuff!

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

The Dream Phone

I've been in the market for my dream phone for almost a year now. Products have been released left and right, but none of them seem to have the functionality that I am desiring. Okay, I admit - "phone" is a bit misleading. What I'm really looking for is a smartphone... no, not a smartphone, a digital companion.

Things I'm looking for:


  • Phone

  • Camera

  • Media Player

  • Freedom



Phone
I want a mobile phone with what has become industry standards, including the dual-mode functionality of GSM and WiFi connections. I should be able to take this phone to any service provider, and get service using this device, keeping both my number and my contacts.

Camera
I want a decent camera that gets decent lighting. While a 2 megapixel camera is about the range I'm looking for, most important is the quality of the resulting pictures. The functionality of a modern-day camera should be available, including light temperature and balance. I should be able to record video using this, as well.

Media Player
I should be able to play any format of media on this device as I can play using my home Linux box. OGG, MP3, MPEG, AVI...

Freedom
I wish to be able to install software freely, from wherever I may choose. If I choose to install emulators and play me some NES, SNES, and Sega Genesis games, I should be able to do this freely, and have the necessary hardware resources to do this. I want to be able to make changes to my device's software at any point in time. I should be able to sync my calendar, to do list, and contacts with my choice of repositories.


I'll grow and review this as necessary. Until then, the Apple iPhone looks bitterly disgusting, while the Motorola Q's use of Windows continues to push me away.

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

The Best Play-by-Post Roleplaying Sites

As many of you know, a lot of my best friends came from an online hobby called "online roleplaying". One of the more popular forms is a type of collaborative fiction called "play by post", in which the participants alternate writing sections of the story. More succinctly; I started a roleplaying site of my own in 2005 called RolePlayGateway to give people the same opportunity I had when I was younger.

I wanted to take a moment and go over some of my favorites, for those who are reading.

RolePlayGateway: an obvious favorite. It takes a little while to find your place (if you're a more 'advanced' roleplayer), but our strength is the wide range of people that play here. Oh, and we have an awesome chat built specifically for roleplaying!

Roleplayer Guild: Run by Dan Neumann, Roleplayer Guild is as close to a sister site of RolePlayGateway as it gets. They've got a slightly different format from RolePlayGateway, letting you browse roleplays based on their "quality" level (e.g., Beginner, Intermediate, Advanced). A great place to go if you're looking to start a nice tight-knit group!

Althanas: Althanas is one of the only other large sites dedicated completely to play-by-post roleplay. I've roleplayed here for a couple years (as an anonymous account!) and they're a great group. The "Guides" sections is irreplaceable, so if you're looking to learn, this is the place to be.

Up and coming!

These sites are new or are just getting off the ground, so they're not as established as the above listings.

Roleplaygetaway: launched as a refuge from the insanity that RolePlayGateway provides, RolePlayGetaway (albeit, a confusing name) is showing a lot of promise. With a brand new roleplaying system built to track your roleplays, it is taking the same route that RolePlayGateway's fabled roleplay tab is taking. It's being run by several of my staff members and close friends, and I can attest that they know what they are doing. I hope to see more sites like this!

Fallen off my list...

These sites used to show some promise, but for some reason or another have fallen by the wayside. As such, I'm rel="nofollow"'ing their links.

AnimeLeague: AnimeLeague appears to have gone the way of AnimeMetro; that is, it has begun to focus more on Anime and conventions instead of roleplay. Sadface! Gaia Online: Gaia Online used to be a fairly decent place for play-by-post roleplay, but then it got uber popular. It too is now expanding beyond play-by-post, and the focus has been lost.

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

I am never anonymous. I never... in reply to

I am never anonymous. I never act online without some sort of name attached, be it my real name or a variation on 'mandrill'. Anonymity online is a myth, people can find out who you are if they're determined enough so what's the point?

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Yes I am also agreed with... in reply to

Yes I am also agreed with this post that “Education must be Open source and Free for all”; there are many potential students who are not able to get proper education because of high Tuition fees. However recently one of my friend got online Life experience degree from his professional Experience , This Good thing which universities have started to offer. You can more info here http://www.usauniversitiesonline.com/degree/awarding-honorary-doctorate-degree/  or you can Google it about online life experience degree.

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

CommunitySpark: Online Community Building

One of my favorite blogs is run by Martin Reed, and it's about online community building. He's really onto something here, and it's a shame there aren't more blogs out there on the topic (ahem, nudge nudge, wink wink). His content is top notch, and it relates directly to what it is that I do with my sites, particularly RolePlayGateway.

Just today he posted an article on active forum members and their value, and I'll be damned if I didn't forward that article to two teams on RolePlayGateway. And then I submitted it to StumbleUpon for good measure! Keep up the good work, Martin!

Does anyone know of any blogs about online community building? Please, share!

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Share if you oppose "Booberday," the G+ meme of sharing photographs of cleavage. It's demeaning, and...

Share if you oppose "Booberday," the G+ meme of sharing photographs of cleavage.

It's demeaning, and it is precisely the gateway to harassment that drives women away from online communities. We have a responsibility as early adopters to create a respectful, caring community where everyone feels welcome. If it is acceptable in a community to post a photograph of cleavage, it becomes okay to comment on it with sexual jokes, then to comment on a photograph of a woman in the G+ community with a sexual joke, and then with sexual comments that are not jokes. If left unchecked, an online community that tolerates harassment against women can become dangerous for women, professionally and physically: http://www.guardian.co.uk/world/2007/apr/06/gender.blogging.

When I commented on +Robert Scoble's post disagreeing with his participation, there were two primary reponses: (1) telling me to relax because it was just a single post of a woman who consented and (2) explaining that the purpose is breast cancer awareness. I normally wouldn't get upset about a single poster, but when my stream went from a thoughtful, respectful community to 2/3 animated gifs of breasts, I think I have reason to warn people: this isolates women and will cause them to leave. And this is not about breast cancer awareness, this is an excuse to share photographs of breasts without being derided as a pervert; if there ever was a component related to breast cancer awareness, that was lost the moment that the photographs were directed to excitement, rather than to the collection of research dollars (immediately?).

+Robert Scoble, I expected more from a public figure than to join in with a concept that degrades the quality of this budding community. You have one of the highest follower counts here, so what you endorse can dramatically shift the nature of the community. As a result of your post, thousands of additional people will join in this meme next week. That participation will harm women.

Please reshare.

2 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Share if you oppose "Booberday," the G+ meme of sharing photographs of cleavage. It's demeaning, and...

Share if you oppose "Booberday," the G+ meme of sharing photographs of cleavage.

It's demeaning, and it is precisely the gateway to harassment that drives women away from online communities. We have a responsibility as early adopters to create a respectful, caring community where everyone feels welcome. If it is acceptable in a community to post a photograph of cleavage, it becomes okay to comment on it with sexual jokes, then to comment on a photograph of a woman in the G+ community with a sexual joke, and then with sexual comments that are not jokes. If left unchecked, an online community that tolerates harassment against women can become dangerous for women, professionally and physically: http://www.guardian.co.uk/world/2007/apr/06/gender.blogging.

When I commented on +Robert Scoble's post disagreeing with his participation, there were two primary reponses: (1) telling me to relax because it was just a single post of a woman who consented and (2) explaining that the purpose is breast cancer awareness. I normally wouldn't get upset about a single poster, but when my stream went from a thoughtful, respectful community to 2/3 animated gifs of breasts, I think I have reason to warn people: this isolates women and will cause them to leave. And this is not about breast cancer awareness, this is an excuse to share photographs of breasts without being derided as a pervert; if there ever was a component related to breast cancer awareness, that was lost the moment that the photographs were directed to excitement, rather than to the collection of research dollars (immediately?).

+Robert Scoble, I expected more from a public figure than to join in with a concept that degrades the quality of this budding community. You have one of the highest follower counts here, so what you endorse can dramatically shift the nature of the community. As a result of your post, thousands of additional people will join in this meme next week. That participation will harm women.

Please reshare.

6 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Share if you oppose "Booberday," the G+ meme of sharing photographs of cleavage. It's demeaning, and...

Share if you oppose "Booberday," the G+ meme of sharing photographs of cleavage.

It's demeaning, and it is precisely the gateway to harassment that drives women away from online communities. We have a responsibility as early adopters to create a respectful, caring community where everyone feels welcome. If it is acceptable in a community to post a photograph of cleavage, it becomes okay to comment on it with sexual jokes, then to comment on a photograph of a woman in the G+ community with a sexual joke, and then with sexual comments that are not jokes. If left unchecked, an online community that tolerates harassment against women can become dangerous for women, professionally and physically: http://www.guardian.co.uk/world/2007/apr/06/gender.blogging.

When I commented on +Robert Scoble's post disagreeing with his participation, there were two primary reponses: (1) telling me to relax because it was just a single post of a woman who consented and (2) explaining that the purpose is breast cancer awareness. I normally wouldn't get upset about a single poster, but when my stream went from a thoughtful, respectful community to 2/3 animated gifs of breasts, I think I have reason to warn people: this isolates women and will cause them to leave. And this is not about breast cancer awareness, this is an excuse to share photographs of breasts without being derided as a pervert; if there ever was a component related to breast cancer awareness, that was lost the moment that the photographs were directed to excitement, rather than to the collection of research dollars (immediately?).

+Robert Scoble, I expected more from a public figure than to join in with a concept that degrades the quality of this budding community. You have one of the highest follower counts here, so what you endorse can dramatically shift the nature of the community. As a result of your post, thousands of additional people will join in this meme next week. That participation will harm women.

Please reshare.

2 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Share if you oppose "Booberday," the G+ meme of sharing photographs of cleavage. It's demeaning, and...

Share if you oppose "Booberday," the G+ meme of sharing photographs of cleavage.

It's demeaning, and it is precisely the gateway to harassment that drives women away from online communities. We have a responsibility as early adopters to create a respectful, caring community where everyone feels welcome. If it is acceptable in a community to post a photograph of cleavage, it becomes okay to comment on it with sexual jokes, then to comment on a photograph of a woman in the G+ community with a sexual joke, and then with sexual comments that are not jokes. If left unchecked, an online community that tolerates harassment against women can become dangerous for women, professionally and physically: http://www.guardian.co.uk/world/2007/apr/06/gender.blogging.

When I commented on +Robert Scoble's post disagreeing with his participation, there were two primary reponses: (1) telling me to relax because it was just a single post of a woman who consented and (2) explaining that the purpose is breast cancer awareness. I normally wouldn't get upset about a single poster, but when my stream went from a thoughtful, respectful community to 2/3 animated gifs of breasts, I think I have reason to warn people: this isolates women and will cause them to leave. And this is not about breast cancer awareness, this is an excuse to share photographs of breasts without being derided as a pervert; if there ever was a component related to breast cancer awareness, that was lost the moment that the photographs were directed to excitement, rather than to the collection of research dollars (immediately?).

+Robert Scoble, I expected more from a public figure than to join in with a concept that degrades the quality of this budding community. You have one of the highest follower counts here, so what you endorse can dramatically shift the nature of the community. As a result of your post, thousands of additional people will join in this meme next week. That participation will harm women.

Please reshare.

2 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

How To Behave On An Internet Forum

So, entirely not in light of any recent events, I was integrating the chat rules that Vexar wrote into RolePlayGateway's Rules, and I was looking for some examples of forum etiquette that other forums use. In searching, I found this perfectly humorous video:

(I found it on Neil Boortz's website, but since headed over to videojug to get the original. PS, Neil? You're awesome.)

That was probably the best one I found, above and beyond the video I came across that seemed geared towards the Steam forum community, which was a bit too NSFW to actually embed here on my blog. If you'd like, you can go check out posting a new thread on AlbinoBlackSheep.

I'm admin on several online forums, and I'm a moderator on many more; not counting the countless other communities where I'm an active member. I was pretty proud of the rules I put together on Gateway, and I think they're clean, simple, and easy to follow. No one likes being bombarded and tacked down by rules, so I try to keep them as simple as possible. What do you think of them?

How do you manage forum users and set rules? I know Martin Reed has some good tips on forum rules, and there are many others out there that learned a lot from running forums. The best thing that we can do is learn from others, and gather experience on how to handle these issues. What is your approach to forum etiquette?

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

I've just learned of a virus that was launched against the U.S. Drone Fleet. See the attached article...

I've just learned of a virus that was launched against the U.S. Drone Fleet. See the attached article from Wired.

Earlier this year, the Pentagon recently concluded that digital attacks such as this can constitute an act of war [1]. This one doesn't [yet] seem as sophisticated as last year's attack on Iran's nuclear reactors by Stuxnet [2], but it continues to show how important and integral our computer systems are in this rapidly changing world. Security professionals +Alex Levinson, +Jerome Radcliffe, and +Scott Hanselman surely have some great insight here, I highly recommend you go take a look at some of the things they've written.

In 2009, a very sophisticated [and successful] cyber-attack was launched from inside China that targeted the United States through Google and Adobe [3] that caused surprisingly few stirs within our government, especially after NATO was sent in to assist in the defense of Estonia's computer systems during the 2007 attacks [4]. Not long after this, the widely-used and [formerly] explicitly trusted RSA security mechanism, used in a large number major institutions around the world. was completely and entirely broken [5] by an embarrassingly simple hack [6].

Aside: We can look back at some of the things actual software engineers like +Ryan Dahl [7] and +Zack Morris [8] have been saying lately and quickly conclude that there's something fundamentally broken with the whole system. If you've ever worked on or with a large software project, you can see evidence of negligence and ignorance alike embedded at every level. It certainly contributes to if not causes these types of security concerns.

[1]: http://online.wsj.com/article/SB10001424052702304563104576355623135782718.html
[2]: http://www.schneier.com/blog/archives/2010/10/stuxnet.html
[3]: http://www.wired.com/threatlevel/2010/01/operation-aurora/
[4]: http://www.wired.com/politics/security/magazine/15-09/ff_estonia
[5]: http://www.computerworld.com/s/article/9214757/RSA_warns_SecurID_customers_after_company_is_hacked
[6]: http://www.zdnet.co.uk/blogs/mapping-babel-10017967/rsa-hack-targeted-flash-vulnerability-10022143/
[7]: https://plus.google.com/115094562986465477143/posts/Di6RwCNKCrf
[8]: http://zackarymorris.tumblr.com/post/10973087527/the-state-of-the-art-is-terrible

Attachments

» Exclusive: Computer Virus Hits U.S. Drone Fleet

A computer virus has infected the cockpits of America's Predator and Reaper drones, logging pilots' every keystroke as they remotely fly missions over

8 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

I've just learned of a virus that was launched against the U.S. Drone Fleet. See the attached article...

I've just learned of a virus that was launched against the U.S. Drone Fleet. See the attached article from Wired.

Earlier this year, the Pentagon recently concluded that digital attacks such as this can constitute an act of war [1]. This one doesn't [yet] seem as sophisticated as last year's attack on Iran's nuclear reactors by Stuxnet [2], but it continues to show how important and integral our computer systems are in this rapidly changing world. Security professionals +Alex Levinson, +Jerome Radcliffe, and +Scott Hanselman surely have some great insight here, I highly recommend you go take a look at some of the things they've written.

In 2009, a very sophisticated [and successful] cyber-attack was launched from inside China that targeted the United States through Google and Adobe [3] that caused surprisingly few stirs within our government, especially after NATO was sent in to assist in the defense of Estonia's computer systems during the 2007 attacks [4]. Not long after this, the widely-used and [formerly] explicitly trusted RSA security mechanism, used in a large number major institutions around the world. was completely and entirely broken [5] by an embarrassingly simple hack [6].

Aside: We can look back at some of the things actual software engineers like +Ryan Dahl [7] and +Zack Morris [8] have been saying lately and quickly conclude that there's something fundamentally broken with the whole system. If you've ever worked on or with a large software project, you can see evidence of negligence and ignorance alike embedded at every level. It certainly contributes to if not causes these types of security concerns.

[1]: http://online.wsj.com/article/SB10001424052702304563104576355623135782718.html
[2]: http://www.schneier.com/blog/archives/2010/10/stuxnet.html
[3]: http://www.wired.com/threatlevel/2010/01/operation-aurora/
[4]: http://www.wired.com/politics/security/magazine/15-09/ff_estonia
[5]: http://www.computerworld.com/s/article/9214757/RSA_warns_SecurID_customers_after_company_is_hacked
[6]: http://www.zdnet.co.uk/blogs/mapping-babel-10017967/rsa-hack-targeted-flash-vulnerability-10022143/
[7]: https://plus.google.com/115094562986465477143/posts/Di6RwCNKCrf
[8]: http://zackarymorris.tumblr.com/post/10973087527/the-state-of-the-art-is-terrible

Attachments

» Exclusive: Computer Virus Hits U.S. Drone Fleet

A computer virus has infected the cockpits of America's Predator and Reaper drones, logging pilots' every keystroke as they remotely fly missions over

1 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

I've just learned of a virus that was launched against the U.S. Drone Fleet. See the attached article...

I've just learned of a virus that was launched against the U.S. Drone Fleet. See the attached article from Wired.

Earlier this year, the Pentagon recently concluded that digital attacks such as this can constitute an act of war [1]. This one doesn't [yet] seem as sophisticated as last year's attack on Iran's nuclear reactors by Stuxnet [2], but it continues to show how important and integral our computer systems are in this rapidly changing world. Security professionals +Alex Levinson, +Jerome Radcliffe, and +Scott Hanselman surely have some great insight here, I highly recommend you go take a look at some of the things they've written.

In 2009, a very sophisticated [and successful] cyber-attack was launched from inside China that targeted the United States through Google and Adobe [3] that caused surprisingly few stirs within our government, especially after NATO was sent in to assist in the defense of Estonia's computer systems during the 2007 attacks [4]. Not long after this, the widely-used and [formerly] explicitly trusted RSA security mechanism, used in a large number major institutions around the world. was completely and entirely broken [5] by an embarrassingly simple hack [6].

Aside: We can look back at some of the things actual software engineers like +Ryan Dahl [7] and +Zack Morris [8] have been saying lately and quickly conclude that there's something fundamentally broken with the whole system. If you've ever worked on or with a large software project, you can see evidence of negligence and ignorance alike embedded at every level. It certainly contributes to if not causes these types of security concerns.

[1]: http://online.wsj.com/article/SB10001424052702304563104576355623135782718.html
[2]: http://www.schneier.com/blog/archives/2010/10/stuxnet.html
[3]: http://www.wired.com/threatlevel/2010/01/operation-aurora/
[4]: http://www.wired.com/politics/security/magazine/15-09/ff_estonia
[5]: http://www.computerworld.com/s/article/9214757/RSA_warns_SecurID_customers_after_company_is_hacked
[6]: http://www.zdnet.co.uk/blogs/mapping-babel-10017967/rsa-hack-targeted-flash-vulnerability-10022143/
[7]: https://plus.google.com/115094562986465477143/posts/Di6RwCNKCrf
[8]: http://zackarymorris.tumblr.com/post/10973087527/the-state-of-the-art-is-terrible

Attachments

» Exclusive: Computer Virus Hits U.S. Drone Fleet

A computer virus has infected the cockpits of America's Predator and Reaper drones, logging pilots' every keystroke as they remotely fly missions over

8 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

I've just learned of a virus that was launched against the U.S. Drone Fleet. See the attached article...

I've just learned of a virus that was launched against the U.S. Drone Fleet. See the attached article from Wired.

Earlier this year, the Pentagon recently concluded that digital attacks such as this can constitute an act of war [1]. This one doesn't [yet] seem as sophisticated as last year's attack on Iran's nuclear reactors by Stuxnet [2], but it continues to show how important and integral our computer systems are in this rapidly changing world. Security professionals +Alex Levinson, +Jerome Radcliffe, and +Scott Hanselman surely have some great insight here, I highly recommend you go take a look at some of the things they've written.

In 2009, a very sophisticated [and successful] cyber-attack was launched from inside China that targeted the United States through Google and Adobe [3] that caused surprisingly few stirs within our government, especially after NATO was sent in to assist in the defense of Estonia's computer systems during the 2007 attacks [4]. Not long after this, the widely-used and [formerly] explicitly trusted RSA security mechanism, used in a large number major institutions around the world. was completely and entirely broken [5] by an embarrassingly simple hack [6].

Aside: We can look back at some of the things actual software engineers like +Ryan Dahl [7] and +Zack Morris [8] have been saying lately and quickly conclude that there's something fundamentally broken with the whole system. If you've ever worked on or with a large software project, you can see evidence of negligence and ignorance alike embedded at every level. It certainly contributes to if not causes these types of security concerns.

[1]: http://online.wsj.com/article/SB10001424052702304563104576355623135782718.html
[2]: http://www.schneier.com/blog/archives/2010/10/stuxnet.html
[3]: http://www.wired.com/threatlevel/2010/01/operation-aurora/
[4]: http://www.wired.com/politics/security/magazine/15-09/ff_estonia
[5]: http://www.computerworld.com/s/article/9214757/RSA_warns_SecurID_customers_after_company_is_hacked
[6]: http://www.zdnet.co.uk/blogs/mapping-babel-10017967/rsa-hack-targeted-flash-vulnerability-10022143/
[7]: https://plus.google.com/115094562986465477143/posts/Di6RwCNKCrf
[8]: http://zackarymorris.tumblr.com/post/10973087527/the-state-of-the-art-is-terrible

Attachments

» Exclusive: Computer Virus Hits U.S. Drone Fleet

A computer virus has infected the cockpits of America's Predator and Reaper drones, logging pilots' every keystroke as they remotely fly missions over

1 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Letter Sweep

Following suit with the likes of Tim Bray and Eric Meyer, I figured I'd throw together my browser's letter sweep tonight.

  • [A]dmin Site. Yeah, I guess I would be visiting the admin panel for this. Quite frequently.
  • Mirascape's [B]log. An infrequent haunt of mine, but fairly obvious.
  • [C]MON. Cluster Monitor for MySQL Cluster, something I almost always have open.
  • Google [D]ocs. This one is painfully obvious, I use Google Docs extensively.
  • [E]ricMartindale.com. Okay, that's a gimme. Does this make me egocentric?
  • [F]acebook. I'm actually fairly ashamed of this one. Why can't I have a cool F site? sadface
  • [G]mail. Three accounts linked using Google's Multiple Sign-in. Open [almost] all day.
  • [H]ighcharts JS. A pretty kick-ass Javascript library for generating charts on the clientside.
  • [I]nternal Discussion. A site for communication with my team. :)
  • [J]Query Mobile Demo, 1.0 alpha 3. I've been spending a lot of time toying with jQuery Mobile, seeing where it's going compared to Sencha Touch.
  • [K]r.github.com. Keith Rarick's GitHub redirect. Total ass-kicker.
  • [L]inkedIn. Pretty straightforward, between hiring for our team at @Mirascape and the travel to and from various conferences and Meetups lately.
  • [M]irascape. The augmented reality platform I'm responsible for.
  • [N]oxBot. A nice PHP-powered IRC bot with various plugins. A bit out of date, but very powerful. Been using it for a couple things lately.
  • [O]K, QR Me!. A QR Code-generating link shortener I built.
  • [P]ostmark. Best Email delivery service I've used. Nice RESTful API, flat rate for emails sent.
  • [Q]uora. These guys nail Q&A, and they're doing it pretty well. Check out all their buzz, too. But for some reason, I just don't stick.
  • Google [R]eader. “From your 1,040 subscriptions, over the last 30 days you read 21,549 items, clicked 274 items, starred 853 items, shared 37 items, and emailed 8 items.” -- </stats>
  • [S]erver Stats for Mirascape. Powered by Munin, it's how I keep track of the status and metrics of all my servers.
  • [T]witter. Not surprising. I love their webapp for my personal use, but own and manage at least five accounts using SplitTweet.
  • [U]serVoice. Pretty sweet tool I use for giving the communities I manage a good way to build a consensus on what they desire most. Examples I run: for RolePlayGateway, and EVE UserVoice for EVE Online.
  • Google [V]oice. Allows me to use SMS from my computer, read (as opposed to listen to) voicemail. Great tool. If only it supported MMS.
  • [W]achovia. One of the places I do banking.
  • [X]DA Developers. An indisposable resource for getting rid of carrier-installed crap and running my own choice of software on the hardware I purchased!
  • [Y]ouTube. Another big namer. No surprise.
  • [Z]ecco. Where I trade most of my public stocks. :)

Surprisingly populist, and there's a lot of Google-owned properties in there. I'm also using Chromium, so I think it prefers the roots of the sites I visit instead of searching through my history for individual pages.

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

On the Ongoing Attacks between China, U.S., Russia, Israel, etc.… The latest round of evidence of ongoing...

On the Ongoing Attacks between China, U.S., Russia, Israel, etc.…
The latest round of evidence of ongoing digital warfare between the superpowers is now being reported in the N.Y. Times [1] after an undeniably incriminating 60-page report on the Chinese attacks on the U.S. by security firm Mandiant [2].

“Either they are coming from inside Unit 61398, or the people who run the most-controlled, most-monitored Internet networks in the world are clueless about thousands of people generating attacks from this one neighborhood.”
                                                    — Kevin Mandia

The report goes on to track individual participants in the attack, tracing them back to the headquarters of P.L.A. Unit 61398.

Attacks from the Chinese have been ongoing for many years, notably back to Operation Titan Rain [3] in 2003, in which attackers gained access to military intelligence networks at organizations such as Lockheed Martin, Sandia National Laboratories, Redstone Arsenal, and NASA [4].  Direct military targets were also included in the assault, such as the U.S. Army Information Systems Engineering Command at Fort Huachuca, Arizona, the Defense Information Systems Agency in Arlington, Virginia, the Naval Ocean Systems Center, a Defense Department installation in San Diego, California, and the U.S. Army Space and Strategic Defense installation in Huntsville, Alabama [5]. 

These ongoing attacks are labeled "Advanced Persistent Threats" or "APT" by the American Military, are considered acts of war by both the White House [6] and the Department of Defense [7] as far back as 2011, and are not unique to the Chinese origins.  You may remember the 2007 attacks on Estonia [8], which has been attributed to entities within Russian territory operating with the assistance of the Russian government [9].  These attacks disabled a wide array of Estonian government sites, rendering services in the world's most digitally-connected country unusable.  The attacks also disabled ATM machines, effectively disabling some portion of the Estonian economy.

The United States [and arguably Israel, [10]] have also been actively participating in these attacks [11] with the deploying of FLAME and Stuxnet against Iran, which made international headlines this past year when the coordinated efforts of the tools were used to disable Iranian nuclear centrifuges in an attempt to slow their progress in their nuclear program [12].  These efforts are ongoing, with the latest addition of the Gauss and Duqu malwares [13] continuing to target middle-eastern countries.

“From his first months in office, President Obama secretly ordered increasingly sophisticated attacks on the computer systems that run Iran’s main nuclear enrichment facilities, significantly expanding America’s first sustained use of cyberweapons, according to participants in the program.”
                                                    — +The New York Times

Obama reportedly went on to sign a classified directive last year [14] enabling the government to seize control of private networks, and the 2012 NDAA (National Defense Authorization Act) includes terms [15, section 954] that authorize offensive attacks on foreign threats [16].  The official United States policy already is to deem any cyberattack on the U.S. as an "act of war" [17], and it looks like these types of actions and attacks have already been made legal.

While it may once have been a subject of fiction [18], it's now and has been a harsh reality that we're in the middle of a new era in warfare, and the battles are already well-underway as countries around the world are openly engaging in offensive attacks on one another that are impacting economies on a massive scale.  I don't know what else to call this other than a world war—even the CIA's Center for the Study of Intelligence (CSI) predicted this [19], as have many others even earlier [20].  

Here's a thought; if our constitution gives us the right to bear arms, and the government deems these types of attacks as acts of war, then isn't it our right to keep and bear these arms?  Yet another case for a mass-algorate society [21], which Mr. Obama appears to agree with me on [22], at the very least.

[1]: http://www.nytimes.com/2013/02/19/technology/chinas-army-is-seen-as-tied-to-hacking-against-us.html
[2]: http://intelreport.mandiant.com/
[3]: http://en.wikipedia.org/wiki/Titan_Rain
[4]: http://www.time.com/time/nation/article/0,8599,1098371,00.html
[5]: http://www.zdnet.com/news/security-experts-lift-lid-on-chinese-hack-attacks/145763
[6]: http://www.whitehouse.gov/sites/default/files/rss_viewer/international_strategy_for_cyberspace.pdf
[7]: http://online.wsj.com/article/SB10001424052702304563104576355623135782718.html
[8]: http://en.wikipedia.org/wiki/2007_cyberattacks_on_Estonia
[9]: http://www.vedomosti.ru/smartmoney/article/2007/05/28/3004
[10]: http://www.zdnet.com/meet-gauss-the-latest-cyber-espionage-tool-7000002405/
[11]: http://www.nytimes.com/2012/06/01/world/middleeast/obama-ordered-wave-of-cyberattacks-against-iran.html?pagewanted=all
[12]: http://www.bbc.co.uk/news/technology-11388018
[13]: http://www.zdnet.com/meet-gauss-the-latest-cyber-espionage-tool-7000002405/
[14]: http://endthelie.com/2012/11/15/obama-reportedly-signs-classified-cyberwarfare-policy-directive-with-troubling-implications/#axzz2LMPlf8iA
[15]: http://www.gpo.gov/fdsys/pkg/BILLS-112hr1540enr/pdf/BILLS-112hr1540enr.pdf
[16]: http://endthelie.com/2011/12/17/approval-of-covert-offensive-cyberwar-sneakily-inserted-into-ndaa/
[17]: http://www.forbes.com/sites/reuvencohen/2012/06/05/the-white-house-and-pentagon-deem-cyber-attacks-an-act-of-war/
[18]: http://en.wikipedia.org/wiki/Neuromancer
[19]: https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/vol48no4/new_face_of_war.html
[20]: http://www.rand.org/content/dam/rand/pubs/reprints/2007/RAND_RP223.pdf
[21]: https://plus.google.com/112353210404102902472/posts/MVQXyw9EJDE
[22]: http://news.cnet.com/8301-17938_105-57569503-1/obama-endorses-required-high-school-coding-classes/

Attachments

China’s Army Is Seen as Tied to Hacking Against U.S.

An overwhelming percentage of the attacks on American companies and government agencies start in a building on the edge of Shanghai, say cybersecurity experts and American intelligence officials.

5 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

On the Ongoing Attacks between China, U.S., Russia, Israel, etc.… The latest round of evidence of ongoing...

On the Ongoing Attacks between China, U.S., Russia, Israel, etc.…
The latest round of evidence of ongoing digital warfare between the superpowers is now being reported in the N.Y. Times [1] after an undeniably incriminating 60-page report on the Chinese attacks on the U.S. by security firm Mandiant [2].

“Either they are coming from inside Unit 61398, or the people who run the most-controlled, most-monitored Internet networks in the world are clueless about thousands of people generating attacks from this one neighborhood.”
                                                    — Kevin Mandia

The report goes on to track individual participants in the attack, tracing them back to the headquarters of P.L.A. Unit 61398.

Attacks from the Chinese have been ongoing for many years, notably back to Operation Titan Rain [3] in 2003, in which attackers gained access to military intelligence networks at organizations such as Lockheed Martin, Sandia National Laboratories, Redstone Arsenal, and NASA [4].  Direct military targets were also included in the assault, such as the U.S. Army Information Systems Engineering Command at Fort Huachuca, Arizona, the Defense Information Systems Agency in Arlington, Virginia, the Naval Ocean Systems Center, a Defense Department installation in San Diego, California, and the U.S. Army Space and Strategic Defense installation in Huntsville, Alabama [5]. 

These ongoing attacks are labeled "Advanced Persistent Threats" or "APT" by the American Military, are considered acts of war by both the White House [6] and the Department of Defense [7] as far back as 2011, and are not unique to the Chinese origins.  You may remember the 2007 attacks on Estonia [8], which has been attributed to entities within Russian territory operating with the assistance of the Russian government [9].  These attacks disabled a wide array of Estonian government sites, rendering services in the world's most digitally-connected country unusable.  The attacks also disabled ATM machines, effectively disabling some portion of the Estonian economy.

The United States [and arguably Israel, [10]] have also been actively participating in these attacks [11] with the deploying of FLAME and Stuxnet against Iran, which made international headlines this past year when the coordinated efforts of the tools were used to disable Iranian nuclear centrifuges in an attempt to slow their progress in their nuclear program [12].  These efforts are ongoing, with the latest addition of the Gauss and Duqu malwares [13] continuing to target middle-eastern countries.

“From his first months in office, President Obama secretly ordered increasingly sophisticated attacks on the computer systems that run Iran’s main nuclear enrichment facilities, significantly expanding America’s first sustained use of cyberweapons, according to participants in the program.”
                                                    — +The New York Times

Obama reportedly went on to sign a classified directive last year [14] enabling the government to seize control of private networks, and the 2012 NDAA (National Defense Authorization Act) includes terms [15, section 954] that authorize offensive attacks on foreign threats [16].  The official United States policy already is to deem any cyberattack on the U.S. as an "act of war" [17], and it looks like these types of actions and attacks have already been made legal.

While it may once have been a subject of fiction [18], it's now and has been a harsh reality that we're in the middle of a new era in warfare, and the battles are already well-underway as countries around the world are openly engaging in offensive attacks on one another that are impacting economies on a massive scale.  I don't know what else to call this other than a world war—even the CIA's Center for the Study of Intelligence (CSI) predicted this [19], as have many others even earlier [20].  

Here's a thought; if our constitution gives us the right to bear arms, and the government deems these types of attacks as acts of war, then isn't it our right to keep and bear these arms?  Yet another case for a mass-algorate society [21], which Mr. Obama appears to agree with me on [22], at the very least.

[1]: http://www.nytimes.com/2013/02/19/technology/chinas-army-is-seen-as-tied-to-hacking-against-us.html
[2]: http://intelreport.mandiant.com/
[3]: http://en.wikipedia.org/wiki/Titan_Rain
[4]: http://www.time.com/time/nation/article/0,8599,1098371,00.html
[5]: http://www.zdnet.com/news/security-experts-lift-lid-on-chinese-hack-attacks/145763
[6]: http://www.whitehouse.gov/sites/default/files/rss_viewer/international_strategy_for_cyberspace.pdf
[7]: http://online.wsj.com/article/SB10001424052702304563104576355623135782718.html
[8]: http://en.wikipedia.org/wiki/2007_cyberattacks_on_Estonia
[9]: http://www.vedomosti.ru/smartmoney/article/2007/05/28/3004
[10]: http://www.zdnet.com/meet-gauss-the-latest-cyber-espionage-tool-7000002405/
[11]: http://www.nytimes.com/2012/06/01/world/middleeast/obama-ordered-wave-of-cyberattacks-against-iran.html?pagewanted=all
[12]: http://www.bbc.co.uk/news/technology-11388018
[13]: http://www.zdnet.com/meet-gauss-the-latest-cyber-espionage-tool-7000002405/
[14]: http://endthelie.com/2012/11/15/obama-reportedly-signs-classified-cyberwarfare-policy-directive-with-troubling-implications/#axzz2LMPlf8iA
[15]: http://www.gpo.gov/fdsys/pkg/BILLS-112hr1540enr/pdf/BILLS-112hr1540enr.pdf
[16]: http://endthelie.com/2011/12/17/approval-of-covert-offensive-cyberwar-sneakily-inserted-into-ndaa/
[17]: http://www.forbes.com/sites/reuvencohen/2012/06/05/the-white-house-and-pentagon-deem-cyber-attacks-an-act-of-war/
[18]: http://en.wikipedia.org/wiki/Neuromancer
[19]: https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/vol48no4/new_face_of_war.html
[20]: http://www.rand.org/content/dam/rand/pubs/reprints/2007/RAND_RP223.pdf
[21]: https://plus.google.com/112353210404102902472/posts/MVQXyw9EJDE
[22]: http://news.cnet.com/8301-17938_105-57569503-1/obama-endorses-required-high-school-coding-classes/

Attachments

China’s Army Is Seen as Tied to Hacking Against U.S.

An overwhelming percentage of the attacks on American companies and government agencies start in a building on the edge of Shanghai, say cybersecurity experts and American intelligence officials.

1 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

On the Ongoing Attacks between China, U.S., Russia, Israel, etc.… The latest round of evidence of ongoing...

On the Ongoing Attacks between China, U.S., Russia, Israel, etc.…
The latest round of evidence of ongoing digital warfare between the superpowers is now being reported in the N.Y. Times [1] after an undeniably incriminating 60-page report on the Chinese attacks on the U.S. by security firm Mandiant [2].

“Either they are coming from inside Unit 61398, or the people who run the most-controlled, most-monitored Internet networks in the world are clueless about thousands of people generating attacks from this one neighborhood.”
                                                    — Kevin Mandia

The report goes on to track individual participants in the attack, tracing them back to the headquarters of P.L.A. Unit 61398.

Attacks from the Chinese have been ongoing for many years, notably back to Operation Titan Rain [3] in 2003, in which attackers gained access to military intelligence networks at organizations such as Lockheed Martin, Sandia National Laboratories, Redstone Arsenal, and NASA [4].  Direct military targets were also included in the assault, such as the U.S. Army Information Systems Engineering Command at Fort Huachuca, Arizona, the Defense Information Systems Agency in Arlington, Virginia, the Naval Ocean Systems Center, a Defense Department installation in San Diego, California, and the U.S. Army Space and Strategic Defense installation in Huntsville, Alabama [5]. 

These ongoing attacks are labeled "Advanced Persistent Threats" or "APT" by the American Military, are considered acts of war by both the White House [6] and the Department of Defense [7] as far back as 2011, and are not unique to the Chinese origins.  You may remember the 2007 attacks on Estonia [8], which has been attributed to entities within Russian territory operating with the assistance of the Russian government [9].  These attacks disabled a wide array of Estonian government sites, rendering services in the world's most digitally-connected country unusable.  The attacks also disabled ATM machines, effectively disabling some portion of the Estonian economy.

The United States [and arguably Israel, [10]] have also been actively participating in these attacks [11] with the deploying of FLAME and Stuxnet against Iran, which made international headlines this past year when the coordinated efforts of the tools were used to disable Iranian nuclear centrifuges in an attempt to slow their progress in their nuclear program [12].  These efforts are ongoing, with the latest addition of the Gauss and Duqu malwares [13] continuing to target middle-eastern countries.

“From his first months in office, President Obama secretly ordered increasingly sophisticated attacks on the computer systems that run Iran’s main nuclear enrichment facilities, significantly expanding America’s first sustained use of cyberweapons, according to participants in the program.”
                                                    — +The New York Times

Obama reportedly went on to sign a classified directive last year [14] enabling the government to seize control of private networks, and the 2012 NDAA (National Defense Authorization Act) includes terms [15, section 954] that authorize offensive attacks on foreign threats [16].  The official United States policy already is to deem any cyberattack on the U.S. as an "act of war" [17], and it looks like these types of actions and attacks have already been made legal.

While it may once have been a subject of fiction [18], it's now and has been a harsh reality that we're in the middle of a new era in warfare, and the battles are already well-underway as countries around the world are openly engaging in offensive attacks on one another that are impacting economies on a massive scale.  I don't know what else to call this other than a world war—even the CIA's Center for the Study of Intelligence (CSI) predicted this [19], as have many others even earlier [20].  

Here's a thought; if our constitution gives us the right to bear arms, and the government deems these types of attacks as acts of war, then isn't it our right to keep and bear these arms?  Yet another case for a mass-algorate society [21], which Mr. Obama appears to agree with me on [22], at the very least.

[1]: http://www.nytimes.com/2013/02/19/technology/chinas-army-is-seen-as-tied-to-hacking-against-us.html
[2]: http://intelreport.mandiant.com/
[3]: http://en.wikipedia.org/wiki/Titan_Rain
[4]: http://www.time.com/time/nation/article/0,8599,1098371,00.html
[5]: http://www.zdnet.com/news/security-experts-lift-lid-on-chinese-hack-attacks/145763
[6]: http://www.whitehouse.gov/sites/default/files/rss_viewer/international_strategy_for_cyberspace.pdf
[7]: http://online.wsj.com/article/SB10001424052702304563104576355623135782718.html
[8]: http://en.wikipedia.org/wiki/2007_cyberattacks_on_Estonia
[9]: http://www.vedomosti.ru/smartmoney/article/2007/05/28/3004
[10]: http://www.zdnet.com/meet-gauss-the-latest-cyber-espionage-tool-7000002405/
[11]: http://www.nytimes.com/2012/06/01/world/middleeast/obama-ordered-wave-of-cyberattacks-against-iran.html?pagewanted=all
[12]: http://www.bbc.co.uk/news/technology-11388018
[13]: http://www.zdnet.com/meet-gauss-the-latest-cyber-espionage-tool-7000002405/
[14]: http://endthelie.com/2012/11/15/obama-reportedly-signs-classified-cyberwarfare-policy-directive-with-troubling-implications/#axzz2LMPlf8iA
[15]: http://www.gpo.gov/fdsys/pkg/BILLS-112hr1540enr/pdf/BILLS-112hr1540enr.pdf
[16]: http://endthelie.com/2011/12/17/approval-of-covert-offensive-cyberwar-sneakily-inserted-into-ndaa/
[17]: http://www.forbes.com/sites/reuvencohen/2012/06/05/the-white-house-and-pentagon-deem-cyber-attacks-an-act-of-war/
[18]: http://en.wikipedia.org/wiki/Neuromancer
[19]: https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/vol48no4/new_face_of_war.html
[20]: http://www.rand.org/content/dam/rand/pubs/reprints/2007/RAND_RP223.pdf
[21]: https://plus.google.com/112353210404102902472/posts/MVQXyw9EJDE
[22]: http://news.cnet.com/8301-17938_105-57569503-1/obama-endorses-required-high-school-coding-classes/

Attachments

China’s Army Is Seen as Tied to Hacking Against U.S.

An overwhelming percentage of the attacks on American companies and government agencies start in a building on the edge of Shanghai, say cybersecurity experts and American intelligence officials.

6 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

On the Ongoing Attacks between China, U.S., Russia, Israel, etc.… The latest round of evidence of ongoing...

On the Ongoing Attacks between China, U.S., Russia, Israel, etc.…
The latest round of evidence of ongoing digital warfare between the superpowers is now being reported in the N.Y. Times [1] after an undeniably incriminating 60-page report on the Chinese attacks on the U.S. by security firm Mandiant [2].

“Either they are coming from inside Unit 61398, or the people who run the most-controlled, most-monitored Internet networks in the world are clueless about thousands of people generating attacks from this one neighborhood.”
                                                    — Kevin Mandia

The report goes on to track individual participants in the attack, tracing them back to the headquarters of P.L.A. Unit 61398.

Attacks from the Chinese have been ongoing for many years, notably back to Operation Titan Rain [3] in 2003, in which attackers gained access to military intelligence networks at organizations such as Lockheed Martin, Sandia National Laboratories, Redstone Arsenal, and NASA [4].  Direct military targets were also included in the assault, such as the U.S. Army Information Systems Engineering Command at Fort Huachuca, Arizona, the Defense Information Systems Agency in Arlington, Virginia, the Naval Ocean Systems Center, a Defense Department installation in San Diego, California, and the U.S. Army Space and Strategic Defense installation in Huntsville, Alabama [5]. 

These ongoing attacks are labeled "Advanced Persistent Threats" or "APT" by the American Military, are considered acts of war by both the White House [6] and the Department of Defense [7] as far back as 2011, and are not unique to the Chinese origins.  You may remember the 2007 attacks on Estonia [8], which has been attributed to entities within Russian territory operating with the assistance of the Russian government [9].  These attacks disabled a wide array of Estonian government sites, rendering services in the world's most digitally-connected country unusable.  The attacks also disabled ATM machines, effectively disabling some portion of the Estonian economy.

The United States [and arguably Israel, [10]] have also been actively participating in these attacks [11] with the deploying of FLAME and Stuxnet against Iran, which made international headlines this past year when the coordinated efforts of the tools were used to disable Iranian nuclear centrifuges in an attempt to slow their progress in their nuclear program [12].  These efforts are ongoing, with the latest addition of the Gauss and Duqu malwares [13] continuing to target middle-eastern countries.

“From his first months in office, President Obama secretly ordered increasingly sophisticated attacks on the computer systems that run Iran’s main nuclear enrichment facilities, significantly expanding America’s first sustained use of cyberweapons, according to participants in the program.”
                                                    — +The New York Times

Obama reportedly went on to sign a classified directive last year [14] enabling the government to seize control of private networks, and the 2012 NDAA (National Defense Authorization Act) includes terms [15, section 954] that authorize offensive attacks on foreign threats [16].  The official United States policy already is to deem any cyberattack on the U.S. as an "act of war" [17], and it looks like these types of actions and attacks have already been made legal.

While it may once have been a subject of fiction [18], it's now and has been a harsh reality that we're in the middle of a new era in warfare, and the battles are already well-underway as countries around the world are openly engaging in offensive attacks on one another that are impacting economies on a massive scale.  I don't know what else to call this other than a world war—even the CIA's Center for the Study of Intelligence (CSI) predicted this [19], as have many others even earlier [20].  

Here's a thought; if our constitution gives us the right to bear arms, and the government deems these types of attacks as acts of war, then isn't it our right to keep and bear these arms?  Yet another case for a mass-algorate society [21], which Mr. Obama appears to agree with me on [22], at the very least.

[1]: http://www.nytimes.com/2013/02/19/technology/chinas-army-is-seen-as-tied-to-hacking-against-us.html
[2]: http://intelreport.mandiant.com/
[3]: http://en.wikipedia.org/wiki/Titan_Rain
[4]: http://www.time.com/time/nation/article/0,8599,1098371,00.html
[5]: http://www.zdnet.com/news/security-experts-lift-lid-on-chinese-hack-attacks/145763
[6]: http://www.whitehouse.gov/sites/default/files/rss_viewer/international_strategy_for_cyberspace.pdf
[7]: http://online.wsj.com/article/SB10001424052702304563104576355623135782718.html
[8]: http://en.wikipedia.org/wiki/2007_cyberattacks_on_Estonia
[9]: http://www.vedomosti.ru/smartmoney/article/2007/05/28/3004
[10]: http://www.zdnet.com/meet-gauss-the-latest-cyber-espionage-tool-7000002405/
[11]: http://www.nytimes.com/2012/06/01/world/middleeast/obama-ordered-wave-of-cyberattacks-against-iran.html?pagewanted=all
[12]: http://www.bbc.co.uk/news/technology-11388018
[13]: http://www.zdnet.com/meet-gauss-the-latest-cyber-espionage-tool-7000002405/
[14]: http://endthelie.com/2012/11/15/obama-reportedly-signs-classified-cyberwarfare-policy-directive-with-troubling-implications/#axzz2LMPlf8iA
[15]: http://www.gpo.gov/fdsys/pkg/BILLS-112hr1540enr/pdf/BILLS-112hr1540enr.pdf
[16]: http://endthelie.com/2011/12/17/approval-of-covert-offensive-cyberwar-sneakily-inserted-into-ndaa/
[17]: http://www.forbes.com/sites/reuvencohen/2012/06/05/the-white-house-and-pentagon-deem-cyber-attacks-an-act-of-war/
[18]: http://en.wikipedia.org/wiki/Neuromancer
[19]: https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/vol48no4/new_face_of_war.html
[20]: http://www.rand.org/content/dam/rand/pubs/reprints/2007/RAND_RP223.pdf
[21]: https://plus.google.com/112353210404102902472/posts/MVQXyw9EJDE
[22]: http://news.cnet.com/8301-17938_105-57569503-1/obama-endorses-required-high-school-coding-classes/

Attachments

China’s Army Is Seen as Tied to Hacking Against U.S.

An overwhelming percentage of the attacks on American companies and government agencies start in a building on the edge of Shanghai, say cybersecurity experts and American intelligence officials.

5 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Just makes it more upsetting to... in reply to

Just makes it more upsetting to have online class homework

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Eric if only it was on... in reply to

Eric if only it was on a weekend! Is it going to be an online vid streaming for that? or maybe it will get recorded and be shared later on? :)

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

to be fair i like the... in reply to

to be fair i like the more visual approach. this is good for the consumer. i still dont know why i would want to dig into my past pics and add and make a "scrapbook" online. where are the privacy settings mate?

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

ZOMGFRIDAY

Wow, it's Friday already. Payday. Christmas gift time.

So, I've been pondering if I should go to an online university, a community college, or just straight to an in state school (UNC, NC State, possibly Duke)?

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

I've watched pretty much all of... in reply to

I've watched pretty much all of em, Alex gave a talk there and was meeting with all kinds of people. I had no idea it even existed and was amazed at how underplayed it was here compared to other conferences considering how huge RSA is... But i just bring it up because if you think that's news... that's just scratching the surface and alot of the discussions that happened had a underlying sense of online warfare.

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

<span class="proflinkWrapper"><span class="proflinkPrefix">+</span><a class="proflink" href="https://plus.google.com/109018108978855138608" oid="109018108978855138608">Zebulin... in reply to

+Zebulin Magby do you honestly believe that there was ever any real anonymity online, even in the days of Bulletin Boards? I think there was just little motivation or profit to be made back then. Now is a different story.

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

We're going live in 15 minutes...

We're going live in 15 minutes with #bitcoin Core Developer @jgarzik on the @DecentralizeAll podcast! Watch online:

Attachments

youtube.com/watch?v=2ZzmcN…

youtube.com/watch?v=2ZzmcN…

youtube.com/watch?v=2ZzmcN…

youtube.com/watch?v=2ZzmcN…

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

That&#39;s one of those great, simple... in reply to

That's one of those great, simple ideas that makes me think, "Huh. Why didn't someone think of that sooner?" :) Your dedication to making a positive difference is really inspiring!

My current project is to give back to the online community that has taught me so much by making some educational videos of my own! I hope to start very very soon, if school doesn't get in the way of my education. =P

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

totally. emoticons are to teeny jpgs... in reply to

totally. emoticons are to teeny jpgs like real breasts are to a boob jobs, you know what I mean? but not only that, you CAN use emoticons and still be cool. I've stopped worrying that people might think that I must be a bozo since I use 'em. Things can get really charged up online, and emoticons are the ONLY shorthand available to help telegraph (there's an obsolete term!) your actual "body english" behind what you're saying.... :0)

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

RT @martindale: We're going live in...

RT @martindale: We're going live in 15 minutes with #bitcoin Core Developer @jgarzik on the @DecentralizeAll podcast! Watch online: https:

Attachments

youtube.com/watch?v=2ZzmcN…

youtube.com/watch?v=2ZzmcN…

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

RT @martindale: We're going live in...

RT @martindale: We're going live in 15 minutes with #bitcoin Core Developer @jgarzik on the @DecentralizeAll podcast! Watch online: https:

Attachments

youtube.com/watch?v=2ZzmcN…

youtube.com/watch?v=2ZzmcN…

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

RT @martindale: We're going live in...

RT @martindale: We're going live in 15 minutes with #bitcoin Core Developer @jgarzik on the @DecentralizeAll podcast! Watch online: https:

Attachments

youtube.com/watch?v=2ZzmcN…

youtube.com/watch?v=2ZzmcN…

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Including the Artificial Intelligence class that I and over 58,000 people have signed up for ( http:...

Including the Artificial Intelligence class that I and over 58,000 people have signed up for ( http://www.nytimes.com/2011/08/16/science/16stanford.html ), Stanford is now offering 13 of their fall semester classes (including statements of accomplishments for those who complete them!) online, for free:

http://see.stanford.edu/see/courses.aspx

Now, the question is... which others to sign up for? How many should I take?!

Attachments

Stanford School of Engineering - Stanford Engineering Everywhere

courses. SEE programming includes one of Stanford's most popular engineering sequences: the three-course Introduction to Computer Science taken by the majority of Stanford undergraduates, and seve...

2 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Including the Artificial Intelligence class that I and over 58,000 people have signed up for ( http:...

Including the Artificial Intelligence class that I and over 58,000 people have signed up for ( http://www.nytimes.com/2011/08/16/science/16stanford.html ), Stanford is now offering 13 of their fall semester classes (including statements of accomplishments for those who complete them!) online, for free:

http://see.stanford.edu/see/courses.aspx

Now, the question is... which others to sign up for? How many should I take?!

Attachments

Stanford School of Engineering - Stanford Engineering Everywhere

courses. SEE programming includes one of Stanford's most popular engineering sequences: the three-course Introduction to Computer Science taken by the majority of Stanford undergraduates, and seve...

6 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Including the Artificial Intelligence class that I and over 58,000 people have signed up for ( http:...

Including the Artificial Intelligence class that I and over 58,000 people have signed up for ( http://www.nytimes.com/2011/08/16/science/16stanford.html ), Stanford is now offering 13 of their fall semester classes (including statements of accomplishments for those who complete them!) online, for free:

http://see.stanford.edu/see/courses.aspx

Now, the question is... which others to sign up for? How many should I take?!

Attachments

Stanford School of Engineering - Stanford Engineering Everywhere

courses. SEE programming includes one of Stanford's most popular engineering sequences: the three-course Introduction to Computer Science taken by the majority of Stanford undergraduates, and seve...

2 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Including the Artificial Intelligence class that I and over 58,000 people have signed up for ( http:...

Including the Artificial Intelligence class that I and over 58,000 people have signed up for ( http://www.nytimes.com/2011/08/16/science/16stanford.html ), Stanford is now offering 13 of their fall semester classes (including statements of accomplishments for those who complete them!) online, for free:

http://see.stanford.edu/see/courses.aspx

Now, the question is... which others to sign up for? How many should I take?!

Attachments

Stanford School of Engineering - Stanford Engineering Everywhere

courses. SEE programming includes one of Stanford's most popular engineering sequences: the three-course Introduction to Computer Science taken by the majority of Stanford undergraduates, and seve...

2 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Oekaki Contest

Kindigo posted an awesome Oekaki contest over on GWing, and will be awarding 10,000 GWing Credits to a winner, every week. I can't wait to see some of the submissions. I think I'll participate, too. Maybe. <3

An Oekaki, for those of you who don't know, is a sort of online version of Photoshop. You can use an Oekaki to draw, sketch, and discuss all the little splurge-arts that you might have. A lot of fun, indeed. For an example, you can check out the GWing Oekaki, and maybe even draw something while you're there.

Don't be afraid - take a look at some of the shameful submissions I've posted!

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

MySQL Cluster: Generating Partition Reports

If you're using MySQL Cluster and have recently added a nodegroup, you can use the following code to generate a report of what tables are currently partitioned across the nodes as you apply ALTER ONLINE TABLE ... REORGANIZE PARTITION to them to get them partitioned:

select count(p.table_name) as partitions, p.table_schema, p.table_name from tables t join partitions p on (t.table_schema=p.table_schema and t.table_name=p.table_name) where t.engine='ndbcluster' group by p.table_schema, p.table_name order by partitions desc;

You'll get a nice clean report of all your tables, what schema they belong to, and how many partitions they have. Use in combination with my method of finding the largest tables in MySQL and you'll ensure smooth growth of your cluster!

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Startup Founders: Donate Equity to Charity!

+Coursefork is happy to announce the Startup Giveback, an initiative for entrepreneurs to donate equity instead of cash to social initiatives, in partnership with +Shoeboxed and the +American Underground.  All are welcome to our first event, which will be hosted at the Shoeboxed HQ in Durham, NC.  100% of equity will go directly to Startup Endowment, while cash donations at the door of the event will go to the Triangle Community Foundation.

Donations of all sorts, not just equity, are welcome!  While we're aiming for a 1% equity donation from each participating company, you're welcome to donate cash either online or at the door of the event.  Feel free to leave comments if you have questions!  I hope to see you there.

Attachments

The Startup Giveback Cookout

*Startup Founders: Donate _Equity_ to Charity!* +Coursefork is happy to announce *the Startup Giveback*, an initiative for entrepreneurs to donate equity instead of cash to social initiatives, in partnership with +Shoeboxed and the +American Underground.  All are welcome to our first event, which will be hosted at the Shoeboxed HQ in Durham, NC.  100% of equity will go directly to Startup Endowment, while cash donations at the door of the event will go to the Triangle Community Foundation. *Donations of all sorts, not just equity, are welcome!*  While we're aiming for a 1% equity donation from each participating company, you're welcome to donate cash either online or at the door of the event.  Feel free to leave comments if you have questions!  I hope to see you there.

8 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Save The Internet!

Free Press and the Harry Potter Alliance collaborated on this video featuring a series of online celebrities and writers speaking about the importance of Net Neutrality.

Featuring John and Hank Green (the vlogbrothers); actor and blogger Wil Wheaton; bestselling author Maureen Johnson; Shawn Ahmed from the UnculturedProject; vloggers and musicians Kristina Horner and Luke Conard; and Adam Savage from Mythbusters.

Take action to save the Internet now: http://www.savetheinternet.com

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

How would you behave in a world with no anonymity? Researchers from +Yuriy Zubovski's alma mater, Carnegie...

How would you behave in a world with no anonymity?

Researchers from +Yuriy Zubovski's alma mater, Carnegie Mellon University, raise a few troubling questions about identity and privacy in a paper released at BlackHat in August [1]. They show results from a facial recognition study and hit some points about how it relates to Augmented Reality (AR), right up +Robert Rice's alley.

One of the authors, Alessandro Acquisti, also gave a talk at USENIX shortly after the release, of which there is video [2]. He explores some fascinating examples of how the images and videos that people have posted online can be utilized for tracking identity, even in cases where you explicitly "untag" yourself, which may people simply do not consider.

[1]: http://www.heinz.cmu.edu/~acquisti/face-recognition-study-FAQ/
[2]: http://www.usenix.org/events/sec11/stream/acquisti/index.html

Attachments

Face Recognition Study - FAQ

FAQ. Face Recognition Study - FAQ. Faces of Facebook: Privacy in the Age of Augmented Reality. Alessandro Acquisti (Heinz College, Carnegie Mellon University). Ralph Gross (Heinz College, Carnegie Mel...

6 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

How would you behave in a world with no anonymity? Researchers from +Yuriy Zubovski's alma mater, Carnegie...

How would you behave in a world with no anonymity?

Researchers from +Yuriy Zubovski's alma mater, Carnegie Mellon University, raise a few troubling questions about identity and privacy in a paper released at BlackHat in August [1]. They show results from a facial recognition study and hit some points about how it relates to Augmented Reality (AR), right up +Robert Rice's alley.

One of the authors, Alessandro Acquisti, also gave a talk at USENIX shortly after the release, of which there is video [2]. He explores some fascinating examples of how the images and videos that people have posted online can be utilized for tracking identity, even in cases where you explicitly "untag" yourself, which may people simply do not consider.

[1]: http://www.heinz.cmu.edu/~acquisti/face-recognition-study-FAQ/
[2]: http://www.usenix.org/events/sec11/stream/acquisti/index.html

Attachments

Face Recognition Study - FAQ

FAQ. Face Recognition Study - FAQ. Faces of Facebook: Privacy in the Age of Augmented Reality. Alessandro Acquisti (Heinz College, Carnegie Mellon University). Ralph Gross (Heinz College, Carnegie Mel...

1 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

How would you behave in a world with no anonymity? Researchers from +Yuriy Zubovski's alma mater, Carnegie...

How would you behave in a world with no anonymity?

Researchers from +Yuriy Zubovski's alma mater, Carnegie Mellon University, raise a few troubling questions about identity and privacy in a paper released at BlackHat in August [1]. They show results from a facial recognition study and hit some points about how it relates to Augmented Reality (AR), right up +Robert Rice's alley.

One of the authors, Alessandro Acquisti, also gave a talk at USENIX shortly after the release, of which there is video [2]. He explores some fascinating examples of how the images and videos that people have posted online can be utilized for tracking identity, even in cases where you explicitly "untag" yourself, which may people simply do not consider.

[1]: http://www.heinz.cmu.edu/~acquisti/face-recognition-study-FAQ/
[2]: http://www.usenix.org/events/sec11/stream/acquisti/index.html

Attachments

Face Recognition Study - FAQ

FAQ. Face Recognition Study - FAQ. Faces of Facebook: Privacy in the Age of Augmented Reality. Alessandro Acquisti (Heinz College, Carnegie Mellon University). Ralph Gross (Heinz College, Carnegie Mel...

6 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

How would you behave in a world with no anonymity? Researchers from +Yuriy Zubovski's alma mater, Carnegie...

How would you behave in a world with no anonymity?

Researchers from +Yuriy Zubovski's alma mater, Carnegie Mellon University, raise a few troubling questions about identity and privacy in a paper released at BlackHat in August [1]. They show results from a facial recognition study and hit some points about how it relates to Augmented Reality (AR), right up +Robert Rice's alley.

One of the authors, Alessandro Acquisti, also gave a talk at USENIX shortly after the release, of which there is video [2]. He explores some fascinating examples of how the images and videos that people have posted online can be utilized for tracking identity, even in cases where you explicitly "untag" yourself, which may people simply do not consider.

[1]: http://www.heinz.cmu.edu/~acquisti/face-recognition-study-FAQ/
[2]: http://www.usenix.org/events/sec11/stream/acquisti/index.html

Attachments

Face Recognition Study - FAQ

FAQ. Face Recognition Study - FAQ. Faces of Facebook: Privacy in the Age of Augmented Reality. Alessandro Acquisti (Heinz College, Carnegie Mellon University). Ralph Gross (Heinz College, Carnegie Mel...

6 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Making the case for a mass-algorate society, in which we all know how to write code. I wholeheartedly...

Making the case for a mass-algorate society, in which we all know how to write code. I wholeheartedly agree.

Some resources:

Learning to Code
- Codecademy: http://www.codecademy.com/
- Stanford's Online CS101 course with in-browser Javascript exercises: http://www.stanford.edu/class/cs101/
- Learn You a Haskell: http://learnyouahaskell.com/chapters
- Project Euler: http://projecteuler.net/

Media
- +Douglas Rushkoff's Program or Be Programmed: Program or Be Programmed by Douglas Rushkoff
- +Daniel Shiffman on Artful Programming: http://vimeo.com/16140257
- +John Graham-Cumming on Teaching Our Kids to Code: http://blog.jgc.org/2011/09/teach-our-kids-to-code.html

Attachments

Why we should teach our kids to code

There's a petition up on the British Government's e-petitions website, called "teach our kids to code". Despite being plugged by geek luminaries like Ben Goldacre, it's received barely a thousand sign...

6 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Making the case for a mass-algorate society, in which we all know how to write code. I wholeheartedly...

Making the case for a mass-algorate society, in which we all know how to write code. I wholeheartedly agree.

Some resources:

Learning to Code
- Codecademy: http://www.codecademy.com/
- Stanford's Online CS101 course with in-browser Javascript exercises: http://www.stanford.edu/class/cs101/
- Learn You a Haskell: http://learnyouahaskell.com/chapters
- Project Euler: http://projecteuler.net/

Media
- +Douglas Rushkoff's Program or Be Programmed: Program or Be Programmed by Douglas Rushkoff
- +Daniel Shiffman on Artful Programming: http://vimeo.com/16140257
- +John Graham-Cumming on Teaching Our Kids to Code: http://blog.jgc.org/2011/09/teach-our-kids-to-code.html

Attachments

Why we should teach our kids to code

There's a petition up on the British Government's e-petitions website, called "teach our kids to code". Despite being plugged by geek luminaries like Ben Goldacre, it's received barely a thousand sign...

6 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Making the case for a mass-algorate society, in which we all know how to write code. I wholeheartedly...

Making the case for a mass-algorate society, in which we all know how to write code. I wholeheartedly agree.

Some resources:

Learning to Code
- Codecademy: http://www.codecademy.com/
- Stanford's Online CS101 course with in-browser Javascript exercises: http://www.stanford.edu/class/cs101/
- Learn You a Haskell: http://learnyouahaskell.com/chapters
- Project Euler: http://projecteuler.net/

Media
- +Douglas Rushkoff's Program or Be Programmed: Program or Be Programmed by Douglas Rushkoff
- +Daniel Shiffman on Artful Programming: http://vimeo.com/16140257
- +John Graham-Cumming on Teaching Our Kids to Code: http://blog.jgc.org/2011/09/teach-our-kids-to-code.html

Attachments

Why we should teach our kids to code

There's a petition up on the British Government's e-petitions website, called "teach our kids to code". Despite being plugged by geek luminaries like Ben Goldacre, it's received barely a thousand sign...

7 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Making the case for a mass-algorate society, in which we all know how to write code. I wholeheartedly...

Making the case for a mass-algorate society, in which we all know how to write code. I wholeheartedly agree.

Some resources:

Learning to Code
- Codecademy: http://www.codecademy.com/
- Stanford's Online CS101 course with in-browser Javascript exercises: http://www.stanford.edu/class/cs101/
- Learn You a Haskell: http://learnyouahaskell.com/chapters
- Project Euler: http://projecteuler.net/

Media
- +Douglas Rushkoff's Program or Be Programmed: Program or Be Programmed by Douglas Rushkoff
- +Daniel Shiffman on Artful Programming: http://vimeo.com/16140257
- +John Graham-Cumming on Teaching Our Kids to Code: http://blog.jgc.org/2011/09/teach-our-kids-to-code.html

Attachments

Why we should teach our kids to code

There's a petition up on the British Government's e-petitions website, called "teach our kids to code". Despite being plugged by geek luminaries like Ben Goldacre, it's received barely a thousand sign...

6 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Today's My Birthday. Want A Link?

Yep, this April 22nd, 2008 is my birthday (credit to the intro goes to sXePhil), and I'm turning 21 today. However, due to the upcoming MMA fight that I've got at Dorton Arena on April 26th, all mandatory 21st birthday celebrations will be postponed until after the fight.

For those of you who aren't already aware, you can pick up tickets at Carolina Fight Promotions. I'm going to be fighting Andy Teague, a well-versed jiujitsu competitor, and the match is scheduled for three rounds at 3 minutes each.

So, today being my birthday--and as such, I've received tons and tons of birthday wishes--I thought I'd give some shoutouts to everyone who has done so. It's pretty simple, all you've got to do is write a "happy birthday" post somewhere on the web, link to me, and then show me the page you want me to link back to.

My twitter friends have had an early start, and it's already the afternoon - don't procrastinate, I'm ending this at midnight tonight!

Thank you guys for the happy birthday wishes! Martin Bowling Michelle Reno Brian Mark Rae Hoffman Dave Rohrer Alex Simpson Heather Sexy SEO SEOcom

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Fight to the Finish II: MMA in Greenville, NC

I'll be fighting at this weekend's "Fight to the Finish II" (Greenville, NC), as the second event run by the Amateur Fight League. Tickets are still available, especially with some great deals available from AFL's Online Store - don't wait, make sure you get your tickets before the weekend. :]



I'm scheduled to weight in as a middleweight (171 - 185 lbs.), which is a step up from my normal weight (170). I've been lifting heavy and training hard, gaining some weight to meet Brian Ward in the ring in my third mixed martial arts fight. Since my last fight against Will Estes was deemed the most exciting fight of the night by StarNews, I've been training harder and working more towards my professional career as a mixed martial arts fighter.

Rest days start after my last training session on Thursday night, so I'll be getting some well-needed rest and relaxation Friday to prepare for the weighin on Saturday morning at the Greenville Convention Center. Afterwards, my friends and I are meeting one of my RolePlayGateway staff members at the Olive Garden in Greenville to enjoy my pre-fight lunch. Then it's off to rest (hoorah for naps), and then later that night - it'll be fight time.

Get in touch with me if you're out in Greenville and you're interested in having lunch with us or if you want to show up for the fight (which is at the Greenville Convention Center, tickets will be available at the doors), you're more than welcome to come.

Let's do the damn thang.

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

My Top 3 Twitter Tools

I've been using Twitter since pretty early on (and long before @oprah), and I've found it to be a superbly convenient communication tool and notification service. Even though it's still very young on the web (Twitter was founded in March of 2006) It's been the home to great ideas like the #twitterdata proposal and the publicdomain book-via-tweets project. It's also an awesome reputation management platform, and can be used to both to provide effective customer service and help distribute news and updates about your business or product, which is exactly how I use it for my online roleplaying project.

But as with the rest of the social media world, Twitter can become very complex very quickly (but I still contend that there is no social media overload) and as a result, can be difficult to manage. As a result, I use several third-party tools to help me manage and gather information that helps me do my Twitter job much more efficiently and effectively.

Splitweet [caption id="attachment_196" align="alignnone" width="300" caption="Splitweet allows you to post and monitor multiple Twitter accounts and brands."]Splitweet allows you to post and monitor multiple Twitter accounts and brands.[/caption]

For those of us with multiple Twitter accounts (like some people who create a Twitter account for each roleplaying character they use), Splitweet is an absolute savior. This service allows you to tweet to multiple accounts at the same time, as well as combining the "stream" from each account into one page. A lot of desktop Twitter clients offer this kind of functionality, but where Splitweet truly excels is in its ability to track what it calls "brands" (more reputation management terms here): you can specify keywords and phrases that will appear in a separate feed, even if you do not follow those users. This gets us around the disastrous changes Twitter made to the @replies, and helps us keep up to date on any mentions of our site's name and any tweets relating to what it is that we do.

Sherflock [caption id="attachment_195" align="alignnone" width="300" caption="Sherflock provides detailed statistics and summaries of Twitter users you are associated with."]Sherflock provides detailed statistics and summaries of Twitter users you are associated with.[/caption]

Sherflock is an absolutely awesome stat tracking machine that helps weed out the waves of spam that have been coming in since Twitter has gone mainstream. Sherflock gives a large number of statistics about each every account the either follows you or that you are following, and lets you sort and filter users based on these statistics.

Twitterfall [caption id="attachment_194" align="alignnone" width="217" caption="Twitterfall offers a live stream of twitter updates on keywords that you specify."]Twitterfall offers a live stream of twitter updates on keywords that you specify.[/caption]

This tool allows you to specify any number of keywords that you wish to view on a live, moving stream of tweets. This is very useful if you are using a computer that allows you to "pin" a window on top (like Ubuntu Linux), or if you have a multiple-monitor rig, or even if you use multiple computers using the input-sharing app Synergy. You'll get a live feed of updates on any topic of your choice, which can even be updated and changed in real-time.

Using these three tools will help you maximize you Twitter performance and make the most of an already awesome service, preventing you from being inundated with the massive stream of messages that you're surely going to subscribe to.

What are your top three Twitter tools? Feel free to make a comment or write your own post, and I'll gladly append a link to this post to help everyone out!

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.