The new EricMartindale.com is an experiment in data aggregation, and might have a few bugs. Feel free to explore, and then provide feedback directly to @martindale.

search results for services

My Top 3 Twitter Tools

I've been using Twitter since pretty early on (and long before @oprah), and I've found it to be a superbly convenient communication tool and notification service. Even though it's still very young on the web (Twitter was founded in March of 2006) It's been the home to great ideas like the #twitterdata proposal and the publicdomain book-via-tweets project. It's also an awesome reputation management platform, and can be used to both to provide effective customer service and help distribute news and updates about your business or product, which is exactly how I use it for my online roleplaying project.

But as with the rest of the social media world, Twitter can become very complex very quickly (but I still contend that there is no social media overload) and as a result, can be difficult to manage. As a result, I use several third-party tools to help me manage and gather information that helps me do my Twitter job much more efficiently and effectively.

Splitweet [caption id="attachment_196" align="alignnone" width="300" caption="Splitweet allows you to post and monitor multiple Twitter accounts and brands."]Splitweet allows you to post and monitor multiple Twitter accounts and brands.[/caption]

For those of us with multiple Twitter accounts (like some people who create a Twitter account for each roleplaying character they use), Splitweet is an absolute savior. This service allows you to tweet to multiple accounts at the same time, as well as combining the "stream" from each account into one page. A lot of desktop Twitter clients offer this kind of functionality, but where Splitweet truly excels is in its ability to track what it calls "brands" (more reputation management terms here): you can specify keywords and phrases that will appear in a separate feed, even if you do not follow those users. This gets us around the disastrous changes Twitter made to the @replies, and helps us keep up to date on any mentions of our site's name and any tweets relating to what it is that we do.

Sherflock [caption id="attachment_195" align="alignnone" width="300" caption="Sherflock provides detailed statistics and summaries of Twitter users you are associated with."]Sherflock provides detailed statistics and summaries of Twitter users you are associated with.[/caption]

Sherflock is an absolutely awesome stat tracking machine that helps weed out the waves of spam that have been coming in since Twitter has gone mainstream. Sherflock gives a large number of statistics about each every account the either follows you or that you are following, and lets you sort and filter users based on these statistics.

Twitterfall [caption id="attachment_194" align="alignnone" width="217" caption="Twitterfall offers a live stream of twitter updates on keywords that you specify."]Twitterfall offers a live stream of twitter updates on keywords that you specify.[/caption]

This tool allows you to specify any number of keywords that you wish to view on a live, moving stream of tweets. This is very useful if you are using a computer that allows you to "pin" a window on top (like Ubuntu Linux), or if you have a multiple-monitor rig, or even if you use multiple computers using the input-sharing app Synergy. You'll get a live feed of updates on any topic of your choice, which can even be updated and changed in real-time.

Using these three tools will help you maximize you Twitter performance and make the most of an already awesome service, preventing you from being inundated with the massive stream of messages that you're surely going to subscribe to.

What are your top three Twitter tools? Feel free to make a comment or write your own post, and I'll gladly append a link to this post to help everyone out!

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

The Dream Phone

I've been in the market for my dream phone for almost a year now. Products have been released left and right, but none of them seem to have the functionality that I am desiring. Okay, I admit - "phone" is a bit misleading. What I'm really looking for is a smartphone... no, not a smartphone, a digital companion.

Things I'm looking for:


  • Phone

  • Camera

  • Media Player

  • Freedom



Phone
I want a mobile phone with what has become industry standards, including the dual-mode functionality of GSM and WiFi connections. I should be able to take this phone to any service provider, and get service using this device, keeping both my number and my contacts.

Camera
I want a decent camera that gets decent lighting. While a 2 megapixel camera is about the range I'm looking for, most important is the quality of the resulting pictures. The functionality of a modern-day camera should be available, including light temperature and balance. I should be able to record video using this, as well.

Media Player
I should be able to play any format of media on this device as I can play using my home Linux box. OGG, MP3, MPEG, AVI...

Freedom
I wish to be able to install software freely, from wherever I may choose. If I choose to install emulators and play me some NES, SNES, and Sega Genesis games, I should be able to do this freely, and have the necessary hardware resources to do this. I want to be able to make changes to my device's software at any point in time. I should be able to sync my calendar, to do list, and contacts with my choice of repositories.


I'll grow and review this as necessary. Until then, the Apple iPhone looks bitterly disgusting, while the Motorola Q's use of Windows continues to push me away.

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Flock Tip: Add Services To Your Sidebar (Sorta)

So, Firefox allows you to open favorites in a sidebar - which is great for things like FriendFeed, Google Talk, Twitter, or even Facebook chat. It lets you use a good web service as what essentially becomes an extension for your browser, so you can browse your regular pages while still participating in the conversation.

I recently switched over to the social browser, Flock - with great success and elation. Flock is built from the Firefox codebase, but they are massively more social in what the browser does - drag and drop images, open media feeds, view your friends in their People and Places sidebar, among many other really cool things.

Then there's Friendfeed - which is a web service that recently took off (but I must say, I've been using long before the hype. :D) because it allows you to combine all of your social media connections (Web 2.5, if you will) and even cross-post responses between them (closer to Web 3.0, minus filtering and duplicate content issues...). After putting in a request to Flock's develpment team to start moving in this direction, I decided to take matters into my own hands.

When you bookmark something in Firefox, you can open the properties of the bookmark and hit a checkbox, "Open this link in the sidebar." However, this option is not available in Flock (by default). So let's open our trusty about:config:

Do a filter on "sidebar", and you'll find a value called "flock.favorites.loadPageInSidebar" - which is set to false by default. Right click this value, and click "toggle".

Bingo. Now you will have the checkbox on all your bookmarks that will allow you to open links in your sidebar!

Blogged with the Flock Browser

Tags: , , , , ,

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

RSS is back, or "a brief history of EricMartindale.com"

Hello there, adoring internet-stalkers! (I'm kidding. ~_~) You may have noticed (if you were loyal, that is ;)) that my Feedburner-powered RSS Feed has been lacking in activity lately. There's a reason for that.

Recently, I got rid of WordPress and Sweetcron in favor of a new CMS platform, Chyrp. I had been running Wordpress for a long time, using it to share my thoughts with the general internet populace. However, it had become a bit of a chore to maintain, and it really felt like duplicate work on top of all the other content-generation I was already performing (i.e., forum posts, blog comments, Last.fm "Loved" Tracks, Google Reader shared items, etc.), so I began to look for a way to aggregate this content into a central place.

For a while, FriendFeed served this purpose well, but I didn't like the lack of control I had over the source. Facebook also filled part of this gap (and it still does, to a point), and they've even purchased FriendFeed, but I was looking for something quite a bit more customizable and self-hosted. Through various referrals, I came across Yongfook's Sweetcron project which was a new platform designed specifically for this new thing they called, le gasp, "Lifestreaming".

However, after fighting with Sweetcron and its aggregation methods, particularly its lack of support for various service feed formats; I decided to look into something else. Initial searches landed me upon Tumblr, who had conveniently announced a feature that syncs comments across multiple services (or aggregates). Sadly, I didn't want to get back into a world where all my code was hosted by someone else, and I had no control over it. I kept Sweetcron running on my site under lifestream/, but I continued searching for a better solution.

I then stumbled across Bazooka, which was billed as "the first free PHP tumblelog engine". Thanks to Bazooka developer Evan Walsh, who alerted me to a more up-to-date and current replacement called Chyrp. And I was sold. I immediately spent a few hours converting my existing content from WordPress and SweetCron over to a test installation of Chyrp, and then took the next night changing my site structure and 301'd all my old links to the new URLs.

That's where EricMartindale.com stands today. I've spent a few weeks getting my stream set up the way I want it, and I'm turning the RSS feed back on. Posts should begin flowing into your RSS reader very shortly. Post comments, feedback, and questions here!

Edit 10:13 PM EST: It looks like Feedburner is having some trouble parsing my new RSS content. You can subscribe to my direct feed and it will always work.

Edit 10:58 PM EST: I've fixed the problem and committed the patch to GitHub.

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Going Viral: A Guide

While marketing RolePlayGateway, one of the things we considered was the "virality" of our approach. Viral marketing is any marketing technique that induces Web sites or users to pass on a marketing message to other sites or users, creating a potentially exponential growth in the message's visibility and effect. We're going to guide you on the road to a truly viral campaign.

A successful viral push can be launched simply by following three simple rules.

  1. Don't spend everything you have on a single campaign.
  2. Don't rely entirely on one vehicle of viral marketing.
  3. Be different from everyone else; stand out.

While we're not nearly viral enough, part of our success so far has been the evangelism of our passionate users. And there you have it, one of the most important keys to successful viral marketing:

Passion: Users who are passionate about your service, your community, or your site. They will propagate, they will evangelize, and ultimately will generate more passionate users who will do the same thing for you. Dawn Anfuso calls these members Boomers - and it is important to not ignore them.

Make it easy for your users to share. Make it hard for them NOT to share. Add a feature on your site that encourages them to send an email to their friends about the service. Add blocks where they can copy and paste code straight to their social profiles on sites like MySpace, Facebook, and Bebo. Jeanne Jennings wrote an amazing article on Optimizing the "E-mail This" Marketing Opportunity, and I'd recommend you read it and implement the things you learn from it.

Widgetize: On that note, we arrive on one of our most powerful vehicles for viral marketing: Widgets. The list of sites that you can infect with widgets are endless. From iGoogle to individual sites, widgets encourage users to put your tool on their page. Be sure to incorporate other techniques here: Include encouragement to share it. Make it easy to post elsewhere and share.

One of the items that RolePlay Gateway could utilize to great success is the concept of game trailers. Many of the games on RPGateway are text-based, and have no real graphics. However, most of these games have amazing storylines, storylines which could be utilized to hitch audiences, or at least entertain them. Flash-based videos, or trailers, with pivotal content, captivating video and audio, and viral marketing elements such as "Email this!" or "Share This", would be an amazing leap forward. Take a look at how YouTube's video player works. Such trailers could even be uploaded to social networking sites, like YouTube and Google Video, and shared to millions of users with a touch of viral marketing magic.

Juice It Up: Include your URL everywhere you go. Facebook, MySpace. Everywhere. This generates user authority, even if the site you are on has nothing at all to do with your target market. Cross sections are a beautiful thing, and even if you don't get a drop of link juice in comments, market saturation is a very important, yet delicate, part of viral marketing.

Maintain a presence on every social networking site you can sustain. Extend your campaign to all of them. Create social groups for each of these sites, and publicize them. The more targets you hit, just like investing, the less committed you are to that particular market. Your assets are distributed, and while the workload may be unfathomably difficult (keeping up with so many social networking sites sucks... that's why we have ProfileLinker), the potential for success is incredible.

Reward: Another option is to provide tangible rewards for marketing. This can be in the form of prizes, such as in a contest, or to individual users. Incentives are very powerful, and drive many users to promote where they'd be otherwise apathetic. Things can be very simple, such as giving them tokens or credits, to very expensive, such as providing real cash per referral. This is probably the most effective, albeit expensive, method of encouraging users to infect others.

Don't Stop. Don't set these actions in motion and then hope they work. Get involved. Comment on profiles. Reply to messages. Enhance your viral effect. Make it tangible. If users can see that there is a real person there, they will be a lot more enthusiastic and encouraged to participate, and your viral marketing campaign will be more successful.

Other Resources!!! Web Marketing Today has an amazing list of resource articles that are sure to help you build your campaign.

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

DMOZ In Danger? Not So Much, Says DMOZ Editor

DMOZ: Open DirectoryThere's been a lot of active discussion about the state of AOL's directory project, DMOZ. There have been many attempts to unseat the directory project from its position as the most authoritative listing resource, such as the Yahoo Directory. Many of these attempts have fallen by the wayside, as Rand Fiskin points out, but none have remained more controversial than DMOZ. More recently, Chris Crum's post on WebProNews about his lack of respect for DMOZ has stirred up a hornet's nest of DMOZ criticism, including a particular post claiming DMOZ is a waste of time.

I forwarded a lot of this on to Philip Nicolcev, known by username as "frug", who is the editor of several roleplay-oriented categories on DMOZ. He responded to me directly with a highly insightful email, and I was fortunate enough to receive his permission to share its contents.

I've been editing the pbp category at DMOZ for what... 4 years now? About that. This article is a big whiny complaint which misses the mark. They are both correct and sadly mistaken. Yes, dmoz is outdated and yes, it fails because of attitude problems, but not silly allegations of 'corruption' or people who are bitter because they didn't get listed. We don't list everything, I don't list even half of the submissions I get, and anyone who has been an administrator or an editor for a similar type of project knows better than to take these kinds of complaints seriously. One thing they say is definitely correct: Apply once carefully following their rules if you wish and then, as Will suggested, forget about them.

This is exactly the approach that should be modeled for any directory, regardless of its state or condition. When you are submitting a link to a directory, you are being offered the privilege to be listed as a resource by the owners and management of that directory. They are not obligated to list your link, let alone review it in a timely fashion--but this would be genuinely appreciated and would reflect on the directory's position as a "good" resource.

DMOZ is the primary source for Google's Directory, and you must respect the opinion of such a large and successful company. It's obvious that the idea behind an open directory like DMOZ is good, but where they fail is in execution. More on that later.

He continues:

That is what you should do. Apply once and forget about it, don't claim anybody is corrupt because whether you believe my opinion or not, there's no corruption. Nobody cares enough about dmoz anymore for it to be valuable for extortion. Don't be ridiculous. Furthermore if you were to speak to some of the senior editors you'd discover that they are pretty damn uptight, even obsessive. The problems with dmoz are, in my opinion, twofold. First off, you have the dated trashy look of the website which is a relic of the 1990's. It's not user friendly, it doesn't entice anyone to go browsing, and it hasn't adapted or added features that would help people understand the structure of the directory or find what they're looking for. The editor forums still use phpBB2, and you should see the editing panel. You wouldn't believe how dated this stuff is. Frankly it has needed an overhaul for years now.

I largely agree with him. The phpBB team deprecated the phpBB2 branch at the beginning of this year, ending support for the outdated platform. AOL would do well to do a complete overhaul of the site's design now that "Web 2.0" has come and gone (and I could reference posts all day on that) - and AOL has completely missed their opportunity to latch on and ride the wave.

Philip finishes his correspondance with the frightening truth that has been plaguing many post-Web2.0 sites and services:

The second problem, attitude, is partially the cause of the first problem. It's a stagnant atmosphere where nothing gets done and nobody gets listened to. They would rather leave a directory as a cluttered mess of garbage than risk breaking its structure by overhauling it. Fixing my category took me about two years before I had approval to restructure it, and I'm in a small niche category nobody pays much attention to. Since becoming an editor I have deleted about 60% of the outdated links listed. Had I not joined, they'd still be there cluttering things up with linkspam geocities pages from 10 years ago. So yeah, dmoz is failing, but not because of corruption or because some guy didn't get what he wanted. And, honestly, if the author of this article was applying to dmoz just to 'test how fair it was' then I'm glad they rejected him. Somehow they made the right decision because he's wasting their time.

And that's the exact problem - the DMOZ community has completely stagnated, which has resulted in the puddle of goop that the directory has become. In my personal opinion, I think that AOL could do a lot better job at community management (all reputation management aside) by setting up a more rigid structure of responsibility. The editors need to be held responsible for a timely review specified by their superiors, and there needs to be cross-checking of the editor's work by other qualified editors.

Is this another example of AOL's purchases being mismanaged and ultimately being forgotten, such as what many people claim is the case with ex-Nullsoft product WinAmp? Perhaps, but I think that remains to be seen. After all, even our favored Google took a questionable amount of time to convert phone-consolidation service GrandCentral to the new Google Voice after its 2007 acquisition. DMOZ was in fact originally a Netscape project, which then-strong AOL acquired in 1998. Since that acquisition, little has changed.

All said and done, DMOZ needs some love if it's going to survive as anything more than a relic of trust and authority in the Web 2.0 bubble. As Philip points out, it has both good and bad traits and deserves further attention, but it needs to be attention in (and from) the right direction. The questions remain; where has AOL been? What can be done about the editors (or lack thereof)? How can DMOZ be improved?

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

A Place Between Us

This is a pretty damned awesome service.

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Getting off the grid for a...

Getting off the grid for a while. Catch you on the flipside... (at Davis Shore Ferry Service) [pic] —

Attachments

path.com/p/46scs6

path.com/p/46scs6

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

I love the Swiss & Mushroom... in reply to

I love the Swiss & Mushroom and the New Mexico. Great burgers. Typically great service too. Now I'm hungry. :D

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Role playing is a gateway drug.... in reply to

Role playing is a gateway drug. Next thing you know you'll be on the street corner soliciting your services just to get your fix. "Hey buddy, wanna be a level 12 paladin for the night?"

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

<span class="proflinkWrapper"><span class="proflinkPrefix">+</span><a class="proflink" href="https://plus.google.com/115858612877723984178" oid="115858612877723984178">fan... in reply to

+fan tai I'd imagine by building a cohesive service model, as opposed to a product-centric business

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

I was literally just in a... in reply to

I was literally just in a meeting where I got into a deep conversation about Bitcoin with a phone exchange service. They were obviously interested in the idea and even brought up adding Bitcoin as a payment option, however, they had hesitation as their primary customer base had "value/savings based" mindsets. Changing the psychological perception of Bitcoin is a huge step towards ubiquitous integration.

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Might want to check this too.... in reply to

Might want to check this too. Security generally is under serviced, bad guys are too often ignored in the design process.

http://www.csmonitor.com/USA/2011/0922/From-the-man-who-discovered-Stuxnet-dire-warnings-one-year-later

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

That said, g+ is doing a... in reply to

That said, g+ is doing a terrible, terrible job of handling the issue of real names and pseudonyms. +Phillip Rhodes I wouldn't jump to conclusions about why people might not like this service. I am reconsidering my former support, and I'm fully aware of how terrible facebook is.

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

<span class="proflinkWrapper"><span class="proflinkPrefix">+</span><a class="proflink" href="https://plus.google.com/104458755807282024750" oid="104458755807282024750">Alex... in reply to

+Alex Angelides you might be able to, actually -- using tools like Google Sketchup and MapsGL. Building a portfolio of your past work doesn't have to implicate a third-party service, you could even host it on your own site. And hey, I'd even venture to say you have a great idea for a new company if you wanted to start a portfolio-sharing network for architects!

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Dell Tech Chatbot Tries His Best

April's Dell said it couldn't find "systems 32 config" and after going through a series of troubleshooting steps with a Dell tech in chat, he said it was due to a bad sector on the hard drive and it would need to be replaced. While that very well may have been the case, we were amused by how the conversation wrapped up...

read more | digg story

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

<span class="proflinkWrapper"><span class="proflinkPrefix">+</span><a class="proflink" href="https://plus.google.com/108865163963379525482" oid="108865163963379525482">James... in reply to

+James McGoram has it right, +fan tai!  When there's a[n effectively] unlimited supply (near-zero access/duplication cost) but a finite demand, we can assume that the value is close to zero.  We have to focus on the finite resources; people and services.

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Amazon Unspun - the next Squidoo?

There's been a lot of talk about how Squidoo is getting punished because of how they are getting used by spammers. The idea there was to go in, create something called a "lense" that is relevant to something about your niche, and then do your marketing thing there.

Well, I just ran into "a new service from Amazon. It appears to let you create your own list and present it to the social community. I'm definitely thinking about using it before the Googledance makes it another cesspool.

I didn't do my Ubuntu reload yet, either.

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Social Solution

All of these Social Networking sites have been giving me a real headache since... well, since forever. There's too many of them. I can't keep track of everything. I've always had the idea of creating a service that'll link all of these together, check and update them all. Well, someone beat me to the punch.

Sara show this to me, but it's take me a while to post my results. Well, here I am.

Now, the other question is what am I supposed to do with all of these accounts that work as an OpenID, like Facebook? Do use one of these as my primary OpenID? Or should I go with one of the many OpenID providers? If so, which should I pick?

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Random Tier 4 Tech Support Musings

I take phone calls from customers, diagnose and estimate the length of time it will take to fix their problem, and schedule an appointment for an engineer to be there. It is then my duty to dispatch this appointment to the engineer, at the appropriate point in time.

At this point in time, I am no longer associated with your on site service. If the engineer does a bad job, it is my job to talk to you and determine if the problem requires the engineer to go back out and solve the issue, and determine whether or not it requires billing.

Do not vent your stress to me. I will get the engineer in contact with you as soon as possible.

Do not yell at me because the engineer was unable to make it at the scheduled time. I will have an engineer to you as soon as we can, I promise. Sometimes appointments take longer than expected, and sometimes cars break down.

That is all.

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

<span class="proflinkWrapper"><span class="proflinkPrefix">+</span><a class="proflink" href="https://plus.google.com/113227819899320297020" oid="113227819899320297020">Joseph... in reply to

+Joseph Coco I don't think you are being honest with the reality of what a business would have to have set up to take bitcoin. 

It is naive to think they can just manage it themselves, especially with the ever changing value, and varying international values,  just like regular credit payment services have to deal with. 

I think pro-bitcoin bias is coloring your responses.   My research on it as someone who considered using them, paints a lot different picture than you are presenting.

I'm no anti-bitcoin.  I'm all for all sorts of varieties of currency and transactions.   But I want the truth and facts to be said about them.

I also notice everyone is ducking the security and backing issue. 

Banks are accredited and insured to protect their customers.   There isn't any bitcoin handler that has that.  Not even Square Marketplace. 

If you want people to use them, great.  If you want to use them yourself, great.  But don't blow smoke up peoples....   trying to cover real negatives about them. 

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Pine cones go in here...

Early this morning, somewhere within an hour of me getting in to work, there were a large number of sirens in my otherwise quiet town. Come to find out, the IGA (International Grocer's Association) down the road got robbed at gunpoint. The police showed up, chased them down the road and through town, crashing just near our watered version of downtown. Apparently one suspect has been apprehended, and two are still on the loose. There have been helicopters circling the area for a while, and intermittent sirens. The police and of all things the fire department have blocked off sections of roads, last I heard.

A wonderful start to a week, don't you think? Hey, at least there's something going on instead of the usual droll mood of a small town. To some ill effect, however: the internet here, Bellsouth, seems to have slowed to a complete and utter crawl. It seems to be letting up slightly now that the excitement is over, but this is unacceptable from a business class DSL service. It likely has to do with the news channels showing up and perhaps plugging in to landlines for their newscasts?

I had a good rest on Saturday, after a rather long night on Friday, and enjoyed my time with Amber. Sunday turned out to be a work day for me, as I was looking through a client's server logs in the morning, fixing my own computer woes, and then fixing an install of Linux for my family while my laundry ran. I left to fix MORE personal computer troubles, then headed out to finally relax with my love that evening.

Alternately, I found an awesome five things to know when you switch to linux post. Check it out. :)

Fights begin, finger prints are took, days is lost, bail is made, court dates are ignored, cycle is repeated.

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

When did you create your first Google Account? During a conversation at the +LocalSense office today...

When did you create your first Google Account?
During a conversation at the +LocalSense office today, I happened to go back and look for the oldest email I'd received in my Gmail account and it got me thinking about just how much data I've given Google over the years.  It's incredible to think about a sense of scale now, especially considering that I have [as of this moment] 134,530 messages in Gmail alone -- that doesn't even consider all of Google's other services now tied to my Google Account.

You can quantify some portion of how much Google knows about you through the "Google Dashboard" [1].  Google also allows you to download [some] of your data with their data liberation tool [2].  I recommend doing this regularly, and making an effort to be aware of the amount, and value, of your data.

I received the first two emails in my Gmail inbox on 11/28/04. They were both from Google, and a few of the links don't work anymore. [3] Didn't anyone tell them that cool URIs don't change? [4] The attached photo is of the well-written introduction to Gmail, the second message in my inbox.  It's fun to look back and think about the state of email at the time, and how innovative Gmail actually was.

[1]: http://www.w3.org/Provider/Style/URI.html
[2]: https://www.google.com/dashboard/
[3]: http://gmail.google.com/gmail/help/start.html
[4]: https://www.google.com/settings/exportdata

Attachments

1 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

When did you create your first Google Account? During a conversation at the +LocalSense office today...

When did you create your first Google Account?
During a conversation at the +LocalSense office today, I happened to go back and look for the oldest email I'd received in my Gmail account and it got me thinking about just how much data I've given Google over the years.  It's incredible to think about a sense of scale now, especially considering that I have [as of this moment] 134,530 messages in Gmail alone -- that doesn't even consider all of Google's other services now tied to my Google Account.

You can quantify some portion of how much Google knows about you through the "Google Dashboard" [1].  Google also allows you to download [some] of your data with their data liberation tool [2].  I recommend doing this regularly, and making an effort to be aware of the amount, and value, of your data.

I received the first two emails in my Gmail inbox on 11/28/04. They were both from Google, and a few of the links don't work anymore. [3] Didn't anyone tell them that cool URIs don't change? [4] The attached photo is of the well-written introduction to Gmail, the second message in my inbox.  It's fun to look back and think about the state of email at the time, and how innovative Gmail actually was.

[1]: http://www.w3.org/Provider/Style/URI.html
[2]: https://www.google.com/dashboard/
[3]: http://gmail.google.com/gmail/help/start.html
[4]: https://www.google.com/settings/exportdata

Attachments

1 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

When did you create your first Google Account? During a conversation at the +LocalSense office today...

When did you create your first Google Account?
During a conversation at the +LocalSense office today, I happened to go back and look for the oldest email I'd received in my Gmail account and it got me thinking about just how much data I've given Google over the years.  It's incredible to think about a sense of scale now, especially considering that I have [as of this moment] 134,530 messages in Gmail alone -- that doesn't even consider all of Google's other services now tied to my Google Account.

You can quantify some portion of how much Google knows about you through the "Google Dashboard" [1].  Google also allows you to download [some] of your data with their data liberation tool [2].  I recommend doing this regularly, and making an effort to be aware of the amount, and value, of your data.

I received the first two emails in my Gmail inbox on 11/28/04. They were both from Google, and a few of the links don't work anymore. [3] Didn't anyone tell them that cool URIs don't change? [4] The attached photo is of the well-written introduction to Gmail, the second message in my inbox.  It's fun to look back and think about the state of email at the time, and how innovative Gmail actually was.

[1]: http://www.w3.org/Provider/Style/URI.html
[2]: https://www.google.com/dashboard/
[3]: http://gmail.google.com/gmail/help/start.html
[4]: https://www.google.com/settings/exportdata

Attachments

21 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

RolePlaying Blog

I've been seriously slacking in getting RPGateway's blog up and running, but I've finally gotten around to re-posting the files and re-connecting Wordpress to the database. Now all I've got to do is to get a couple of our admins (and hopefully, one of our loverly owners) to start posting and managing it.

The idea here is to create a single update page where watchers who don't want to be involved in the site can still read updates from the staff. A buzz can be established, and hopefully, some real momentum can be generated with content that is updated daily. The so-called 'blogosphere' (I cringe too, relax.) is a very powerful force in the tubes today, and I think it's important to at least begin to establish some sort of presence here.

I was recently pointed to Trevor Somerville's 30 days to success, and I'm only reminded that articles are the Queen in a world where daily updates are King. Good luck to Trevor, I'll probably swing by once or twice to check up on his progress and see if he has any useful tips.

I started fiddling with some new posting options again, in particular the email posting. Blogger lets you set up a secret email to which you can send blog posts, at which point they'll automatically be added to your blog. I had a contact set up in my Gmail as of (insert long period of time) ago, and I sent a post to it, but I haven't seen anything of it. It looks like the same email, but... apparently not. I guess I'll be reconfiguring this later.

I've been having great experiences with SEO and RolePlay Gateway, we're rising in rankings rather quickly, even after the domain migration. Many thanks to the folks over at DigitalPoint for my education over the past few months. I'm sure I'll be telling these success stories soon, but right now I have to head off to Winston to run a few service calls.

Peace out!

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

When did you create your first Google Account? During a conversation at the +LocalSense office today...

When did you create your first Google Account?
During a conversation at the +LocalSense office today, I happened to go back and look for the oldest email I'd received in my Gmail account and it got me thinking about just how much data I've given Google over the years.  It's incredible to think about a sense of scale now, especially considering that I have [as of this moment] 134,530 messages in Gmail alone -- that doesn't even consider all of Google's other services now tied to my Google Account.

You can quantify some portion of how much Google knows about you through the "Google Dashboard" [1].  Google also allows you to download [some] of your data with their data liberation tool [2].  I recommend doing this regularly, and making an effort to be aware of the amount, and value, of your data.

I received the first two emails in my Gmail inbox on 11/28/04. They were both from Google, and a few of the links don't work anymore. [3] Didn't anyone tell them that cool URIs don't change? [4] The attached photo is of the well-written introduction to Gmail, the second message in my inbox.  It's fun to look back and think about the state of email at the time, and how innovative Gmail actually was.

[1]: http://www.w3.org/Provider/Style/URI.html
[2]: https://www.google.com/dashboard/
[3]: http://gmail.google.com/gmail/help/start.html
[4]: https://www.google.com/settings/exportdata

Attachments

1 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Why isn't education open-source in the first place? I recently gave a talk at +The Research Triangle...

Why isn't education open-source in the first place?
I recently gave a talk at +The Research Triangle Park about education and open source, and how the freedoms that are necessary for a healthy education system were systematically removed over time.  While the slides aren't available in the video, I've uploaded them to +Coursefork [1].

It's incredibly powerful to lay out the data and show how increased spending and manpower has impacted the quality of education over time: aptitude measurements have stayed flat (or negative!) while test scores and grades continue to inflate.  It seems as if we've built a system of education that is extremely good at—wait for it—_getting people to pass standardized tests_.

Companies like +Khan Academy and +Coursera are really chipping away at the problem of making the resources available, both content and services (i.e., actual teaching), but making the content interchangeable and hackable is of critical importance to building the healthy open source ecosystem that we've seen emerge in the software community (a la +GitHub) within the world of education.

One day, we'll see the equivalent of the pull request in education.  I'm hoping to build it with +Coursefork.

[1]:  http://coursefork.org/martindale/open-freedom-and-education

Attachments

RTP 180: "Open, Freedom, and Education" with Eric Martindale

Eric Martindale of Coursefork talks about the potential power of applying open source principles to education at The Research Triangle Park's RTP 180: "Open ...

1 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Why isn't education open-source in the first place? I recently gave a talk at +The Research Triangle...

Why isn't education open-source in the first place?
I recently gave a talk at +The Research Triangle Park about education and open source, and how the freedoms that are necessary for a healthy education system were systematically removed over time.  While the slides aren't available in the video, I've uploaded them to +Coursefork [1].

It's incredibly powerful to lay out the data and show how increased spending and manpower has impacted the quality of education over time: aptitude measurements have stayed flat (or negative!) while test scores and grades continue to inflate.  It seems as if we've built a system of education that is extremely good at—wait for it—_getting people to pass standardized tests_.

Companies like +Khan Academy and +Coursera are really chipping away at the problem of making the resources available, both content and services (i.e., actual teaching), but making the content interchangeable and hackable is of critical importance to building the healthy open source ecosystem that we've seen emerge in the software community (a la +GitHub) within the world of education.

One day, we'll see the equivalent of the pull request in education.  I'm hoping to build it with +Coursefork.

[1]:  http://coursefork.org/martindale/open-freedom-and-education

Attachments

RTP 180: "Open, Freedom, and Education" with Eric Martindale

Eric Martindale of Coursefork talks about the potential power of applying open source principles to education at The Research Triangle Park's RTP 180: "Open ...

1 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Why isn't education open-source in the first place? I recently gave a talk at +The Research Triangle...

Why isn't education open-source in the first place?
I recently gave a talk at +The Research Triangle Park about education and open source, and how the freedoms that are necessary for a healthy education system were systematically removed over time.  While the slides aren't available in the video, I've uploaded them to +Coursefork [1].

It's incredibly powerful to lay out the data and show how increased spending and manpower has impacted the quality of education over time: aptitude measurements have stayed flat (or negative!) while test scores and grades continue to inflate.  It seems as if we've built a system of education that is extremely good at—wait for it—_getting people to pass standardized tests_.

Companies like +Khan Academy and +Coursera are really chipping away at the problem of making the resources available, both content and services (i.e., actual teaching), but making the content interchangeable and hackable is of critical importance to building the healthy open source ecosystem that we've seen emerge in the software community (a la +GitHub) within the world of education.

One day, we'll see the equivalent of the pull request in education.  I'm hoping to build it with +Coursefork.

[1]:  http://coursefork.org/martindale/open-freedom-and-education

Attachments

RTP 180: "Open, Freedom, and Education" with Eric Martindale

Eric Martindale of Coursefork talks about the potential power of applying open source principles to education at The Research Triangle Park's RTP 180: "Open ...

14 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Why isn't education open-source in the first place? I recently gave a talk at +The Research Triangle...

Why isn't education open-source in the first place?
I recently gave a talk at +The Research Triangle Park about education and open source, and how the freedoms that are necessary for a healthy education system were systematically removed over time.  While the slides aren't available in the video, I've uploaded them to +Coursefork [1].

It's incredibly powerful to lay out the data and show how increased spending and manpower has impacted the quality of education over time: aptitude measurements have stayed flat (or negative!) while test scores and grades continue to inflate.  It seems as if we've built a system of education that is extremely good at—wait for it—_getting people to pass standardized tests_.

Companies like +Khan Academy and +Coursera are really chipping away at the problem of making the resources available, both content and services (i.e., actual teaching), but making the content interchangeable and hackable is of critical importance to building the healthy open source ecosystem that we've seen emerge in the software community (a la +GitHub) within the world of education.

One day, we'll see the equivalent of the pull request in education.  I'm hoping to build it with +Coursefork.

[1]:  http://coursefork.org/martindale/open-freedom-and-education

Attachments

RTP 180: "Open, Freedom, and Education" with Eric Martindale

Eric Martindale of Coursefork talks about the potential power of applying open source principles to education at The Research Triangle Park's RTP 180: "Open ...

1 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Importing StackOverflow (...et al) into Chryp Using Aggregates

StackOverflow LogoAs I have mentioned before, I'm in a love affair with Chyrp, which is an up-and-coming platform meant to replace WordPress and work a bit like Tumblr, as a microblogging and lifestreaming service.

One of Chyrp's major draws for me is the Aggregator module, which is included in Chryp 2.0 by default. Mike Crittenden of MergeWeb Fame has covered the use of Chyrp's Aggregator previously, but I figured I'd dive in a bit further and help others in configuring their feeds.

You may also be familiar with StackOverflow, a crowd-sourcing social-media head-bashing awesome site that enables users to ask tech-related questions and get awesome community-approved answers. The same group runs several other sites using the same model, including SuperUser and ServerFault, and they are even releasing their codebase as free and open source as the <a href="http://stackexchange.com/>StackExchange project.

But, onward into the goodies: syndicating your activity on StackOverflow (and the other sites) using Chryp.

The first you'll need is your Activity Feed. To acquire this, visit the "Recent" tab of your user profile and look in the bottom right hand corner: you'll see a link to "user recent activity feed". This is the URL for your activity feed, grab that and let's move on to Chyrp.

In Chyrp, you'll want to add a new aggregate in your Admin panel. Paste your Activity Feed into the "Source URL" box, then configure the remaining settings as follows:

Feather: Link Post Attributes: name: "feed[title]" source: "feed[id]" description: "feed[description]"

Now, assign a "Name" and make sure the correct Author is selected, and click "Update". You're all done! You'll see new content from your feed the next time your aggregates update.

Questions? Comments? Lemme have 'em.

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Choosing A Medium For Your Online Role Playing Game

Running a role playing game online presents a large of amount of flexibility in the way you run the game. You no longer need individual sessions where all players are present, and there are a plethora of options as to where you are going to run it - if you want to run it in any one place.

One of the number one questions I receive relates to the medium for online RPGs. There are tons of different ways of communicating online, mainly grouped into a few categories. We have instant messenger, chats, message boards, and emails. There are a few custom services out there, but I'm going to touch on the four that I've mentioned.

On RolePlayGateway, we have a set of roleplaying forums as well as a roleplaying chat. When you're running an RPG, there are a few items you should consider when deciding where you're going to keep everything.

Forums have the benefit of being static and always available - users can post to forums at any time during the day and be sure that other users (and roleplayers) can see their message. Forums are also very flexible, they allow you to embed images and other multimedia within your posts, allowing you to share any experience with your players. However, it is post based - forums are often not the quickest way to communicate, as it is not a live feed of information like a chat.

Chats, on the other hand, have the benefit of being real time. Games can be run in chat (and instant messenger) on a moment's notice, and work best when all of the players can be available at the same time. Because it is real time, short blip-based sessions such as character conversations and interactions work extraordinarily well with chats. Players can get the chance to interject into other player's actions and statements without the worry of too much time going by. It is for this reason that the longer posts, such as those that exceed a paragraph, are often too large and unwieldy for chats - players end up waiting too long for each post, and will get bored.

Longer posts do very well on forums, where writing an individual post can take half an hour or longer to refine and perfect - just enough time for the players to go look at other games and other topics before they come back and begin formulating their response.

If you're running a game with a detailed and/or complicated storyline or characters, it is always good to post something on a forum for player reference. This lets the players have a place to communicate out of character (OOC) - such as when they won't be able to make a chat session, or when they want to discuss plans for character interaction, growth, or development. Even if your game is already on a forum - it is a good idea to create a place for OOC discussion. For chat-based games - this gives a perfect opportunity for players to jump in at the middle of a game with little trouble, as they simply need to read over the history of the game on the forum, which they can do at any point in time, and less time is needed explaining the game to the player.

Instant messenger works well when dealing with one on one sessions, such as when two characters are the only ones in an interaction or a meeting needs to be private. These interactions can be summarized or written into a cinematic format and then posted to the forum, for other players to enjoy as well. Instant messenger (as well as Private Messages) does very well at asking questions of the other players, which is convenient when you have a question about how they're playing a role or a reference they made in character.

There are also emails - many games aren't run by email anymore, but email is still a very valuable tool. RolePlayGateway like many forums offers you the ability to subscribe to topics. Subscriptions will let you receive an immediate email update whenever someone replies to the thread. This is extraordinarily helpful when there's an RPG with only a few players that can only reply every once in a while, but it requires that people, y'know, actually check their email. RolePlayGateway also has the special ability to instant message you when there's an update to a subscribed thread. All you need is a Jabber account (GMail accounts work, too) and to set up the notifications. We'll send you a message as soon as there's an update.

What methods have you used to manage your online roleplaying games? Are you a fan of forum or chat? Both? What helps you determine where you're going to hold your game? Discuss!

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Letter Sweep

Following suit with the likes of Tim Bray and Eric Meyer, I figured I'd throw together my browser's letter sweep tonight.

  • [A]dmin Site. Yeah, I guess I would be visiting the admin panel for this. Quite frequently.
  • Mirascape's [B]log. An infrequent haunt of mine, but fairly obvious.
  • [C]MON. Cluster Monitor for MySQL Cluster, something I almost always have open.
  • Google [D]ocs. This one is painfully obvious, I use Google Docs extensively.
  • [E]ricMartindale.com. Okay, that's a gimme. Does this make me egocentric?
  • [F]acebook. I'm actually fairly ashamed of this one. Why can't I have a cool F site? sadface
  • [G]mail. Three accounts linked using Google's Multiple Sign-in. Open [almost] all day.
  • [H]ighcharts JS. A pretty kick-ass Javascript library for generating charts on the clientside.
  • [I]nternal Discussion. A site for communication with my team. :)
  • [J]Query Mobile Demo, 1.0 alpha 3. I've been spending a lot of time toying with jQuery Mobile, seeing where it's going compared to Sencha Touch.
  • [K]r.github.com. Keith Rarick's GitHub redirect. Total ass-kicker.
  • [L]inkedIn. Pretty straightforward, between hiring for our team at @Mirascape and the travel to and from various conferences and Meetups lately.
  • [M]irascape. The augmented reality platform I'm responsible for.
  • [N]oxBot. A nice PHP-powered IRC bot with various plugins. A bit out of date, but very powerful. Been using it for a couple things lately.
  • [O]K, QR Me!. A QR Code-generating link shortener I built.
  • [P]ostmark. Best Email delivery service I've used. Nice RESTful API, flat rate for emails sent.
  • [Q]uora. These guys nail Q&A, and they're doing it pretty well. Check out all their buzz, too. But for some reason, I just don't stick.
  • Google [R]eader. “From your 1,040 subscriptions, over the last 30 days you read 21,549 items, clicked 274 items, starred 853 items, shared 37 items, and emailed 8 items.” -- </stats>
  • [S]erver Stats for Mirascape. Powered by Munin, it's how I keep track of the status and metrics of all my servers.
  • [T]witter. Not surprising. I love their webapp for my personal use, but own and manage at least five accounts using SplitTweet.
  • [U]serVoice. Pretty sweet tool I use for giving the communities I manage a good way to build a consensus on what they desire most. Examples I run: for RolePlayGateway, and EVE UserVoice for EVE Online.
  • Google [V]oice. Allows me to use SMS from my computer, read (as opposed to listen to) voicemail. Great tool. If only it supported MMS.
  • [W]achovia. One of the places I do banking.
  • [X]DA Developers. An indisposable resource for getting rid of carrier-installed crap and running my own choice of software on the hardware I purchased!
  • [Y]ouTube. Another big namer. No surprise.
  • [Z]ecco. Where I trade most of my public stocks. :)

Surprisingly populist, and there's a lot of Google-owned properties in there. I'm also using Chromium, so I think it prefers the roots of the sites I visit instead of searching through my history for individual pages.

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

On the Ongoing Attacks between China, U.S., Russia, Israel, etc.… The latest round of evidence of ongoing...

On the Ongoing Attacks between China, U.S., Russia, Israel, etc.…
The latest round of evidence of ongoing digital warfare between the superpowers is now being reported in the N.Y. Times [1] after an undeniably incriminating 60-page report on the Chinese attacks on the U.S. by security firm Mandiant [2].

“Either they are coming from inside Unit 61398, or the people who run the most-controlled, most-monitored Internet networks in the world are clueless about thousands of people generating attacks from this one neighborhood.”
                                                    — Kevin Mandia

The report goes on to track individual participants in the attack, tracing them back to the headquarters of P.L.A. Unit 61398.

Attacks from the Chinese have been ongoing for many years, notably back to Operation Titan Rain [3] in 2003, in which attackers gained access to military intelligence networks at organizations such as Lockheed Martin, Sandia National Laboratories, Redstone Arsenal, and NASA [4].  Direct military targets were also included in the assault, such as the U.S. Army Information Systems Engineering Command at Fort Huachuca, Arizona, the Defense Information Systems Agency in Arlington, Virginia, the Naval Ocean Systems Center, a Defense Department installation in San Diego, California, and the U.S. Army Space and Strategic Defense installation in Huntsville, Alabama [5]. 

These ongoing attacks are labeled "Advanced Persistent Threats" or "APT" by the American Military, are considered acts of war by both the White House [6] and the Department of Defense [7] as far back as 2011, and are not unique to the Chinese origins.  You may remember the 2007 attacks on Estonia [8], which has been attributed to entities within Russian territory operating with the assistance of the Russian government [9].  These attacks disabled a wide array of Estonian government sites, rendering services in the world's most digitally-connected country unusable.  The attacks also disabled ATM machines, effectively disabling some portion of the Estonian economy.

The United States [and arguably Israel, [10]] have also been actively participating in these attacks [11] with the deploying of FLAME and Stuxnet against Iran, which made international headlines this past year when the coordinated efforts of the tools were used to disable Iranian nuclear centrifuges in an attempt to slow their progress in their nuclear program [12].  These efforts are ongoing, with the latest addition of the Gauss and Duqu malwares [13] continuing to target middle-eastern countries.

“From his first months in office, President Obama secretly ordered increasingly sophisticated attacks on the computer systems that run Iran’s main nuclear enrichment facilities, significantly expanding America’s first sustained use of cyberweapons, according to participants in the program.”
                                                    — +The New York Times

Obama reportedly went on to sign a classified directive last year [14] enabling the government to seize control of private networks, and the 2012 NDAA (National Defense Authorization Act) includes terms [15, section 954] that authorize offensive attacks on foreign threats [16].  The official United States policy already is to deem any cyberattack on the U.S. as an "act of war" [17], and it looks like these types of actions and attacks have already been made legal.

While it may once have been a subject of fiction [18], it's now and has been a harsh reality that we're in the middle of a new era in warfare, and the battles are already well-underway as countries around the world are openly engaging in offensive attacks on one another that are impacting economies on a massive scale.  I don't know what else to call this other than a world war—even the CIA's Center for the Study of Intelligence (CSI) predicted this [19], as have many others even earlier [20].  

Here's a thought; if our constitution gives us the right to bear arms, and the government deems these types of attacks as acts of war, then isn't it our right to keep and bear these arms?  Yet another case for a mass-algorate society [21], which Mr. Obama appears to agree with me on [22], at the very least.

[1]: http://www.nytimes.com/2013/02/19/technology/chinas-army-is-seen-as-tied-to-hacking-against-us.html
[2]: http://intelreport.mandiant.com/
[3]: http://en.wikipedia.org/wiki/Titan_Rain
[4]: http://www.time.com/time/nation/article/0,8599,1098371,00.html
[5]: http://www.zdnet.com/news/security-experts-lift-lid-on-chinese-hack-attacks/145763
[6]: http://www.whitehouse.gov/sites/default/files/rss_viewer/international_strategy_for_cyberspace.pdf
[7]: http://online.wsj.com/article/SB10001424052702304563104576355623135782718.html
[8]: http://en.wikipedia.org/wiki/2007_cyberattacks_on_Estonia
[9]: http://www.vedomosti.ru/smartmoney/article/2007/05/28/3004
[10]: http://www.zdnet.com/meet-gauss-the-latest-cyber-espionage-tool-7000002405/
[11]: http://www.nytimes.com/2012/06/01/world/middleeast/obama-ordered-wave-of-cyberattacks-against-iran.html?pagewanted=all
[12]: http://www.bbc.co.uk/news/technology-11388018
[13]: http://www.zdnet.com/meet-gauss-the-latest-cyber-espionage-tool-7000002405/
[14]: http://endthelie.com/2012/11/15/obama-reportedly-signs-classified-cyberwarfare-policy-directive-with-troubling-implications/#axzz2LMPlf8iA
[15]: http://www.gpo.gov/fdsys/pkg/BILLS-112hr1540enr/pdf/BILLS-112hr1540enr.pdf
[16]: http://endthelie.com/2011/12/17/approval-of-covert-offensive-cyberwar-sneakily-inserted-into-ndaa/
[17]: http://www.forbes.com/sites/reuvencohen/2012/06/05/the-white-house-and-pentagon-deem-cyber-attacks-an-act-of-war/
[18]: http://en.wikipedia.org/wiki/Neuromancer
[19]: https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/vol48no4/new_face_of_war.html
[20]: http://www.rand.org/content/dam/rand/pubs/reprints/2007/RAND_RP223.pdf
[21]: https://plus.google.com/112353210404102902472/posts/MVQXyw9EJDE
[22]: http://news.cnet.com/8301-17938_105-57569503-1/obama-endorses-required-high-school-coding-classes/

Attachments

China’s Army Is Seen as Tied to Hacking Against U.S.

An overwhelming percentage of the attacks on American companies and government agencies start in a building on the edge of Shanghai, say cybersecurity experts and American intelligence officials.

5 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

On the Ongoing Attacks between China, U.S., Russia, Israel, etc.… The latest round of evidence of ongoing...

On the Ongoing Attacks between China, U.S., Russia, Israel, etc.…
The latest round of evidence of ongoing digital warfare between the superpowers is now being reported in the N.Y. Times [1] after an undeniably incriminating 60-page report on the Chinese attacks on the U.S. by security firm Mandiant [2].

“Either they are coming from inside Unit 61398, or the people who run the most-controlled, most-monitored Internet networks in the world are clueless about thousands of people generating attacks from this one neighborhood.”
                                                    — Kevin Mandia

The report goes on to track individual participants in the attack, tracing them back to the headquarters of P.L.A. Unit 61398.

Attacks from the Chinese have been ongoing for many years, notably back to Operation Titan Rain [3] in 2003, in which attackers gained access to military intelligence networks at organizations such as Lockheed Martin, Sandia National Laboratories, Redstone Arsenal, and NASA [4].  Direct military targets were also included in the assault, such as the U.S. Army Information Systems Engineering Command at Fort Huachuca, Arizona, the Defense Information Systems Agency in Arlington, Virginia, the Naval Ocean Systems Center, a Defense Department installation in San Diego, California, and the U.S. Army Space and Strategic Defense installation in Huntsville, Alabama [5]. 

These ongoing attacks are labeled "Advanced Persistent Threats" or "APT" by the American Military, are considered acts of war by both the White House [6] and the Department of Defense [7] as far back as 2011, and are not unique to the Chinese origins.  You may remember the 2007 attacks on Estonia [8], which has been attributed to entities within Russian territory operating with the assistance of the Russian government [9].  These attacks disabled a wide array of Estonian government sites, rendering services in the world's most digitally-connected country unusable.  The attacks also disabled ATM machines, effectively disabling some portion of the Estonian economy.

The United States [and arguably Israel, [10]] have also been actively participating in these attacks [11] with the deploying of FLAME and Stuxnet against Iran, which made international headlines this past year when the coordinated efforts of the tools were used to disable Iranian nuclear centrifuges in an attempt to slow their progress in their nuclear program [12].  These efforts are ongoing, with the latest addition of the Gauss and Duqu malwares [13] continuing to target middle-eastern countries.

“From his first months in office, President Obama secretly ordered increasingly sophisticated attacks on the computer systems that run Iran’s main nuclear enrichment facilities, significantly expanding America’s first sustained use of cyberweapons, according to participants in the program.”
                                                    — +The New York Times

Obama reportedly went on to sign a classified directive last year [14] enabling the government to seize control of private networks, and the 2012 NDAA (National Defense Authorization Act) includes terms [15, section 954] that authorize offensive attacks on foreign threats [16].  The official United States policy already is to deem any cyberattack on the U.S. as an "act of war" [17], and it looks like these types of actions and attacks have already been made legal.

While it may once have been a subject of fiction [18], it's now and has been a harsh reality that we're in the middle of a new era in warfare, and the battles are already well-underway as countries around the world are openly engaging in offensive attacks on one another that are impacting economies on a massive scale.  I don't know what else to call this other than a world war—even the CIA's Center for the Study of Intelligence (CSI) predicted this [19], as have many others even earlier [20].  

Here's a thought; if our constitution gives us the right to bear arms, and the government deems these types of attacks as acts of war, then isn't it our right to keep and bear these arms?  Yet another case for a mass-algorate society [21], which Mr. Obama appears to agree with me on [22], at the very least.

[1]: http://www.nytimes.com/2013/02/19/technology/chinas-army-is-seen-as-tied-to-hacking-against-us.html
[2]: http://intelreport.mandiant.com/
[3]: http://en.wikipedia.org/wiki/Titan_Rain
[4]: http://www.time.com/time/nation/article/0,8599,1098371,00.html
[5]: http://www.zdnet.com/news/security-experts-lift-lid-on-chinese-hack-attacks/145763
[6]: http://www.whitehouse.gov/sites/default/files/rss_viewer/international_strategy_for_cyberspace.pdf
[7]: http://online.wsj.com/article/SB10001424052702304563104576355623135782718.html
[8]: http://en.wikipedia.org/wiki/2007_cyberattacks_on_Estonia
[9]: http://www.vedomosti.ru/smartmoney/article/2007/05/28/3004
[10]: http://www.zdnet.com/meet-gauss-the-latest-cyber-espionage-tool-7000002405/
[11]: http://www.nytimes.com/2012/06/01/world/middleeast/obama-ordered-wave-of-cyberattacks-against-iran.html?pagewanted=all
[12]: http://www.bbc.co.uk/news/technology-11388018
[13]: http://www.zdnet.com/meet-gauss-the-latest-cyber-espionage-tool-7000002405/
[14]: http://endthelie.com/2012/11/15/obama-reportedly-signs-classified-cyberwarfare-policy-directive-with-troubling-implications/#axzz2LMPlf8iA
[15]: http://www.gpo.gov/fdsys/pkg/BILLS-112hr1540enr/pdf/BILLS-112hr1540enr.pdf
[16]: http://endthelie.com/2011/12/17/approval-of-covert-offensive-cyberwar-sneakily-inserted-into-ndaa/
[17]: http://www.forbes.com/sites/reuvencohen/2012/06/05/the-white-house-and-pentagon-deem-cyber-attacks-an-act-of-war/
[18]: http://en.wikipedia.org/wiki/Neuromancer
[19]: https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/vol48no4/new_face_of_war.html
[20]: http://www.rand.org/content/dam/rand/pubs/reprints/2007/RAND_RP223.pdf
[21]: https://plus.google.com/112353210404102902472/posts/MVQXyw9EJDE
[22]: http://news.cnet.com/8301-17938_105-57569503-1/obama-endorses-required-high-school-coding-classes/

Attachments

China’s Army Is Seen as Tied to Hacking Against U.S.

An overwhelming percentage of the attacks on American companies and government agencies start in a building on the edge of Shanghai, say cybersecurity experts and American intelligence officials.

1 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

On the Ongoing Attacks between China, U.S., Russia, Israel, etc.… The latest round of evidence of ongoing...

On the Ongoing Attacks between China, U.S., Russia, Israel, etc.…
The latest round of evidence of ongoing digital warfare between the superpowers is now being reported in the N.Y. Times [1] after an undeniably incriminating 60-page report on the Chinese attacks on the U.S. by security firm Mandiant [2].

“Either they are coming from inside Unit 61398, or the people who run the most-controlled, most-monitored Internet networks in the world are clueless about thousands of people generating attacks from this one neighborhood.”
                                                    — Kevin Mandia

The report goes on to track individual participants in the attack, tracing them back to the headquarters of P.L.A. Unit 61398.

Attacks from the Chinese have been ongoing for many years, notably back to Operation Titan Rain [3] in 2003, in which attackers gained access to military intelligence networks at organizations such as Lockheed Martin, Sandia National Laboratories, Redstone Arsenal, and NASA [4].  Direct military targets were also included in the assault, such as the U.S. Army Information Systems Engineering Command at Fort Huachuca, Arizona, the Defense Information Systems Agency in Arlington, Virginia, the Naval Ocean Systems Center, a Defense Department installation in San Diego, California, and the U.S. Army Space and Strategic Defense installation in Huntsville, Alabama [5]. 

These ongoing attacks are labeled "Advanced Persistent Threats" or "APT" by the American Military, are considered acts of war by both the White House [6] and the Department of Defense [7] as far back as 2011, and are not unique to the Chinese origins.  You may remember the 2007 attacks on Estonia [8], which has been attributed to entities within Russian territory operating with the assistance of the Russian government [9].  These attacks disabled a wide array of Estonian government sites, rendering services in the world's most digitally-connected country unusable.  The attacks also disabled ATM machines, effectively disabling some portion of the Estonian economy.

The United States [and arguably Israel, [10]] have also been actively participating in these attacks [11] with the deploying of FLAME and Stuxnet against Iran, which made international headlines this past year when the coordinated efforts of the tools were used to disable Iranian nuclear centrifuges in an attempt to slow their progress in their nuclear program [12].  These efforts are ongoing, with the latest addition of the Gauss and Duqu malwares [13] continuing to target middle-eastern countries.

“From his first months in office, President Obama secretly ordered increasingly sophisticated attacks on the computer systems that run Iran’s main nuclear enrichment facilities, significantly expanding America’s first sustained use of cyberweapons, according to participants in the program.”
                                                    — +The New York Times

Obama reportedly went on to sign a classified directive last year [14] enabling the government to seize control of private networks, and the 2012 NDAA (National Defense Authorization Act) includes terms [15, section 954] that authorize offensive attacks on foreign threats [16].  The official United States policy already is to deem any cyberattack on the U.S. as an "act of war" [17], and it looks like these types of actions and attacks have already been made legal.

While it may once have been a subject of fiction [18], it's now and has been a harsh reality that we're in the middle of a new era in warfare, and the battles are already well-underway as countries around the world are openly engaging in offensive attacks on one another that are impacting economies on a massive scale.  I don't know what else to call this other than a world war—even the CIA's Center for the Study of Intelligence (CSI) predicted this [19], as have many others even earlier [20].  

Here's a thought; if our constitution gives us the right to bear arms, and the government deems these types of attacks as acts of war, then isn't it our right to keep and bear these arms?  Yet another case for a mass-algorate society [21], which Mr. Obama appears to agree with me on [22], at the very least.

[1]: http://www.nytimes.com/2013/02/19/technology/chinas-army-is-seen-as-tied-to-hacking-against-us.html
[2]: http://intelreport.mandiant.com/
[3]: http://en.wikipedia.org/wiki/Titan_Rain
[4]: http://www.time.com/time/nation/article/0,8599,1098371,00.html
[5]: http://www.zdnet.com/news/security-experts-lift-lid-on-chinese-hack-attacks/145763
[6]: http://www.whitehouse.gov/sites/default/files/rss_viewer/international_strategy_for_cyberspace.pdf
[7]: http://online.wsj.com/article/SB10001424052702304563104576355623135782718.html
[8]: http://en.wikipedia.org/wiki/2007_cyberattacks_on_Estonia
[9]: http://www.vedomosti.ru/smartmoney/article/2007/05/28/3004
[10]: http://www.zdnet.com/meet-gauss-the-latest-cyber-espionage-tool-7000002405/
[11]: http://www.nytimes.com/2012/06/01/world/middleeast/obama-ordered-wave-of-cyberattacks-against-iran.html?pagewanted=all
[12]: http://www.bbc.co.uk/news/technology-11388018
[13]: http://www.zdnet.com/meet-gauss-the-latest-cyber-espionage-tool-7000002405/
[14]: http://endthelie.com/2012/11/15/obama-reportedly-signs-classified-cyberwarfare-policy-directive-with-troubling-implications/#axzz2LMPlf8iA
[15]: http://www.gpo.gov/fdsys/pkg/BILLS-112hr1540enr/pdf/BILLS-112hr1540enr.pdf
[16]: http://endthelie.com/2011/12/17/approval-of-covert-offensive-cyberwar-sneakily-inserted-into-ndaa/
[17]: http://www.forbes.com/sites/reuvencohen/2012/06/05/the-white-house-and-pentagon-deem-cyber-attacks-an-act-of-war/
[18]: http://en.wikipedia.org/wiki/Neuromancer
[19]: https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/vol48no4/new_face_of_war.html
[20]: http://www.rand.org/content/dam/rand/pubs/reprints/2007/RAND_RP223.pdf
[21]: https://plus.google.com/112353210404102902472/posts/MVQXyw9EJDE
[22]: http://news.cnet.com/8301-17938_105-57569503-1/obama-endorses-required-high-school-coding-classes/

Attachments

China’s Army Is Seen as Tied to Hacking Against U.S.

An overwhelming percentage of the attacks on American companies and government agencies start in a building on the edge of Shanghai, say cybersecurity experts and American intelligence officials.

6 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

On the Ongoing Attacks between China, U.S., Russia, Israel, etc.… The latest round of evidence of ongoing...

On the Ongoing Attacks between China, U.S., Russia, Israel, etc.…
The latest round of evidence of ongoing digital warfare between the superpowers is now being reported in the N.Y. Times [1] after an undeniably incriminating 60-page report on the Chinese attacks on the U.S. by security firm Mandiant [2].

“Either they are coming from inside Unit 61398, or the people who run the most-controlled, most-monitored Internet networks in the world are clueless about thousands of people generating attacks from this one neighborhood.”
                                                    — Kevin Mandia

The report goes on to track individual participants in the attack, tracing them back to the headquarters of P.L.A. Unit 61398.

Attacks from the Chinese have been ongoing for many years, notably back to Operation Titan Rain [3] in 2003, in which attackers gained access to military intelligence networks at organizations such as Lockheed Martin, Sandia National Laboratories, Redstone Arsenal, and NASA [4].  Direct military targets were also included in the assault, such as the U.S. Army Information Systems Engineering Command at Fort Huachuca, Arizona, the Defense Information Systems Agency in Arlington, Virginia, the Naval Ocean Systems Center, a Defense Department installation in San Diego, California, and the U.S. Army Space and Strategic Defense installation in Huntsville, Alabama [5]. 

These ongoing attacks are labeled "Advanced Persistent Threats" or "APT" by the American Military, are considered acts of war by both the White House [6] and the Department of Defense [7] as far back as 2011, and are not unique to the Chinese origins.  You may remember the 2007 attacks on Estonia [8], which has been attributed to entities within Russian territory operating with the assistance of the Russian government [9].  These attacks disabled a wide array of Estonian government sites, rendering services in the world's most digitally-connected country unusable.  The attacks also disabled ATM machines, effectively disabling some portion of the Estonian economy.

The United States [and arguably Israel, [10]] have also been actively participating in these attacks [11] with the deploying of FLAME and Stuxnet against Iran, which made international headlines this past year when the coordinated efforts of the tools were used to disable Iranian nuclear centrifuges in an attempt to slow their progress in their nuclear program [12].  These efforts are ongoing, with the latest addition of the Gauss and Duqu malwares [13] continuing to target middle-eastern countries.

“From his first months in office, President Obama secretly ordered increasingly sophisticated attacks on the computer systems that run Iran’s main nuclear enrichment facilities, significantly expanding America’s first sustained use of cyberweapons, according to participants in the program.”
                                                    — +The New York Times

Obama reportedly went on to sign a classified directive last year [14] enabling the government to seize control of private networks, and the 2012 NDAA (National Defense Authorization Act) includes terms [15, section 954] that authorize offensive attacks on foreign threats [16].  The official United States policy already is to deem any cyberattack on the U.S. as an "act of war" [17], and it looks like these types of actions and attacks have already been made legal.

While it may once have been a subject of fiction [18], it's now and has been a harsh reality that we're in the middle of a new era in warfare, and the battles are already well-underway as countries around the world are openly engaging in offensive attacks on one another that are impacting economies on a massive scale.  I don't know what else to call this other than a world war—even the CIA's Center for the Study of Intelligence (CSI) predicted this [19], as have many others even earlier [20].  

Here's a thought; if our constitution gives us the right to bear arms, and the government deems these types of attacks as acts of war, then isn't it our right to keep and bear these arms?  Yet another case for a mass-algorate society [21], which Mr. Obama appears to agree with me on [22], at the very least.

[1]: http://www.nytimes.com/2013/02/19/technology/chinas-army-is-seen-as-tied-to-hacking-against-us.html
[2]: http://intelreport.mandiant.com/
[3]: http://en.wikipedia.org/wiki/Titan_Rain
[4]: http://www.time.com/time/nation/article/0,8599,1098371,00.html
[5]: http://www.zdnet.com/news/security-experts-lift-lid-on-chinese-hack-attacks/145763
[6]: http://www.whitehouse.gov/sites/default/files/rss_viewer/international_strategy_for_cyberspace.pdf
[7]: http://online.wsj.com/article/SB10001424052702304563104576355623135782718.html
[8]: http://en.wikipedia.org/wiki/2007_cyberattacks_on_Estonia
[9]: http://www.vedomosti.ru/smartmoney/article/2007/05/28/3004
[10]: http://www.zdnet.com/meet-gauss-the-latest-cyber-espionage-tool-7000002405/
[11]: http://www.nytimes.com/2012/06/01/world/middleeast/obama-ordered-wave-of-cyberattacks-against-iran.html?pagewanted=all
[12]: http://www.bbc.co.uk/news/technology-11388018
[13]: http://www.zdnet.com/meet-gauss-the-latest-cyber-espionage-tool-7000002405/
[14]: http://endthelie.com/2012/11/15/obama-reportedly-signs-classified-cyberwarfare-policy-directive-with-troubling-implications/#axzz2LMPlf8iA
[15]: http://www.gpo.gov/fdsys/pkg/BILLS-112hr1540enr/pdf/BILLS-112hr1540enr.pdf
[16]: http://endthelie.com/2011/12/17/approval-of-covert-offensive-cyberwar-sneakily-inserted-into-ndaa/
[17]: http://www.forbes.com/sites/reuvencohen/2012/06/05/the-white-house-and-pentagon-deem-cyber-attacks-an-act-of-war/
[18]: http://en.wikipedia.org/wiki/Neuromancer
[19]: https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/vol48no4/new_face_of_war.html
[20]: http://www.rand.org/content/dam/rand/pubs/reprints/2007/RAND_RP223.pdf
[21]: https://plus.google.com/112353210404102902472/posts/MVQXyw9EJDE
[22]: http://news.cnet.com/8301-17938_105-57569503-1/obama-endorses-required-high-school-coding-classes/

Attachments

China’s Army Is Seen as Tied to Hacking Against U.S.

An overwhelming percentage of the attacks on American companies and government agencies start in a building on the edge of Shanghai, say cybersecurity experts and American intelligence officials.

5 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.