The new EricMartindale.com is an experiment in data aggregation, and might have a few bugs. Feel free to explore, and then provide feedback directly to @martindale.

search results for information security

Why I Don't Use Skype (and why you shouldn't, either)

I often get asked for my Skype address, sometimes in relation to business or casual conversation. I politely decline with some degree of hand-waving about my reasons, and suggest an alternative form of communication (typically either Google Talk or Google Hangouts, depending on the context—both are built right in to Gmail!). I'd like to outline some of the reasons why I've made the decision to avoid Skype, primarily so I have something to link to when someone asks me about it.

First and foremost, we don't really know what Skype actually does. The binary (the actual program you run on your computer) is obfuscated, so attempts at disassembling it [PDF] to verify some of its strange behavior and the information it is transmitting have so far come up with very little. This is an issue, because Skype produces encrypted traffic even when you are not actively using Skype. This means we can only speculate on what information Skype is collecting about you after you've so graciously chosen to install it, and perhaps more importantly who it is sending that information to.

Quoting Salman Baset:

When a Skype client is not in a call and is running on a machine with public IP address, it has on the average 4-8 active TCP connections and atleast one UDP connection.

While connecting to external IP addresses is normal for a server/client architecture and necessary for receiving notifications, the volume of traffic and number of connections is concerning, considering the compounding issues between Skype's peer-to-peer architecture [PDF] and the "reasonable level of detection accuracy" in snooping on voice calls in Skype [PDF], despite the [purportedly] encrypted nature of the Skype protocol.

Speaking in general terms, Skype is "black box" software which has undergone no public review despite very concerning observed behavior. When new Skype malware (like Skype IMBot, of which an analysis is available, or the more recent Skype account hijacking) is released, there are very few options to protect ourselves if we've got Skype installed. On Linux, tools like AppArmor and TOMOYO exist, but without the ability to easily view the source and understand the attack (per perhaps even fix it proactively, before it occurs) we are at the mercy of Skype's new maintainers to provide a timely resolution in a reactive approach.

If you use a proprietary program or somebody else's web server, you're defenceless. You're putty in the hands of whoever developed that software.
— Richard Stallman
In conclusion, while Skype may be convenient, it presents a series of questions that must be asked and implications to be considered before choosing it over other chat, VoIP, and video chat solutions. I can only hope that more people consider these things before doing so.

Asides

Some of the other things I found interesting, more recently than the research I've linked in this post, include Skype's role in the Syrian conflict, in which a claim was made as follows:
A media activist in Idlib named Mohamed said a rebel informant working for the government was killed in Damascus six months ago after sending warnings to the Free Syrian Army on Skype. “I saw this incident right in front of my eyes,” Mohamed said. “We put his info on Skype so he was arrested and killed.”

Skype (Microsoft) has also made other concerning statements after accusations of helping the U.S. Government spy on its own citizens.

Wikipedia also lists a large number of known flaws in Skype, which I've chosen to avoid duplicating in this post.

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

“Programming is, without a doubt, the most mentally rewarding thing I've ever done.” -- +Randall Degges...

“Programming is, without a doubt, the most mentally rewarding thing I've ever done.”
-- +Randall Degges

You should learn to write code. It is the new language of this information age, in which our systems of commerce become increasingly focused on trading information, buying and selling it with ease thanks to our burgeoning ability to transmit and receive this information.

As with all increases in the available bandwidth of communication throughout human history, it is a time for change and innovation. Just as with the telegraph and Gutenberg's printing press before it, we are undergoing a revolution in the way we live, the way we work, and the way we love. You have two options; become literate and help shape the world, or stand by and be content with letting others define it for you.

Attachments

How I Learned to Program - Randall Degges

Programming is, without a doubt, the most mentally rewarding thing I've ever done. Programming taught me that life should be fun, filled with creativity, and lived to the fullest. Programming taug...

1 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

“Programming is, without a doubt, the most mentally rewarding thing I've ever done.” -- +Randall Degges...

“Programming is, without a doubt, the most mentally rewarding thing I've ever done.”
-- +Randall Degges

You should learn to write code. It is the new language of this information age, in which our systems of commerce become increasingly focused on trading information, buying and selling it with ease thanks to our burgeoning ability to transmit and receive this information.

As with all increases in the available bandwidth of communication throughout human history, it is a time for change and innovation. Just as with the telegraph and Gutenberg's printing press before it, we are undergoing a revolution in the way we live, the way we work, and the way we love. You have two options; become literate and help shape the world, or stand by and be content with letting others define it for you.

Attachments

How I Learned to Program - Randall Degges

Programming is, without a doubt, the most mentally rewarding thing I've ever done. Programming taught me that life should be fun, filled with creativity, and lived to the fullest. Programming taug...

1 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

“Programming is, without a doubt, the most mentally rewarding thing I've ever done.” -- +Randall Degges...

“Programming is, without a doubt, the most mentally rewarding thing I've ever done.”
-- +Randall Degges

You should learn to write code. It is the new language of this information age, in which our systems of commerce become increasingly focused on trading information, buying and selling it with ease thanks to our burgeoning ability to transmit and receive this information.

As with all increases in the available bandwidth of communication throughout human history, it is a time for change and innovation. Just as with the telegraph and Gutenberg's printing press before it, we are undergoing a revolution in the way we live, the way we work, and the way we love. You have two options; become literate and help shape the world, or stand by and be content with letting others define it for you.

Attachments

How I Learned to Program - Randall Degges

Programming is, without a doubt, the most mentally rewarding thing I've ever done. Programming taught me that life should be fun, filled with creativity, and lived to the fullest. Programming taug...

1 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

“Programming is, without a doubt, the most mentally rewarding thing I've ever done.” -- +Randall Degges...

“Programming is, without a doubt, the most mentally rewarding thing I've ever done.”
-- +Randall Degges

You should learn to write code. It is the new language of this information age, in which our systems of commerce become increasingly focused on trading information, buying and selling it with ease thanks to our burgeoning ability to transmit and receive this information.

As with all increases in the available bandwidth of communication throughout human history, it is a time for change and innovation. Just as with the telegraph and Gutenberg's printing press before it, we are undergoing a revolution in the way we live, the way we work, and the way we love. You have two options; become literate and help shape the world, or stand by and be content with letting others define it for you.

Attachments

How I Learned to Program - Randall Degges

Programming is, without a doubt, the most mentally rewarding thing I've ever done. Programming taught me that life should be fun, filled with creativity, and lived to the fullest. Programming taug...

20 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Hurricane Sandy: Resources, Guides, and Information With #HurricaneSandy  already flooding streets ...

Hurricane Sandy: Resources, Guides, and Information

With #HurricaneSandy  already flooding streets [1] and causing damage [2] in #NYC  due to the effects of the combined hurricane, western stormfront, and full-moon tides [3], I wanted to take just a quick moment to collect some resources related to the storm.  I have quite a few friends directly in the path of the storm (ahem, +Sharon Strandskov!) and I want to urge everyone to stay safe. Make no illusion, this storm is serious business: take a look at the attached photo to see a comparison to Hurricane Irene.

As always, preparedness is key.  If you're in the path of the storm and haven't yet found your battery-powered radio, it's strongly recommend that you do so now while you have the light, as both your Internet and cell signals are likely to be interrupted.  If you haven't stocked up on water and [non-perishable] food, it's a bit late and you're going to have to hunker down and hope for the best.

Course of Action:
From the FEMA Guidelines [4]:
  1) Listen to the radio or TV for information. [ed.: or FEMA's Twitter [5]]
  2) Secure your home, close storm shutters, and secure outdoor objects or bring them indoors.
  3) Turn off utilities if instructed to do so. Otherwise, turn the refrigerator thermostat to its coldest setting and keep its doors closed.
  4) Turn off propane tanks.· Avoid using the phone, except for serious emergencies.
  5) Moor your boat if time permits.
  6) Ensure a supply of water for sanitary purposes such as cleaning and flushing toilets. Fill the bathtub and other large containers with water.

As an additional tip that I recently learned, you can fill plastic bags with water and put them in your freezer to prepare for extended power/water outages.  These will stay cool longer than bottled water in your refrigerator.

If you're in one of the evacuation areas and haven't yet followed the instructions or aren't able to do so, make sure to seek shelter and follow the appropriate guidelines. [4]

Resources:
Google Crisis Map: http://google.org/crisismap/2012-sandy -- this is awesome, and a great central resource keeping up to date.
NOAA Station 44065: http://www.ndbc.noaa.gov/station_page.php?station=44065 -- this is a buoy off the coast of New York tracking the wind speed and direction, if you want direct from-the-source reports.
GOES-14 Satellite Imagery: http://www.ssec.wisc.edu/data/1min/index.php -- Composite satellite imagery from the SSEC program at WISC, on a 1 minute loop.
Weather.gov: http://www.weather.gov/ -- useful for official advisories and up-to-date information, straight from the source.
Weather.com: http://www.weather.com/

Take a moment and look up your local news station's Facebook / Twitter and subscribe, optionally via SMS so that when the power goes out, you still have a method of receiving realtime updates (provided cell coverage doesn't go down / get inundated with emergency requests).

As a bonus, there's a pretty awesome #HTML5  canvas wind visualization demo that updates in realtime [6].  Some pretty slick techniques there, so view the source [Luke].

Feel free to add your own resources in the comments.  I'll edit the post to add the most helpful resources.

[1]: http://observer.com/2012/10/gowanus-canal-flooding/
[2]: http://www.usnews.com/news/us/articles/2012/10/29/crane-dangles-from-nyc-high-rise-clearing-streets
[3]: http://blogs.discovermagazine.com/badastronomy/2012/10/26/hurricane-sandy-looms-over-the-us/
[4]: http://m.fema.gov/hu_during.htm
[5]: https://twitter.com/fema
[6]: http://hint.fm/wind/

Attachments

9 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Hurricane Sandy: Resources, Guides, and Information With #HurricaneSandy  already flooding streets ...

Hurricane Sandy: Resources, Guides, and Information

With #HurricaneSandy  already flooding streets [1] and causing damage [2] in #NYC  due to the effects of the combined hurricane, western stormfront, and full-moon tides [3], I wanted to take just a quick moment to collect some resources related to the storm.  I have quite a few friends directly in the path of the storm (ahem, +Sharon Strandskov!) and I want to urge everyone to stay safe. Make no illusion, this storm is serious business: take a look at the attached photo to see a comparison to Hurricane Irene.

As always, preparedness is key.  If you're in the path of the storm and haven't yet found your battery-powered radio, it's strongly recommend that you do so now while you have the light, as both your Internet and cell signals are likely to be interrupted.  If you haven't stocked up on water and [non-perishable] food, it's a bit late and you're going to have to hunker down and hope for the best.

Course of Action:
From the FEMA Guidelines [4]:
  1) Listen to the radio or TV for information. [ed.: or FEMA's Twitter [5]]
  2) Secure your home, close storm shutters, and secure outdoor objects or bring them indoors.
  3) Turn off utilities if instructed to do so. Otherwise, turn the refrigerator thermostat to its coldest setting and keep its doors closed.
  4) Turn off propane tanks.· Avoid using the phone, except for serious emergencies.
  5) Moor your boat if time permits.
  6) Ensure a supply of water for sanitary purposes such as cleaning and flushing toilets. Fill the bathtub and other large containers with water.

As an additional tip that I recently learned, you can fill plastic bags with water and put them in your freezer to prepare for extended power/water outages.  These will stay cool longer than bottled water in your refrigerator.

If you're in one of the evacuation areas and haven't yet followed the instructions or aren't able to do so, make sure to seek shelter and follow the appropriate guidelines. [4]

Resources:
Google Crisis Map: http://google.org/crisismap/2012-sandy -- this is awesome, and a great central resource keeping up to date.
NOAA Station 44065: http://www.ndbc.noaa.gov/station_page.php?station=44065 -- this is a buoy off the coast of New York tracking the wind speed and direction, if you want direct from-the-source reports.
GOES-14 Satellite Imagery: http://www.ssec.wisc.edu/data/1min/index.php -- Composite satellite imagery from the SSEC program at WISC, on a 1 minute loop.
Weather.gov: http://www.weather.gov/ -- useful for official advisories and up-to-date information, straight from the source.
Weather.com: http://www.weather.com/

Take a moment and look up your local news station's Facebook / Twitter and subscribe, optionally via SMS so that when the power goes out, you still have a method of receiving realtime updates (provided cell coverage doesn't go down / get inundated with emergency requests).

As a bonus, there's a pretty awesome #HTML5  canvas wind visualization demo that updates in realtime [6].  Some pretty slick techniques there, so view the source [Luke].

Feel free to add your own resources in the comments.  I'll edit the post to add the most helpful resources.

[1]: http://observer.com/2012/10/gowanus-canal-flooding/
[2]: http://www.usnews.com/news/us/articles/2012/10/29/crane-dangles-from-nyc-high-rise-clearing-streets
[3]: http://blogs.discovermagazine.com/badastronomy/2012/10/26/hurricane-sandy-looms-over-the-us/
[4]: http://m.fema.gov/hu_during.htm
[5]: https://twitter.com/fema
[6]: http://hint.fm/wind/

Attachments

1 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Hurricane Sandy: Resources, Guides, and Information With #HurricaneSandy  already flooding streets ...

Hurricane Sandy: Resources, Guides, and Information

With #HurricaneSandy  already flooding streets [1] and causing damage [2] in #NYC  due to the effects of the combined hurricane, western stormfront, and full-moon tides [3], I wanted to take just a quick moment to collect some resources related to the storm.  I have quite a few friends directly in the path of the storm (ahem, +Sharon Strandskov!) and I want to urge everyone to stay safe. Make no illusion, this storm is serious business: take a look at the attached photo to see a comparison to Hurricane Irene.

As always, preparedness is key.  If you're in the path of the storm and haven't yet found your battery-powered radio, it's strongly recommend that you do so now while you have the light, as both your Internet and cell signals are likely to be interrupted.  If you haven't stocked up on water and [non-perishable] food, it's a bit late and you're going to have to hunker down and hope for the best.

Course of Action:
From the FEMA Guidelines [4]:
  1) Listen to the radio or TV for information. [ed.: or FEMA's Twitter [5]]
  2) Secure your home, close storm shutters, and secure outdoor objects or bring them indoors.
  3) Turn off utilities if instructed to do so. Otherwise, turn the refrigerator thermostat to its coldest setting and keep its doors closed.
  4) Turn off propane tanks.· Avoid using the phone, except for serious emergencies.
  5) Moor your boat if time permits.
  6) Ensure a supply of water for sanitary purposes such as cleaning and flushing toilets. Fill the bathtub and other large containers with water.

As an additional tip that I recently learned, you can fill plastic bags with water and put them in your freezer to prepare for extended power/water outages.  These will stay cool longer than bottled water in your refrigerator.

If you're in one of the evacuation areas and haven't yet followed the instructions or aren't able to do so, make sure to seek shelter and follow the appropriate guidelines. [4]

Resources:
Google Crisis Map: http://google.org/crisismap/2012-sandy -- this is awesome, and a great central resource keeping up to date.
NOAA Station 44065: http://www.ndbc.noaa.gov/station_page.php?station=44065 -- this is a buoy off the coast of New York tracking the wind speed and direction, if you want direct from-the-source reports.
GOES-14 Satellite Imagery: http://www.ssec.wisc.edu/data/1min/index.php -- Composite satellite imagery from the SSEC program at WISC, on a 1 minute loop.
Weather.gov: http://www.weather.gov/ -- useful for official advisories and up-to-date information, straight from the source.
Weather.com: http://www.weather.com/

Take a moment and look up your local news station's Facebook / Twitter and subscribe, optionally via SMS so that when the power goes out, you still have a method of receiving realtime updates (provided cell coverage doesn't go down / get inundated with emergency requests).

As a bonus, there's a pretty awesome #HTML5  canvas wind visualization demo that updates in realtime [6].  Some pretty slick techniques there, so view the source [Luke].

Feel free to add your own resources in the comments.  I'll edit the post to add the most helpful resources.

[1]: http://observer.com/2012/10/gowanus-canal-flooding/
[2]: http://www.usnews.com/news/us/articles/2012/10/29/crane-dangles-from-nyc-high-rise-clearing-streets
[3]: http://blogs.discovermagazine.com/badastronomy/2012/10/26/hurricane-sandy-looms-over-the-us/
[4]: http://m.fema.gov/hu_during.htm
[5]: https://twitter.com/fema
[6]: http://hint.fm/wind/

Attachments

9 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Hurricane Sandy: Resources, Guides, and Information With #HurricaneSandy  already flooding streets ...

Hurricane Sandy: Resources, Guides, and Information

With #HurricaneSandy  already flooding streets [1] and causing damage [2] in #NYC  due to the effects of the combined hurricane, western stormfront, and full-moon tides [3], I wanted to take just a quick moment to collect some resources related to the storm.  I have quite a few friends directly in the path of the storm (ahem, +Sharon Strandskov!) and I want to urge everyone to stay safe. Make no illusion, this storm is serious business: take a look at the attached photo to see a comparison to Hurricane Irene.

As always, preparedness is key.  If you're in the path of the storm and haven't yet found your battery-powered radio, it's strongly recommend that you do so now while you have the light, as both your Internet and cell signals are likely to be interrupted.  If you haven't stocked up on water and [non-perishable] food, it's a bit late and you're going to have to hunker down and hope for the best.

Course of Action:
From the FEMA Guidelines [4]:
  1) Listen to the radio or TV for information. [ed.: or FEMA's Twitter [5]]
  2) Secure your home, close storm shutters, and secure outdoor objects or bring them indoors.
  3) Turn off utilities if instructed to do so. Otherwise, turn the refrigerator thermostat to its coldest setting and keep its doors closed.
  4) Turn off propane tanks.· Avoid using the phone, except for serious emergencies.
  5) Moor your boat if time permits.
  6) Ensure a supply of water for sanitary purposes such as cleaning and flushing toilets. Fill the bathtub and other large containers with water.

As an additional tip that I recently learned, you can fill plastic bags with water and put them in your freezer to prepare for extended power/water outages.  These will stay cool longer than bottled water in your refrigerator.

If you're in one of the evacuation areas and haven't yet followed the instructions or aren't able to do so, make sure to seek shelter and follow the appropriate guidelines. [4]

Resources:
Google Crisis Map: http://google.org/crisismap/2012-sandy -- this is awesome, and a great central resource keeping up to date.
NOAA Station 44065: http://www.ndbc.noaa.gov/station_page.php?station=44065 -- this is a buoy off the coast of New York tracking the wind speed and direction, if you want direct from-the-source reports.
GOES-14 Satellite Imagery: http://www.ssec.wisc.edu/data/1min/index.php -- Composite satellite imagery from the SSEC program at WISC, on a 1 minute loop.
Weather.gov: http://www.weather.gov/ -- useful for official advisories and up-to-date information, straight from the source.
Weather.com: http://www.weather.com/

Take a moment and look up your local news station's Facebook / Twitter and subscribe, optionally via SMS so that when the power goes out, you still have a method of receiving realtime updates (provided cell coverage doesn't go down / get inundated with emergency requests).

As a bonus, there's a pretty awesome #HTML5  canvas wind visualization demo that updates in realtime [6].  Some pretty slick techniques there, so view the source [Luke].

Feel free to add your own resources in the comments.  I'll edit the post to add the most helpful resources.

[1]: http://observer.com/2012/10/gowanus-canal-flooding/
[2]: http://www.usnews.com/news/us/articles/2012/10/29/crane-dangles-from-nyc-high-rise-clearing-streets
[3]: http://blogs.discovermagazine.com/badastronomy/2012/10/26/hurricane-sandy-looms-over-the-us/
[4]: http://m.fema.gov/hu_during.htm
[5]: https://twitter.com/fema
[6]: http://hint.fm/wind/

Attachments

1 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

CC <span class="proflinkWrapper"><span class="proflinkPrefix">+</span><a class="proflink" href="https://plus.google.com/114752870863000007466"... in reply to

CC +Robert Rice, +Daniel Barbour, and +Greg Brannon: http://www.dailymail.co.uk/sciencetech/article-2076742/Google-unveil-hi-tech-Google-glasses-superimpose-information-world.html

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Eric,<br />Have we had the conversation... in reply to

Eric,
Have we had the conversation about the predatory nature of evolutionary psychology inspiring Darwinian interactions within our own species? Play should not only be for children, we should teach humans to play together throughout their lives.
I believe we've spoken about the necessity of philosophy in elementary school curriculum? Any chance you'd be interested in working with the state to make this happen? Are you searching for the complete solution through institution or solely seeking answers through decentralized systems?

Toni Lane Casserly, TLC
Sent from my mobile. Pardon any error of the thumb.

Co-Founder
Human Nodes

Email: ****@**
Twitter: @tonilanec
Instagram: @tonilanec

Cell: (+1) 281-513-1621

Confidentiality notice:
The information transmitted in this email and/or any attached document(s) is confidential and intended only for the person or entity to which it is addressed and may contain privileged material. Any review, retransmission, dissemination or other use of, or taking of any action in reliance upon this information by persons or entities other than the intended recipient is prohibited. If you received this in error, please contact the sender and delete the material from any computer.

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Find Largest Tables in MySQL

If you're trying to find what tables in your MySQL deployment are consuming the most amount of space, you can use the following query to find this information directly from the information schema.

SELECT CONCAT(table_schema, '.', table_name), CONCAT(ROUND(table_rows / 1000000, 2), 'M') rows, CONCAT(ROUND(data_length / ( 1024 1024 1024 ), 2), 'G') DATA, CONCAT(ROUND(index_length / ( 1024 1024 1024 ), 2), 'G') idx, CONCAT(ROUND(( data_length + index_length ) / ( 1024 1024 1024 ), 2), 'G') total_size, ROUND(index_length / data_length, 2) idxfrac, engine FROM information_schema.TABLES ORDER BY data_length + index_length DESC LIMIT 25;

You'll get a list of the top 25 tables by total size (index size + data size), how many rows they have, and the engine they are using to be stored. Being able to see what engine is being used is especially helpful when running MySQL Cluster.

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

All About Forensic Psychology New video to promote The All About Forensic Psychology website. I originally...

All About Forensic Psychology

New video to promote The All About Forensic Psychology website. I originally built the the website as a student resource for an undergraduate course in forensic psychology I wrote and delivered.

Highlights on the website include:

A detailed and clear account of what forensic psychology actually is. Important because of the way the subject has been distorted, sensationalised and inaccurately presented in books, films and on TV. See following link.

http://www.all-about-forensic-psychology.com/what-is-forensic-psychology.html

A series of information pages on criminal profiling. A fascinating subject to learn about in iteslf but also important to know of its place within forensic psychology; for example is criminal profiling a realistic career goal? See following link.

http://www.all-about-forensic-psychology.com/fbi-profiler.html

The Forensic Psychology Degree Directory. A great resource for anybody thinking about studying forensic psychology. See following link.

http://www.all-about-forensic-psychology.com/forensic-psychology-degree.html

Free full-text articles. A wonderful collection of publications including a special "Inside the Criminal Mind" collection showcasing all the major articles written by members of the Behavioral Science Units, National Center for the Analysis of Violent Crime, at the FBI Academy. See following link.

http://www.all-about-forensic-psychology.com/forensic-psychology-ebook.html

I really hope that you find all the information and resources on the All About Forensic Psychology website useful and engaging.

All the best

David

http://www.all-about-forensic-psychology.com/

Attachments

Forensic Psychology

Thank you for taking the time to check out my forensic psychology website. My name is David Webb and I've had a passionate interest in studying and teaching psychology for over 20 years. I have a first class honors degree in psychology and a Masters in Occupational psychology from the University of Sheffield (UK). For a number of years, I was a lecturer in psychology at the University of Huddersfield (UK). During this time I wrote and delivered an undergraduate course in forensic psychology, as a result of which I ended up building the All About Forensic Psychology website (http://www.all-about-forensic-psychology.com/). Highlights on the website include: A detailed and clear account of what forensic psychology actually is. Important because of the way the subject has been distorted, sensationalised and inaccurately presented in books, films and on TV. See following link. http://www.all-about-forensic-psychology.com/what-is-forensic-psychology.html A series of information pages on criminal profiling. A fascinating subject to learn about in iteslf but also important to know of its place within forensic psychology; for example is criminal profiling a realistic career goal? See following link. http://www.all-about-forensic-psychology.com/fbi-profiler.html The Forensic Psychology Degree Directory. A great resource for anybody thinking about studying forensic psychology. See following link. http://www.all-about-forensic-psychology.com/forensic-psychology-degree.html Free full-text articles. A wonderful collection of publications including a special "Inside the Criminal Mind" collection showcasing all the major articles written by members of the Behavioral Science Units, National Center for the Analysis of Violent Crime, at the FBI Academy. See following link. http://www.all-about-forensic-psychology.com/forensic-psychology-ebook.html I really hope that you find all the information and resources on the All About Forensic Psychology website useful and engaging. David Webb BSc (hons), MSc http://www.all-about-forensic-psychology.com/

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

All About Forensic Psychology New video to promote The All About Forensic Psychology website. I originally...

All About Forensic Psychology

New video to promote The All About Forensic Psychology website. I originally built the the website as a student resource for an undergraduate course in forensic psychology I wrote and delivered.

Highlights on the website include:

A detailed and clear account of what forensic psychology actually is. Important because of the way the subject has been distorted, sensationalised and inaccurately presented in books, films and on TV. See following link.

http://www.all-about-forensic-psychology.com/what-is-forensic-psychology.html

A series of information pages on criminal profiling. A fascinating subject to learn about in iteslf but also important to know of its place within forensic psychology; for example is criminal profiling a realistic career goal? See following link.

http://www.all-about-forensic-psychology.com/fbi-profiler.html

The Forensic Psychology Degree Directory. A great resource for anybody thinking about studying forensic psychology. See following link.

http://www.all-about-forensic-psychology.com/forensic-psychology-degree.html

Free full-text articles. A wonderful collection of publications including a special "Inside the Criminal Mind" collection showcasing all the major articles written by members of the Behavioral Science Units, National Center for the Analysis of Violent Crime, at the FBI Academy. See following link.

http://www.all-about-forensic-psychology.com/forensic-psychology-ebook.html

I really hope that you find all the information and resources on the All About Forensic Psychology website useful and engaging.

All the best

David

http://www.all-about-forensic-psychology.com/

Attachments

Forensic Psychology

Thank you for taking the time to check out my forensic psychology website. My name is David Webb and I've had a passionate interest in studying and teaching psychology for over 20 years. I have a first class honors degree in psychology and a Masters in Occupational psychology from the University of Sheffield (UK). For a number of years, I was a lecturer in psychology at the University of Huddersfield (UK). During this time I wrote and delivered an undergraduate course in forensic psychology, as a result of which I ended up building the All About Forensic Psychology website (http://www.all-about-forensic-psychology.com/). Highlights on the website include: A detailed and clear account of what forensic psychology actually is. Important because of the way the subject has been distorted, sensationalised and inaccurately presented in books, films and on TV. See following link. http://www.all-about-forensic-psychology.com/what-is-forensic-psychology.html A series of information pages on criminal profiling. A fascinating subject to learn about in iteslf but also important to know of its place within forensic psychology; for example is criminal profiling a realistic career goal? See following link. http://www.all-about-forensic-psychology.com/fbi-profiler.html The Forensic Psychology Degree Directory. A great resource for anybody thinking about studying forensic psychology. See following link. http://www.all-about-forensic-psychology.com/forensic-psychology-degree.html Free full-text articles. A wonderful collection of publications including a special "Inside the Criminal Mind" collection showcasing all the major articles written by members of the Behavioral Science Units, National Center for the Analysis of Violent Crime, at the FBI Academy. See following link. http://www.all-about-forensic-psychology.com/forensic-psychology-ebook.html I really hope that you find all the information and resources on the All About Forensic Psychology website useful and engaging. David Webb BSc (hons), MSc http://www.all-about-forensic-psychology.com/

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Compelling Narratives using Augmented Reality +Google Glass has, for better or worse, shaped the narrative...

Compelling Narratives using Augmented Reality
+Google Glass has, for better or worse, shaped the narrative around augmented reality this past year.  We've seen the arms (eyes?) race rapidly develop, culminating recently with the +YCombinator-backed +meta announcing their "SpaceGlasses" [1], one of the first truly compelling experiences built around a convincingly capable device [2].

The hardest part of augmented reality is not the hardware, nor the computer vision software—both extremely difficult academic challenges in their own right, and certainly not to be taken by the faint of heart—but in the experience.

These problems will be solved, through no small effort, but they will be solved.  The most daunting challenge is to build a compelling story that binds the available data (read "the Internet") to the real world, and exposes it in an unobtrusive and seamless fashion.  This too will emerge naturally, but early pioneers in the space need to think carefully about the application of augmented reality in order to succeed; no one wants a world filled with advertisements [3], and in fact—some even try to eliminate them [4].

Here, +Field Trip attempts to builds one such compelling story.  The experience of contextual information making itself available without interrupting your interactions with the real world is so tantalizingly close you can feel it, but one wonders just how much control the user will have over the frequency and relevance of the information "popups".  In the early days of the software industry (late 60s, early 70s), an ongoing debate between the [then] default of free software vs. closed software unfolded, setting the foundation for today's conversation around open source and free [5] software.  I'll be talking more about this in a presentation at the upcoming #RTP180 : Open Source All Things event [6] in North Carolina.

It's another step forward for ubiquitous augmented reality, an exciting one indeed, but one that won't achieve mass adoption until the user can control their own experience [7].

[1]: https://www.spaceglasses.com/
[2]: SpaceGlasses are the future of computing
[3]: https://vimeo.com/8569187
[4]: http://unlogo.org/pages/about
[5]: that's free as in libertas, not as in gratis.
[6]: http://www.rtp.org/rtp-180-open-source-all-things
[7]: I recently started a project to this effect called "Para", a client-agnostic peer-to-peer network for implementing a data layer on top of the real world.  I'm seeking collaborators!  Check it out: http://para.io

Attachments

Field Trip on Glass

Heads up! Your city is trying to tell you something. The history, architecture, insider tips and hidden gems from over 100 local publisher partners come to l...

4 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Compelling Narratives using Augmented Reality +Google Glass has, for better or worse, shaped the narrative...

Compelling Narratives using Augmented Reality
+Google Glass has, for better or worse, shaped the narrative around augmented reality this past year.  We've seen the arms (eyes?) race rapidly develop, culminating recently with the +YCombinator-backed +meta announcing their "SpaceGlasses" [1], one of the first truly compelling experiences built around a convincingly capable device [2].

The hardest part of augmented reality is not the hardware, nor the computer vision software—both extremely difficult academic challenges in their own right, and certainly not to be taken by the faint of heart—but in the experience.

These problems will be solved, through no small effort, but they will be solved.  The most daunting challenge is to build a compelling story that binds the available data (read "the Internet") to the real world, and exposes it in an unobtrusive and seamless fashion.  This too will emerge naturally, but early pioneers in the space need to think carefully about the application of augmented reality in order to succeed; no one wants a world filled with advertisements [3], and in fact—some even try to eliminate them [4].

Here, +Field Trip attempts to builds one such compelling story.  The experience of contextual information making itself available without interrupting your interactions with the real world is so tantalizingly close you can feel it, but one wonders just how much control the user will have over the frequency and relevance of the information "popups".  In the early days of the software industry (late 60s, early 70s), an ongoing debate between the [then] default of free software vs. closed software unfolded, setting the foundation for today's conversation around open source and free [5] software.  I'll be talking more about this in a presentation at the upcoming #RTP180 : Open Source All Things event [6] in North Carolina.

It's another step forward for ubiquitous augmented reality, an exciting one indeed, but one that won't achieve mass adoption until the user can control their own experience [7].

[1]: https://www.spaceglasses.com/
[2]: SpaceGlasses are the future of computing
[3]: https://vimeo.com/8569187
[4]: http://unlogo.org/pages/about
[5]: that's free as in libertas, not as in gratis.
[6]: http://www.rtp.org/rtp-180-open-source-all-things
[7]: I recently started a project to this effect called "Para", a client-agnostic peer-to-peer network for implementing a data layer on top of the real world.  I'm seeking collaborators!  Check it out: http://para.io

Attachments

Field Trip on Glass

Heads up! Your city is trying to tell you something. The history, architecture, insider tips and hidden gems from over 100 local publisher partners come to l...

1 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Compelling Narratives using Augmented Reality +Google Glass has, for better or worse, shaped the narrative...

Compelling Narratives using Augmented Reality
+Google Glass has, for better or worse, shaped the narrative around augmented reality this past year.  We've seen the arms (eyes?) race rapidly develop, culminating recently with the +YCombinator-backed +meta announcing their "SpaceGlasses" [1], one of the first truly compelling experiences built around a convincingly capable device [2].

The hardest part of augmented reality is not the hardware, nor the computer vision software—both extremely difficult academic challenges in their own right, and certainly not to be taken by the faint of heart—but in the experience.

These problems will be solved, through no small effort, but they will be solved.  The most daunting challenge is to build a compelling story that binds the available data (read "the Internet") to the real world, and exposes it in an unobtrusive and seamless fashion.  This too will emerge naturally, but early pioneers in the space need to think carefully about the application of augmented reality in order to succeed; no one wants a world filled with advertisements [3], and in fact—some even try to eliminate them [4].

Here, +Field Trip attempts to builds one such compelling story.  The experience of contextual information making itself available without interrupting your interactions with the real world is so tantalizingly close you can feel it, but one wonders just how much control the user will have over the frequency and relevance of the information "popups".  In the early days of the software industry (late 60s, early 70s), an ongoing debate between the [then] default of free software vs. closed software unfolded, setting the foundation for today's conversation around open source and free [5] software.  I'll be talking more about this in a presentation at the upcoming #RTP180 : Open Source All Things event [6] in North Carolina.

It's another step forward for ubiquitous augmented reality, an exciting one indeed, but one that won't achieve mass adoption until the user can control their own experience [7].

[1]: https://www.spaceglasses.com/
[2]: SpaceGlasses are the future of computing
[3]: https://vimeo.com/8569187
[4]: http://unlogo.org/pages/about
[5]: that's free as in libertas, not as in gratis.
[6]: http://www.rtp.org/rtp-180-open-source-all-things
[7]: I recently started a project to this effect called "Para", a client-agnostic peer-to-peer network for implementing a data layer on top of the real world.  I'm seeking collaborators!  Check it out: http://para.io

Attachments

Field Trip on Glass

Heads up! Your city is trying to tell you something. The history, architecture, insider tips and hidden gems from over 100 local publisher partners come to l...

5 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Compelling Narratives using Augmented Reality +Google Glass has, for better or worse, shaped the narrative...

Compelling Narratives using Augmented Reality
+Google Glass has, for better or worse, shaped the narrative around augmented reality this past year.  We've seen the arms (eyes?) race rapidly develop, culminating recently with the +YCombinator-backed +meta announcing their "SpaceGlasses" [1], one of the first truly compelling experiences built around a convincingly capable device [2].

The hardest part of augmented reality is not the hardware, nor the computer vision software—both extremely difficult academic challenges in their own right, and certainly not to be taken by the faint of heart—but in the experience.

These problems will be solved, through no small effort, but they will be solved.  The most daunting challenge is to build a compelling story that binds the available data (read "the Internet") to the real world, and exposes it in an unobtrusive and seamless fashion.  This too will emerge naturally, but early pioneers in the space need to think carefully about the application of augmented reality in order to succeed; no one wants a world filled with advertisements [3], and in fact—some even try to eliminate them [4].

Here, +Field Trip attempts to builds one such compelling story.  The experience of contextual information making itself available without interrupting your interactions with the real world is so tantalizingly close you can feel it, but one wonders just how much control the user will have over the frequency and relevance of the information "popups".  In the early days of the software industry (late 60s, early 70s), an ongoing debate between the [then] default of free software vs. closed software unfolded, setting the foundation for today's conversation around open source and free [5] software.  I'll be talking more about this in a presentation at the upcoming #RTP180 : Open Source All Things event [6] in North Carolina.

It's another step forward for ubiquitous augmented reality, an exciting one indeed, but one that won't achieve mass adoption until the user can control their own experience [7].

[1]: https://www.spaceglasses.com/
[2]: SpaceGlasses are the future of computing
[3]: https://vimeo.com/8569187
[4]: http://unlogo.org/pages/about
[5]: that's free as in libertas, not as in gratis.
[6]: http://www.rtp.org/rtp-180-open-source-all-things
[7]: I recently started a project to this effect called "Para", a client-agnostic peer-to-peer network for implementing a data layer on top of the real world.  I'm seeking collaborators!  Check it out: http://para.io

Attachments

Field Trip on Glass

Heads up! Your city is trying to tell you something. The history, architecture, insider tips and hidden gems from over 100 local publisher partners come to l...

4 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

On the Ongoing Attacks between China, U.S., Russia, Israel, etc.… The latest round of evidence of ongoing...

On the Ongoing Attacks between China, U.S., Russia, Israel, etc.…
The latest round of evidence of ongoing digital warfare between the superpowers is now being reported in the N.Y. Times [1] after an undeniably incriminating 60-page report on the Chinese attacks on the U.S. by security firm Mandiant [2].

“Either they are coming from inside Unit 61398, or the people who run the most-controlled, most-monitored Internet networks in the world are clueless about thousands of people generating attacks from this one neighborhood.”
                                                    — Kevin Mandia

The report goes on to track individual participants in the attack, tracing them back to the headquarters of P.L.A. Unit 61398.

Attacks from the Chinese have been ongoing for many years, notably back to Operation Titan Rain [3] in 2003, in which attackers gained access to military intelligence networks at organizations such as Lockheed Martin, Sandia National Laboratories, Redstone Arsenal, and NASA [4].  Direct military targets were also included in the assault, such as the U.S. Army Information Systems Engineering Command at Fort Huachuca, Arizona, the Defense Information Systems Agency in Arlington, Virginia, the Naval Ocean Systems Center, a Defense Department installation in San Diego, California, and the U.S. Army Space and Strategic Defense installation in Huntsville, Alabama [5]. 

These ongoing attacks are labeled "Advanced Persistent Threats" or "APT" by the American Military, are considered acts of war by both the White House [6] and the Department of Defense [7] as far back as 2011, and are not unique to the Chinese origins.  You may remember the 2007 attacks on Estonia [8], which has been attributed to entities within Russian territory operating with the assistance of the Russian government [9].  These attacks disabled a wide array of Estonian government sites, rendering services in the world's most digitally-connected country unusable.  The attacks also disabled ATM machines, effectively disabling some portion of the Estonian economy.

The United States [and arguably Israel, [10]] have also been actively participating in these attacks [11] with the deploying of FLAME and Stuxnet against Iran, which made international headlines this past year when the coordinated efforts of the tools were used to disable Iranian nuclear centrifuges in an attempt to slow their progress in their nuclear program [12].  These efforts are ongoing, with the latest addition of the Gauss and Duqu malwares [13] continuing to target middle-eastern countries.

“From his first months in office, President Obama secretly ordered increasingly sophisticated attacks on the computer systems that run Iran’s main nuclear enrichment facilities, significantly expanding America’s first sustained use of cyberweapons, according to participants in the program.”
                                                    — +The New York Times

Obama reportedly went on to sign a classified directive last year [14] enabling the government to seize control of private networks, and the 2012 NDAA (National Defense Authorization Act) includes terms [15, section 954] that authorize offensive attacks on foreign threats [16].  The official United States policy already is to deem any cyberattack on the U.S. as an "act of war" [17], and it looks like these types of actions and attacks have already been made legal.

While it may once have been a subject of fiction [18], it's now and has been a harsh reality that we're in the middle of a new era in warfare, and the battles are already well-underway as countries around the world are openly engaging in offensive attacks on one another that are impacting economies on a massive scale.  I don't know what else to call this other than a world war—even the CIA's Center for the Study of Intelligence (CSI) predicted this [19], as have many others even earlier [20].  

Here's a thought; if our constitution gives us the right to bear arms, and the government deems these types of attacks as acts of war, then isn't it our right to keep and bear these arms?  Yet another case for a mass-algorate society [21], which Mr. Obama appears to agree with me on [22], at the very least.

[1]: http://www.nytimes.com/2013/02/19/technology/chinas-army-is-seen-as-tied-to-hacking-against-us.html
[2]: http://intelreport.mandiant.com/
[3]: http://en.wikipedia.org/wiki/Titan_Rain
[4]: http://www.time.com/time/nation/article/0,8599,1098371,00.html
[5]: http://www.zdnet.com/news/security-experts-lift-lid-on-chinese-hack-attacks/145763
[6]: http://www.whitehouse.gov/sites/default/files/rss_viewer/international_strategy_for_cyberspace.pdf
[7]: http://online.wsj.com/article/SB10001424052702304563104576355623135782718.html
[8]: http://en.wikipedia.org/wiki/2007_cyberattacks_on_Estonia
[9]: http://www.vedomosti.ru/smartmoney/article/2007/05/28/3004
[10]: http://www.zdnet.com/meet-gauss-the-latest-cyber-espionage-tool-7000002405/
[11]: http://www.nytimes.com/2012/06/01/world/middleeast/obama-ordered-wave-of-cyberattacks-against-iran.html?pagewanted=all
[12]: http://www.bbc.co.uk/news/technology-11388018
[13]: http://www.zdnet.com/meet-gauss-the-latest-cyber-espionage-tool-7000002405/
[14]: http://endthelie.com/2012/11/15/obama-reportedly-signs-classified-cyberwarfare-policy-directive-with-troubling-implications/#axzz2LMPlf8iA
[15]: http://www.gpo.gov/fdsys/pkg/BILLS-112hr1540enr/pdf/BILLS-112hr1540enr.pdf
[16]: http://endthelie.com/2011/12/17/approval-of-covert-offensive-cyberwar-sneakily-inserted-into-ndaa/
[17]: http://www.forbes.com/sites/reuvencohen/2012/06/05/the-white-house-and-pentagon-deem-cyber-attacks-an-act-of-war/
[18]: http://en.wikipedia.org/wiki/Neuromancer
[19]: https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/vol48no4/new_face_of_war.html
[20]: http://www.rand.org/content/dam/rand/pubs/reprints/2007/RAND_RP223.pdf
[21]: https://plus.google.com/112353210404102902472/posts/MVQXyw9EJDE
[22]: http://news.cnet.com/8301-17938_105-57569503-1/obama-endorses-required-high-school-coding-classes/

Attachments

China’s Army Is Seen as Tied to Hacking Against U.S.

An overwhelming percentage of the attacks on American companies and government agencies start in a building on the edge of Shanghai, say cybersecurity experts and American intelligence officials.

5 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

On the Ongoing Attacks between China, U.S., Russia, Israel, etc.… The latest round of evidence of ongoing...

On the Ongoing Attacks between China, U.S., Russia, Israel, etc.…
The latest round of evidence of ongoing digital warfare between the superpowers is now being reported in the N.Y. Times [1] after an undeniably incriminating 60-page report on the Chinese attacks on the U.S. by security firm Mandiant [2].

“Either they are coming from inside Unit 61398, or the people who run the most-controlled, most-monitored Internet networks in the world are clueless about thousands of people generating attacks from this one neighborhood.”
                                                    — Kevin Mandia

The report goes on to track individual participants in the attack, tracing them back to the headquarters of P.L.A. Unit 61398.

Attacks from the Chinese have been ongoing for many years, notably back to Operation Titan Rain [3] in 2003, in which attackers gained access to military intelligence networks at organizations such as Lockheed Martin, Sandia National Laboratories, Redstone Arsenal, and NASA [4].  Direct military targets were also included in the assault, such as the U.S. Army Information Systems Engineering Command at Fort Huachuca, Arizona, the Defense Information Systems Agency in Arlington, Virginia, the Naval Ocean Systems Center, a Defense Department installation in San Diego, California, and the U.S. Army Space and Strategic Defense installation in Huntsville, Alabama [5]. 

These ongoing attacks are labeled "Advanced Persistent Threats" or "APT" by the American Military, are considered acts of war by both the White House [6] and the Department of Defense [7] as far back as 2011, and are not unique to the Chinese origins.  You may remember the 2007 attacks on Estonia [8], which has been attributed to entities within Russian territory operating with the assistance of the Russian government [9].  These attacks disabled a wide array of Estonian government sites, rendering services in the world's most digitally-connected country unusable.  The attacks also disabled ATM machines, effectively disabling some portion of the Estonian economy.

The United States [and arguably Israel, [10]] have also been actively participating in these attacks [11] with the deploying of FLAME and Stuxnet against Iran, which made international headlines this past year when the coordinated efforts of the tools were used to disable Iranian nuclear centrifuges in an attempt to slow their progress in their nuclear program [12].  These efforts are ongoing, with the latest addition of the Gauss and Duqu malwares [13] continuing to target middle-eastern countries.

“From his first months in office, President Obama secretly ordered increasingly sophisticated attacks on the computer systems that run Iran’s main nuclear enrichment facilities, significantly expanding America’s first sustained use of cyberweapons, according to participants in the program.”
                                                    — +The New York Times

Obama reportedly went on to sign a classified directive last year [14] enabling the government to seize control of private networks, and the 2012 NDAA (National Defense Authorization Act) includes terms [15, section 954] that authorize offensive attacks on foreign threats [16].  The official United States policy already is to deem any cyberattack on the U.S. as an "act of war" [17], and it looks like these types of actions and attacks have already been made legal.

While it may once have been a subject of fiction [18], it's now and has been a harsh reality that we're in the middle of a new era in warfare, and the battles are already well-underway as countries around the world are openly engaging in offensive attacks on one another that are impacting economies on a massive scale.  I don't know what else to call this other than a world war—even the CIA's Center for the Study of Intelligence (CSI) predicted this [19], as have many others even earlier [20].  

Here's a thought; if our constitution gives us the right to bear arms, and the government deems these types of attacks as acts of war, then isn't it our right to keep and bear these arms?  Yet another case for a mass-algorate society [21], which Mr. Obama appears to agree with me on [22], at the very least.

[1]: http://www.nytimes.com/2013/02/19/technology/chinas-army-is-seen-as-tied-to-hacking-against-us.html
[2]: http://intelreport.mandiant.com/
[3]: http://en.wikipedia.org/wiki/Titan_Rain
[4]: http://www.time.com/time/nation/article/0,8599,1098371,00.html
[5]: http://www.zdnet.com/news/security-experts-lift-lid-on-chinese-hack-attacks/145763
[6]: http://www.whitehouse.gov/sites/default/files/rss_viewer/international_strategy_for_cyberspace.pdf
[7]: http://online.wsj.com/article/SB10001424052702304563104576355623135782718.html
[8]: http://en.wikipedia.org/wiki/2007_cyberattacks_on_Estonia
[9]: http://www.vedomosti.ru/smartmoney/article/2007/05/28/3004
[10]: http://www.zdnet.com/meet-gauss-the-latest-cyber-espionage-tool-7000002405/
[11]: http://www.nytimes.com/2012/06/01/world/middleeast/obama-ordered-wave-of-cyberattacks-against-iran.html?pagewanted=all
[12]: http://www.bbc.co.uk/news/technology-11388018
[13]: http://www.zdnet.com/meet-gauss-the-latest-cyber-espionage-tool-7000002405/
[14]: http://endthelie.com/2012/11/15/obama-reportedly-signs-classified-cyberwarfare-policy-directive-with-troubling-implications/#axzz2LMPlf8iA
[15]: http://www.gpo.gov/fdsys/pkg/BILLS-112hr1540enr/pdf/BILLS-112hr1540enr.pdf
[16]: http://endthelie.com/2011/12/17/approval-of-covert-offensive-cyberwar-sneakily-inserted-into-ndaa/
[17]: http://www.forbes.com/sites/reuvencohen/2012/06/05/the-white-house-and-pentagon-deem-cyber-attacks-an-act-of-war/
[18]: http://en.wikipedia.org/wiki/Neuromancer
[19]: https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/vol48no4/new_face_of_war.html
[20]: http://www.rand.org/content/dam/rand/pubs/reprints/2007/RAND_RP223.pdf
[21]: https://plus.google.com/112353210404102902472/posts/MVQXyw9EJDE
[22]: http://news.cnet.com/8301-17938_105-57569503-1/obama-endorses-required-high-school-coding-classes/

Attachments

China’s Army Is Seen as Tied to Hacking Against U.S.

An overwhelming percentage of the attacks on American companies and government agencies start in a building on the edge of Shanghai, say cybersecurity experts and American intelligence officials.

1 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

On the Ongoing Attacks between China, U.S., Russia, Israel, etc.… The latest round of evidence of ongoing...

On the Ongoing Attacks between China, U.S., Russia, Israel, etc.…
The latest round of evidence of ongoing digital warfare between the superpowers is now being reported in the N.Y. Times [1] after an undeniably incriminating 60-page report on the Chinese attacks on the U.S. by security firm Mandiant [2].

“Either they are coming from inside Unit 61398, or the people who run the most-controlled, most-monitored Internet networks in the world are clueless about thousands of people generating attacks from this one neighborhood.”
                                                    — Kevin Mandia

The report goes on to track individual participants in the attack, tracing them back to the headquarters of P.L.A. Unit 61398.

Attacks from the Chinese have been ongoing for many years, notably back to Operation Titan Rain [3] in 2003, in which attackers gained access to military intelligence networks at organizations such as Lockheed Martin, Sandia National Laboratories, Redstone Arsenal, and NASA [4].  Direct military targets were also included in the assault, such as the U.S. Army Information Systems Engineering Command at Fort Huachuca, Arizona, the Defense Information Systems Agency in Arlington, Virginia, the Naval Ocean Systems Center, a Defense Department installation in San Diego, California, and the U.S. Army Space and Strategic Defense installation in Huntsville, Alabama [5]. 

These ongoing attacks are labeled "Advanced Persistent Threats" or "APT" by the American Military, are considered acts of war by both the White House [6] and the Department of Defense [7] as far back as 2011, and are not unique to the Chinese origins.  You may remember the 2007 attacks on Estonia [8], which has been attributed to entities within Russian territory operating with the assistance of the Russian government [9].  These attacks disabled a wide array of Estonian government sites, rendering services in the world's most digitally-connected country unusable.  The attacks also disabled ATM machines, effectively disabling some portion of the Estonian economy.

The United States [and arguably Israel, [10]] have also been actively participating in these attacks [11] with the deploying of FLAME and Stuxnet against Iran, which made international headlines this past year when the coordinated efforts of the tools were used to disable Iranian nuclear centrifuges in an attempt to slow their progress in their nuclear program [12].  These efforts are ongoing, with the latest addition of the Gauss and Duqu malwares [13] continuing to target middle-eastern countries.

“From his first months in office, President Obama secretly ordered increasingly sophisticated attacks on the computer systems that run Iran’s main nuclear enrichment facilities, significantly expanding America’s first sustained use of cyberweapons, according to participants in the program.”
                                                    — +The New York Times

Obama reportedly went on to sign a classified directive last year [14] enabling the government to seize control of private networks, and the 2012 NDAA (National Defense Authorization Act) includes terms [15, section 954] that authorize offensive attacks on foreign threats [16].  The official United States policy already is to deem any cyberattack on the U.S. as an "act of war" [17], and it looks like these types of actions and attacks have already been made legal.

While it may once have been a subject of fiction [18], it's now and has been a harsh reality that we're in the middle of a new era in warfare, and the battles are already well-underway as countries around the world are openly engaging in offensive attacks on one another that are impacting economies on a massive scale.  I don't know what else to call this other than a world war—even the CIA's Center for the Study of Intelligence (CSI) predicted this [19], as have many others even earlier [20].  

Here's a thought; if our constitution gives us the right to bear arms, and the government deems these types of attacks as acts of war, then isn't it our right to keep and bear these arms?  Yet another case for a mass-algorate society [21], which Mr. Obama appears to agree with me on [22], at the very least.

[1]: http://www.nytimes.com/2013/02/19/technology/chinas-army-is-seen-as-tied-to-hacking-against-us.html
[2]: http://intelreport.mandiant.com/
[3]: http://en.wikipedia.org/wiki/Titan_Rain
[4]: http://www.time.com/time/nation/article/0,8599,1098371,00.html
[5]: http://www.zdnet.com/news/security-experts-lift-lid-on-chinese-hack-attacks/145763
[6]: http://www.whitehouse.gov/sites/default/files/rss_viewer/international_strategy_for_cyberspace.pdf
[7]: http://online.wsj.com/article/SB10001424052702304563104576355623135782718.html
[8]: http://en.wikipedia.org/wiki/2007_cyberattacks_on_Estonia
[9]: http://www.vedomosti.ru/smartmoney/article/2007/05/28/3004
[10]: http://www.zdnet.com/meet-gauss-the-latest-cyber-espionage-tool-7000002405/
[11]: http://www.nytimes.com/2012/06/01/world/middleeast/obama-ordered-wave-of-cyberattacks-against-iran.html?pagewanted=all
[12]: http://www.bbc.co.uk/news/technology-11388018
[13]: http://www.zdnet.com/meet-gauss-the-latest-cyber-espionage-tool-7000002405/
[14]: http://endthelie.com/2012/11/15/obama-reportedly-signs-classified-cyberwarfare-policy-directive-with-troubling-implications/#axzz2LMPlf8iA
[15]: http://www.gpo.gov/fdsys/pkg/BILLS-112hr1540enr/pdf/BILLS-112hr1540enr.pdf
[16]: http://endthelie.com/2011/12/17/approval-of-covert-offensive-cyberwar-sneakily-inserted-into-ndaa/
[17]: http://www.forbes.com/sites/reuvencohen/2012/06/05/the-white-house-and-pentagon-deem-cyber-attacks-an-act-of-war/
[18]: http://en.wikipedia.org/wiki/Neuromancer
[19]: https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/vol48no4/new_face_of_war.html
[20]: http://www.rand.org/content/dam/rand/pubs/reprints/2007/RAND_RP223.pdf
[21]: https://plus.google.com/112353210404102902472/posts/MVQXyw9EJDE
[22]: http://news.cnet.com/8301-17938_105-57569503-1/obama-endorses-required-high-school-coding-classes/

Attachments

China’s Army Is Seen as Tied to Hacking Against U.S.

An overwhelming percentage of the attacks on American companies and government agencies start in a building on the edge of Shanghai, say cybersecurity experts and American intelligence officials.

6 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

On the Ongoing Attacks between China, U.S., Russia, Israel, etc.… The latest round of evidence of ongoing...

On the Ongoing Attacks between China, U.S., Russia, Israel, etc.…
The latest round of evidence of ongoing digital warfare between the superpowers is now being reported in the N.Y. Times [1] after an undeniably incriminating 60-page report on the Chinese attacks on the U.S. by security firm Mandiant [2].

“Either they are coming from inside Unit 61398, or the people who run the most-controlled, most-monitored Internet networks in the world are clueless about thousands of people generating attacks from this one neighborhood.”
                                                    — Kevin Mandia

The report goes on to track individual participants in the attack, tracing them back to the headquarters of P.L.A. Unit 61398.

Attacks from the Chinese have been ongoing for many years, notably back to Operation Titan Rain [3] in 2003, in which attackers gained access to military intelligence networks at organizations such as Lockheed Martin, Sandia National Laboratories, Redstone Arsenal, and NASA [4].  Direct military targets were also included in the assault, such as the U.S. Army Information Systems Engineering Command at Fort Huachuca, Arizona, the Defense Information Systems Agency in Arlington, Virginia, the Naval Ocean Systems Center, a Defense Department installation in San Diego, California, and the U.S. Army Space and Strategic Defense installation in Huntsville, Alabama [5]. 

These ongoing attacks are labeled "Advanced Persistent Threats" or "APT" by the American Military, are considered acts of war by both the White House [6] and the Department of Defense [7] as far back as 2011, and are not unique to the Chinese origins.  You may remember the 2007 attacks on Estonia [8], which has been attributed to entities within Russian territory operating with the assistance of the Russian government [9].  These attacks disabled a wide array of Estonian government sites, rendering services in the world's most digitally-connected country unusable.  The attacks also disabled ATM machines, effectively disabling some portion of the Estonian economy.

The United States [and arguably Israel, [10]] have also been actively participating in these attacks [11] with the deploying of FLAME and Stuxnet against Iran, which made international headlines this past year when the coordinated efforts of the tools were used to disable Iranian nuclear centrifuges in an attempt to slow their progress in their nuclear program [12].  These efforts are ongoing, with the latest addition of the Gauss and Duqu malwares [13] continuing to target middle-eastern countries.

“From his first months in office, President Obama secretly ordered increasingly sophisticated attacks on the computer systems that run Iran’s main nuclear enrichment facilities, significantly expanding America’s first sustained use of cyberweapons, according to participants in the program.”
                                                    — +The New York Times

Obama reportedly went on to sign a classified directive last year [14] enabling the government to seize control of private networks, and the 2012 NDAA (National Defense Authorization Act) includes terms [15, section 954] that authorize offensive attacks on foreign threats [16].  The official United States policy already is to deem any cyberattack on the U.S. as an "act of war" [17], and it looks like these types of actions and attacks have already been made legal.

While it may once have been a subject of fiction [18], it's now and has been a harsh reality that we're in the middle of a new era in warfare, and the battles are already well-underway as countries around the world are openly engaging in offensive attacks on one another that are impacting economies on a massive scale.  I don't know what else to call this other than a world war—even the CIA's Center for the Study of Intelligence (CSI) predicted this [19], as have many others even earlier [20].  

Here's a thought; if our constitution gives us the right to bear arms, and the government deems these types of attacks as acts of war, then isn't it our right to keep and bear these arms?  Yet another case for a mass-algorate society [21], which Mr. Obama appears to agree with me on [22], at the very least.

[1]: http://www.nytimes.com/2013/02/19/technology/chinas-army-is-seen-as-tied-to-hacking-against-us.html
[2]: http://intelreport.mandiant.com/
[3]: http://en.wikipedia.org/wiki/Titan_Rain
[4]: http://www.time.com/time/nation/article/0,8599,1098371,00.html
[5]: http://www.zdnet.com/news/security-experts-lift-lid-on-chinese-hack-attacks/145763
[6]: http://www.whitehouse.gov/sites/default/files/rss_viewer/international_strategy_for_cyberspace.pdf
[7]: http://online.wsj.com/article/SB10001424052702304563104576355623135782718.html
[8]: http://en.wikipedia.org/wiki/2007_cyberattacks_on_Estonia
[9]: http://www.vedomosti.ru/smartmoney/article/2007/05/28/3004
[10]: http://www.zdnet.com/meet-gauss-the-latest-cyber-espionage-tool-7000002405/
[11]: http://www.nytimes.com/2012/06/01/world/middleeast/obama-ordered-wave-of-cyberattacks-against-iran.html?pagewanted=all
[12]: http://www.bbc.co.uk/news/technology-11388018
[13]: http://www.zdnet.com/meet-gauss-the-latest-cyber-espionage-tool-7000002405/
[14]: http://endthelie.com/2012/11/15/obama-reportedly-signs-classified-cyberwarfare-policy-directive-with-troubling-implications/#axzz2LMPlf8iA
[15]: http://www.gpo.gov/fdsys/pkg/BILLS-112hr1540enr/pdf/BILLS-112hr1540enr.pdf
[16]: http://endthelie.com/2011/12/17/approval-of-covert-offensive-cyberwar-sneakily-inserted-into-ndaa/
[17]: http://www.forbes.com/sites/reuvencohen/2012/06/05/the-white-house-and-pentagon-deem-cyber-attacks-an-act-of-war/
[18]: http://en.wikipedia.org/wiki/Neuromancer
[19]: https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/vol48no4/new_face_of_war.html
[20]: http://www.rand.org/content/dam/rand/pubs/reprints/2007/RAND_RP223.pdf
[21]: https://plus.google.com/112353210404102902472/posts/MVQXyw9EJDE
[22]: http://news.cnet.com/8301-17938_105-57569503-1/obama-endorses-required-high-school-coding-classes/

Attachments

China’s Army Is Seen as Tied to Hacking Against U.S.

An overwhelming percentage of the attacks on American companies and government agencies start in a building on the edge of Shanghai, say cybersecurity experts and American intelligence officials.

5 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Information-Centric Warfare... in reply to

Information-Centric Warfare

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

What are they doing to the... in reply to

What are they doing to the glorious information social network that was!?

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

So @TWC just hijacked all my...

So @TWC just hijacked all my unencrypted HTTP traffic with a 302 to their site requiring personal information before restoring access. #1984

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

6/16/04 Just remember being blown away... in reply to

6/16/04 Just remember being blown away by how much space they allowed. No one came close to them and it pulled tons of people in.

They have a crazy amount of information on me and I can only hope the government doesn't seize it some day :)

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

I agree content is a big... in reply to

I agree content is a big differentiator that doesn't get the attention it deserves. I personally think that a novel new collaborative content strategy would be useful about now. Something more richly interlinked and taking advantage of the interconnectedness of the web at large, and all the information within it.

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

It's so incredibly painful to see...

It's so incredibly painful to see someone who had so much more to give departing from this world. It's tragic that he won't be around to see the results, but his efforts had massive impact on both my personal perspectives and the conversation surrounding the freedom of information. The world has lost a truly great man; one who had the courage to act and the talent to execute.

Attachments

Aaron Swartz commits suicide - The Tech

Computer activist Aaron H. Swartz committed suicide in New York City yesterday, Jan. 11, according to his uncle, Michael Wolf, in a comment to The Tech. Swartz was 26.

1 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

RT @martindale: So @TWC just hijacked...

RT @martindale: So @TWC just hijacked all my unencrypted HTTP traffic with a 302 to their site requiring personal information before restor…

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Thanks for this post <span class="proflinkWrapper"><span... in reply to

Thanks for this post +Eric Martindale. As a new Engineering student, I could use all the advice I can get, especially in making a decision on what to specialize in in grad school. And anyone on this post if I have circled you, I put you in my Engineers circle. Thank you all for the informative discussion here :-)

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

<span class="proflinkWrapper"><span class="proflinkPrefix">+</span><a class="proflink" href="https://plus.google.com/117821058998625758091" oid="117821058998625758091">Kendy... in reply to

+Kendy Louwaars yeah, I was planning on building two similar features on Twitter (one for retweets, the other for conversations) because of how meaningful the impact of this kind of information can be.

I might put together something tonight to make exploring Google Ripples a bit easier, actually.

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

You hate smart boards? WT?... in reply to

You hate smart boards? WT? As someone that used to be a trainer I loved them. They let me do things I couldn't even think about with black board. Easy to clean, push of a button. Incorporate images. Prepare many boards with lots of information. Print out or even better dump to a file a PDF of everything done with a lesson.

There is nothing I can do with a chalk board I can't do with a smart board besides inhale chalk dust.

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Linux Mobile Phone

Oh, yes. I think I will.

FIC has announced an on-sale date for its Neo1973, expected to be the first low-cost, high-volume phone with a user-modifiable Linux-based operating system. Additionally, the OpenMoko project building open-source software for the phone has published a wealth of technical resources.


See the link for more information. This is a huge step towards my dream phone.

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Suppose you have a three-dimensional scene in which there are five recognizable landmark points such...

Suppose you have a three-dimensional scene in which there are five recognizable landmark points such as corners of buildings. Take two photos of the scene, from unrecorded camera positions. Do the photos themselves, together with the focal lengths of the lenses you used to take them, give you enough information to reconstruct the relative positions of the landmarks and the cameras? The answer: no, but almost. According to the Kruppa–Demazure theorem, in general there are only ten different scenes and camera placements that could have given you the same two photos: the actual scene, and nine other alternatives that have the same two projections.

The Demazure of the theorem is Michel Demazure. He started out as a student of Grothendieck and a member of Bourbaki, proved this theorem at about the same time as he was president of the French Mathematical Society, and after that became a science museum director (twice).

Attachments

Michel Demazure - Wikipedia, the free encyclopedia

Michel Demazure. From Wikipedia, the free encyclopedia. Jump to: navigation, search. Michel Demazure, Bures-sur-Yvette 2007. Michel Demazure (born 1937) is a French mathematician. He made contribution...

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Suppose you have a three-dimensional scene in which there are five recognizable landmark points such...

Suppose you have a three-dimensional scene in which there are five recognizable landmark points such as corners of buildings. Take two photos of the scene, from unrecorded camera positions. Do the photos themselves, together with the focal lengths of the lenses you used to take them, give you enough information to reconstruct the relative positions of the landmarks and the cameras? The answer: no, but almost. According to the Kruppa–Demazure theorem, in general there are only ten different scenes and camera placements that could have given you the same two photos: the actual scene, and nine other alternatives that have the same two projections.

The Demazure of the theorem is Michel Demazure. He started out as a student of Grothendieck and a member of Bourbaki, proved this theorem at about the same time as he was president of the French Mathematical Society, and after that became a science museum director (twice).

Attachments

Michel Demazure - Wikipedia, the free encyclopedia

Michel Demazure. From Wikipedia, the free encyclopedia. Jump to: navigation, search. Michel Demazure, Bures-sur-Yvette 2007. Michel Demazure (born 1937) is a French mathematician. He made contribution...

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

<span class="proflinkWrapper"><span class="proflinkPrefix">+</span><a class="proflink" href="https://plus.google.com/116038350716337582317" oid="116038350716337582317">Peter... in reply to

+Peter A. Saldaña III 's statement pretty much support the current of the myth behind Rapa Nui's (Easter Islands) deforestation and demographic mass change of centuries ago. There are other mysteries about the culture such as its writing system as raised by +hizoka andou I ve heard that the first missionaries (back in the 17-18 centuries) were able to record some informations about that if you're talking about the "Rongo Rongo" (kinna of blurring ones but its only lead we have so far I believe!). Don't quote me on this but best of luck on your studies...

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

<span class="proflinkWrapper"><span class="proflinkPrefix">+</span><a class="proflink" href="https://plus.google.com/101946159124570139670" oid="101946159124570139670">Patrick... in reply to

+Patrick Shampine I'm not certain, as I wasn't informed of this until just recently.  +Mark Traphagen mentioned that he and +Jesse Wojdylo were invited, but I only just met them today and they don't seem certain on the details either.  +Domingo Rogers or +Devin Buell might know more.

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Scissors and Strands

I got a haircut last night - I'm down to maybe half a curl of hair. I don't have any pictures yet, but as soon as I do I'll post them here. Tonia killed me two or three times over when she found out. Sorry!

On another note, I'm writing this post in Google Docs. Since I'm using the Blogger Beta, I wasn't able to do this up until about a week ago, but I'm only now testing it out. It's a fairly easy setup, all I've had to do is select "Blogger (Beta)" from the Blog settings here in Docs, and then enter my username, password, and finally which blog I'd like to post to. This last bit of information is optional, and they said that they'll post to the first blog they find if you don't specify it.

We're (GWing Roleplay) looking at some excellent affiliate options, and will be presenting the community with a good number of resources in the near future. There are some outstanding opportunities that have presented themselves, and we're striving to give GWing the best environment possible for the roleplayers. We'll keep you updated as things progress, we promise!

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Definitely an interesting read. <br />Whenever... in reply to

Definitely an interesting read.
Whenever i work at a Diabetes camp, one of the questions i have received from parents is "How do you make sure the remote is controlling the right pump? Currently, Medtronic/Minimed uses a device ID to pair the meter, CGM, or remote to the pump. I believe Johnson & Johnson/Animas One Touch Ping uses a similar method - i would have to ask my brother.
The Insulet Omnipod uses a proximity registration method, which i don't fully understand (I haven't played with it much), but I have a feeling that this pairing method might be vulnerable to an attack, possibly of a man-in-the-middle design.

I also do not see how interfering with the CGM signal could cause any issue - the only integrated CGM/pump combo that is FDA approved for sale in the USA (Minimed 522/722 or 523/723 ("Revel")) does nothing with the CGM information beyond display it on the pump and alert you to changes. Let me reiterate: the US CGM/pump combo does not use CGM data to alter insulin patterns - at this point in time, the FDA simply will not allow it.
Now, assuming the insulin pump is Medtronic's European model, I have been told (by a Medtronic Diabetes sales representative) that the european model features an "auto-off" switch - if the wearer's blood glucose level drops below a certain threshold, the insulin pump will immediately suspend insulin delivery. I do not know the specifics of how this works, if it is all insulin or just the basal levels, but it is a potential vulnerability, but leads to the risk of a high blood sugar (which leads to long-term complications if uncontrolled).

Now the flipside of the auto off, would be an automatic insulin increase. Theoretically, if we wanted a closed-loop insulin delivery system that mimics the natural function of the pancreas, we need to automatically reduce insulin delivery when blood glucose levels are dropping, as well as increase insulin delivery when BG levels are rising. The current technology has its known issues, so I am not sure if the FDA (or any similar agencies worldwide) will even allow this functionality with the available technology, but it is still a valid concern for biomedical programmers.

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Eve Online Roleplaying: Journaling

I've always loved Eve Online. It's a space MMO, with ridiculous levels of immersion. They tout that it's the world's largest game universe, and let me tell you - it's absolutely huge.

One of our new members has posted her intentions to work on an Eve Online Roleplaying Journal. I think this is an incredibly awesome idea. It's not new, I've seen character journals before, but it just seems to fit in with Eve's extensive world and role playing experience.

Character journaling is a great way to extend the world of a game and add more depth to both the character and the plot. Be careful that you don't fall victim to the inactivity that often plagues real journaling! Stick to it, and you'll reap the benefits of fleshing out your character and having a solid history of the thought processes involved.

Be sure to check out Emywn's Journal from Eve Online Roleplaying. It looks like it's going to be something I'm going to have to follow using my trusty Google RSS Reader. Good luck, Kethro - and thanks for the idea!

P.S.: Google Reader is an amazing tool that lets you follow your favorite sites and their content without ever checking the page. You can check out my shared items list to see what sort of things I follow, but check out the official Google Reader page for more information.

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Search Engine Roundtable: Why I'm Unsubscribing

Dear Search Engine Roundtable,

Since I subscribed to your feed (in early 2005), I have received and read every post you've made using my RSS reader of choice (Google Reader, currently). Your excerpts have been enticing, with well-written post titles and seemingly interesting topics. The idea was good, to aggregate content and discussions about Search Engines from multiple locations at one central blog.

Unfortunately, I've found that your articles are less informative than I'd have hoped, with frequent referrals to other locations where the conversations are actually taking place. Instead of effective bullet points and topic reviews, I find quick and hastily-written overviews of the content and discussion in question.

Not only that, but you're only providing partial content in your feeds! When I come across your posts in my daily reading of over 500 posts, you've caught my attention with your title - and because you're only giving me the partial article text, you've got me clicking through to your site (hoorah, ad impressions!). Unfortunately, half the time I'm wasting even more time by being forced to click through to yet another page to follow the conversation.

I rarely (if ever) find myself sharing your content, and from what I can tell from a cursory glance - you've never shown up in my shared items feed. (PS, when will I be able to control this page, Google? I hope this link juice means something in the future. Maybe even market that page in a bit more of a controlled fashion. I digress.) I've maybe starred one or two of your articles for future reading, but again - when I do finally read the posts, I find that I'm disappointed by your article quality and content.

What's up with that?! Alright, rabid feedreaders and social media evangelists - tell me if I'm in the wrong here, but I'm going to unsubscribe from Search Engine Roundtable.

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

My list of entrepreneurial shortcomings includes Mirascape, which aspired to be a ubiquitous augmented...

My list of entrepreneurial shortcomings includes Mirascape, which aspired to be a ubiquitous augmented reality (AR) operating system for the real world. The problems we were solving (and our packaged solution) would have been the backbone for all of the [imagined] technology you see in this Samsung promo video for a new tech they're excited about, transparent and flexible OLED displays. [1]

If you're not familiar with augmented reality; it is the visual overlay of otherwise hidden information on the real world, as you observe it.

While you can ogle over ostentatious technologies like the embedded-display contact lenses the University of Washington is so proud of [2], it's exciting to see companies like TDK [3] and Laster Technologies [4] bring these kinds of stepping stone technology to bear. We can all download and install the awkward and barely applicable consumer-level AR applications on our smartphones ([5], [6], and [7]), but they will all remain novelty applications until we see major innovation in the display space.

One of the more practical examples I've seen of augmented reality in the real world is WordLens [8] (sadly only available for iOS), which provides instantaneous video translation through your device. It's not hard to imagine a pair of Oakley glasses with this display technology built-in, providing you with always-on translation while in an unfamiliar foreign location. Or perhaps even displaying your friend's tweet as a speech bubble above their head for a few seconds -- imagine if it were built right, how amazing it could be.

I genuinely hope to see more of this transparent display technology built in to more consumer-level products, and eyewear in particular. We need a lot more developers playing with the practical applications of augmented reality, and not just displaying compass-aligned markers over a geotagged Wikipedia article or Flickr photo. The high-power hardware necessary to do real-time computer vision processing is coming, and the applied software world needs to be ready for it.

[1]: Amazing Screen Technology : Samsung Flexible AMOLED
[2]: http://spectrum.ieee.org/biomedical/bionics/augmented-reality-in-a-contact-lens/
[3]: http://www.oled-info.com/tdk-starts-mass-production-transparent-24-qvga-pmoleds
[4]: http://www.laster.fr/produits/promobiledisplay/
[5]: http://www.layar.com/
[6]: http://www.wikitude.com/
[7]: http://www.junaio.com/
[8]: http://questvisual.com/

Attachments

Amazing Screen Technology : Samsung Flexible AMOLED

This is CF of Samsung Mobile Display & AMOLED. I'ts amazing and wonderful technology!!! In korea, netizen says "Samsung kidnaps aliens(or hijacks UFO) again!" :)

8 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

My list of entrepreneurial shortcomings includes Mirascape, which aspired to be a ubiquitous augmented...

My list of entrepreneurial shortcomings includes Mirascape, which aspired to be a ubiquitous augmented reality (AR) operating system for the real world. The problems we were solving (and our packaged solution) would have been the backbone for all of the [imagined] technology you see in this Samsung promo video for a new tech they're excited about, transparent and flexible OLED displays. [1]

If you're not familiar with augmented reality; it is the visual overlay of otherwise hidden information on the real world, as you observe it.

While you can ogle over ostentatious technologies like the embedded-display contact lenses the University of Washington is so proud of [2], it's exciting to see companies like TDK [3] and Laster Technologies [4] bring these kinds of stepping stone technology to bear. We can all download and install the awkward and barely applicable consumer-level AR applications on our smartphones ([5], [6], and [7]), but they will all remain novelty applications until we see major innovation in the display space.

One of the more practical examples I've seen of augmented reality in the real world is WordLens [8] (sadly only available for iOS), which provides instantaneous video translation through your device. It's not hard to imagine a pair of Oakley glasses with this display technology built-in, providing you with always-on translation while in an unfamiliar foreign location. Or perhaps even displaying your friend's tweet as a speech bubble above their head for a few seconds -- imagine if it were built right, how amazing it could be.

I genuinely hope to see more of this transparent display technology built in to more consumer-level products, and eyewear in particular. We need a lot more developers playing with the practical applications of augmented reality, and not just displaying compass-aligned markers over a geotagged Wikipedia article or Flickr photo. The high-power hardware necessary to do real-time computer vision processing is coming, and the applied software world needs to be ready for it.

[1]: Amazing Screen Technology : Samsung Flexible AMOLED
[2]: http://spectrum.ieee.org/biomedical/bionics/augmented-reality-in-a-contact-lens/
[3]: http://www.oled-info.com/tdk-starts-mass-production-transparent-24-qvga-pmoleds
[4]: http://www.laster.fr/produits/promobiledisplay/
[5]: http://www.layar.com/
[6]: http://www.wikitude.com/
[7]: http://www.junaio.com/
[8]: http://questvisual.com/

Attachments

Amazing Screen Technology : Samsung Flexible AMOLED

This is CF of Samsung Mobile Display & AMOLED. I'ts amazing and wonderful technology!!! In korea, netizen says "Samsung kidnaps aliens(or hijacks UFO) again!" :)

1 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

My list of entrepreneurial shortcomings includes Mirascape, which aspired to be a ubiquitous augmented...

My list of entrepreneurial shortcomings includes Mirascape, which aspired to be a ubiquitous augmented reality (AR) operating system for the real world. The problems we were solving (and our packaged solution) would have been the backbone for all of the [imagined] technology you see in this Samsung promo video for a new tech they're excited about, transparent and flexible OLED displays. [1]

If you're not familiar with augmented reality; it is the visual overlay of otherwise hidden information on the real world, as you observe it.

While you can ogle over ostentatious technologies like the embedded-display contact lenses the University of Washington is so proud of [2], it's exciting to see companies like TDK [3] and Laster Technologies [4] bring these kinds of stepping stone technology to bear. We can all download and install the awkward and barely applicable consumer-level AR applications on our smartphones ([5], [6], and [7]), but they will all remain novelty applications until we see major innovation in the display space.

One of the more practical examples I've seen of augmented reality in the real world is WordLens [8] (sadly only available for iOS), which provides instantaneous video translation through your device. It's not hard to imagine a pair of Oakley glasses with this display technology built-in, providing you with always-on translation while in an unfamiliar foreign location. Or perhaps even displaying your friend's tweet as a speech bubble above their head for a few seconds -- imagine if it were built right, how amazing it could be.

I genuinely hope to see more of this transparent display technology built in to more consumer-level products, and eyewear in particular. We need a lot more developers playing with the practical applications of augmented reality, and not just displaying compass-aligned markers over a geotagged Wikipedia article or Flickr photo. The high-power hardware necessary to do real-time computer vision processing is coming, and the applied software world needs to be ready for it.

[1]: Amazing Screen Technology : Samsung Flexible AMOLED
[2]: http://spectrum.ieee.org/biomedical/bionics/augmented-reality-in-a-contact-lens/
[3]: http://www.oled-info.com/tdk-starts-mass-production-transparent-24-qvga-pmoleds
[4]: http://www.laster.fr/produits/promobiledisplay/
[5]: http://www.layar.com/
[6]: http://www.wikitude.com/
[7]: http://www.junaio.com/
[8]: http://questvisual.com/

Attachments

Amazing Screen Technology : Samsung Flexible AMOLED

This is CF of Samsung Mobile Display & AMOLED. I'ts amazing and wonderful technology!!! In korea, netizen says "Samsung kidnaps aliens(or hijacks UFO) again!" :)

8 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Fantasy Author Robert Jordan Passes Away

Robert Jordan
The author of the particularly famous Wheel of Time series passed away yesterday due to cardiac amyloidosis. Diagnosed with the disease in March of 2006, Jordan, born James Oliver Rigney Jr., vowed to fight the disease and continue his legendary writing career for many years to come. It is a great loss to the fantasy community, and on behalf of RolePlayGateway, we send our condolences to his family and friends, who will no doubt be the most affected by his passing.

You can catch more on Robert Jordan's Official Blog, but due to the high traffic, here's a mirror of his post:

Lords of Chaos, by Robert JordanIt is with great sadness that I tell you that the Dragon is gone. RJ left us today at 2:45 PM. He fought a valiant fight against this most horrid disease. In the end, he left peacefully and in no pain. In the years he had fought this, he taught me much about living and about facing death. He never waivered in his faith, nor questioned our God’s timing. I could not possibly be more proud of anyone. I am eternally grateful for the time that I had with him on this earth and look forward to our reunion, though as I told him this afternoon, not yet. I love you bubba. Our beloved Harriet was at his side through the entire fight and to the end. The last words from his mouth were to tell her that he loved her. Thank each and everyone of you for your prayers and support through this ordeal. He knew you were there. Harriet reminded him today that she was very proud of the many lives he had touched through his work. We’ve all felt the love that you’ve been sending my brother/cousin. Please keep it coming as our Harriet could use the support. Jason will be posting funeral arrangements. My sincerest thanks. Peace and Light be with each of you, Wilson Brother/Cousin 4th of 3 To Catalyst: Never, never loose faith. RJ did not. Harriet hasn’t. I haven’t. Going through what we have, our faith is only strengthened. Besides, if God didn’t exist, we would have never had Jim. We did. God does. Remember my Brother/Cousin, my friend, think of him fondly and glorify God’s name. Editor’s Note: The entire staff of Dragonmount.com would like to extend its most deepest sympathies to Robert Jordan’s family. He touched all of our lives in some way and we wish him the rest and peace he deserves. We will be posting information in the near future about where you can send condolences. Please check the News Section for these updates.

May you rest in peace.

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

My list of entrepreneurial shortcomings includes Mirascape, which aspired to be a ubiquitous augmented...

My list of entrepreneurial shortcomings includes Mirascape, which aspired to be a ubiquitous augmented reality (AR) operating system for the real world. The problems we were solving (and our packaged solution) would have been the backbone for all of the [imagined] technology you see in this Samsung promo video for a new tech they're excited about, transparent and flexible OLED displays. [1]

If you're not familiar with augmented reality; it is the visual overlay of otherwise hidden information on the real world, as you observe it.

While you can ogle over ostentatious technologies like the embedded-display contact lenses the University of Washington is so proud of [2], it's exciting to see companies like TDK [3] and Laster Technologies [4] bring these kinds of stepping stone technology to bear. We can all download and install the awkward and barely applicable consumer-level AR applications on our smartphones ([5], [6], and [7]), but they will all remain novelty applications until we see major innovation in the display space.

One of the more practical examples I've seen of augmented reality in the real world is WordLens [8] (sadly only available for iOS), which provides instantaneous video translation through your device. It's not hard to imagine a pair of Oakley glasses with this display technology built-in, providing you with always-on translation while in an unfamiliar foreign location. Or perhaps even displaying your friend's tweet as a speech bubble above their head for a few seconds -- imagine if it were built right, how amazing it could be.

I genuinely hope to see more of this transparent display technology built in to more consumer-level products, and eyewear in particular. We need a lot more developers playing with the practical applications of augmented reality, and not just displaying compass-aligned markers over a geotagged Wikipedia article or Flickr photo. The high-power hardware necessary to do real-time computer vision processing is coming, and the applied software world needs to be ready for it.

[1]: Amazing Screen Technology : Samsung Flexible AMOLED
[2]: http://spectrum.ieee.org/biomedical/bionics/augmented-reality-in-a-contact-lens/
[3]: http://www.oled-info.com/tdk-starts-mass-production-transparent-24-qvga-pmoleds
[4]: http://www.laster.fr/produits/promobiledisplay/
[5]: http://www.layar.com/
[6]: http://www.wikitude.com/
[7]: http://www.junaio.com/
[8]: http://questvisual.com/

Attachments

Amazing Screen Technology : Samsung Flexible AMOLED

This is CF of Samsung Mobile Display & AMOLED. I'ts amazing and wonderful technology!!! In korea, netizen says "Samsung kidnaps aliens(or hijacks UFO) again!" :)

1 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

BitPay Expands, Fueled By Bitcoin Demand

Yes, we're expanding.  While +Wells Fargo [1] and +Wikipedia [2] start exploring #cryptofinance, we're also moving full steam ahead towards getting every company in the world to accept  #bitcoin as a payment option.

Not only have we hired the best from companies like +Red Hat+IBM, and Visa into our senior leadership, but we've established a firm position in the marketplace–we're now performing over $1,000,000 per day in transactions with Bitcoin, and there are now over 1,000 new businesses accepting Bitcoin every week.  Now, we're hiring to support this investment in the community.

If you're interested in building anything related to  #cryptofinance, give me a shout.  We're extremely focused on  #OpenSource and  #cryptography  , and will be spending a lot of our time [3] participating in the support of developers building applications in the space.  If you want to build something that will shape the future of the world,  #cryptofinance is the right space to be in.

[1]: http://www.reuters.com/article/2014/01/14/us-wellsfargo-bitcoin-idUSBREA0D1LL20140114
[2]: https://twitter.com/jimmy_wales/status/441632741352681472 and http://www.reddit.com/r/Bitcoin/comments/201fa6/hello_from_jimmy_wales_of_wikipedia/ !
[3]: We've already released Bitcore (see bitcore.io for more information), but we'll be a major presence in number of events in the coming year (not the least of which was +LAUNCH most recently!).  We're on a tear to support engineers building new projects with  #bitcoin  , so feel free to reach out and let me know what you're working on.

Attachments

Atlanta's BitPay expands HQ, fueled by Bitcoin demand - Atlanta Business Chronicle

Even as the fate of cryptocurrency Bitcoin whipsaws amidst controversy and volatility, one Atlanta-based Bitcoin services company is doubling down.

2 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Forums Are Social: But We Need Stuff

There's some discussion about how forums are or are not social media, (frankly, I don't think there's any question at all) - and it occurred to me the answer of why there is this rift in perception of forums/message boards.

Message boards haven't changed in almost 25 years. There simply hasn't been any real innovation - and that's why there's so much "real" social media out there that's exploding right now. The stuff is so radically different from traditional mediums such as forums that everyone is missing the core of what social media is: community engagement and interaction

So, here are some of the things I'd like to see in a forum, and some things that I've implemented on some of my own forums (heh, or at least planning to implement):

Trackbacks It'd be awesome to have the same functionality in a blog post that we have on Wordpress or other blog software - did I give credit to someone? Let me hit the trackback API to make sure there's a connection between the two posts in the semantic web.

A forum thread is no different than a blog post. It has a topic, a goal, and a discussion pertaining to the original post. Let's see some of the functionality we found in the current decade put to use!

Native RSS Support There's nothing worse than having to write an RSS extension for your forum, and still not have the functionality you want. Give every URL on my forum a /feed, please. This includes forums, threads, posts, users: the whole shebang.

While you're at it, tell Feedburner to support filtered feeds - a lot of my users don't want every single post. And I sure as hell don't want to burn a new feed for every forum. C'mon, let's meet somewhere in the middle.

Semantic URLs Blogging software does it, why do we still have URLs on forums that use IDs right there in the URL? What benefit does that have to the user?

Social Profiles Alright, we've got friends and foes lists on our forums, now - but where is the option to make this information public? Why aren't we displaying a users' friend list on their profile page by default? What about all their most recent posts and actions, and selected excerpts?

A community can only grow in a stifled manner if interaction between members isn't made as easy as humanly possible. Current forum software is stuck in the 90's, with an XHTML wrapper around it. Let's fix this, and soon - before we all melt.

Real Metrics and Algorithms Stop using post count as a legitimate metric. This only encourages poor post quality. Let's see the ability to easily show Flesch-Kincaid, average word count, or something similar. The amount of posts a user has is not a good valuation of their contributions.

Instead, replace these with something more community-driven. Look at Digg for example. There is a solid (questionably) algorithm in place that measures users based on what they've submitted and the reactions of other users' reaction to that content, whether it be a comment or a submission.

Maybe I'm just whining. Maybe I've got legitimate desires. What do you think?

P.S.: And good god, phpBB! Why didn't you include this stuff in your phpBB3 release?!

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

BitPay Expands, Fueled By Bitcoin Demand Yes, we're expanding.  While +Wells Fargo [1] and +Wikipedia...

BitPay Expands, Fueled By Bitcoin Demand
Yes, we're expanding.  While +Wells Fargo [1] and +Wikipedia [2] start exploring    #cryptofinance  , we're also moving full steam ahead towards getting every company in the world to accept  #bitcoin   as a payment option.

Not only have we hired the best from companies like +Red Hat+IBM, and Visa into our senior leadership, but we've established a firm position in the marketplace–we're now performing over $1,000,000 per day in transactions with Bitcoin, and there are now over 1,000 new businesses accepting Bitcoin every week.  Now, we're hiring to support this investment in the community.

If you're interested in building anything related to  #cryptofinance  , give me a shout.  We're extremely focused on  #OpenSource   and  #cryptography  , and will be spending a lot of our time [3] participating in the support of developers building applications in the space.  If you want to build something that will shape the future of the world,  #cryptofinance   is the right space to be in.

[1]: http://www.reuters.com/article/2014/01/14/us-wellsfargo-bitcoin-idUSBREA0D1LL20140114
[2]: https://twitter.com/jimmy_wales/status/441632741352681472 and http://www.reddit.com/r/Bitcoin/comments/201fa6/hello_from_jimmy_wales_of_wikipedia/ !
[3]: We've already released Bitcore (see bitcore.io for more information), but we'll be a major presence in number of events in the coming year (not the least of which was +LAUNCH most recently!).  We're on a tear to support engineers building new projects with  #bitcoin  , so feel free to reach out and let me know what you're working on.

Attachments

Atlanta's BitPay expands HQ, fueled by Bitcoin demand - Atlanta Business Chronicle

Even as the fate of cryptocurrency Bitcoin whipsaws amidst controversy and volatility, one Atlanta-based Bitcoin services company is doubling down.

3 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

BitPay Expands, Fueled By Bitcoin Demand Yes, we're expanding.  While +Wells Fargo [1] and +Wikipedia...

BitPay Expands, Fueled By Bitcoin Demand
Yes, we're expanding.  While +Wells Fargo [1] and +Wikipedia [2] start exploring    #cryptofinance  , we're also moving full steam ahead towards getting every company in the world to accept  #bitcoin   as a payment option.

Not only have we hired the best from companies like +Red Hat+IBM, and Visa into our senior leadership, but we've established a firm position in the marketplace–we're now performing over $1,000,000 per day in transactions with Bitcoin, and there are now over 1,000 new businesses accepting Bitcoin every week.  Now, we're hiring to support this investment in the community.

If you're interested in building anything related to  #cryptofinance  , give me a shout.  We're extremely focused on  #OpenSource   and  #cryptography  , and will be spending a lot of our time [3] participating in the support of developers building applications in the space.  If you want to build something that will shape the future of the world,  #cryptofinance   is the right space to be in.

[1]: http://www.reuters.com/article/2014/01/14/us-wellsfargo-bitcoin-idUSBREA0D1LL20140114
[2]: https://twitter.com/jimmy_wales/status/441632741352681472 and http://www.reddit.com/r/Bitcoin/comments/201fa6/hello_from_jimmy_wales_of_wikipedia/ !
[3]: We've already released Bitcore (see bitcore.io for more information), but we'll be a major presence in number of events in the coming year (not the least of which was +LAUNCH most recently!).  We're on a tear to support engineers building new projects with  #bitcoin  , so feel free to reach out and let me know what you're working on.

Attachments

Atlanta's BitPay expands HQ, fueled by Bitcoin demand - Atlanta Business Chronicle

Even as the fate of cryptocurrency Bitcoin whipsaws amidst controversy and volatility, one Atlanta-based Bitcoin services company is doubling down.

6 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

BitPay Expands, Fueled By Bitcoin Demand Yes, we're expanding.  While +Wells Fargo [1] and +Wikipedia...

BitPay Expands, Fueled By Bitcoin Demand
Yes, we're expanding.  While +Wells Fargo [1] and +Wikipedia [2] start exploring    #cryptofinance  , we're also moving full steam ahead towards getting every company in the world to accept  #bitcoin   as a payment option.

Not only have we hired the best from companies like +Red Hat+IBM, and Visa into our senior leadership, but we've established a firm position in the marketplace–we're now performing over $1,000,000 per day in transactions with Bitcoin, and there are now over 1,000 new businesses accepting Bitcoin every week.  Now, we're hiring to support this investment in the community.

If you're interested in building anything related to  #cryptofinance  , give me a shout.  We're extremely focused on  #OpenSource   and  #cryptography  , and will be spending a lot of our time [3] participating in the support of developers building applications in the space.  If you want to build something that will shape the future of the world,  #cryptofinance   is the right space to be in.

[1]: http://www.reuters.com/article/2014/01/14/us-wellsfargo-bitcoin-idUSBREA0D1LL20140114
[2]: https://twitter.com/jimmy_wales/status/441632741352681472 and http://www.reddit.com/r/Bitcoin/comments/201fa6/hello_from_jimmy_wales_of_wikipedia/ !
[3]: We've already released Bitcore (see bitcore.io for more information), but we'll be a major presence in number of events in the coming year (not the least of which was +LAUNCH most recently!).  We're on a tear to support engineers building new projects with  #bitcoin  , so feel free to reach out and let me know what you're working on.

Attachments

Atlanta's BitPay expands HQ, fueled by Bitcoin demand - Atlanta Business Chronicle

Even as the fate of cryptocurrency Bitcoin whipsaws amidst controversy and volatility, one Atlanta-based Bitcoin services company is doubling down.

3 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Choosing A Medium For Your Online Role Playing Game

Running a role playing game online presents a large of amount of flexibility in the way you run the game. You no longer need individual sessions where all players are present, and there are a plethora of options as to where you are going to run it - if you want to run it in any one place.

One of the number one questions I receive relates to the medium for online RPGs. There are tons of different ways of communicating online, mainly grouped into a few categories. We have instant messenger, chats, message boards, and emails. There are a few custom services out there, but I'm going to touch on the four that I've mentioned.

On RolePlayGateway, we have a set of roleplaying forums as well as a roleplaying chat. When you're running an RPG, there are a few items you should consider when deciding where you're going to keep everything.

Forums have the benefit of being static and always available - users can post to forums at any time during the day and be sure that other users (and roleplayers) can see their message. Forums are also very flexible, they allow you to embed images and other multimedia within your posts, allowing you to share any experience with your players. However, it is post based - forums are often not the quickest way to communicate, as it is not a live feed of information like a chat.

Chats, on the other hand, have the benefit of being real time. Games can be run in chat (and instant messenger) on a moment's notice, and work best when all of the players can be available at the same time. Because it is real time, short blip-based sessions such as character conversations and interactions work extraordinarily well with chats. Players can get the chance to interject into other player's actions and statements without the worry of too much time going by. It is for this reason that the longer posts, such as those that exceed a paragraph, are often too large and unwieldy for chats - players end up waiting too long for each post, and will get bored.

Longer posts do very well on forums, where writing an individual post can take half an hour or longer to refine and perfect - just enough time for the players to go look at other games and other topics before they come back and begin formulating their response.

If you're running a game with a detailed and/or complicated storyline or characters, it is always good to post something on a forum for player reference. This lets the players have a place to communicate out of character (OOC) - such as when they won't be able to make a chat session, or when they want to discuss plans for character interaction, growth, or development. Even if your game is already on a forum - it is a good idea to create a place for OOC discussion. For chat-based games - this gives a perfect opportunity for players to jump in at the middle of a game with little trouble, as they simply need to read over the history of the game on the forum, which they can do at any point in time, and less time is needed explaining the game to the player.

Instant messenger works well when dealing with one on one sessions, such as when two characters are the only ones in an interaction or a meeting needs to be private. These interactions can be summarized or written into a cinematic format and then posted to the forum, for other players to enjoy as well. Instant messenger (as well as Private Messages) does very well at asking questions of the other players, which is convenient when you have a question about how they're playing a role or a reference they made in character.

There are also emails - many games aren't run by email anymore, but email is still a very valuable tool. RolePlayGateway like many forums offers you the ability to subscribe to topics. Subscriptions will let you receive an immediate email update whenever someone replies to the thread. This is extraordinarily helpful when there's an RPG with only a few players that can only reply every once in a while, but it requires that people, y'know, actually check their email. RolePlayGateway also has the special ability to instant message you when there's an update to a subscribed thread. All you need is a Jabber account (GMail accounts work, too) and to set up the notifications. We'll send you a message as soon as there's an update.

What methods have you used to manage your online roleplaying games? Are you a fan of forum or chat? Both? What helps you determine where you're going to hold your game? Discuss!

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

My Top 3 Twitter Tools

I've been using Twitter since pretty early on (and long before @oprah), and I've found it to be a superbly convenient communication tool and notification service. Even though it's still very young on the web (Twitter was founded in March of 2006) It's been the home to great ideas like the #twitterdata proposal and the publicdomain book-via-tweets project. It's also an awesome reputation management platform, and can be used to both to provide effective customer service and help distribute news and updates about your business or product, which is exactly how I use it for my online roleplaying project.

But as with the rest of the social media world, Twitter can become very complex very quickly (but I still contend that there is no social media overload) and as a result, can be difficult to manage. As a result, I use several third-party tools to help me manage and gather information that helps me do my Twitter job much more efficiently and effectively.

Splitweet [caption id="attachment_196" align="alignnone" width="300" caption="Splitweet allows you to post and monitor multiple Twitter accounts and brands."]Splitweet allows you to post and monitor multiple Twitter accounts and brands.[/caption]

For those of us with multiple Twitter accounts (like some people who create a Twitter account for each roleplaying character they use), Splitweet is an absolute savior. This service allows you to tweet to multiple accounts at the same time, as well as combining the "stream" from each account into one page. A lot of desktop Twitter clients offer this kind of functionality, but where Splitweet truly excels is in its ability to track what it calls "brands" (more reputation management terms here): you can specify keywords and phrases that will appear in a separate feed, even if you do not follow those users. This gets us around the disastrous changes Twitter made to the @replies, and helps us keep up to date on any mentions of our site's name and any tweets relating to what it is that we do.

Sherflock [caption id="attachment_195" align="alignnone" width="300" caption="Sherflock provides detailed statistics and summaries of Twitter users you are associated with."]Sherflock provides detailed statistics and summaries of Twitter users you are associated with.[/caption]

Sherflock is an absolutely awesome stat tracking machine that helps weed out the waves of spam that have been coming in since Twitter has gone mainstream. Sherflock gives a large number of statistics about each every account the either follows you or that you are following, and lets you sort and filter users based on these statistics.

Twitterfall [caption id="attachment_194" align="alignnone" width="217" caption="Twitterfall offers a live stream of twitter updates on keywords that you specify."]Twitterfall offers a live stream of twitter updates on keywords that you specify.[/caption]

This tool allows you to specify any number of keywords that you wish to view on a live, moving stream of tweets. This is very useful if you are using a computer that allows you to "pin" a window on top (like Ubuntu Linux), or if you have a multiple-monitor rig, or even if you use multiple computers using the input-sharing app Synergy. You'll get a live feed of updates on any topic of your choice, which can even be updated and changed in real-time.

Using these three tools will help you maximize you Twitter performance and make the most of an already awesome service, preventing you from being inundated with the massive stream of messages that you're surely going to subscribe to.

What are your top three Twitter tools? Feel free to make a comment or write your own post, and I'll gladly append a link to this post to help everyone out!

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

I've just learned of a virus that was launched against the U.S. Drone Fleet. See the attached article...

I've just learned of a virus that was launched against the U.S. Drone Fleet. See the attached article from Wired.

Earlier this year, the Pentagon recently concluded that digital attacks such as this can constitute an act of war [1]. This one doesn't [yet] seem as sophisticated as last year's attack on Iran's nuclear reactors by Stuxnet [2], but it continues to show how important and integral our computer systems are in this rapidly changing world. Security professionals +Alex Levinson, +Jerome Radcliffe, and +Scott Hanselman surely have some great insight here, I highly recommend you go take a look at some of the things they've written.

In 2009, a very sophisticated [and successful] cyber-attack was launched from inside China that targeted the United States through Google and Adobe [3] that caused surprisingly few stirs within our government, especially after NATO was sent in to assist in the defense of Estonia's computer systems during the 2007 attacks [4]. Not long after this, the widely-used and [formerly] explicitly trusted RSA security mechanism, used in a large number major institutions around the world. was completely and entirely broken [5] by an embarrassingly simple hack [6].

Aside: We can look back at some of the things actual software engineers like +Ryan Dahl [7] and +Zack Morris [8] have been saying lately and quickly conclude that there's something fundamentally broken with the whole system. If you've ever worked on or with a large software project, you can see evidence of negligence and ignorance alike embedded at every level. It certainly contributes to if not causes these types of security concerns.

[1]: http://online.wsj.com/article/SB10001424052702304563104576355623135782718.html
[2]: http://www.schneier.com/blog/archives/2010/10/stuxnet.html
[3]: http://www.wired.com/threatlevel/2010/01/operation-aurora/
[4]: http://www.wired.com/politics/security/magazine/15-09/ff_estonia
[5]: http://www.computerworld.com/s/article/9214757/RSA_warns_SecurID_customers_after_company_is_hacked
[6]: http://www.zdnet.co.uk/blogs/mapping-babel-10017967/rsa-hack-targeted-flash-vulnerability-10022143/
[7]: https://plus.google.com/115094562986465477143/posts/Di6RwCNKCrf
[8]: http://zackarymorris.tumblr.com/post/10973087527/the-state-of-the-art-is-terrible

Attachments

» Exclusive: Computer Virus Hits U.S. Drone Fleet

A computer virus has infected the cockpits of America's Predator and Reaper drones, logging pilots' every keystroke as they remotely fly missions over

8 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

I've just learned of a virus that was launched against the U.S. Drone Fleet. See the attached article...

I've just learned of a virus that was launched against the U.S. Drone Fleet. See the attached article from Wired.

Earlier this year, the Pentagon recently concluded that digital attacks such as this can constitute an act of war [1]. This one doesn't [yet] seem as sophisticated as last year's attack on Iran's nuclear reactors by Stuxnet [2], but it continues to show how important and integral our computer systems are in this rapidly changing world. Security professionals +Alex Levinson, +Jerome Radcliffe, and +Scott Hanselman surely have some great insight here, I highly recommend you go take a look at some of the things they've written.

In 2009, a very sophisticated [and successful] cyber-attack was launched from inside China that targeted the United States through Google and Adobe [3] that caused surprisingly few stirs within our government, especially after NATO was sent in to assist in the defense of Estonia's computer systems during the 2007 attacks [4]. Not long after this, the widely-used and [formerly] explicitly trusted RSA security mechanism, used in a large number major institutions around the world. was completely and entirely broken [5] by an embarrassingly simple hack [6].

Aside: We can look back at some of the things actual software engineers like +Ryan Dahl [7] and +Zack Morris [8] have been saying lately and quickly conclude that there's something fundamentally broken with the whole system. If you've ever worked on or with a large software project, you can see evidence of negligence and ignorance alike embedded at every level. It certainly contributes to if not causes these types of security concerns.

[1]: http://online.wsj.com/article/SB10001424052702304563104576355623135782718.html
[2]: http://www.schneier.com/blog/archives/2010/10/stuxnet.html
[3]: http://www.wired.com/threatlevel/2010/01/operation-aurora/
[4]: http://www.wired.com/politics/security/magazine/15-09/ff_estonia
[5]: http://www.computerworld.com/s/article/9214757/RSA_warns_SecurID_customers_after_company_is_hacked
[6]: http://www.zdnet.co.uk/blogs/mapping-babel-10017967/rsa-hack-targeted-flash-vulnerability-10022143/
[7]: https://plus.google.com/115094562986465477143/posts/Di6RwCNKCrf
[8]: http://zackarymorris.tumblr.com/post/10973087527/the-state-of-the-art-is-terrible

Attachments

» Exclusive: Computer Virus Hits U.S. Drone Fleet

A computer virus has infected the cockpits of America's Predator and Reaper drones, logging pilots' every keystroke as they remotely fly missions over

1 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

I've just learned of a virus that was launched against the U.S. Drone Fleet. See the attached article...

I've just learned of a virus that was launched against the U.S. Drone Fleet. See the attached article from Wired.

Earlier this year, the Pentagon recently concluded that digital attacks such as this can constitute an act of war [1]. This one doesn't [yet] seem as sophisticated as last year's attack on Iran's nuclear reactors by Stuxnet [2], but it continues to show how important and integral our computer systems are in this rapidly changing world. Security professionals +Alex Levinson, +Jerome Radcliffe, and +Scott Hanselman surely have some great insight here, I highly recommend you go take a look at some of the things they've written.

In 2009, a very sophisticated [and successful] cyber-attack was launched from inside China that targeted the United States through Google and Adobe [3] that caused surprisingly few stirs within our government, especially after NATO was sent in to assist in the defense of Estonia's computer systems during the 2007 attacks [4]. Not long after this, the widely-used and [formerly] explicitly trusted RSA security mechanism, used in a large number major institutions around the world. was completely and entirely broken [5] by an embarrassingly simple hack [6].

Aside: We can look back at some of the things actual software engineers like +Ryan Dahl [7] and +Zack Morris [8] have been saying lately and quickly conclude that there's something fundamentally broken with the whole system. If you've ever worked on or with a large software project, you can see evidence of negligence and ignorance alike embedded at every level. It certainly contributes to if not causes these types of security concerns.

[1]: http://online.wsj.com/article/SB10001424052702304563104576355623135782718.html
[2]: http://www.schneier.com/blog/archives/2010/10/stuxnet.html
[3]: http://www.wired.com/threatlevel/2010/01/operation-aurora/
[4]: http://www.wired.com/politics/security/magazine/15-09/ff_estonia
[5]: http://www.computerworld.com/s/article/9214757/RSA_warns_SecurID_customers_after_company_is_hacked
[6]: http://www.zdnet.co.uk/blogs/mapping-babel-10017967/rsa-hack-targeted-flash-vulnerability-10022143/
[7]: https://plus.google.com/115094562986465477143/posts/Di6RwCNKCrf
[8]: http://zackarymorris.tumblr.com/post/10973087527/the-state-of-the-art-is-terrible

Attachments

» Exclusive: Computer Virus Hits U.S. Drone Fleet

A computer virus has infected the cockpits of America's Predator and Reaper drones, logging pilots' every keystroke as they remotely fly missions over

8 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

I've just learned of a virus that was launched against the U.S. Drone Fleet. See the attached article...

I've just learned of a virus that was launched against the U.S. Drone Fleet. See the attached article from Wired.

Earlier this year, the Pentagon recently concluded that digital attacks such as this can constitute an act of war [1]. This one doesn't [yet] seem as sophisticated as last year's attack on Iran's nuclear reactors by Stuxnet [2], but it continues to show how important and integral our computer systems are in this rapidly changing world. Security professionals +Alex Levinson, +Jerome Radcliffe, and +Scott Hanselman surely have some great insight here, I highly recommend you go take a look at some of the things they've written.

In 2009, a very sophisticated [and successful] cyber-attack was launched from inside China that targeted the United States through Google and Adobe [3] that caused surprisingly few stirs within our government, especially after NATO was sent in to assist in the defense of Estonia's computer systems during the 2007 attacks [4]. Not long after this, the widely-used and [formerly] explicitly trusted RSA security mechanism, used in a large number major institutions around the world. was completely and entirely broken [5] by an embarrassingly simple hack [6].

Aside: We can look back at some of the things actual software engineers like +Ryan Dahl [7] and +Zack Morris [8] have been saying lately and quickly conclude that there's something fundamentally broken with the whole system. If you've ever worked on or with a large software project, you can see evidence of negligence and ignorance alike embedded at every level. It certainly contributes to if not causes these types of security concerns.

[1]: http://online.wsj.com/article/SB10001424052702304563104576355623135782718.html
[2]: http://www.schneier.com/blog/archives/2010/10/stuxnet.html
[3]: http://www.wired.com/threatlevel/2010/01/operation-aurora/
[4]: http://www.wired.com/politics/security/magazine/15-09/ff_estonia
[5]: http://www.computerworld.com/s/article/9214757/RSA_warns_SecurID_customers_after_company_is_hacked
[6]: http://www.zdnet.co.uk/blogs/mapping-babel-10017967/rsa-hack-targeted-flash-vulnerability-10022143/
[7]: https://plus.google.com/115094562986465477143/posts/Di6RwCNKCrf
[8]: http://zackarymorris.tumblr.com/post/10973087527/the-state-of-the-art-is-terrible

Attachments

» Exclusive: Computer Virus Hits U.S. Drone Fleet

A computer virus has infected the cockpits of America's Predator and Reaper drones, logging pilots' every keystroke as they remotely fly missions over

1 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Why not?  Who is backing bitcoin... in reply to

Why not?  Who is backing bitcoin to insure it?  No one.  We've already seen multi-million dollar values of bitcoin embezzlement.   The claim it is secure is bs.  

If I have bitcoin store at any one of these sites and then all of a sudden they go belly up, what happens?  I lose everything.

A bank going belly up at least they have backing on it to secure the vast majority of the funds kept in it. 

Is other currency, or banking 100% secure?  No.  But it is a lot more than bitcoin.  

It it was supported and insured like other currencies, I'd say there isn't a reason.  But it isn't. 

And it is as much beholden to the market as any other currency out there also.   We've seen people price manipulating it just like other currency trading.

So no real insurance or security, and questionable "banks" for it.  No thanks.

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Doesn&#39;t sound like a targeted attack... in reply to

Doesn't sound like a targeted attack but, just accidental luck to get into something thought to be secured.

Personally I think that in the IT industry there needs to be proactive training for all software developers because there is a serious deficit on security education and its very hard to keep up because of its ever changing nature. Better yet would be a strong investment in automated tools which could evaluate code for exploits. I'm sure some automated security checking exists out there but, I can tell you that if banks aren't using this sort of tool then I doubt many companies are.

Getting rid of Adobe reader and flash would also help greatly...

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

New Chapters

After a year and a half working with some of the smartest and most competent engineers I've ever met, it's time for me to part ways with BitPay. I've had the opportunity to be deeply involved in the design, implementation, and deployment of some incredible technologies, but we're turning a page in the story of Bitcoin's rise and it's time to start exploring the new chapter. BitPay continues to paint an incredibly compelling picture as to what the decentralized future looks like – we worked on some incredibly far-reaching and massively impactful ideas, including: - [ChainDB][chaindb], a distributed database backed exclusively by the Bitcoin blockchain. - [Copay][copay], a truly decentralized wallet & identity management platform. - [BitAuth][bitauth], a secure authentication mechanism for peers on the web, using the `k1` curve. - [Impulse][impulse], a method of securing zero-confirmation transactions. - [Foxtrot][foxtrot], a completely encrypted data transmission network. - [Bitcore][bitcore], a library of common software functionality to glue everything together. You might notice a few common themes. Let me point out the two most important. Firstly, that everything here is open source (with the notable exception of ChainDB). Open source, and more importantly [free software][free software], is a very big deal to me. Prior to joining BitPay, I was [open sourcing education][coursefork], [contributing to open source software](https://github.com/martindale), and [speaking on the importance of open source](https://www.youtube.com/watch?v=iuYLWdG-lP0). Some of the things I'm most proud of are the things _other_ people built with the things _we_ gave away – _that's_ the real power of open source. Secondly, that everything here is based on Bitcoin, not some alternative blockchain. BitPay was a firm believer in Bitcoin as the exclusive platform that would secure the post-fiat era, and that belief has held strongly with me before and after my departure. Until a more compelling alternative to Bitcoin emerges, One of the other exciting things to come out of BitPay was the emergence of [DECENTRALIZE][decentralize], which we formed last fall with a few of our fellow employees. DECENTRALIZE has become [an acclaimed content source][cointelegraph:decentralize] in the latest resurgence of decentralized thinking, and now it gets to be a much bigger priority for me. Before I joined BitPay, I'd put a lot of work into [Maki][maki], a framework for making full-stack application development significantly easier. Maki took a bit of a back-burner position while I was focusing on my work at BitPay, so I'll be redoubling my efforts to see that vision through. In fact, I think now's as good a time as any to share that vision. To that end, I'm starting a new project named Fabric. I'd like to entirely eliminate centralized servers on the Internet and catalyze the development of an entirely new class of economic actor. More details soon. As we embark on our next journey, let's always remember the carefully selected input used to create [the Genesis Block][genesis]: > The Times 03/Jan/2009 Chancellor on brink of second bailout for banks [chaindb]: https://bitpay.com/chaindb.pdf [copay]: https://copay.io/ [bitauth]: https://github.com/bitpay/bitauth [impulse]: https://impulse.is/ [foxtrot]: https://github.com/bitpay/foxtrot [bitcore]: https://bitcore.io [decentralize]: https://decentralize.fm [free software]: http://www.gnu.org/philosophy/free-sw.en.html [coursefork]: https://coursefork.org/ [maki]: https://maki.ericmartindale.com/ [cointelegraph:decentralize]: http://cointelegraph.com/news/114496/leaders-in-bitcoin-broadcasting-pandoras-box-is-open-and-theres-no-going-back [genesis]: https://en.bitcoin.it/wiki/Genesis_block

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

<span class="proflinkWrapper"><span class="proflinkPrefix">+</span><a class="proflink" href="https://plus.google.com/111716948575577959969" oid="111716948575577959969">Marko... in reply to

+Marko Shiva Pavlovic that's just plainly delusional. Don't be lazy. Do some research, THEN provide commentary if you must. http://arstechnica.com/security/2012/06/flame-crypto-breakthrough/

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Recently at the Black Hat Security Conference, security researcher +Jerome Radcliffe unveiled some research...

Recently at the Black Hat Security Conference, security researcher +Jerome Radcliffe unveiled some research into how malicious crackers could deliver some potentially lethal payloads to certain insulin pumps. +Scott Hanselman wrote up an extraordinary rebuttal to the media's sensationalism on the topic; it's far more worth the read than the news floating around out there, as I'm sure my diabetic friend +Geoffrey Steinman can attest.

Attachments

Hackers can kill Diabetics with Insulin Pumps from a half mile away - Um, no. Facts vs. Journalistic Fear mongering - Scott Hanselman

Scott Hanselman on Programming, User Experience, The Zen of Computers and Life in General

2 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Recently at the Black Hat Security Conference, security researcher +Jerome Radcliffe unveiled some research...

Recently at the Black Hat Security Conference, security researcher +Jerome Radcliffe unveiled some research into how malicious crackers could deliver some potentially lethal payloads to certain insulin pumps. +Scott Hanselman wrote up an extraordinary rebuttal to the media's sensationalism on the topic; it's far more worth the read than the news floating around out there, as I'm sure my diabetic friend +Geoffrey Steinman can attest.

Attachments

Hackers can kill Diabetics with Insulin Pumps from a half mile away - Um, no. Facts vs. Journalistic Fear mongering - Scott Hanselman

Scott Hanselman on Programming, User Experience, The Zen of Computers and Life in General

2 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Recently at the Black Hat Security Conference, security researcher +Jerome Radcliffe unveiled some research...

Recently at the Black Hat Security Conference, security researcher +Jerome Radcliffe unveiled some research into how malicious crackers could deliver some potentially lethal payloads to certain insulin pumps. +Scott Hanselman wrote up an extraordinary rebuttal to the media's sensationalism on the topic; it's far more worth the read than the news floating around out there, as I'm sure my diabetic friend +Geoffrey Steinman can attest.

Attachments

Hackers can kill Diabetics with Insulin Pumps from a half mile away - Um, no. Facts vs. Journalistic Fear mongering - Scott Hanselman

Scott Hanselman on Programming, User Experience, The Zen of Computers and Life in General

6 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Recently at the Black Hat Security Conference, security researcher +Jerome Radcliffe unveiled some research...

Recently at the Black Hat Security Conference, security researcher +Jerome Radcliffe unveiled some research into how malicious crackers could deliver some potentially lethal payloads to certain insulin pumps. +Scott Hanselman wrote up an extraordinary rebuttal to the media's sensationalism on the topic; it's far more worth the read than the news floating around out there, as I'm sure my diabetic friend +Geoffrey Steinman can attest.

Attachments

Hackers can kill Diabetics with Insulin Pumps from a half mile away - Um, no. Facts vs. Journalistic Fear mongering - Scott Hanselman

Scott Hanselman on Programming, User Experience, The Zen of Computers and Life in General

2 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

As a corporate business insider I... in reply to

As a corporate business insider I can offer a perspective from the "enemy's" den. Many people agree that this movement has gained momentum and has the potential to become as big or bigger than the Tea Party Movement. I grew up in the same generation as many of those protesting today and I understand the innuendo behind Anonymous, I understand point being made by the zombies, and I understand what general sense of anger is meant for. However, keep in mind that you are generally a younger generation trying to speak to an industry dominated mostly by an older generation of people. To these people this movement appears random, chaotic, and annoying simply because they don't even know what this movement's demands or goals are. Indeed for almost all of September I don't think Wall Street even understood exactly what they were protesting, and just recently have they gotten some kind of vague idea as to what these people want done. Most people relate these types of sit-in's to hippies from their generation and view them as more of an unorganized annoyance. To my friends who I work with in NYC, comments I hear from them are to this effect (I am summarizing several people's opinions as one): "It's just stupid, they block traffic and cause trouble nearby. We have to exit buildings from completely the opposite side now just to avoid them if we're wearing a suit regardless of our purpose. No one is there during the day but all of a sudden they pop up during rush hour. They wreck local businesses and drive customers away. The corporations they protest are unaffected but the small businesses nearby are the ones they are actually hurting. We don't even know what they want."

My bosses have gone to meetings with Bernanke and Geithner it is unclear still whether these protests will actually have any influence over policy. At an executive level they still appear confused as to how to handle situation, mostly because they do not understand it. But understand this, from their perspective they have changed the following: In terms of big banks, their balance sheets have been improved light years beyond where they were in 2008 with more liquidity and more capital on hand to prevent these types of shocks to the system. They have repaid any tax dollars received and are often significantly more efficient at implementing change than the government is in making up it's mind on what to do. The majority of issues occurs because of the indecisiveness in Washington. Think about these issues: 12 people are tasked with cutting $1.7 Trillion in the next 5 weeks -- The only way that is going to happen is if they cut large dollar programs. That means Healthcare, medicare, social security, and of course military but that is even less politically viable than the other three. There is also gridlock on what will happen with the tax system in the future. Those main issues where indecisiveness has been are also some of the largest possible expenses a corporation could have. How do plan for variable expenses that could go up or down by 50% in EITHER direction? Corporations have no idea how to plan for healthcare, medicare, or social security plans for their employees because there is no decisiveness on what will occur in the future. They do not want to hire people that they cannot afford to keep a year later because of law changes. So even if they have the money for it now (which they do), they are unable to hire because of the risk of causing liquidity issues later and the massive negative PR associated with hiring and then firing. These banks also receive criticism for not lending money out, but this is not their fault. They ARE lending money out, but there is no demand. It is not supply side issues, there is plenty of money out there to be had. You can get a loan today no problem, don't believe me? Go try it at any bank you want. There is just no one who wants to take a loan. So all that free capital that we spent 3 years trying to push into banks is now stuck there.

This issue is not business related anymore. It is purely political. My above statements are not to absolve corporations of responsibility in 2008, but they are more to explain the current situation here and now. Europe is a whole other book to write about another time.

In a world where politicians and talking heads can call the greatest capitalist of our time Warren Buffett a socialist, and get away with it as "news" is the real issue at hand.

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Reminder to the general public: please...

Reminder to the general public: please observe the grave inefficiencies of backscatter scanners in airport security:

Attachments

radsec.org/gallery.html

radsec.org/gallery.html

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

To be clear, a blockchain is...

To be clear, a blockchain is a data structure above and beyond transactions. If you only need a secure log, a merkle tree may be sufficient.

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Airport security? What a joke....

Airport security? What a joke. It's actually safer to get manually checked! Those multi-million dollar machines are cost-saving measures.

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

RT @martindale: To be clear, a...

RT @martindale: To be clear, a blockchain is a data structure above and beyond transactions. If you only need a secure log, a merkle tree m…

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

RT @martindale: Reminder to the general...

RT @martindale: Reminder to the general public: please observe the grave inefficiencies of backscatter scanners in airport security: https:

Attachments

radsec.org/gallery.html

radsec.org/gallery.html

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

RT @martindale: Reminder to the general...

RT @martindale: Reminder to the general public: please observe the grave inefficiencies of backscatter scanners in airport security: https:

Attachments

radsec.org/gallery.html

radsec.org/gallery.html

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

We, the ██████ of the ███████... in reply to

We, the ██████ of the ███████ █████, in order to ████ a more ███████ ██████, █████████ ███████ ██████ domestic ███████████, ███████ for the ██████ ███████, promote the ███████ ███████, and secure the █████████ of [redacted] to █████████ and our █████████ do ordain and establish this ████████████ for the ███████ ██████ of ███████.

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

It's official, @bitpay is launching copay,...

It's official, @bitpay is launching copay, an open-source #bitcoin wallet for secure m-of-n transactions (multi-sig):

Attachments

blog.bitpay.com/2014/07/09/cop…

blog.bitpay.com/2014/07/09/cop…

blog.bitpay.com/2014/07/09/cop…

blog.bitpay.com/2014/07/09/cop…

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

RT @martindale: It's official, @bitpay is...

RT @martindale: It's official, @bitpay is launching copay, an open-source #bitcoin wallet for secure m-of-n transactions (multi-sig): http:

Attachments

blog.bitpay.com/2014/07/09/cop…

blog.bitpay.com/2014/07/09/cop…

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

RT @martindale: It's official, @bitpay is...

RT @martindale: It's official, @bitpay is launching copay, an open-source #bitcoin wallet for secure m-of-n transactions (multi-sig): http:

Attachments

blog.bitpay.com/2014/07/09/cop…

blog.bitpay.com/2014/07/09/cop…

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

RT @martindale: It's official, @bitpay is...

RT @martindale: It's official, @bitpay is launching copay, an open-source #bitcoin wallet for secure m-of-n transactions (multi-sig): http:

Attachments

blog.bitpay.com/2014/07/09/cop…

blog.bitpay.com/2014/07/09/cop…

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

RT @martindale: It's official, @bitpay is...

RT @martindale: It's official, @bitpay is launching copay, an open-source #bitcoin wallet for secure m-of-n transactions (multi-sig): http:

Attachments

blog.bitpay.com/2014/07/09/cop…

blog.bitpay.com/2014/07/09/cop…

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

RT @martindale: It's official, @bitpay is...

RT @martindale: It's official, @bitpay is launching copay, an open-source #bitcoin wallet for secure m-of-n transactions (multi-sig): http:

Attachments

blog.bitpay.com/2014/07/09/cop…

blog.bitpay.com/2014/07/09/cop…

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

RT @martindale: It's official, @bitpay is...

RT @martindale: It's official, @bitpay is launching copay, an open-source #bitcoin wallet for secure m-of-n transactions (multi-sig): http:

Attachments

blog.bitpay.com/2014/07/09/cop…

blog.bitpay.com/2014/07/09/cop…

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

RT @martindale: It's official, @bitpay is...

RT @martindale: It's official, @bitpay is launching copay, an open-source #bitcoin wallet for secure m-of-n transactions (multi-sig): http:

Attachments

blog.bitpay.com/2014/07/09/cop…

blog.bitpay.com/2014/07/09/cop…

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

RT @martindale: It's official, @bitpay is...

RT @martindale: It's official, @bitpay is launching copay, an open-source #bitcoin wallet for secure m-of-n transactions (multi-sig): http:

Attachments

blog.bitpay.com/2014/07/09/cop…

blog.bitpay.com/2014/07/09/cop…

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Might want to check this too.... in reply to

Might want to check this too. Security generally is under serviced, bad guys are too often ignored in the design process.

http://www.csmonitor.com/USA/2011/0922/From-the-man-who-discovered-Stuxnet-dire-warnings-one-year-later

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

I bet blackhats in Russia and... in reply to

I bet blackhats in Russia and China are pissed off that someone else revealed a useful exploit and security is about to be tightened.

More details would be nice. Like what OS are we talking about and why are they "wiping it off the system" and it keeps coming back? Are they not fixing the code that allows it in in the first place? Are they using some OS where one has to be careful what one clicks on lest one get infected with something? If so, how is something that insecure used in the war-fighting infrastructure? Did the NSA get overruled by some powerful senator that needed to repay a campaign favor?

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Building Blockchain-secured Applications Is Easy with Bitcore We've spent a lot of time figuring out...

Building Blockchain-secured Applications Is Easy with Bitcore
We've spent a lot of time figuring out how to make #blockchain  technology much more accessible to developers.  There's a lot of things you can do with #bitcoin  that you might not realize – and they're all right at your fingertips with Bitcore.

Come join our lead developer +Manuel Araoz as he gives an introduction to Bitcore, our Javascript library for doing all things related to bitcoin and the blockchain.  The webinar is tomorrow, at 7PM EDT.  Don't miss it.

Attachments

Webinar Registration: Intro to Bitcore

Live: Tuesday, 21 April 2015 at 07:00 PM EDT

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

<span class="proflinkWrapper"><span class="proflinkPrefix">+</span><a class="proflink" href="https://plus.google.com/113227819899320297020" oid="113227819899320297020">Joseph... in reply to

+Joseph Coco I don't think you are being honest with the reality of what a business would have to have set up to take bitcoin. 

It is naive to think they can just manage it themselves, especially with the ever changing value, and varying international values,  just like regular credit payment services have to deal with. 

I think pro-bitcoin bias is coloring your responses.   My research on it as someone who considered using them, paints a lot different picture than you are presenting.

I'm no anti-bitcoin.  I'm all for all sorts of varieties of currency and transactions.   But I want the truth and facts to be said about them.

I also notice everyone is ducking the security and backing issue. 

Banks are accredited and insured to protect their customers.   There isn't any bitcoin handler that has that.  Not even Square Marketplace. 

If you want people to use them, great.  If you want to use them yourself, great.  But don't blow smoke up peoples....   trying to cover real negatives about them. 

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Problem Solving Challenge: Move 211 Tons of Gold

A recent post from renowned security analyst Bruce Schneier highlighted an interesting problem to me.

It was announced last week that Hugo Chávez of Venezuela intends to repatriate 211 tons of gold (worth some $12.1 billion dollars by calculations based on current prices) from Europe back to Venezuela.

Venezuela would need to transport the gold in several trips, traders said, since the high value of gold means it would be impossible to insure a single aircraft carrying 211 tonnes. It could take about 40 shipments to move the gold back to Caracas, traders estimated. “It’s going to be quite a task. Logistically, I’m not sure if the central bank realises the magnitude of the task ahead of them,” said one senior gold banker.

So the challenge is this: how can Venezuela safely retrieve 211 tons of gold from its European stores? What solutions can you come up with using lateral analysis?

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

What I Do In My Spare Time...

Between work, my social life, and training, I play a game called EVE Online. It's the first game I've ever shelled out a monthly fee for, and it's well worth it. I came across this fan-made video for one of the in-game factions on CrazyKinux's blog.

Full screen this and play it in HD, while keeping in mind that this is made entirely of recorded gameplay video.

I'm the director of a group of players (called a "Corporation" as opposed to "Guild" in other MMORPGs), and if you're interested in playing with me, shoot me a line or message me in game as "Baeryn". You'll never find a game so perfect.

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Mitigating the BEAST TLS attack in node.js

I've been relying heavily on node.js this past year to provide a robust set of tools to solve the problems I encounter on a daily basis. I was pleased to see honorCipherOrder was added to node's TLS library in node.js v0.7.6, and released with node.js v0.8.0.

Late last year, security researcher Juliano Rizzo announced a new attack against the AES encryption used in the SSL/TLS transaction he dubbed BEAST. The details are interesting to those who care, but it turns out that we can mitigate this attack in node.js by enforcing honorCipherOrder on the server. Let's take a look.

If you have an HTTPS server that looks like this:


var https = require('https');
var fs = require('fs');

var options = {
  key: fs.readFileSync('key.pem'),
  cert: fs.readFileSync('cert.pem')
};

https.createServer(options, function (req, res) {
  res.writeHead(200);
  res.end("hello world\n");
}).listen(443);

...you can now manage the cipher order by using the ciphers option. In the following code snippet we're going set the options for the above server to use Steve Caligo's cipher order, which prefers TLS 1.2 ciphers (which are not vulnerable to the BEAST attack) for clients that support TLS 1.2 but falls back to the RC4 ciphers on TLS 1.0 clients.[...]


var options = {
  key: fs.readFileSync('key.pem'),
  cert: fs.readFileSync('cert.pem'),
  ciphers: 'ECDHE-RSA-AES256-SHA:AES256-SHA:RC4-SHA:RC4:HIGH:!MD5:!aNULL:!EDH:!AESGCM'
};


Finally, we will enforce the cipher order on the server's side of the negotiation:

var options = {
  key: fs.readFileSync('key.pem'),
  cert: fs.readFileSync('cert.pem'),
  ciphers: 'ECDHE-RSA-AES256-SHA:AES256-SHA:RC4-SHA:RC4:HIGH:!MD5:!aNULL:!EDH:!AESGCM',
  honorCipherOrder: true
};

...which leaves us with the following code for a working server that is not vulnerable to the BEAST attack (in node v0.8.0+!):


var https = require('https');
var fs = require('fs');

var options = {
  key: fs.readFileSync('key.pem'),
  cert: fs.readFileSync('cert.pem'),
  ciphers: 'ECDHE-RSA-AES256-SHA:AES256-SHA:RC4-SHA:RC4:HIGH:!MD5:!aNULL:!EDH:!AESGCM',
  honorCipherOrder: true
};

https.createServer(options, function (req, res) {
  res.writeHead(200);
  res.end("hello world\n");
}).listen(443);

Edit, 6/13/2013: Lloyd Watkin has done some research on his own and decided to use a different cipher chain:

ECDHE-RSA-AES128-SHA256:AES128-GCM-SHA256:RC4:HIGH:!MD5:!aNULL:!EDH

You should read into why he chose it and make an educated decision. </edit>

Until node.js implements this as the defaults (they should), this is something you should implement where using HTTPS with node!

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.