Saturday, May 28, 2011
Wednesday, May 25, 2011
Monday, May 16, 2011
Sunday, May 15, 2011
Friday, May 6, 2011
Wednesday, May 4, 2011
Sunday, April 17, 2011
iPad eliminating thousands of American jobs.
Why do you need to go to Borders anymore?' asked Jackson.
'Why do you need to go to Barnes & Noble?
Buy an iPad, download your book, download your newspaper, download your magazine.'
'What becomes of publishing companies and publishing company jobs?
And what becomes of bookstores and librarians and all of the jobs associated with paper?
Well, in the not too distant future, such jobs simply will not exist.
Steve Jobs is doing pretty well. He's created the iPad.
Certainly, it has made life more efficient for Americans, but the iPad is produced in China.
It is not produced here in the United States."
Saturday, April 16, 2011
Saturday, April 9, 2011
Sunday, March 27, 2011
Wednesday, March 23, 2011
Splinternet, Or How We Broke the Good Old Web
Friday, March 18, 2011
New kind of quantum public key cryptography - Wooohooo!
Sunday, March 6, 2011
Saturday, March 5, 2011
DOA - SysAdmins
The Decline and Fall of System Administration"Deep End's Paul Venezia questions whether server virtualization technologies are contributing to the decline of real server administration skills, as more and more sysadmins argue in favor of re-imaging as a solution to Unix server woes.
'This has always been the (many times undeserved) joke about clueless Windows admins: They have a small arsenal of possible fixes, and once they've exhausted the supply, they punt and rebuild the server from scratch rather than dig deeper. On the Unix side of the house, that concept has been met with derision since the dawn of time, but as Linux has moved into the mainstream — and the number of marginal Linux admins has grown — those ideas are suddenly somehow rational.'"
Wednesday, March 2, 2011
Friday, February 18, 2011
Thursday, February 17, 2011
Friday, February 4, 2011
Internet Kill Switch is Easy, just ask Gates
"It's not that hard to shut the Internet down if you have military power where you can tell people that's what's going to happen," Gates said. "Whenever you do something extraordinary like that you're sort of showing people you're afraid of the truth getting out, so it's a very difficult tactic, but certainly it can be shut off."
The majority ISPs Internet connectivity from the rest of the world comes from a small group of backbone pipes....
"If you want people to stay at home and do nothing, why don't you turn the internet back on?" - Conan O'Brien
Wednesday, February 2, 2011
Monday, January 31, 2011
Wednesday, January 26, 2011
Facebook and Twitter The Pathological Problem
Twitter and Facebook don't connect people – they isolate them from reality...
Guardian The way in which people frantically communicate online via Twitter, Facebook and instant messaging can be seen as a form of modern madness, according to a leading American sociologist.
"A behaviour that has become typical may still express the problems that once caused us to see it as pathological," MIT professor Sherry Turkle writes in her new book, Alone Together, which is leading an attack on the information age.
Turkle's book, published in the UK next month, has caused a sensation in America, which is usually more obsessed with the merits of social networking. She appeared last week on Stephen Colbert's late-night comedy show, The Colbert Report. When Turkle said she had been at funerals where people checked their iPhones, Colbert quipped: "We all say goodbye in our own way."
Turkle's thesis is simple: technology is threatening to dominate our lives and make us less human. Under the illusion of allowing us to communicate better, it is actually isolating us from real human interactions in a cyber-reality that is a poor imitation of the real world.
Social networking under fresh attack as tide of cyber-scepticism sweeps US
The list of attacks on social media is a long one and comes from all corners of academia and popular culture. A recent bestseller in the US, The Shallows by Nicholas Carr, suggested that use of the internet was altering the way we think to make us less capable of digesting large and complex amounts of information, such as books and magazine articles. The book was based on an essay that Carr wrote in the Atlantic magazine.
It was just as emphatic and was headlined: Is Google Making Us Stupid?
Another strand of thought in the field of cyber-scepticism is found in The Net Delusion, by Evgeny Morozov. He argues that social media has bred a generation of "slacktivists". It has made people lazy and enshrined the illusion that clicking a mouse is a form of activism equal to real world donations of money and time.
Other books include The Dumbest Generation by Emory University professor Mark Bauerlein – in which he claims "the intellectual future of the US looks dim"– and We Have Met the Enemy by Daniel Akst, which describes the problems of self-control in the modern world, of which the proliferation of communication tools is a key component.
Turkle's book, however, has sparked the most debate so far. It is a cri de coeur for putting down the BlackBerry, ignoring Facebook and shunning Twitter. "We have invented inspiring and enhancing technologies, yet we have allowed them to diminish us," she writes... the social media generation, suggesting that Facebook was created by people who failed to fit in with the real world.
Is this creating the uncivil culture that has no empathy?
Fellow critics point to numerous incidents to back up their argument. Recently, media coverage of the death in Brighton of Simone Back focused on a suicide note she had posted on Facebook that was seen by many of her 1,048 "friends" on the site. Yet none called for help – instead they traded insults with each other on her Facebook wall. Read on at Guardian
Thursday, January 20, 2011
Computer Virus's Turn 25
Read more of this story at Slashdot
Wednesday, January 19, 2011
Tweet Age Wasteland... world of the web
- 107 trillion emails were sent
- 89% of that email was spam.
- Domain Names: Over 202 million are already taken. *
- There are 1.97 billion internet users in the world. That's 14% more than last year. Asia has 825 million, Europe has 475 million, North America has 266 million.
- There are 152 million blogs
- There were 25 billion tweets sent.
- Facebook had 600 million members.
Sunday, January 16, 2011
GOV on Facebook
Saturday, January 15, 2011
Friday, January 7, 2011
Hope for Change in Microsoft
CES: Microsoft Hacks Up Next OS as SOC
With the Pre-CES Keynote made by [Steve Ballmer], the announcement came that the next iteration of their operating system being available in SOC specific form. This will lead to windows being able to run a very diverse hardware set in a much more efficient manner than it does right now. Microsoft displayed 4 different versions of what the next generation prototypes are from 4 different manufacturers but there has been no work done yet on the GUI for SOC as [Ballmer] was very clear to mention that more than a couple of times.
The picture below is Intel's iteration of System on a Chip.
Thursday, January 6, 2011
How you can't avoid online tracking....
Even after you set your browser to delete existing cookies and ban new ones, download super-cookies and use the tools created by pro-privacy programmers, there's one data-gathering technique that you simply cannot avoid. Your computer has hundreds of settings that control things like the main interface language (English, Korean, etc.), sound and screen resolution settings, and the color schemes people set for their Microsoft Word documents.How to avoid online tracking. (Hint: you can't.)As you scroll the Internet, most websites automatically take snapshots of your settings. That information, combined with data on where you connect to the internet, can be used to track your movements around the web and build a profile about each visitor. To see how effective this is at tracing individual users, I ran a test designed by Eckerseley called Panopticlick on my own computer. I've only had this computer for about a month, so I haven't even taken the time to open my control panel and customize the settings for the track pad, keyboard, screen, etc. (The program doesn't search for computers or beacons on your computer.)
Nevertheless, Panopticlick found 20 bits of identifying information on my Mac. Using those bits, it could tell that I was a unique user and not one of the 1.3 million people who ran the test before me.
Wednesday, December 22, 2010
FCC approves controversial ‘Net Neutrality’ regulations
The rules authored by FCC Chairman Julius Genachowski would require ISPs to allow their customers to have access all legal online content, applications and services over their wired networks and prohibit unreasonable network discrimination.
But the plan would also allow for a greater fractioning of the Internet and data rationing on mobile and wired networks, according to analysis of the policies. Major network stakeholders like Verizon and AT&T would be able to sell bandwidth in capped tiers, with overage charges for users who download too much information, and certain types of data traffic like peer-to-peer file transfers could be banned altogether.
If they pass and telecoms are allowed to move forward with their plans, "the Internet as we know it would cease to exist," Sen. Franken concluded in an editorial published by Huffington Post.
"The FCC will be meeting to discuss those regulations, and we must make sure that its members understand that allowing corporations to control the Internet is simply unacceptable." Read more at RawStory
Thursday, December 16, 2010
WTF has a new meaning Zuckerberg
Society FAIL - Zuckerberg, TIME Magazine's Person of the Year
WTF!... Welcome To Facebook
Tuesday, December 14, 2010
new cloud computing looks like a plan "to push people into careless computing"
The risks include loss of legal rights to data if it is stored on a company's machine's rather than your own, Stallman points out: "In the US, you even lose legal rights if you store your data in a company's machines instead of your own. The police need to present you with a search warrant to get your data from you; but if they are stored in a company's server, the police can get it without showing you anything. They may not even have to give the company a search warrant."
...He sees a creeping problem: "I suppose many people will continue moving towards careless computing, because there's a sucker born every minute. The US government may try to encourage people to place their data where the US government can seize it without showing them a search warrant, rather than in their own property. However, as long as enough of us continue keeping our data under our own control, we can still do so. And we had better do so, or the option may disappear."
"I'd say the problem is in the nature of the job ChromeOS is designed to do. Namely, encourage you to keep your data elsewhere, and do your computing elsewhere, instead of doing it in your own computer."
Please read full at Guardian
Saturday, December 11, 2010
Thursday, December 9, 2010
Steve Wozniak: 'We've lost a lot of control'
"You used to ask a smart person a question. Now, who do you ask? It starts with g-o, and it's not God," he quipped.
Earlier that day, Wozniak said the biggest obstacle with the growing prevalence of technology is that our personal devices are unreliable.
"Little things that work one day; they don't work the next day," he said enthusiastically, waving his hands. "I think it's much harder today than ever before to basically know that something you have ... is going to work tomorrow."
Reciting an all-too-common living-room frustration, Wozniak told a story about the countless hours he spent trying to troubleshoot his media player, called Slingbox.
"There is no solution," Wozniak said of tech troubles. "Everything has a computer in it nowadays; everything with a computer is going to fail. The solution is: kill the people who invented these things," he said with a smile.
Saturday, November 27, 2010
NPR on the future of the Internet, 1993
17 years ago, Internet radio pioneer (and future rogue archivist) Carl Malamud and search engine inventor (and future Internet Archive founder) Brewster Kahle appeared on an historic segment of NPR's Science Friday to talk with Ira Flatow about the amazing future of the Internet.
Scientists from Xerox PARC helped them put this broadcast onto the Internet, and they even received call-ins from people on powerful Unix workstations at academic institutions with blazing-fast ISDN connections (which no doubt sent their sysadmins into a panic as the traffic across the campus routers spiked). Call-in guests asked how we'd manage the glut of information, how we'd figure out what was true, what you could do with your overstuffed email inbox, and, of course, how copyright would fare. Good times!
Science Friday, 1993: The Future of the Internet
Monday, November 15, 2010
Friday, October 29, 2010
World’s Fastest Supercomputer… Is Now In China
Saturday, October 23, 2010
Friday, October 22, 2010
Thursday, October 21, 2010
I, Product
I tweet, therefore I am...
You may think of yourself as a user of Google, Facebook or Amazon, but you are actually their product.
Forget 1984 and Brave New World. The men who wrote those books were dangerously naïve and not as prescient as we once believed. Instead of Big Brother looking after us, we're immersed in a dizzily delightful system that cares so much about us that it anticipates our every pleasure, like a giant planetary-class Vegas, an immense, inexhaustible Disney World. All we have to do is to preserve the illusion that we, "the users," have the power: in that ignorance, we can live happily ever after.
Sure, Google will provide you with search results, but they are not in the search business; they are in the advertising business. Their profits come from marketing firms that buy your behavior.
Similarly, Amazon is not in the book business, although they will send you the books you've ordered. They are in the personal information business.
The assets of modern web-based companies are the intimate profiles of those who "use" them, like you and me. Time to forget the nice pronouncements like "Do no evil" that accompany the wholesale destruction of privacy now taking place on the web, or rather within the walled gardens that companies like Facebook, Google and Apple are erecting around us on the web. Compared to them, the Chinese censors re-inventing their Great Wall are a bunch of sissies.
Well, who cares? Look at what we've gained: We now have access to unprecedented new riches. Movies and songs by the thousands; new "friends" by the hundreds; timely pieces of data by the millions. Our lives have become richer, more intelligent, more interesting.
The world moves on. You may have had privacy rights as a customer or a user but what makes you think you should retain those rights now that you're just a product?
Read More at the Boing2Wednesday, October 20, 2010
Monday, October 18, 2010
Sunday, October 17, 2010
Friday, October 15, 2010
Thursday, October 14, 2010
Sunday, October 10, 2010
Wiretapping the Internet - To tech with IT all!
...Formerly reserved for totalitarian countries, this wholesale surveillance of citizens has moved into the democratic world as well. Governments like Sweden, Canada and the United Kingdom are debating or passing laws giving their police new powers of internet surveillance, in many cases requiring communications system providers to redesign products and services they sell. More are passing data retention laws, forcing companies to retain customer data in case they might need to be investigated later.
Obama isn't the first U.S. president to seek expanded digital eavesdropping. The 1994 (CLINTON) CALEA law required phone companies to build ways to better facilitate FBI eavesdropping into their digital phone switches. Since 2001, the National Security Agency has built substantial eavesdropping systems within the United States.
These laws are dangerous, both for citizens of countries like China and citizens of Western democracies. Forcing companies to redesign their communications products and services to facilitate government eavesdropping reduces privacy and liberty; that's obvious. But the laws also make us less safe. Communications systems that have no inherent eavesdropping capabilities are more secure than systems with those capabilities built in.
Any surveillance system invites both criminal appropriation and government abuse. Function creep is the most obvious abuse: New police powers, enacted to fight terrorism, are already used in situations of conventional nonterrorist crime. Internet surveillance and control will be no different.
Please read more from the SCHNEIER
Friday, October 1, 2010
Tuesday, September 14, 2010
The Day The Data Died - Long live useless social networking
Friday, August 27, 2010
Newbies attack Microsoft between 7000 and 9000 times per second.
Thursday, August 26, 2010
Teens addicted to texting like Heroin
cbs3.com - Teenagers are becoming addicted to texting, according to a new study. In fact experts are saying being hooked on texting can be like being addicted to drugs.
Walking, sitting, it doesn't matter where it happens, teenagers seem to need to text. Statistics show 80 percent of all 15 to 18-year-olds own a cell phone. And the rate of texting has sky rocketed 600 percent in three years. The average teen sends 3,000 texts a month
Wednesday, August 25, 2010
40 Critical Windows Bugs used to hijack & infect PC's with malware
HD Moore, chief security officer at Rapid7 and creator of the open-source Metasploit penetration-testing toolkit. Moore did not reveal the names of the vulnerable applications or their makers, however.
"The cat is out of the bag, this issue affects about 40 different apps, including the Windows shell,"
"Solving the flaw requires every affected vendor to produce a patch," he said. "
The bug in Apple in its iTunes... According to Apple, the bug does not affect Mac machines.
Moore confirmed that the flaw "applies to a wide range of Windows applications," and added that he stumbled across it while researching the Windows shortcut vulnerability, a critical bug that Microsoft acknowledged in July and patched on Aug. 2 using one of its rare "out of band" emergency updates.
Moore declined to name the applications that contain the bug or to go into great detail about the vulnerability. But he was willing to share some observations.
"The vector is slightly different between applications, but the end result is an attacker-supplied .dll being loaded after the user opens a 'safe' file type from a network share [either on the local network or the Internet]," Moore said in an e-mail reply to questions. "It is possible to force a user to open a file from the share, either through their Web browser or by abusing other applications, for example, Office documents with embedded content."
Some of what Moore described was reminiscent of the attacks using the Windows shortcut vulnerability. For instance, hackers were able to launch drive-by attacks exploiting the shortcut bug from malicious sites via WebDAV, and could embed their exploits into Office documents, which would presumably be delivered to victims as seemingly innocuous e-mail attachments.
His advice until the vulnerable applications are patched was also taken from Microsoft's shortcut bug playbook.
"Users can block outbound SMB [by blocking TCP ports] 139 and 445, and disable the WebDAV client [in Windows] to prevent these flaws from being exploited from outside of their local network," Moore recommended.
Both work-arounds were among those Microsoft told users they could apply if they were unable to apply the emergency update.
But although Microsoft was able to plug the shortcut hole with a patch for Windows, Moore was pessimistic that the company would be able to do the same with this vulnerability.
Please read full at ComputerWorld
Tuesday, August 24, 2010
National Park Service Says Tech Is Enabling Stupidity
"The National Park Service... Last fall, a group of hikers in the Grand Canyon called in rescue helicopters three times by pressing the emergency button on their satellite location device. When rangers arrived the second time, the hikers complained that their water supply tasted salty. 'Because of having that electronic device, people have an expectation that they can do something stupid and be rescued,' said a spokeswoman for Grand Teton National Park. 'Every once in a while we get a call from someone who has gone to the top of a peak, the weather has turned and they are confused about how to get down and they want someone to personally escort them. The answer is that you are up there for the night.'"
Friday, August 20, 2010
Tuesday, August 3, 2010
Console owners are “most depressed and socially awkward”
The Harm Of Gaming: We Present The Facts
The perennial questions of the harm that games may be causing us and our children are extremely troubling. Every week seems to bring a new survey or study that demonstrates links between gaming and problematic behavior, with renowned psychologists, sociologists and publicists explaining to us what it is we need to be scared of. Over the last fifteen years I have been studying this data and reading these papers, and I am now ready to publish my findings. Below is the result of a decade-and-a-half's research, and I think will once and for all answer the questions every parent, teacher, child and teenager should be asking.
Grand Theft Auto Causes Marriages To Break Down
While no one is left in any doubt that playing Grand Theft Auto causes anyone under the age of 17 to become dangerously exposed to murder, the longer-term effects on adults have been less examined. As part of my research I thought to compare the sales of each GTA game with what the orce rate must have been when each came out. As you can see each new GTA game has been directly correlated with an increase in orces. While the graph may give the impression that GTA IV has caused fewer orces than Vice City or San Andreas, this game only came out in 2008, so most of the orces it has induced will still be going through the courts and awaiting completion. Expect to see this number soar in the next twelve months.
Owning Consoles More Serious Than Gun Crime
A lot of videogames include the use of guns. While these may not be real guns, but rather recreations made of pixels and polygons, it is obvious to anyone playing one of these "simulations" that it is in no meaningful way different from firing a real gun in a school. But it's far scarier than you might have first thought. Nearly twice as many Americans own gun-displaying consoles than those who own the types of guns that require a license and paperwork to purchase. No such paperwork is necessary when buying an Xbox, and yet still teenagers will kill each other in the streets.
Monday, August 2, 2010
Social Media killing intimate relationships...
"Such findings suggest that despite increases in technology and globalization that would presumably foster social connections, people are becoming increasingly more socially isolated."
...got to love the irony that social networks and communication devices are creating the most anti-social environment the world has ever witnessed.
Saturday, July 31, 2010
temporal analytics engine
The idea is to figure out for each incident who was involved, where it happened and when it might go down. Recorded Future then plots that chatter, showing online "momentum" for any given event.
The "How People Use It" page on Recorded Future's website makes absolutely no attempt to hide The Creepy:Research a personExclusive: Google, CIA Invest in 'Future' of Web Monitoring (Wired Danger Room blog)
Monitor news on public figures to...
Identify future travel plans; spot past travel trends and patterns
Search for communication with other individuals; graph their network
Monitor career history and announced job changes
Find quotations and sound bites in the news and blogs
Discover future and past strategic positioning
Uncover public political ties and family relationships
Wednesday, July 28, 2010
Tuesday, July 27, 2010
Sunday, July 25, 2010
Google Bends Over for China
China renewed Google's Internet license after it pledged to obey censorship laws and stop automatically switching mainland users to its unfiltered Hong Kong site, an official said Tuesday.
It was Beijing's first public comment on its decision to allow Google to continue operating a China website following a public clash over censorship. The company closed its China search engine in March but still offers music and other services in China.
Thursday, July 22, 2010
Looking for a few good IT
Read more of this story at Slashdot.
Sunday, July 11, 2010
Thursday, July 8, 2010
Germans taking on Facebook and google privacy
Things 2dolist - Crack the "Cyber Command" logo
The U.S. Military's new "Cyber Command" logo contains a hidden code. Noah Shachtman at Wired News says, "Help us crack it!"
Related reading today: Bruce Schneier says "The Threat of Cyberwar Has Been Grossly Exaggerated."As usual I have to agree with Bruce...
Wednesday, July 7, 2010
AI - paradoxical mix of intelligence and stupidity
I mention these specific examples — smart cars and massive knowledge-bases — because they came up repeatedly in my recent conversations with AI researchers. These experts expressed little doubt that both technologies will reach the market far sooner, and penetrate it more pervasively, than most people realize.
But confidence to the point of arrogance is practically a degree requirement for computer scientists. Which, actually, is another reason why these particular developments caught my interest: for all their confidence about the technologies per se, every researcher I spoke to admitted they had no clue - but were intensely curious - how these developments will affect society. - "new developments in AI"