The new EricMartindale.com is an experiment in data aggregation, and might have a few bugs. Feel free to explore, and then provide feedback directly to @martindale.

search results for tools

My Top 3 Twitter Tools

I've been using Twitter since pretty early on (and long before @oprah), and I've found it to be a superbly convenient communication tool and notification service. Even though it's still very young on the web (Twitter was founded in March of 2006) It's been the home to great ideas like the #twitterdata proposal and the publicdomain book-via-tweets project. It's also an awesome reputation management platform, and can be used to both to provide effective customer service and help distribute news and updates about your business or product, which is exactly how I use it for my online roleplaying project.

But as with the rest of the social media world, Twitter can become very complex very quickly (but I still contend that there is no social media overload) and as a result, can be difficult to manage. As a result, I use several third-party tools to help me manage and gather information that helps me do my Twitter job much more efficiently and effectively.

Splitweet [caption id="attachment_196" align="alignnone" width="300" caption="Splitweet allows you to post and monitor multiple Twitter accounts and brands."]Splitweet allows you to post and monitor multiple Twitter accounts and brands.[/caption]

For those of us with multiple Twitter accounts (like some people who create a Twitter account for each roleplaying character they use), Splitweet is an absolute savior. This service allows you to tweet to multiple accounts at the same time, as well as combining the "stream" from each account into one page. A lot of desktop Twitter clients offer this kind of functionality, but where Splitweet truly excels is in its ability to track what it calls "brands" (more reputation management terms here): you can specify keywords and phrases that will appear in a separate feed, even if you do not follow those users. This gets us around the disastrous changes Twitter made to the @replies, and helps us keep up to date on any mentions of our site's name and any tweets relating to what it is that we do.

Sherflock [caption id="attachment_195" align="alignnone" width="300" caption="Sherflock provides detailed statistics and summaries of Twitter users you are associated with."]Sherflock provides detailed statistics and summaries of Twitter users you are associated with.[/caption]

Sherflock is an absolutely awesome stat tracking machine that helps weed out the waves of spam that have been coming in since Twitter has gone mainstream. Sherflock gives a large number of statistics about each every account the either follows you or that you are following, and lets you sort and filter users based on these statistics.

Twitterfall [caption id="attachment_194" align="alignnone" width="217" caption="Twitterfall offers a live stream of twitter updates on keywords that you specify."]Twitterfall offers a live stream of twitter updates on keywords that you specify.[/caption]

This tool allows you to specify any number of keywords that you wish to view on a live, moving stream of tweets. This is very useful if you are using a computer that allows you to "pin" a window on top (like Ubuntu Linux), or if you have a multiple-monitor rig, or even if you use multiple computers using the input-sharing app Synergy. You'll get a live feed of updates on any topic of your choice, which can even be updated and changed in real-time.

Using these three tools will help you maximize you Twitter performance and make the most of an already awesome service, preventing you from being inundated with the massive stream of messages that you're surely going to subscribe to.

What are your top three Twitter tools? Feel free to make a comment or write your own post, and I'll gladly append a link to this post to help everyone out!

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

On the Ongoing Attacks between China, U.S., Russia, Israel, etc.… The latest round of evidence of ongoing...

On the Ongoing Attacks between China, U.S., Russia, Israel, etc.…
The latest round of evidence of ongoing digital warfare between the superpowers is now being reported in the N.Y. Times [1] after an undeniably incriminating 60-page report on the Chinese attacks on the U.S. by security firm Mandiant [2].

“Either they are coming from inside Unit 61398, or the people who run the most-controlled, most-monitored Internet networks in the world are clueless about thousands of people generating attacks from this one neighborhood.”
                                                    — Kevin Mandia

The report goes on to track individual participants in the attack, tracing them back to the headquarters of P.L.A. Unit 61398.

Attacks from the Chinese have been ongoing for many years, notably back to Operation Titan Rain [3] in 2003, in which attackers gained access to military intelligence networks at organizations such as Lockheed Martin, Sandia National Laboratories, Redstone Arsenal, and NASA [4].  Direct military targets were also included in the assault, such as the U.S. Army Information Systems Engineering Command at Fort Huachuca, Arizona, the Defense Information Systems Agency in Arlington, Virginia, the Naval Ocean Systems Center, a Defense Department installation in San Diego, California, and the U.S. Army Space and Strategic Defense installation in Huntsville, Alabama [5]. 

These ongoing attacks are labeled "Advanced Persistent Threats" or "APT" by the American Military, are considered acts of war by both the White House [6] and the Department of Defense [7] as far back as 2011, and are not unique to the Chinese origins.  You may remember the 2007 attacks on Estonia [8], which has been attributed to entities within Russian territory operating with the assistance of the Russian government [9].  These attacks disabled a wide array of Estonian government sites, rendering services in the world's most digitally-connected country unusable.  The attacks also disabled ATM machines, effectively disabling some portion of the Estonian economy.

The United States [and arguably Israel, [10]] have also been actively participating in these attacks [11] with the deploying of FLAME and Stuxnet against Iran, which made international headlines this past year when the coordinated efforts of the tools were used to disable Iranian nuclear centrifuges in an attempt to slow their progress in their nuclear program [12].  These efforts are ongoing, with the latest addition of the Gauss and Duqu malwares [13] continuing to target middle-eastern countries.

“From his first months in office, President Obama secretly ordered increasingly sophisticated attacks on the computer systems that run Iran’s main nuclear enrichment facilities, significantly expanding America’s first sustained use of cyberweapons, according to participants in the program.”
                                                    — +The New York Times

Obama reportedly went on to sign a classified directive last year [14] enabling the government to seize control of private networks, and the 2012 NDAA (National Defense Authorization Act) includes terms [15, section 954] that authorize offensive attacks on foreign threats [16].  The official United States policy already is to deem any cyberattack on the U.S. as an "act of war" [17], and it looks like these types of actions and attacks have already been made legal.

While it may once have been a subject of fiction [18], it's now and has been a harsh reality that we're in the middle of a new era in warfare, and the battles are already well-underway as countries around the world are openly engaging in offensive attacks on one another that are impacting economies on a massive scale.  I don't know what else to call this other than a world war—even the CIA's Center for the Study of Intelligence (CSI) predicted this [19], as have many others even earlier [20].  

Here's a thought; if our constitution gives us the right to bear arms, and the government deems these types of attacks as acts of war, then isn't it our right to keep and bear these arms?  Yet another case for a mass-algorate society [21], which Mr. Obama appears to agree with me on [22], at the very least.

[1]: http://www.nytimes.com/2013/02/19/technology/chinas-army-is-seen-as-tied-to-hacking-against-us.html
[2]: http://intelreport.mandiant.com/
[3]: http://en.wikipedia.org/wiki/Titan_Rain
[4]: http://www.time.com/time/nation/article/0,8599,1098371,00.html
[5]: http://www.zdnet.com/news/security-experts-lift-lid-on-chinese-hack-attacks/145763
[6]: http://www.whitehouse.gov/sites/default/files/rss_viewer/international_strategy_for_cyberspace.pdf
[7]: http://online.wsj.com/article/SB10001424052702304563104576355623135782718.html
[8]: http://en.wikipedia.org/wiki/2007_cyberattacks_on_Estonia
[9]: http://www.vedomosti.ru/smartmoney/article/2007/05/28/3004
[10]: http://www.zdnet.com/meet-gauss-the-latest-cyber-espionage-tool-7000002405/
[11]: http://www.nytimes.com/2012/06/01/world/middleeast/obama-ordered-wave-of-cyberattacks-against-iran.html?pagewanted=all
[12]: http://www.bbc.co.uk/news/technology-11388018
[13]: http://www.zdnet.com/meet-gauss-the-latest-cyber-espionage-tool-7000002405/
[14]: http://endthelie.com/2012/11/15/obama-reportedly-signs-classified-cyberwarfare-policy-directive-with-troubling-implications/#axzz2LMPlf8iA
[15]: http://www.gpo.gov/fdsys/pkg/BILLS-112hr1540enr/pdf/BILLS-112hr1540enr.pdf
[16]: http://endthelie.com/2011/12/17/approval-of-covert-offensive-cyberwar-sneakily-inserted-into-ndaa/
[17]: http://www.forbes.com/sites/reuvencohen/2012/06/05/the-white-house-and-pentagon-deem-cyber-attacks-an-act-of-war/
[18]: http://en.wikipedia.org/wiki/Neuromancer
[19]: https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/vol48no4/new_face_of_war.html
[20]: http://www.rand.org/content/dam/rand/pubs/reprints/2007/RAND_RP223.pdf
[21]: https://plus.google.com/112353210404102902472/posts/MVQXyw9EJDE
[22]: http://news.cnet.com/8301-17938_105-57569503-1/obama-endorses-required-high-school-coding-classes/

Attachments

China’s Army Is Seen as Tied to Hacking Against U.S.

An overwhelming percentage of the attacks on American companies and government agencies start in a building on the edge of Shanghai, say cybersecurity experts and American intelligence officials.

5 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

On the Ongoing Attacks between China, U.S., Russia, Israel, etc.… The latest round of evidence of ongoing...

On the Ongoing Attacks between China, U.S., Russia, Israel, etc.…
The latest round of evidence of ongoing digital warfare between the superpowers is now being reported in the N.Y. Times [1] after an undeniably incriminating 60-page report on the Chinese attacks on the U.S. by security firm Mandiant [2].

“Either they are coming from inside Unit 61398, or the people who run the most-controlled, most-monitored Internet networks in the world are clueless about thousands of people generating attacks from this one neighborhood.”
                                                    — Kevin Mandia

The report goes on to track individual participants in the attack, tracing them back to the headquarters of P.L.A. Unit 61398.

Attacks from the Chinese have been ongoing for many years, notably back to Operation Titan Rain [3] in 2003, in which attackers gained access to military intelligence networks at organizations such as Lockheed Martin, Sandia National Laboratories, Redstone Arsenal, and NASA [4].  Direct military targets were also included in the assault, such as the U.S. Army Information Systems Engineering Command at Fort Huachuca, Arizona, the Defense Information Systems Agency in Arlington, Virginia, the Naval Ocean Systems Center, a Defense Department installation in San Diego, California, and the U.S. Army Space and Strategic Defense installation in Huntsville, Alabama [5]. 

These ongoing attacks are labeled "Advanced Persistent Threats" or "APT" by the American Military, are considered acts of war by both the White House [6] and the Department of Defense [7] as far back as 2011, and are not unique to the Chinese origins.  You may remember the 2007 attacks on Estonia [8], which has been attributed to entities within Russian territory operating with the assistance of the Russian government [9].  These attacks disabled a wide array of Estonian government sites, rendering services in the world's most digitally-connected country unusable.  The attacks also disabled ATM machines, effectively disabling some portion of the Estonian economy.

The United States [and arguably Israel, [10]] have also been actively participating in these attacks [11] with the deploying of FLAME and Stuxnet against Iran, which made international headlines this past year when the coordinated efforts of the tools were used to disable Iranian nuclear centrifuges in an attempt to slow their progress in their nuclear program [12].  These efforts are ongoing, with the latest addition of the Gauss and Duqu malwares [13] continuing to target middle-eastern countries.

“From his first months in office, President Obama secretly ordered increasingly sophisticated attacks on the computer systems that run Iran’s main nuclear enrichment facilities, significantly expanding America’s first sustained use of cyberweapons, according to participants in the program.”
                                                    — +The New York Times

Obama reportedly went on to sign a classified directive last year [14] enabling the government to seize control of private networks, and the 2012 NDAA (National Defense Authorization Act) includes terms [15, section 954] that authorize offensive attacks on foreign threats [16].  The official United States policy already is to deem any cyberattack on the U.S. as an "act of war" [17], and it looks like these types of actions and attacks have already been made legal.

While it may once have been a subject of fiction [18], it's now and has been a harsh reality that we're in the middle of a new era in warfare, and the battles are already well-underway as countries around the world are openly engaging in offensive attacks on one another that are impacting economies on a massive scale.  I don't know what else to call this other than a world war—even the CIA's Center for the Study of Intelligence (CSI) predicted this [19], as have many others even earlier [20].  

Here's a thought; if our constitution gives us the right to bear arms, and the government deems these types of attacks as acts of war, then isn't it our right to keep and bear these arms?  Yet another case for a mass-algorate society [21], which Mr. Obama appears to agree with me on [22], at the very least.

[1]: http://www.nytimes.com/2013/02/19/technology/chinas-army-is-seen-as-tied-to-hacking-against-us.html
[2]: http://intelreport.mandiant.com/
[3]: http://en.wikipedia.org/wiki/Titan_Rain
[4]: http://www.time.com/time/nation/article/0,8599,1098371,00.html
[5]: http://www.zdnet.com/news/security-experts-lift-lid-on-chinese-hack-attacks/145763
[6]: http://www.whitehouse.gov/sites/default/files/rss_viewer/international_strategy_for_cyberspace.pdf
[7]: http://online.wsj.com/article/SB10001424052702304563104576355623135782718.html
[8]: http://en.wikipedia.org/wiki/2007_cyberattacks_on_Estonia
[9]: http://www.vedomosti.ru/smartmoney/article/2007/05/28/3004
[10]: http://www.zdnet.com/meet-gauss-the-latest-cyber-espionage-tool-7000002405/
[11]: http://www.nytimes.com/2012/06/01/world/middleeast/obama-ordered-wave-of-cyberattacks-against-iran.html?pagewanted=all
[12]: http://www.bbc.co.uk/news/technology-11388018
[13]: http://www.zdnet.com/meet-gauss-the-latest-cyber-espionage-tool-7000002405/
[14]: http://endthelie.com/2012/11/15/obama-reportedly-signs-classified-cyberwarfare-policy-directive-with-troubling-implications/#axzz2LMPlf8iA
[15]: http://www.gpo.gov/fdsys/pkg/BILLS-112hr1540enr/pdf/BILLS-112hr1540enr.pdf
[16]: http://endthelie.com/2011/12/17/approval-of-covert-offensive-cyberwar-sneakily-inserted-into-ndaa/
[17]: http://www.forbes.com/sites/reuvencohen/2012/06/05/the-white-house-and-pentagon-deem-cyber-attacks-an-act-of-war/
[18]: http://en.wikipedia.org/wiki/Neuromancer
[19]: https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/vol48no4/new_face_of_war.html
[20]: http://www.rand.org/content/dam/rand/pubs/reprints/2007/RAND_RP223.pdf
[21]: https://plus.google.com/112353210404102902472/posts/MVQXyw9EJDE
[22]: http://news.cnet.com/8301-17938_105-57569503-1/obama-endorses-required-high-school-coding-classes/

Attachments

China’s Army Is Seen as Tied to Hacking Against U.S.

An overwhelming percentage of the attacks on American companies and government agencies start in a building on the edge of Shanghai, say cybersecurity experts and American intelligence officials.

1 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

On the Ongoing Attacks between China, U.S., Russia, Israel, etc.… The latest round of evidence of ongoing...

On the Ongoing Attacks between China, U.S., Russia, Israel, etc.…
The latest round of evidence of ongoing digital warfare between the superpowers is now being reported in the N.Y. Times [1] after an undeniably incriminating 60-page report on the Chinese attacks on the U.S. by security firm Mandiant [2].

“Either they are coming from inside Unit 61398, or the people who run the most-controlled, most-monitored Internet networks in the world are clueless about thousands of people generating attacks from this one neighborhood.”
                                                    — Kevin Mandia

The report goes on to track individual participants in the attack, tracing them back to the headquarters of P.L.A. Unit 61398.

Attacks from the Chinese have been ongoing for many years, notably back to Operation Titan Rain [3] in 2003, in which attackers gained access to military intelligence networks at organizations such as Lockheed Martin, Sandia National Laboratories, Redstone Arsenal, and NASA [4].  Direct military targets were also included in the assault, such as the U.S. Army Information Systems Engineering Command at Fort Huachuca, Arizona, the Defense Information Systems Agency in Arlington, Virginia, the Naval Ocean Systems Center, a Defense Department installation in San Diego, California, and the U.S. Army Space and Strategic Defense installation in Huntsville, Alabama [5]. 

These ongoing attacks are labeled "Advanced Persistent Threats" or "APT" by the American Military, are considered acts of war by both the White House [6] and the Department of Defense [7] as far back as 2011, and are not unique to the Chinese origins.  You may remember the 2007 attacks on Estonia [8], which has been attributed to entities within Russian territory operating with the assistance of the Russian government [9].  These attacks disabled a wide array of Estonian government sites, rendering services in the world's most digitally-connected country unusable.  The attacks also disabled ATM machines, effectively disabling some portion of the Estonian economy.

The United States [and arguably Israel, [10]] have also been actively participating in these attacks [11] with the deploying of FLAME and Stuxnet against Iran, which made international headlines this past year when the coordinated efforts of the tools were used to disable Iranian nuclear centrifuges in an attempt to slow their progress in their nuclear program [12].  These efforts are ongoing, with the latest addition of the Gauss and Duqu malwares [13] continuing to target middle-eastern countries.

“From his first months in office, President Obama secretly ordered increasingly sophisticated attacks on the computer systems that run Iran’s main nuclear enrichment facilities, significantly expanding America’s first sustained use of cyberweapons, according to participants in the program.”
                                                    — +The New York Times

Obama reportedly went on to sign a classified directive last year [14] enabling the government to seize control of private networks, and the 2012 NDAA (National Defense Authorization Act) includes terms [15, section 954] that authorize offensive attacks on foreign threats [16].  The official United States policy already is to deem any cyberattack on the U.S. as an "act of war" [17], and it looks like these types of actions and attacks have already been made legal.

While it may once have been a subject of fiction [18], it's now and has been a harsh reality that we're in the middle of a new era in warfare, and the battles are already well-underway as countries around the world are openly engaging in offensive attacks on one another that are impacting economies on a massive scale.  I don't know what else to call this other than a world war—even the CIA's Center for the Study of Intelligence (CSI) predicted this [19], as have many others even earlier [20].  

Here's a thought; if our constitution gives us the right to bear arms, and the government deems these types of attacks as acts of war, then isn't it our right to keep and bear these arms?  Yet another case for a mass-algorate society [21], which Mr. Obama appears to agree with me on [22], at the very least.

[1]: http://www.nytimes.com/2013/02/19/technology/chinas-army-is-seen-as-tied-to-hacking-against-us.html
[2]: http://intelreport.mandiant.com/
[3]: http://en.wikipedia.org/wiki/Titan_Rain
[4]: http://www.time.com/time/nation/article/0,8599,1098371,00.html
[5]: http://www.zdnet.com/news/security-experts-lift-lid-on-chinese-hack-attacks/145763
[6]: http://www.whitehouse.gov/sites/default/files/rss_viewer/international_strategy_for_cyberspace.pdf
[7]: http://online.wsj.com/article/SB10001424052702304563104576355623135782718.html
[8]: http://en.wikipedia.org/wiki/2007_cyberattacks_on_Estonia
[9]: http://www.vedomosti.ru/smartmoney/article/2007/05/28/3004
[10]: http://www.zdnet.com/meet-gauss-the-latest-cyber-espionage-tool-7000002405/
[11]: http://www.nytimes.com/2012/06/01/world/middleeast/obama-ordered-wave-of-cyberattacks-against-iran.html?pagewanted=all
[12]: http://www.bbc.co.uk/news/technology-11388018
[13]: http://www.zdnet.com/meet-gauss-the-latest-cyber-espionage-tool-7000002405/
[14]: http://endthelie.com/2012/11/15/obama-reportedly-signs-classified-cyberwarfare-policy-directive-with-troubling-implications/#axzz2LMPlf8iA
[15]: http://www.gpo.gov/fdsys/pkg/BILLS-112hr1540enr/pdf/BILLS-112hr1540enr.pdf
[16]: http://endthelie.com/2011/12/17/approval-of-covert-offensive-cyberwar-sneakily-inserted-into-ndaa/
[17]: http://www.forbes.com/sites/reuvencohen/2012/06/05/the-white-house-and-pentagon-deem-cyber-attacks-an-act-of-war/
[18]: http://en.wikipedia.org/wiki/Neuromancer
[19]: https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/vol48no4/new_face_of_war.html
[20]: http://www.rand.org/content/dam/rand/pubs/reprints/2007/RAND_RP223.pdf
[21]: https://plus.google.com/112353210404102902472/posts/MVQXyw9EJDE
[22]: http://news.cnet.com/8301-17938_105-57569503-1/obama-endorses-required-high-school-coding-classes/

Attachments

China’s Army Is Seen as Tied to Hacking Against U.S.

An overwhelming percentage of the attacks on American companies and government agencies start in a building on the edge of Shanghai, say cybersecurity experts and American intelligence officials.

6 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

On the Ongoing Attacks between China, U.S., Russia, Israel, etc.… The latest round of evidence of ongoing...

On the Ongoing Attacks between China, U.S., Russia, Israel, etc.…
The latest round of evidence of ongoing digital warfare between the superpowers is now being reported in the N.Y. Times [1] after an undeniably incriminating 60-page report on the Chinese attacks on the U.S. by security firm Mandiant [2].

“Either they are coming from inside Unit 61398, or the people who run the most-controlled, most-monitored Internet networks in the world are clueless about thousands of people generating attacks from this one neighborhood.”
                                                    — Kevin Mandia

The report goes on to track individual participants in the attack, tracing them back to the headquarters of P.L.A. Unit 61398.

Attacks from the Chinese have been ongoing for many years, notably back to Operation Titan Rain [3] in 2003, in which attackers gained access to military intelligence networks at organizations such as Lockheed Martin, Sandia National Laboratories, Redstone Arsenal, and NASA [4].  Direct military targets were also included in the assault, such as the U.S. Army Information Systems Engineering Command at Fort Huachuca, Arizona, the Defense Information Systems Agency in Arlington, Virginia, the Naval Ocean Systems Center, a Defense Department installation in San Diego, California, and the U.S. Army Space and Strategic Defense installation in Huntsville, Alabama [5]. 

These ongoing attacks are labeled "Advanced Persistent Threats" or "APT" by the American Military, are considered acts of war by both the White House [6] and the Department of Defense [7] as far back as 2011, and are not unique to the Chinese origins.  You may remember the 2007 attacks on Estonia [8], which has been attributed to entities within Russian territory operating with the assistance of the Russian government [9].  These attacks disabled a wide array of Estonian government sites, rendering services in the world's most digitally-connected country unusable.  The attacks also disabled ATM machines, effectively disabling some portion of the Estonian economy.

The United States [and arguably Israel, [10]] have also been actively participating in these attacks [11] with the deploying of FLAME and Stuxnet against Iran, which made international headlines this past year when the coordinated efforts of the tools were used to disable Iranian nuclear centrifuges in an attempt to slow their progress in their nuclear program [12].  These efforts are ongoing, with the latest addition of the Gauss and Duqu malwares [13] continuing to target middle-eastern countries.

“From his first months in office, President Obama secretly ordered increasingly sophisticated attacks on the computer systems that run Iran’s main nuclear enrichment facilities, significantly expanding America’s first sustained use of cyberweapons, according to participants in the program.”
                                                    — +The New York Times

Obama reportedly went on to sign a classified directive last year [14] enabling the government to seize control of private networks, and the 2012 NDAA (National Defense Authorization Act) includes terms [15, section 954] that authorize offensive attacks on foreign threats [16].  The official United States policy already is to deem any cyberattack on the U.S. as an "act of war" [17], and it looks like these types of actions and attacks have already been made legal.

While it may once have been a subject of fiction [18], it's now and has been a harsh reality that we're in the middle of a new era in warfare, and the battles are already well-underway as countries around the world are openly engaging in offensive attacks on one another that are impacting economies on a massive scale.  I don't know what else to call this other than a world war—even the CIA's Center for the Study of Intelligence (CSI) predicted this [19], as have many others even earlier [20].  

Here's a thought; if our constitution gives us the right to bear arms, and the government deems these types of attacks as acts of war, then isn't it our right to keep and bear these arms?  Yet another case for a mass-algorate society [21], which Mr. Obama appears to agree with me on [22], at the very least.

[1]: http://www.nytimes.com/2013/02/19/technology/chinas-army-is-seen-as-tied-to-hacking-against-us.html
[2]: http://intelreport.mandiant.com/
[3]: http://en.wikipedia.org/wiki/Titan_Rain
[4]: http://www.time.com/time/nation/article/0,8599,1098371,00.html
[5]: http://www.zdnet.com/news/security-experts-lift-lid-on-chinese-hack-attacks/145763
[6]: http://www.whitehouse.gov/sites/default/files/rss_viewer/international_strategy_for_cyberspace.pdf
[7]: http://online.wsj.com/article/SB10001424052702304563104576355623135782718.html
[8]: http://en.wikipedia.org/wiki/2007_cyberattacks_on_Estonia
[9]: http://www.vedomosti.ru/smartmoney/article/2007/05/28/3004
[10]: http://www.zdnet.com/meet-gauss-the-latest-cyber-espionage-tool-7000002405/
[11]: http://www.nytimes.com/2012/06/01/world/middleeast/obama-ordered-wave-of-cyberattacks-against-iran.html?pagewanted=all
[12]: http://www.bbc.co.uk/news/technology-11388018
[13]: http://www.zdnet.com/meet-gauss-the-latest-cyber-espionage-tool-7000002405/
[14]: http://endthelie.com/2012/11/15/obama-reportedly-signs-classified-cyberwarfare-policy-directive-with-troubling-implications/#axzz2LMPlf8iA
[15]: http://www.gpo.gov/fdsys/pkg/BILLS-112hr1540enr/pdf/BILLS-112hr1540enr.pdf
[16]: http://endthelie.com/2011/12/17/approval-of-covert-offensive-cyberwar-sneakily-inserted-into-ndaa/
[17]: http://www.forbes.com/sites/reuvencohen/2012/06/05/the-white-house-and-pentagon-deem-cyber-attacks-an-act-of-war/
[18]: http://en.wikipedia.org/wiki/Neuromancer
[19]: https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/vol48no4/new_face_of_war.html
[20]: http://www.rand.org/content/dam/rand/pubs/reprints/2007/RAND_RP223.pdf
[21]: https://plus.google.com/112353210404102902472/posts/MVQXyw9EJDE
[22]: http://news.cnet.com/8301-17938_105-57569503-1/obama-endorses-required-high-school-coding-classes/

Attachments

China’s Army Is Seen as Tied to Hacking Against U.S.

An overwhelming percentage of the attacks on American companies and government agencies start in a building on the edge of Shanghai, say cybersecurity experts and American intelligence officials.

5 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Coursefork Among Top 10 Open Source Projects of 2013

I'm so pleased that +Coursefork made +Opensource.com's list of the top 10 open-source projects for 2013... this puts us alongside +Docker and +OpenStack, a true honor in my book.

If you haven't heard what the team has been working on, Coursefork is building an open-source collaboration tool for educators.  In the same way software creators can re-use open-source resources to get ahead in the development cycle, we want to enable teachers to re-use materials and improvements thereof to allow for the accretion of teaching techniques in place of continual re-invention.

“We're creating the pull request for courses, and the process of getting there means creating the tools necessary to support the community of a new open future for education.”

Learn more in this interview on OpenSource.com: http://opensource.com/education/13/9/coursefork-education-tool

Attachments

Top 10 open source projects in 2013 |

Best of Opensource.com in 2013: Top 10 open source projects of the year.

6 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Coursefork Among Top 10 Open Source Projects of 2013 I'm so pleased that +Coursefork made +Opensource.com's...

Coursefork Among Top 10 Open Source Projects of 2013
I'm so pleased that +Coursefork made +Opensource.com's list of the top 10 open-source projects for 2013... this puts us alongside +Docker and +OpenStack, a true honor in my book.

If you haven't heard what the team has been working on, Coursefork is building an open-source collaboration tool for educators.  In the same way software creators can re-use open-source resources to get ahead in the development cycle, we want to enable teachers to re-use materials and improvements thereof to allow for the accretion of teaching techniques in place of continual re-invention.

“We're creating the pull request for courses, and the process of getting there means creating the tools necessary to support the community of a new open future for education.”

Learn more in this interview on OpenSource.com: http://opensource.com/education/13/9/coursefork-education-tool

Attachments

Top 10 open source projects in 2013 |

Best of Opensource.com in 2013: Top 10 open source projects of the year.

4 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Coursefork Among Top 10 Open Source Projects of 2013 I'm so pleased that +Coursefork made +Opensource.com's...

Coursefork Among Top 10 Open Source Projects of 2013
I'm so pleased that +Coursefork made +Opensource.com's list of the top 10 open-source projects for 2013... this puts us alongside +Docker and +OpenStack, a true honor in my book.

If you haven't heard what the team has been working on, Coursefork is building an open-source collaboration tool for educators.  In the same way software creators can re-use open-source resources to get ahead in the development cycle, we want to enable teachers to re-use materials and improvements thereof to allow for the accretion of teaching techniques in place of continual re-invention.

“We're creating the pull request for courses, and the process of getting there means creating the tools necessary to support the community of a new open future for education.”

Learn more in this interview on OpenSource.com: http://opensource.com/education/13/9/coursefork-education-tool

Attachments

Top 10 open source projects in 2013 |

Best of Opensource.com in 2013: Top 10 open source projects of the year.

1 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Coursefork Among Top 10 Open Source Projects of 2013 I'm so pleased that +Coursefork made +Opensource.com's...

Coursefork Among Top 10 Open Source Projects of 2013
I'm so pleased that +Coursefork made +Opensource.com's list of the top 10 open-source projects for 2013... this puts us alongside +Docker and +OpenStack, a true honor in my book.

If you haven't heard what the team has been working on, Coursefork is building an open-source collaboration tool for educators.  In the same way software creators can re-use open-source resources to get ahead in the development cycle, we want to enable teachers to re-use materials and improvements thereof to allow for the accretion of teaching techniques in place of continual re-invention.

“We're creating the pull request for courses, and the process of getting there means creating the tools necessary to support the community of a new open future for education.”

Learn more in this interview on OpenSource.com: http://opensource.com/education/13/9/coursefork-education-tool

Attachments

Top 10 open source projects in 2013 |

Best of Opensource.com in 2013: Top 10 open source projects of the year.

4 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

The question is, when will people... in reply to

The question is, when will people who rage about php stop treating coding like a religion and start realizing that tools are just tools, and the best tool for the job isn't necessarily the be all and end all of code.
I'm so tired of hearing people bemoan the horrors of php without having an alternative that offers any advantage whatsoever to the majority of my uses.

I wouldn't throw away my car because it's an ugly color or had a few dents in it if the only alternative was to buy a truck.

It's a good article, and Eric is always good about finding contrary opinions and listening, but a grain of salt is always necessary.

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Doesn't sound like a targeted attack... in reply to

Doesn't sound like a targeted attack but, just accidental luck to get into something thought to be secured.

Personally I think that in the IT industry there needs to be proactive training for all software developers because there is a serious deficit on security education and its very hard to keep up because of its ever changing nature. Better yet would be a strong investment in automated tools which could evaluate code for exploits. I'm sure some automated security checking exists out there but, I can tell you that if banks aren't using this sort of tool then I doubt many companies are.

Getting rid of Adobe reader and flash would also help greatly...

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Letter Sweep

Following suit with the likes of Tim Bray and Eric Meyer, I figured I'd throw together my browser's letter sweep tonight.

  • [A]dmin Site. Yeah, I guess I would be visiting the admin panel for this. Quite frequently.
  • Mirascape's [B]log. An infrequent haunt of mine, but fairly obvious.
  • [C]MON. Cluster Monitor for MySQL Cluster, something I almost always have open.
  • Google [D]ocs. This one is painfully obvious, I use Google Docs extensively.
  • [E]ricMartindale.com. Okay, that's a gimme. Does this make me egocentric?
  • [F]acebook. I'm actually fairly ashamed of this one. Why can't I have a cool F site? sadface
  • [G]mail. Three accounts linked using Google's Multiple Sign-in. Open [almost] all day.
  • [H]ighcharts JS. A pretty kick-ass Javascript library for generating charts on the clientside.
  • [I]nternal Discussion. A site for communication with my team. :)
  • [J]Query Mobile Demo, 1.0 alpha 3. I've been spending a lot of time toying with jQuery Mobile, seeing where it's going compared to Sencha Touch.
  • [K]r.github.com. Keith Rarick's GitHub redirect. Total ass-kicker.
  • [L]inkedIn. Pretty straightforward, between hiring for our team at @Mirascape and the travel to and from various conferences and Meetups lately.
  • [M]irascape. The augmented reality platform I'm responsible for.
  • [N]oxBot. A nice PHP-powered IRC bot with various plugins. A bit out of date, but very powerful. Been using it for a couple things lately.
  • [O]K, QR Me!. A QR Code-generating link shortener I built.
  • [P]ostmark. Best Email delivery service I've used. Nice RESTful API, flat rate for emails sent.
  • [Q]uora. These guys nail Q&A, and they're doing it pretty well. Check out all their buzz, too. But for some reason, I just don't stick.
  • Google [R]eader. “From your 1,040 subscriptions, over the last 30 days you read 21,549 items, clicked 274 items, starred 853 items, shared 37 items, and emailed 8 items.” -- </stats>
  • [S]erver Stats for Mirascape. Powered by Munin, it's how I keep track of the status and metrics of all my servers.
  • [T]witter. Not surprising. I love their webapp for my personal use, but own and manage at least five accounts using SplitTweet.
  • [U]serVoice. Pretty sweet tool I use for giving the communities I manage a good way to build a consensus on what they desire most. Examples I run: for RolePlayGateway, and EVE UserVoice for EVE Online.
  • Google [V]oice. Allows me to use SMS from my computer, read (as opposed to listen to) voicemail. Great tool. If only it supported MMS.
  • [W]achovia. One of the places I do banking.
  • [X]DA Developers. An indisposable resource for getting rid of carrier-installed crap and running my own choice of software on the hardware I purchased!
  • [Y]ouTube. Another big namer. No surprise.
  • [Z]ecco. Where I trade most of my public stocks. :)

Surprisingly populist, and there's a lot of Google-owned properties in there. I'm also using Chromium, so I think it prefers the roots of the sites I visit instead of searching through my history for individual pages.

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Onward, and Ever Upward

2013 was an amazing year; between founding +Coursefork, building soundtrack.io and para.io, working with several amazing startups [1], and being allowed to call myself a peer to some of the smartest people I know all throughout, it has been a year of both great achievement and personal growth.  This sets an incredibly compelling stage for 2014 and everything to come therein.

Today, I'm excited to announce that I'll be joining the likes of Jeff Garzik [2], Patrick Nagurny, and Ian Patton under the leadership of CTO Stephen Pair at +Bitpay, which allows anyone to quickly and seamlessly accept Bitcoin as payment, settling immediately in any currency, including USD.

Bitcoin has become one of the biggest stories of 2013, having grown over 9000% in value [3] and even surpassing Western Union in transaction volume [4].  As potentially the most counterfeit-proof form of payment in history, Bitcoin is poised to become one of the most disruptive technologies since the invention of the Internet as society moves increasingly into decentralized systems in an era of waning trust and increasing technological awareness by growing economies like China, India, and Brazil [5].

Taking advantage of this trend of decentralization, BitPay is perfectly positioned to serve as the mechanism for BitCoin's mass-adoption as massive merchants such as +Overstock.com move to accept this new form of payment.  It's exciting to be involved with a company in this position at such an early stage, and expand the breadth of my experience to include another decentralized system, and especially to be holding the responsibility of expanding the company's open-source initiatives and engaging the developer community in a meaningful way.

After parting ways with Coursefork late last year, I've taken a seat on the Board of Advisors, allowing the amazing team we built to realize the vision of open-sourcing the world of education [6] under the leadership of CTO +Brian Marks.  Brian was previously the CTO of successful education startup WebAssign [7], and will be an excellent steward of Coursefork's team and technology as they move towards the much-needed decentralization and open-sourcing of the education industry.  My best wishes to the team as they endeavor to do so!

Exciting times all around, and I'm truly lucky to be a part of it in so many ways.  Now let's go make the world a better place.

[1]: One of which, DigaForce, was just acquired: http://www.bizjournals.com/triangle/news/2014/01/02/apex-tech-firm-strategic-link-partners.html?page=all — congratulations to +Anthony Pompliano and +Matthew Cotter!
[2]: Jeff is one of the core developers of Bitcoin and a former +Red Hat team member from Raleigh.  How's that for the Triangle Company Family tree, +Derrick Minor?!
[3]: http://www.theblaze.com/stories/2013/11/29/which-currency-is-up-over-9000-this-year-and-sells-for-almost-as-much-as-an-ounce-of-gold/
[4]: http://www.businessinsider.com/bitcoin-can-be-the-new-western-union-2013-12
[5]: You might recall that in March of 2013, the Cypriot government restricted withdrawals and then utilized citizens' bank accounts directly to bail out their banking system, resulting in a surge in Bitcoin prices as individuals fled the fiat currency: http://money.cnn.com/2013/03/28/investing/bitcoin-cyprus/
[6]: Here's an interview I did while CTO of Coursefork with +Jason Hibbets from +Opensource.com that explains the vision: http://opensource.com/education/13/9/coursefork-education-tool
[7]: As a cofounder and CTO at WebAssign for 13 years, Brian took the education company from zero to over $30M in yearly revenue before becoming my co-founder at Coursefork.

Attachments

Stephen Pair: BitCoin Economy

Stephen Pair, Cofounder and CTO, BitPay on doing business in the BitCoin economy.

17 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Onward, and Ever Upward 2013 was an amazing year; between founding +Coursefork, building soundtrack.io...

Onward, and Ever Upward
2013 was an amazing year; between founding +Coursefork, building soundtrack.io and para.io, working with several amazing startups [1], and being allowed to call myself a peer to some of the smartest people I know all throughout, it has been a year of both great achievement and personal growth.  This sets an incredibly compelling stage for 2014 and everything to come therein.

Today, I'm excited to announce that I'll be joining the likes of Jeff Garzik [2], Patrick Nagurny, and Ian Patton under the leadership of CTO Stephen Pair at +Bitpay, which allows anyone to quickly and seamlessly accept Bitcoin as payment, settling immediately in any currency, including USD.

Bitcoin has become one of the biggest stories of 2013, having grown over 9000% in value [3] and even surpassing Western Union in transaction volume [4].  As potentially the most counterfeit-proof form of payment in history, Bitcoin is poised to become one of the most disruptive technologies since the invention of the Internet as society moves increasingly into decentralized systems in an era of waning trust and increasing technological awareness by growing economies like China, India, and Brazil [5].

Taking advantage of this trend of decentralization, BitPay is perfectly positioned to serve as the mechanism for BitCoin's mass-adoption as massive merchants such as +Overstock.com move to accept this new form of payment.  It's exciting to be involved with a company in this position at such an early stage, and expand the breadth of my experience to include another decentralized system, and especially to be holding the responsibility of expanding the company's open-source initiatives and engaging the developer community in a meaningful way.

After parting ways with Coursefork late last year, I've taken a seat on the Board of Advisors, allowing the amazing team we built to realize the vision of open-sourcing the world of education [6] under the leadership of CTO +Brian Marks.  Brian was previously the CTO of successful education startup WebAssign [7], and will be an excellent steward of Coursefork's team and technology as they move towards the much-needed decentralization and open-sourcing of the education industry.  My best wishes to the team as they endeavor to do so!

Exciting times all around, and I'm truly lucky to be a part of it in so many ways.  Now let's go make the world a better place.

[1]: One of which, DigaForce, was just acquired: http://www.bizjournals.com/triangle/news/2014/01/02/apex-tech-firm-strategic-link-partners.html?page=all — congratulations to +Anthony Pompliano and +Matthew Cotter!
[2]: Jeff is one of the core developers of Bitcoin and a former +Red Hat team member from Raleigh.  How's that for the Triangle Company Family tree, +Derrick Minor?!
[3]: http://www.theblaze.com/stories/2013/11/29/which-currency-is-up-over-9000-this-year-and-sells-for-almost-as-much-as-an-ounce-of-gold/
[4]: http://www.businessinsider.com/bitcoin-can-be-the-new-western-union-2013-12
[5]: You might recall that in March of 2013, the Cypriot government restricted withdrawals and then utilized citizens' bank accounts directly to bail out their banking system, resulting in a surge in Bitcoin prices as individuals fled the fiat currency: http://money.cnn.com/2013/03/28/investing/bitcoin-cyprus/
[6]: Here's an interview I did while CTO of Coursefork with +Jason Hibbets from +Opensource.com that explains the vision: http://opensource.com/education/13/9/coursefork-education-tool
[7]: As a cofounder and CTO at WebAssign for 13 years, Brian took the education company from zero to over $30M in yearly revenue before becoming my co-founder at Coursefork.

Attachments

Stephen Pair: BitCoin Economy

Stephen Pair, Cofounder and CTO, BitPay on doing business in the BitCoin economy.

1 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Onward, and Ever Upward 2013 was an amazing year; between founding +Coursefork, building soundtrack.io...

Onward, and Ever Upward
2013 was an amazing year; between founding +Coursefork, building soundtrack.io and para.io, working with several amazing startups [1], and being allowed to call myself a peer to some of the smartest people I know all throughout, it has been a year of both great achievement and personal growth.  This sets an incredibly compelling stage for 2014 and everything to come therein.

Today, I'm excited to announce that I'll be joining the likes of Jeff Garzik [2], Patrick Nagurny, and Ian Patton under the leadership of CTO Stephen Pair at +Bitpay, which allows anyone to quickly and seamlessly accept Bitcoin as payment, settling immediately in any currency, including USD.

Bitcoin has become one of the biggest stories of 2013, having grown over 9000% in value [3] and even surpassing Western Union in transaction volume [4].  As potentially the most counterfeit-proof form of payment in history, Bitcoin is poised to become one of the most disruptive technologies since the invention of the Internet as society moves increasingly into decentralized systems in an era of waning trust and increasing technological awareness by growing economies like China, India, and Brazil [5].

Taking advantage of this trend of decentralization, BitPay is perfectly positioned to serve as the mechanism for BitCoin's mass-adoption as massive merchants such as +Overstock.com move to accept this new form of payment.  It's exciting to be involved with a company in this position at such an early stage, and expand the breadth of my experience to include another decentralized system, and especially to be holding the responsibility of expanding the company's open-source initiatives and engaging the developer community in a meaningful way.

After parting ways with Coursefork late last year, I've taken a seat on the Board of Advisors, allowing the amazing team we built to realize the vision of open-sourcing the world of education [6] under the leadership of CTO +Brian Marks.  Brian was previously the CTO of successful education startup WebAssign [7], and will be an excellent steward of Coursefork's team and technology as they move towards the much-needed decentralization and open-sourcing of the education industry.  My best wishes to the team as they endeavor to do so!

Exciting times all around, and I'm truly lucky to be a part of it in so many ways.  Now let's go make the world a better place.

[1]: One of which, DigaForce, was just acquired: http://www.bizjournals.com/triangle/news/2014/01/02/apex-tech-firm-strategic-link-partners.html?page=all — congratulations to +Anthony Pompliano and +Matthew Cotter!
[2]: Jeff is one of the core developers of Bitcoin and a former +Red Hat team member from Raleigh.  How's that for the Triangle Company Family tree, +Derrick Minor?!
[3]: http://www.theblaze.com/stories/2013/11/29/which-currency-is-up-over-9000-this-year-and-sells-for-almost-as-much-as-an-ounce-of-gold/
[4]: http://www.businessinsider.com/bitcoin-can-be-the-new-western-union-2013-12
[5]: You might recall that in March of 2013, the Cypriot government restricted withdrawals and then utilized citizens' bank accounts directly to bail out their banking system, resulting in a surge in Bitcoin prices as individuals fled the fiat currency: http://money.cnn.com/2013/03/28/investing/bitcoin-cyprus/
[6]: Here's an interview I did while CTO of Coursefork with +Jason Hibbets from +Opensource.com that explains the vision: http://opensource.com/education/13/9/coursefork-education-tool
[7]: As a cofounder and CTO at WebAssign for 13 years, Brian took the education company from zero to over $30M in yearly revenue before becoming my co-founder at Coursefork.

Attachments

Stephen Pair: BitCoin Economy

Stephen Pair, Cofounder and CTO, BitPay on doing business in the BitCoin economy.

1 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Onward, and Ever Upward 2013 was an amazing year; between founding +Coursefork, building soundtrack.io...

Onward, and Ever Upward
2013 was an amazing year; between founding +Coursefork, building soundtrack.io and para.io, working with several amazing startups [1], and being allowed to call myself a peer to some of the smartest people I know all throughout, it has been a year of both great achievement and personal growth.  This sets an incredibly compelling stage for 2014 and everything to come therein.

Today, I'm excited to announce that I'll be joining the likes of Jeff Garzik [2], Patrick Nagurny, and Ian Patton under the leadership of CTO Stephen Pair at +Bitpay, which allows anyone to quickly and seamlessly accept Bitcoin as payment, settling immediately in any currency, including USD.

Bitcoin has become one of the biggest stories of 2013, having grown over 9000% in value [3] and even surpassing Western Union in transaction volume [4].  As potentially the most counterfeit-proof form of payment in history, Bitcoin is poised to become one of the most disruptive technologies since the invention of the Internet as society moves increasingly into decentralized systems in an era of waning trust and increasing technological awareness by growing economies like China, India, and Brazil [5].

Taking advantage of this trend of decentralization, BitPay is perfectly positioned to serve as the mechanism for BitCoin's mass-adoption as massive merchants such as +Overstock.com move to accept this new form of payment.  It's exciting to be involved with a company in this position at such an early stage, and expand the breadth of my experience to include another decentralized system, and especially to be holding the responsibility of expanding the company's open-source initiatives and engaging the developer community in a meaningful way.

After parting ways with Coursefork late last year, I've taken a seat on the Board of Advisors, allowing the amazing team we built to realize the vision of open-sourcing the world of education [6] under the leadership of CTO +Brian Marks.  Brian was previously the CTO of successful education startup WebAssign [7], and will be an excellent steward of Coursefork's team and technology as they move towards the much-needed decentralization and open-sourcing of the education industry.  My best wishes to the team as they endeavor to do so!

Exciting times all around, and I'm truly lucky to be a part of it in so many ways.  Now let's go make the world a better place.

[1]: One of which, DigaForce, was just acquired: http://www.bizjournals.com/triangle/news/2014/01/02/apex-tech-firm-strategic-link-partners.html?page=all — congratulations to +Anthony Pompliano and +Matthew Cotter!
[2]: Jeff is one of the core developers of Bitcoin and a former +Red Hat team member from Raleigh.  How's that for the Triangle Company Family tree, +Derrick Minor?!
[3]: http://www.theblaze.com/stories/2013/11/29/which-currency-is-up-over-9000-this-year-and-sells-for-almost-as-much-as-an-ounce-of-gold/
[4]: http://www.businessinsider.com/bitcoin-can-be-the-new-western-union-2013-12
[5]: You might recall that in March of 2013, the Cypriot government restricted withdrawals and then utilized citizens' bank accounts directly to bail out their banking system, resulting in a surge in Bitcoin prices as individuals fled the fiat currency: http://money.cnn.com/2013/03/28/investing/bitcoin-cyprus/
[6]: Here's an interview I did while CTO of Coursefork with +Jason Hibbets from +Opensource.com that explains the vision: http://opensource.com/education/13/9/coursefork-education-tool
[7]: As a cofounder and CTO at WebAssign for 13 years, Brian took the education company from zero to over $30M in yearly revenue before becoming my co-founder at Coursefork.

Attachments

Stephen Pair: BitCoin Economy

Stephen Pair, Cofounder and CTO, BitPay on doing business in the BitCoin economy.

1 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

&gt;secret tool<br />&gt;people know about it... in reply to

>secret tool
>people know about it

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Yes, it&#39;s a useful tool, but... in reply to

Yes, it's a useful tool, but nonetheless it is going to fall victim to the internet eventually

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Character map in system tools find... in reply to

Character map in system tools find it in their or just right click on to black area an copy then just paste

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

I'm looking to manage a public...

I'm looking to manage a public calendar, and @GoogleCalendar just doesn't cut it (even with Hangouts integration). What tools have you used?

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Every other technological advancement has been... in reply to

Every other technological advancement has been used in law enforcement. We don't chase criminals from horseback anymore, we use automobiles - and with the advent of Flight we employ helicopters. Robotic drones are a tool that will be used. It doesn't surprise or alarm me in the least.

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

<span class="proflinkWrapper"><span class="proflinkPrefix">+</span><a class="proflink" href="https://plus.google.com/114277157189201407389" oid="114277157189201407389">Chad... in reply to

+Chad McConnell I did so from the main page, but sadly the "report feedback" tool is missing from profile pages. Sad day.

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

<span class="proflinkWrapper"><span class="proflinkPrefix">+</span><a class="proflink" href="https://plus.google.com/100704823063108177924" oid="100704823063108177924">Robert... in reply to

+Robert Martin With SOPA your message would have been:
"Character map in system tools ████ it in their or just right click on to black area an ████ then just █████"

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

<span class="proflinkWrapper"><span class="proflinkPrefix">+</span><a class="proflink" href="https://plus.google.com/104458755807282024750" oid="104458755807282024750">Alex... in reply to

+Alex Angelides you might be able to, actually -- using tools like Google Sketchup and MapsGL. Building a portfolio of your past work doesn't have to implicate a third-party service, you could even host it on your own site. And hey, I'd even venture to say you have a great idea for a new company if you wanted to start a portfolio-sharing network for architects!

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Outlook. Google. Go.

I just bought a subscription to the Google Calendar/Microsoft Outlook/Windows Mobile syncing tool, OggSync. It's going to allow me to (finally) sync Google Calendar, my phone's calendar, and my Outlook Calendar. Isn't that hawt?

It's $29.99 per year, and after resolving an issue or two of duplicate events - it's well worth the money.

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

&quot;What you still hear today from... in reply to

"What you still hear today from all kinds of people is how a Stuxnet-type attack requires so much insider knowledge."

Lazy programmers and administrators have said similar things for ages. First it was stack overflow bugs where the claim was it was much too hard to take advantage of them. Now it is a science with automatic intrusion tools that characterize certain types of overflows and develop attacks.

The best thing that can happen right now is benign bored teenagers breaking into systems until the owners can't pretend it isn't a real problem. Hopefully that happens long before organized crime and adversarial nations get into the act.

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Have you heard about Google Ripples yet? Take a look at their blog post here: http://googleblog.blogspot.com...

Have you heard about Google Ripples yet? Take a look at their blog post here: http://googleblog.blogspot.com/2011/10/google-popular-posts-eye-catching.html

1) Find the post you are interested in.
2) Copy its "activityID" from your address bar.
3) Append it to the following URL: https://plus.google.com/ripples/details?activityid=

Image instructions attached. What interesting things can you learn from this tool?

Attachments

1 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Have you heard about Google Ripples yet? Take a look at their blog post here: http://googleblog.blogspot.com...

Have you heard about Google Ripples yet? Take a look at their blog post here: http://googleblog.blogspot.com/2011/10/google-popular-posts-eye-catching.html

1) Find the post you are interested in.
2) Copy its "activityID" from your address bar.
3) Append it to the following URL: https://plus.google.com/ripples/details?activityid=

Image instructions attached. What interesting things can you learn from this tool?

Attachments

1 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Have you heard about Google Ripples yet? Take a look at their blog post here: http://googleblog.blogspot.com...

Have you heard about Google Ripples yet? Take a look at their blog post here: http://googleblog.blogspot.com/2011/10/google-popular-posts-eye-catching.html

1) Find the post you are interested in.
2) Copy its "activityID" from your address bar.
3) Append it to the following URL: https://plus.google.com/ripples/details?activityid=

Image instructions attached. What interesting things can you learn from this tool?

Attachments

20 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Have you heard about Google Ripples yet? Take a look at their blog post here: http://googleblog.blogspot.com...

Have you heard about Google Ripples yet? Take a look at their blog post here: http://googleblog.blogspot.com/2011/10/google-popular-posts-eye-catching.html

1) Find the post you are interested in.
2) Copy its "activityID" from your address bar.
3) Append it to the following URL: https://plus.google.com/ripples/details?activityid=

Image instructions attached. What interesting things can you learn from this tool?

Attachments

1 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

While hiring the first five engineers here at +LocalSense, we've never looked at someone's résumé. Not...

While hiring the first five engineers here at +LocalSense, we've never looked at someone's résumé. Not even once. One of the greatest things about the business world today compared to a decade ago (or even a couple years back!) is that you can directly qualify someone's past work through, at least for software engineers, tools such as GitHub [1]. The best measure of a potential hire's impact is going to be direct observation of their past work, and not a page or two of biography on the individual and their credentials.

Now, this approach remains difficult for more traditional careers in fields like academia and publishing, which simply don't have the agility necessary for something like GitHub or Dribbble [2] to make the impact they have. They have an existing [rigid] infrastructure that places the barrier to entry of any disruptive technology prohibitively high. The most established sectors will struggle the hardest, and perhaps fail the most spectacularly.

[1]: http://github.com/
[2]: http://dribbble.com/

Attachments

Resumes are dangerous by Alex MacCaw

Author: Alex MacCaw, Content: I've been interviewing engineers for a while now, and it seems the more interviews I do, the more I realize how many my initial assumptions about hiring were wrong. F...

20 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

While hiring the first five engineers here at +LocalSense, we've never looked at someone's résumé. Not...

While hiring the first five engineers here at +LocalSense, we've never looked at someone's résumé. Not even once. One of the greatest things about the business world today compared to a decade ago (or even a couple years back!) is that you can directly qualify someone's past work through, at least for software engineers, tools such as GitHub [1]. The best measure of a potential hire's impact is going to be direct observation of their past work, and not a page or two of biography on the individual and their credentials.

Now, this approach remains difficult for more traditional careers in fields like academia and publishing, which simply don't have the agility necessary for something like GitHub or Dribbble [2] to make the impact they have. They have an existing [rigid] infrastructure that places the barrier to entry of any disruptive technology prohibitively high. The most established sectors will struggle the hardest, and perhaps fail the most spectacularly.

[1]: http://github.com/
[2]: http://dribbble.com/

Attachments

Resumes are dangerous by Alex MacCaw

Author: Alex MacCaw, Content: I've been interviewing engineers for a while now, and it seems the more interviews I do, the more I realize how many my initial assumptions about hiring were wrong. F...

1 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

While hiring the first five engineers here at +LocalSense, we've never looked at someone's résumé. Not...

While hiring the first five engineers here at +LocalSense, we've never looked at someone's résumé. Not even once. One of the greatest things about the business world today compared to a decade ago (or even a couple years back!) is that you can directly qualify someone's past work through, at least for software engineers, tools such as GitHub [1]. The best measure of a potential hire's impact is going to be direct observation of their past work, and not a page or two of biography on the individual and their credentials.

Now, this approach remains difficult for more traditional careers in fields like academia and publishing, which simply don't have the agility necessary for something like GitHub or Dribbble [2] to make the impact they have. They have an existing [rigid] infrastructure that places the barrier to entry of any disruptive technology prohibitively high. The most established sectors will struggle the hardest, and perhaps fail the most spectacularly.

[1]: http://github.com/
[2]: http://dribbble.com/

Attachments

Resumes are dangerous by Alex MacCaw

Author: Alex MacCaw, Content: I've been interviewing engineers for a while now, and it seems the more interviews I do, the more I realize how many my initial assumptions about hiring were wrong. F...

20 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Since you cannot reshare a share, I linked to the article by +Carmelyne Thompson instead. Nice read ...

Since you cannot reshare a share, I linked to the article by +Carmelyne Thompson instead. Nice read regarding how we operate in Hangout Academy!
http://hangoutacademy.com

Whoever is curious what we use:
- Gerrit for Code Review
- We use Debian for Staging Server / Production Server
- We have automated builds that it deploys the web app to Staging server
- We follow agile development, we do modified SCRUM every other day.
- We document enough so that if a new member joins, they wont get lost.
- We design, we architect, we develop and iterate!
- We use hangouts for our main communication tool.
- We use Google Apps with Sites / Mail / Calendar integration

The team is beyond awesome, read her post to know the full picture! We love to tinker, we love development, and we love design!

via +Carmelyne Thompson

Attachments

Carmelyne Thompson - Google+ - Wonder what we have been working on for the last month? …

Wonder what we have been working on for the last month? Coming soon, Hangout Academy will make educational and public hangouts fun and effective. Right…

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Since you cannot reshare a share, I linked to the article by +Carmelyne Thompson instead. Nice read ...

Since you cannot reshare a share, I linked to the article by +Carmelyne Thompson instead. Nice read regarding how we operate in Hangout Academy!
http://hangoutacademy.com

Whoever is curious what we use:
- Gerrit for Code Review
- We use Debian for Staging Server / Production Server
- We have automated builds that it deploys the web app to Staging server
- We follow agile development, we do modified SCRUM every other day.
- We document enough so that if a new member joins, they wont get lost.
- We design, we architect, we develop and iterate!
- We use hangouts for our main communication tool.
- We use Google Apps with Sites / Mail / Calendar integration

The team is beyond awesome, read her post to know the full picture! We love to tinker, we love development, and we love design!

via +Carmelyne Thompson

Attachments

Carmelyne Thompson - Google+ - Wonder what we have been working on for the last month? …

Wonder what we have been working on for the last month? Coming soon, Hangout Academy will make educational and public hangouts fun and effective. Right…

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

While hiring the first five engineers here at +LocalSense, we've never looked at someone's résumé. Not...

While hiring the first five engineers here at +LocalSense, we've never looked at someone's résumé. Not even once. One of the greatest things about the business world today compared to a decade ago (or even a couple years back!) is that you can directly qualify someone's past work through, at least for software engineers, tools such as GitHub [1]. The best measure of a potential hire's impact is going to be direct observation of their past work, and not a page or two of biography on the individual and their credentials.

Now, this approach remains difficult for more traditional careers in fields like academia and publishing, which simply don't have the agility necessary for something like GitHub or Dribbble [2] to make the impact they have. They have an existing [rigid] infrastructure that places the barrier to entry of any disruptive technology prohibitively high. The most established sectors will struggle the hardest, and perhaps fail the most spectacularly.

[1]: http://github.com/
[2]: http://dribbble.com/

Attachments

Resumes are dangerous by Alex MacCaw

Author: Alex MacCaw, Content: I've been interviewing engineers for a while now, and it seems the more interviews I do, the more I realize how many my initial assumptions about hiring were wrong. F...

1 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

How to RECORD and BROADCAST your Hangout using the new (secret) tool: 1) Join / create a Hangout. 2...

How to RECORD and BROADCAST your Hangout using the new (secret) tool:

1) Join / create a Hangout.
2) Look at the addressbar. You should see a something like this: https://talkgadget.google.com/hangouts/7d727f30da8aefb15f78a11059bbe8335267b020?authuser=0&hl=en
3) Copy paste the portion after "hangouts/" and before the ? mark.
4) Take the following URL, and replace <hangoutID> with the number above: https://talkgadget.google.com/hangouts/broadcast/hangout.google.com/<hangoutID>

Your URL using the example above should be: https://talkgadget.google.com/hangouts/broadcast/hangout.google.com/7d727f30da8aefb15f78a11059bbe8335267b020

Just hit this URL and you'll be presented with a special prompt for permissions before joining the Hangout. Enjoy!

Thanks to +Robert McGee for helping us out with this. :)

10 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

How to RECORD and BROADCAST your Hangout using the new (secret) tool: 1) Join / create a Hangout. 2...

How to RECORD and BROADCAST your Hangout using the new (secret) tool:

1) Join / create a Hangout.
2) Look at the addressbar. You should see a something like this: https://talkgadget.google.com/hangouts/7d727f30da8aefb15f78a11059bbe8335267b020?authuser=0&hl=en
3) Copy paste the portion after "hangouts/" and before the ? mark.
4) Take the following URL, and replace <hangoutID> with the number above: https://talkgadget.google.com/hangouts/broadcast/hangout.google.com/<hangoutID>

Your URL using the example above should be: https://talkgadget.google.com/hangouts/broadcast/hangout.google.com/7d727f30da8aefb15f78a11059bbe8335267b020

Just hit this URL and you'll be presented with a special prompt for permissions before joining the Hangout. Enjoy!

Thanks to +Robert McGee for helping us out with this. :)

1 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

How to RECORD and BROADCAST your Hangout using the new (secret) tool: 1) Join / create a Hangout. 2...

How to RECORD and BROADCAST your Hangout using the new (secret) tool:

1) Join / create a Hangout.
2) Look at the addressbar. You should see a something like this: https://talkgadget.google.com/hangouts/7d727f30da8aefb15f78a11059bbe8335267b020?authuser=0&hl=en
3) Copy paste the portion after "hangouts/" and before the ? mark.
4) Take the following URL, and replace <hangoutID> with the number above: https://talkgadget.google.com/hangouts/broadcast/hangout.google.com/<hangoutID>

Your URL using the example above should be: https://talkgadget.google.com/hangouts/broadcast/hangout.google.com/7d727f30da8aefb15f78a11059bbe8335267b020

Just hit this URL and you'll be presented with a special prompt for permissions before joining the Hangout. Enjoy!

Thanks to +Robert McGee for helping us out with this. :)

10 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

How to RECORD and BROADCAST your Hangout using the new (secret) tool: 1) Join / create a Hangout. 2...

How to RECORD and BROADCAST your Hangout using the new (secret) tool:

1) Join / create a Hangout.
2) Look at the addressbar. You should see a something like this: https://talkgadget.google.com/hangouts/7d727f30da8aefb15f78a11059bbe8335267b020?authuser=0&hl=en
3) Copy paste the portion after "hangouts/" and before the ? mark.
4) Take the following URL, and replace <hangoutID> with the number above: https://talkgadget.google.com/hangouts/broadcast/hangout.google.com/<hangoutID>

Your URL using the example above should be: https://talkgadget.google.com/hangouts/broadcast/hangout.google.com/7d727f30da8aefb15f78a11059bbe8335267b020

Just hit this URL and you'll be presented with a special prompt for permissions before joining the Hangout. Enjoy!

Thanks to +Robert McGee for helping us out with this. :)

10 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

When did you create your first Google Account? During a conversation at the +LocalSense office today...

When did you create your first Google Account?
During a conversation at the +LocalSense office today, I happened to go back and look for the oldest email I'd received in my Gmail account and it got me thinking about just how much data I've given Google over the years.  It's incredible to think about a sense of scale now, especially considering that I have [as of this moment] 134,530 messages in Gmail alone -- that doesn't even consider all of Google's other services now tied to my Google Account.

You can quantify some portion of how much Google knows about you through the "Google Dashboard" [1].  Google also allows you to download [some] of your data with their data liberation tool [2].  I recommend doing this regularly, and making an effort to be aware of the amount, and value, of your data.

I received the first two emails in my Gmail inbox on 11/28/04. They were both from Google, and a few of the links don't work anymore. [3] Didn't anyone tell them that cool URIs don't change? [4] The attached photo is of the well-written introduction to Gmail, the second message in my inbox.  It's fun to look back and think about the state of email at the time, and how innovative Gmail actually was.

[1]: http://www.w3.org/Provider/Style/URI.html
[2]: https://www.google.com/dashboard/
[3]: http://gmail.google.com/gmail/help/start.html
[4]: https://www.google.com/settings/exportdata

Attachments

1 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

When did you create your first Google Account? During a conversation at the +LocalSense office today...

When did you create your first Google Account?
During a conversation at the +LocalSense office today, I happened to go back and look for the oldest email I'd received in my Gmail account and it got me thinking about just how much data I've given Google over the years.  It's incredible to think about a sense of scale now, especially considering that I have [as of this moment] 134,530 messages in Gmail alone -- that doesn't even consider all of Google's other services now tied to my Google Account.

You can quantify some portion of how much Google knows about you through the "Google Dashboard" [1].  Google also allows you to download [some] of your data with their data liberation tool [2].  I recommend doing this regularly, and making an effort to be aware of the amount, and value, of your data.

I received the first two emails in my Gmail inbox on 11/28/04. They were both from Google, and a few of the links don't work anymore. [3] Didn't anyone tell them that cool URIs don't change? [4] The attached photo is of the well-written introduction to Gmail, the second message in my inbox.  It's fun to look back and think about the state of email at the time, and how innovative Gmail actually was.

[1]: http://www.w3.org/Provider/Style/URI.html
[2]: https://www.google.com/dashboard/
[3]: http://gmail.google.com/gmail/help/start.html
[4]: https://www.google.com/settings/exportdata

Attachments

1 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

When did you create your first Google Account? During a conversation at the +LocalSense office today...

When did you create your first Google Account?
During a conversation at the +LocalSense office today, I happened to go back and look for the oldest email I'd received in my Gmail account and it got me thinking about just how much data I've given Google over the years.  It's incredible to think about a sense of scale now, especially considering that I have [as of this moment] 134,530 messages in Gmail alone -- that doesn't even consider all of Google's other services now tied to my Google Account.

You can quantify some portion of how much Google knows about you through the "Google Dashboard" [1].  Google also allows you to download [some] of your data with their data liberation tool [2].  I recommend doing this regularly, and making an effort to be aware of the amount, and value, of your data.

I received the first two emails in my Gmail inbox on 11/28/04. They were both from Google, and a few of the links don't work anymore. [3] Didn't anyone tell them that cool URIs don't change? [4] The attached photo is of the well-written introduction to Gmail, the second message in my inbox.  It's fun to look back and think about the state of email at the time, and how innovative Gmail actually was.

[1]: http://www.w3.org/Provider/Style/URI.html
[2]: https://www.google.com/dashboard/
[3]: http://gmail.google.com/gmail/help/start.html
[4]: https://www.google.com/settings/exportdata

Attachments

21 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Eve Online Roleplaying: Journaling

I've always loved Eve Online. It's a space MMO, with ridiculous levels of immersion. They tout that it's the world's largest game universe, and let me tell you - it's absolutely huge.

One of our new members has posted her intentions to work on an Eve Online Roleplaying Journal. I think this is an incredibly awesome idea. It's not new, I've seen character journals before, but it just seems to fit in with Eve's extensive world and role playing experience.

Character journaling is a great way to extend the world of a game and add more depth to both the character and the plot. Be careful that you don't fall victim to the inactivity that often plagues real journaling! Stick to it, and you'll reap the benefits of fleshing out your character and having a solid history of the thought processes involved.

Be sure to check out Emywn's Journal from Eve Online Roleplaying. It looks like it's going to be something I'm going to have to follow using my trusty Google RSS Reader. Good luck, Kethro - and thanks for the idea!

P.S.: Google Reader is an amazing tool that lets you follow your favorite sites and their content without ever checking the page. You can check out my shared items list to see what sort of things I follow, but check out the official Google Reader page for more information.

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

When did you create your first Google Account? During a conversation at the +LocalSense office today...

When did you create your first Google Account?
During a conversation at the +LocalSense office today, I happened to go back and look for the oldest email I'd received in my Gmail account and it got me thinking about just how much data I've given Google over the years.  It's incredible to think about a sense of scale now, especially considering that I have [as of this moment] 134,530 messages in Gmail alone -- that doesn't even consider all of Google's other services now tied to my Google Account.

You can quantify some portion of how much Google knows about you through the "Google Dashboard" [1].  Google also allows you to download [some] of your data with their data liberation tool [2].  I recommend doing this regularly, and making an effort to be aware of the amount, and value, of your data.

I received the first two emails in my Gmail inbox on 11/28/04. They were both from Google, and a few of the links don't work anymore. [3] Didn't anyone tell them that cool URIs don't change? [4] The attached photo is of the well-written introduction to Gmail, the second message in my inbox.  It's fun to look back and think about the state of email at the time, and how innovative Gmail actually was.

[1]: http://www.w3.org/Provider/Style/URI.html
[2]: https://www.google.com/dashboard/
[3]: http://gmail.google.com/gmail/help/start.html
[4]: https://www.google.com/settings/exportdata

Attachments

1 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Choosing A Medium For Your Online Role Playing Game

Running a role playing game online presents a large of amount of flexibility in the way you run the game. You no longer need individual sessions where all players are present, and there are a plethora of options as to where you are going to run it - if you want to run it in any one place.

One of the number one questions I receive relates to the medium for online RPGs. There are tons of different ways of communicating online, mainly grouped into a few categories. We have instant messenger, chats, message boards, and emails. There are a few custom services out there, but I'm going to touch on the four that I've mentioned.

On RolePlayGateway, we have a set of roleplaying forums as well as a roleplaying chat. When you're running an RPG, there are a few items you should consider when deciding where you're going to keep everything.

Forums have the benefit of being static and always available - users can post to forums at any time during the day and be sure that other users (and roleplayers) can see their message. Forums are also very flexible, they allow you to embed images and other multimedia within your posts, allowing you to share any experience with your players. However, it is post based - forums are often not the quickest way to communicate, as it is not a live feed of information like a chat.

Chats, on the other hand, have the benefit of being real time. Games can be run in chat (and instant messenger) on a moment's notice, and work best when all of the players can be available at the same time. Because it is real time, short blip-based sessions such as character conversations and interactions work extraordinarily well with chats. Players can get the chance to interject into other player's actions and statements without the worry of too much time going by. It is for this reason that the longer posts, such as those that exceed a paragraph, are often too large and unwieldy for chats - players end up waiting too long for each post, and will get bored.

Longer posts do very well on forums, where writing an individual post can take half an hour or longer to refine and perfect - just enough time for the players to go look at other games and other topics before they come back and begin formulating their response.

If you're running a game with a detailed and/or complicated storyline or characters, it is always good to post something on a forum for player reference. This lets the players have a place to communicate out of character (OOC) - such as when they won't be able to make a chat session, or when they want to discuss plans for character interaction, growth, or development. Even if your game is already on a forum - it is a good idea to create a place for OOC discussion. For chat-based games - this gives a perfect opportunity for players to jump in at the middle of a game with little trouble, as they simply need to read over the history of the game on the forum, which they can do at any point in time, and less time is needed explaining the game to the player.

Instant messenger works well when dealing with one on one sessions, such as when two characters are the only ones in an interaction or a meeting needs to be private. These interactions can be summarized or written into a cinematic format and then posted to the forum, for other players to enjoy as well. Instant messenger (as well as Private Messages) does very well at asking questions of the other players, which is convenient when you have a question about how they're playing a role or a reference they made in character.

There are also emails - many games aren't run by email anymore, but email is still a very valuable tool. RolePlayGateway like many forums offers you the ability to subscribe to topics. Subscriptions will let you receive an immediate email update whenever someone replies to the thread. This is extraordinarily helpful when there's an RPG with only a few players that can only reply every once in a while, but it requires that people, y'know, actually check their email. RolePlayGateway also has the special ability to instant message you when there's an update to a subscribed thread. All you need is a Jabber account (GMail accounts work, too) and to set up the notifications. We'll send you a message as soon as there's an update.

What methods have you used to manage your online roleplaying games? Are you a fan of forum or chat? Both? What helps you determine where you're going to hold your game? Discuss!

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Mitigating the BEAST TLS attack in node.js

I've been relying heavily on node.js this past year to provide a robust set of tools to solve the problems I encounter on a daily basis. I was pleased to see honorCipherOrder was added to node's TLS library in node.js v0.7.6, and released with node.js v0.8.0.

Late last year, security researcher Juliano Rizzo announced a new attack against the AES encryption used in the SSL/TLS transaction he dubbed BEAST. The details are interesting to those who care, but it turns out that we can mitigate this attack in node.js by enforcing honorCipherOrder on the server. Let's take a look.

If you have an HTTPS server that looks like this:


var https = require('https');
var fs = require('fs');

var options = {
  key: fs.readFileSync('key.pem'),
  cert: fs.readFileSync('cert.pem')
};

https.createServer(options, function (req, res) {
  res.writeHead(200);
  res.end("hello world\n");
}).listen(443);

...you can now manage the cipher order by using the ciphers option. In the following code snippet we're going set the options for the above server to use Steve Caligo's cipher order, which prefers TLS 1.2 ciphers (which are not vulnerable to the BEAST attack) for clients that support TLS 1.2 but falls back to the RC4 ciphers on TLS 1.0 clients.[...]


var options = {
  key: fs.readFileSync('key.pem'),
  cert: fs.readFileSync('cert.pem'),
  ciphers: 'ECDHE-RSA-AES256-SHA:AES256-SHA:RC4-SHA:RC4:HIGH:!MD5:!aNULL:!EDH:!AESGCM'
};


Finally, we will enforce the cipher order on the server's side of the negotiation:

var options = {
  key: fs.readFileSync('key.pem'),
  cert: fs.readFileSync('cert.pem'),
  ciphers: 'ECDHE-RSA-AES256-SHA:AES256-SHA:RC4-SHA:RC4:HIGH:!MD5:!aNULL:!EDH:!AESGCM',
  honorCipherOrder: true
};

...which leaves us with the following code for a working server that is not vulnerable to the BEAST attack (in node v0.8.0+!):


var https = require('https');
var fs = require('fs');

var options = {
  key: fs.readFileSync('key.pem'),
  cert: fs.readFileSync('cert.pem'),
  ciphers: 'ECDHE-RSA-AES256-SHA:AES256-SHA:RC4-SHA:RC4:HIGH:!MD5:!aNULL:!EDH:!AESGCM',
  honorCipherOrder: true
};

https.createServer(options, function (req, res) {
  res.writeHead(200);
  res.end("hello world\n");
}).listen(443);

Edit, 6/13/2013: Lloyd Watkin has done some research on his own and decided to use a different cipher chain:

ECDHE-RSA-AES128-SHA256:AES128-GCM-SHA256:RC4:HIGH:!MD5:!aNULL:!EDH

You should read into why he chose it and make an educated decision. </edit>

Until node.js implements this as the defaults (they should), this is something you should implement where using HTTPS with node!

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Tuning Large phpBB3 Forums

One of the sites I own and run (RolePlayGateway) has a pretty large forum, with several customizations and features that I've added on to the base install of phpBB3. As time went on, we continued upgrading the servers (moving from GoDaddy shared hosting to GoDaddy virtual dedicated servers, then onward to MediaTemple's (gs), and now we're on the second tier of MediaTemple's (dv) hosting) in an effort to keep the hardware moving as fast as possible.

As I'm sure you know, hardware can be pretty expensive! One month, while on MediaTemple's Grid Server, we racked up $600 in CPU time overage charges. (Ow.) Now that we've moved onward to bigger and better packages, we're shelling out just about $100 per month for a rock-solid server solution that can be upgraded seamlessly in the future. But since upgrades can only go so far without being prohibitively expensive, I thought it was time to take a look at some of our coding approaches.

Enter memcache, the distributed database caching solution originally designed by LiveJournal to help them deal with massive databases and large volumes of users. DavidMJ has written some shiny ACM modules to help phpBB3 make use of some caching systems, and a memcache module was among them.

That didn't work so well. It gave about a 50% boost to phpBB3's performance (which was great!), but we were still choking the server, and ended up upgrading to a bigger and more robust package with MediaTemple. So I started looking into more options, and DavidMJ suggested xcache. So I go grab xcache and compile it, then enabled it in php. Bingo! There's a 500% boost in our page compile times, and across most of our pages we're now well under 0.1 second compile times. (With the exception of viewtopic.php, which frequently approaches 2 seconds due to bad coding on my part... this will be fixed soon.)

So now that I've got the thirst for speed, let's take a look at how we're performing. To do this, use the apache benchmarking tool:ab -n 100000 http://www.mydomain.com/my_page This will test the URL you specify 100,000 times, and give you some feedback about how the page performs. You'll end up with something looking like this:

Server Software: Apache/2.2.3 Server Hostname: www.mydomain.com Server Port: 80 Document Path: /my_page Document Length: 0 bytes Concurrency Level: 1 Time taken for tests: 15.30100 seconds Complete requests: 1 Failed requests: 0 Write errors: 0 Non-2xx responses: 1 Total transferred: 715 bytes HTML transferred: 0 bytes Requests per second: 0.07 [#/sec] (mean) Time per request: 15030.100 [ms] (mean) Time per request: 15030.100 [ms] (mean, across all concurrent requests) Transfer rate: 0.00 [Kbytes/sec] received Connection Times (ms) min mean[+/-sd] median max Connect: 0 0 0.0 0 0 Processing: 15030 15030 0.0 15030 15030 Waiting: 30 30 0.0 30 30 Total: 15030 15030 0.0 15030 15030

Some tweaks to the default xcache config that I recommend:

Set the number of caches to one per processor on your server! ; set to cpu count (cat /proc/cpuinfo |grep -c processor) xcache.count = 4

This post will be updated as I explore phpBB3 and more server side options. (I wrote part of this post, then stopped writing... and figure I'd publish it a couple days later anyway!)

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Going Viral: A Guide

While marketing RolePlayGateway, one of the things we considered was the "virality" of our approach. Viral marketing is any marketing technique that induces Web sites or users to pass on a marketing message to other sites or users, creating a potentially exponential growth in the message's visibility and effect. We're going to guide you on the road to a truly viral campaign.

A successful viral push can be launched simply by following three simple rules.

  1. Don't spend everything you have on a single campaign.
  2. Don't rely entirely on one vehicle of viral marketing.
  3. Be different from everyone else; stand out.

While we're not nearly viral enough, part of our success so far has been the evangelism of our passionate users. And there you have it, one of the most important keys to successful viral marketing:

Passion: Users who are passionate about your service, your community, or your site. They will propagate, they will evangelize, and ultimately will generate more passionate users who will do the same thing for you. Dawn Anfuso calls these members Boomers - and it is important to not ignore them.

Make it easy for your users to share. Make it hard for them NOT to share. Add a feature on your site that encourages them to send an email to their friends about the service. Add blocks where they can copy and paste code straight to their social profiles on sites like MySpace, Facebook, and Bebo. Jeanne Jennings wrote an amazing article on Optimizing the "E-mail This" Marketing Opportunity, and I'd recommend you read it and implement the things you learn from it.

Widgetize: On that note, we arrive on one of our most powerful vehicles for viral marketing: Widgets. The list of sites that you can infect with widgets are endless. From iGoogle to individual sites, widgets encourage users to put your tool on their page. Be sure to incorporate other techniques here: Include encouragement to share it. Make it easy to post elsewhere and share.

One of the items that RolePlay Gateway could utilize to great success is the concept of game trailers. Many of the games on RPGateway are text-based, and have no real graphics. However, most of these games have amazing storylines, storylines which could be utilized to hitch audiences, or at least entertain them. Flash-based videos, or trailers, with pivotal content, captivating video and audio, and viral marketing elements such as "Email this!" or "Share This", would be an amazing leap forward. Take a look at how YouTube's video player works. Such trailers could even be uploaded to social networking sites, like YouTube and Google Video, and shared to millions of users with a touch of viral marketing magic.

Juice It Up: Include your URL everywhere you go. Facebook, MySpace. Everywhere. This generates user authority, even if the site you are on has nothing at all to do with your target market. Cross sections are a beautiful thing, and even if you don't get a drop of link juice in comments, market saturation is a very important, yet delicate, part of viral marketing.

Maintain a presence on every social networking site you can sustain. Extend your campaign to all of them. Create social groups for each of these sites, and publicize them. The more targets you hit, just like investing, the less committed you are to that particular market. Your assets are distributed, and while the workload may be unfathomably difficult (keeping up with so many social networking sites sucks... that's why we have ProfileLinker), the potential for success is incredible.

Reward: Another option is to provide tangible rewards for marketing. This can be in the form of prizes, such as in a contest, or to individual users. Incentives are very powerful, and drive many users to promote where they'd be otherwise apathetic. Things can be very simple, such as giving them tokens or credits, to very expensive, such as providing real cash per referral. This is probably the most effective, albeit expensive, method of encouraging users to infect others.

Don't Stop. Don't set these actions in motion and then hope they work. Get involved. Comment on profiles. Reply to messages. Enhance your viral effect. Make it tangible. If users can see that there is a real person there, they will be a lot more enthusiastic and encouraged to participate, and your viral marketing campaign will be more successful.

Other Resources!!! Web Marketing Today has an amazing list of resource articles that are sure to help you build your campaign.

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Why I Don't Use Skype (and why you shouldn't, either)

I often get asked for my Skype address, sometimes in relation to business or casual conversation. I politely decline with some degree of hand-waving about my reasons, and suggest an alternative form of communication (typically either Google Talk or Google Hangouts, depending on the context—both are built right in to Gmail!). I'd like to outline some of the reasons why I've made the decision to avoid Skype, primarily so I have something to link to when someone asks me about it.

First and foremost, we don't really know what Skype actually does. The binary (the actual program you run on your computer) is obfuscated, so attempts at disassembling it [PDF] to verify some of its strange behavior and the information it is transmitting have so far come up with very little. This is an issue, because Skype produces encrypted traffic even when you are not actively using Skype. This means we can only speculate on what information Skype is collecting about you after you've so graciously chosen to install it, and perhaps more importantly who it is sending that information to.

Quoting Salman Baset:

When a Skype client is not in a call and is running on a machine with public IP address, it has on the average 4-8 active TCP connections and atleast one UDP connection.

While connecting to external IP addresses is normal for a server/client architecture and necessary for receiving notifications, the volume of traffic and number of connections is concerning, considering the compounding issues between Skype's peer-to-peer architecture [PDF] and the "reasonable level of detection accuracy" in snooping on voice calls in Skype [PDF], despite the [purportedly] encrypted nature of the Skype protocol.

Speaking in general terms, Skype is "black box" software which has undergone no public review despite very concerning observed behavior. When new Skype malware (like Skype IMBot, of which an analysis is available, or the more recent Skype account hijacking) is released, there are very few options to protect ourselves if we've got Skype installed. On Linux, tools like AppArmor and TOMOYO exist, but without the ability to easily view the source and understand the attack (per perhaps even fix it proactively, before it occurs) we are at the mercy of Skype's new maintainers to provide a timely resolution in a reactive approach.

If you use a proprietary program or somebody else's web server, you're defenceless. You're putty in the hands of whoever developed that software.
— Richard Stallman
In conclusion, while Skype may be convenient, it presents a series of questions that must be asked and implications to be considered before choosing it over other chat, VoIP, and video chat solutions. I can only hope that more people consider these things before doing so.

Asides

Some of the other things I found interesting, more recently than the research I've linked in this post, include Skype's role in the Syrian conflict, in which a claim was made as follows:
A media activist in Idlib named Mohamed said a rebel informant working for the government was killed in Damascus six months ago after sending warnings to the Free Syrian Army on Skype. “I saw this incident right in front of my eyes,” Mohamed said. “We put his info on Skype so he was arrested and killed.”

Skype (Microsoft) has also made other concerning statements after accusations of helping the U.S. Government spy on its own citizens.

Wikipedia also lists a large number of known flaws in Skype, which I've chosen to avoid duplicating in this post.

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.