Sunday, April 17, 2011

iPad eliminating thousands of American jobs.

"on an anti-technology rant on Friday on the floor of Congress, http://www.motifake.com/image/demotivational-poster/small/1003/taking-over-the-world-ipad-apple-fail-demotivational-poster-1267796770.jpgblaming the iPad for eliminating thousands of American jobs. '
Why do you need to go to Borders anymore?' asked Jackson.
'Why do you need to go to Barnes & Noble?

Buy an iPad, download your book, download your newspaper, download your magazine.'
 
'What becomes of publishing companies and publishing company jobs?
And what becomes of bookstores and librarians and all of the jobs associated with paper?
Well, in the not too distant future, such jobs simply will not exist.
Steve Jobs is doing pretty well. He's created the iPad.
Certainly, it has made life more efficient for Americans, but the iPad is produced in China.
It is not produced here in the United States."

Wednesday, March 23, 2011

Splinternet, Or How We Broke the Good Old Web

HTML clipboard SlashDot - "I don't want to be that scruffy guy with 'The end is nigh' sign and some really bad dental problems, but most industry analysts already noticed that global Internet is coming apart, changing into a cluster of smaller and more closed webs. They have even created a catchy name for this Web 3.0 – the Splinternet.

Friday, March 18, 2011

New kind of quantum public key cryptography - Wooohooo!

"Public key cryptography allows anybody to encrypt a message using a public key but only those with another private key can decrypt the message. That's possible because of certain mathematical functions that are easy to perform in one direction but hard to do in reverse. The most famous example is multiplication. It's easy to multiply two numbers together to get a third but hard to start with the third number and work out its factors. Now Japanese researchers have discovered a quantum problem that is hard to solve in one direction but easy to do in reverse. This asymmetry, they say, could form the basis of a new kind of quantum public key cryptography. Their system is based on the problem of distinguishing between two ensembles of quantum states. This is similar to the problem of determining whether two graphs are identical, ie whether they correspond vertex-for-vertex and edge-for-edge. Increasing the complexity of the graph can always make this problem practically impossible for a quantum computer to solve in a reasonable time. But knowing the structure of a subset of the graph makes this problem easy, so this acts as a kind of private key for decrypting messages."

Saturday, March 5, 2011

Chain of Fools : Upgrading through every version of windows (HQ)

DOA - SysAdmins

The Decline and Fall of System Administration"Deep End's Paul Venezia questions whether server virtualization technologies are contributing to the decline of real server administration skills, as more and more sysadmins argue in favor of re-imaging as a solution to Unix server woes.

http://www.thinkgeek.com/images/blog/devotion_to_duty.jpg

'This has always been the (many times undeserved) joke about clueless Windows admins: They have a small arsenal of possible fixes, and once they've exhausted the supply, they punt and rebuild the server from scratch rather than dig deeper. On the Unix side of the house, that concept has been met with derision since the dawn of time, but as Linux has moved into the mainstream — and the number of marginal Linux admins has grown — those ideas are suddenly somehow rational.'"

Friday, February 4, 2011

Internet Kill Switch is Easy, just ask Gates

Register When US TV anchor Katie Couric asked the Microsoft co-founder and chairman if he was surprised that Egyptian president Hosni Mubarak could take the unprecedented step of killing the entire Egyptian internet, Gates responded with an emphatic: "no".

"It's not that hard to shut the Internet down if you have military power where you can tell people that's what's going to happen," Gates said. "Whenever you do something extraordinary like that you're sort of showing people you're afraid of the truth getting out, so it's a very difficult tactic, but certainly it can be shut off."

The majority ISPs Internet connectivity from the rest of the world comes from a small group of backbone pipes....
"If you want people to stay at home and do nothing, why don't you turn the internet back on?" - Conan O'Brien

Wednesday, January 26, 2011

Facebook and Twitter The Pathological Problem

Twitter and Facebook don't connect people – they isolate them from reality...

Guardian The way in which people frantically communicate online via Twitter, Facebook and instant messaging can be seen as a form of modern madness, according to a leading American sociologist.

"A behaviour that has become typical may still express the problems that once caused us to see it as pathological," MIT professor Sherry Turkle writes in her new book, Alone Together, which is leading an attack on the information age.

Turkle's book, published in the UK next month, has caused a sensation in America, which is usually more obsessed with the merits of social networking. She appeared last week on Stephen Colbert's late-night comedy show, The Colbert Report. When Turkle said she had been at funerals where people checked their iPhones, Colbert quipped: "We all say goodbye in our own way."

Turkle's thesis is simple: technology is threatening to dominate our lives and make us less human. Under the illusion of allowing us to communicate better, it is actually isolating us from real human interactions in a cyber-reality that is a poor imitation of the real world.


Social networking under fresh attack as tide of cyber-scepticism sweeps US

The list of attacks on social media is a long one and comes from all corners of academia and popular culture. A recent bestseller in the US, The Shallows by Nicholas Carr, suggested that use of the internet was altering the way we think to make us less capable of digesting large and complex amounts of information, such as books and magazine articles. The book was based on an essay that Carr wrote in the Atlantic magazine.

demotivational posters - FACEBOOK

It was just as emphatic and was headlined: Is Google Making Us Stupid?

Another strand of thought in the field of cyber-scepticism is found in The Net Delusion, by Evgeny Morozov. He argues that social media has bred a generation of "slacktivists". It has made people lazy and enshrined the illusion that clicking a mouse is a form of activism equal to real world donations of money and time.

Other books include The Dumbest Generation by Emory University professor Mark Bauerlein – in which he claims "the intellectual future of the US looks dim"– and We Have Met the Enemy by Daniel Akst, which describes the problems of self-control in the modern world, of which the proliferation of communication tools is a key component.

Turkle's book, however, has sparked the most debate so far. It is a cri de coeur for putting down the BlackBerry, ignoring Facebook and shunning Twitter. "We have invented inspiring and enhancing technologies, yet we have allowed them to diminish us," she writes... the social media generation, suggesting that Facebook was created by people who failed to fit in with the real world.


Is this creating the uncivil culture that has no empathy? 
Fellow critics point to numerous incidents to back up their argument. Recently, media coverage of the death in Brighton of Simone Back focused on a suicide note she had posted on Facebook that was seen by many of her 1,048 "friends" on the site. Yet none called for help – instead they traded insults with each other on her Facebook wall. Read on at Guardian

Thursday, January 20, 2011

Computer Virus's Turn 25

"Happy anniversary Brain Virus, the first bit of malware capable of infecting a DOS-based PC. Back in those relatively innocent times, the brothers actually embedded their real names and business address in the code and later told Time magazine they had written the virus to protect their medical software from piracy. Who knows what they were really thinking, but by all accounts the Brain Virus was relatively harmless. Twenty-five years later, most malware is anything but benign and cyber criminals pull off exploits the Alvi brothers never envisioned."
Read more of this story at Slashdot

Wednesday, January 19, 2011

Tweet Age Wasteland... world of the web

  • 107 trillion emails were sent
  • 89% of that email was spam.
  • Domain Names: Over 202 million are already taken. *
  • There are 1.97 billion internet users in the world. That's 14% more than last year. Asia has 825 million, Europe has 475 million, North America has 266 million.
  • There are 152 million blogs
  • There were 25 billion tweets sent.
  • Facebook had 600 million members.
There are a lot more numbers in Pingdom's post.

Sunday, January 16, 2011

GOV on Facebook

"Congress was broadcast live on Facebook for the first time in history. Now you can waste time and not get work done by watching Congress waste time and not get work done." —Jimmy Fallon

Friday, January 7, 2011

Hope for Change in Microsoft

Apparently MS is getting tired of getting kicked around by IOS and Android... Can they catch up at this point? 

CES: Microsoft Hacks Up Next OS as SOC


With the Pre-CES Keynote made by [Steve Ballmer], the announcement came that the next iteration of their operating system being available in SOC specific form.  This will lead to windows being able to run a very diverse hardware set in a much more efficient manner than it does right now.  Microsoft displayed 4 different versions of what the next generation prototypes are from 4 different manufacturers but there has been no work done yet on the GUI for SOC as [Ballmer] was very clear to mention that more than a couple of times. 

The picture below is Intel's iteration of System on a Chip.

Read more at HackAday

Thursday, January 6, 2011

How you can't avoid online tracking....

Where ever, where ever you are... I will follow
Even after you set your browser to delete existing cookies and ban new ones, download super-cookies and use the tools created by pro-privacy programmers, there's one data-gathering technique that you simply cannot avoid. Your computer has hundreds of settings that control things like the main interface language (English, Korean, etc.), sound and screen resolution settings, and the color schemes people set for their Microsoft Word documents.

As you scroll the Internet, most websites automatically take snapshots of your settings. That information, combined with data on where you connect to the internet, can be used to track your movements around the web and build a profile about each visitor. To see how effective this is at tracing individual users, I ran a test designed by Eckerseley called Panopticlick on my own computer. I've only had this computer for about a month, so I haven't even taken the time to open my control panel and customize the settings for the track pad, keyboard, screen, etc. (The program doesn't search for computers or beacons on your computer.)

Nevertheless, Panopticlick found 20 bits of identifying information on my Mac. Using those bits, it could tell that I was a unique user and not one of the 1.3 million people who ran the test before me.

How to avoid online tracking. (Hint: you can't.)

Wednesday, December 22, 2010

FCC approves controversial ‘Net Neutrality’ regulations

RawStory -  Sen. Al Franken (D-MN), who has championed "Net Neutrality" in the HTML clipboardHTML clipboardhttps://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhdII1jeVkADWThMCIHaYjQncEkXp0g4SSF9XFot5z94Zuz3xnvIzwQOSjWPbpP7xDCTkIDXtMcofNxja3dEW9eshnRZHi3Zhs2fIVju6BSL51NgtqqlA-07rKh3UR_hG-fNkoj7MAdD8A/?imgmax=800past, said the FCC's proposed rules would actually "destroy" the principle of "Net Neutrality."

The rules authored by FCC Chairman Julius Genachowski would require ISPs to allow their customers to have access all legal online content, applications and services over their wired networks and prohibit unreasonable network discrimination.

But the plan would also allow for a greater fractioning of the Internet and data rationing on mobile and wired networks, according to analysis of the policies. Major network stakeholders like Verizon and AT&T would be able to sell bandwidth in capped tiers, with overage charges for users who download too much information, and certain types of data traffic like peer-to-peer file transfers could be banned altogether.

If they pass and telecoms are allowed to move forward with their plans, "the Internet as we know it would cease to exist," Sen. Franken concluded in an editorial published by Huffington Post.

"The FCC will be meeting to discuss those regulations, and we must make sure that its members understand that allowing corporations to control the Internet is simply unacceptable." Read more at RawStory

Thursday, December 16, 2010

WTF has a new meaning Zuckerberg

Society FAIL - Zuckerberg, TIME Magazine's Person of the Year

WTF!... Welcome To Facebook

demotivational posters - WTF

Tuesday, December 14, 2010

new cloud computing looks like a plan "to push people into careless computing"

http://www.masternewmedia.org/images/free_as_in_freedom_book_cover_richard_stallman.gifGuardian...making extensive use of cloud computing was "worse than stupidity" because it meant a loss of control of data, warns Richard Stallman, founder of the Free Software Foundation and creator of the operating system GNU.

HTML clipboardNow he says he is increasingly concerned about the release by Google of its ChromeOS operating system, which is based on GNU/Linux and designed to store the minimum possible data locally. Instead it relies on a data connection to link to Google's "cloud" of servers, which are at unknown locations, to store documents and other information.

The risks include loss of legal rights to data if it is stored on a company's machine's rather than your own, Stallman points out: "In the US, you even lose legal rights if you store your data in a company's machines instead of your own. The police need to present you with a search warrant to get your data from you; but if they are stored in a company's server, the police can get it without showing you anything. They may not even have to give the company a search warrant."

...He sees a creeping problem: "I suppose many people will continue moving towards careless computing, because there's a sucker born every minute. The US government may try to encourage people to place their data where the US government can seize it without showing them a search warrant, rather than in their own property. However, as long as enough of us continue keeping our data under our own control, we can still do so. And we had better do so, or the option may disappear."

"I'd say the problem is in the nature of the job ChromeOS is designed to do. Namely, encourage you to keep your data elsewhere, and do your computing elsewhere, instead of doing it in your own computer."


Please read full at Guardian

Thursday, December 9, 2010

Steve Wozniak: 'We've lost a lot of control'

CNN -  "All of a sudden, we've lost a lot of control," he said. "We can't turn off our internet; we can't turn off our smartphones; we can't turn off our computers."

"You used to ask a smart person a question. Now, who do you ask? It starts with g-o, and it's not God," he quipped.

Earlier that day, Wozniak said the biggest obstacle with the growing prevalence of technology is that our personal devices are unreliable.

"Little things that work one day; they don't work the next day," he said enthusiastically, waving his hands. "I think it's much harder today than ever before to basically know that something you have ... is going to work tomorrow."

Reciting an all-too-common living-room frustration, Wozniak told a story about the countless hours he spent trying to troubleshoot his media player, called Slingbox.

"There is no solution," Wozniak said of tech troubles. "Everything has a computer in it nowadays; everything with a computer is going to fail. The solution is: kill the people who invented these things," he said with a smile.

Saturday, November 27, 2010

NPR on the future of the Internet, 1993

VIA boing2

17 years ago, Internet radio pioneer (and future rogue archivist) Carl Malamud and search engine inventor (and future Internet Archive founder) Brewster Kahle appeared on an historic segment of NPR's Science Friday to talk with Ira Flatow about the amazing future of the Internet.
Scientists from Xerox PARC helped them put this broadcast onto the Internet, and they even received call-ins from people on powerful Unix workstations at academic institutions with blazing-fast ISDN connections (which no doubt sent their sysadmins into a panic as the traffic across the campus routers spiked). Call-in guests asked how we'd manage the glut of information, how we'd figure out what was true, what you could do with your overstuffed email inbox, and, of course, how copyright would fare. Good times!

Science Friday, 1993: The Future of the Internet


Friday, October 29, 2010

World’s Fastest Supercomputer… Is Now In China

Nvidia- Tianhe-1A, a new supercomputer designed by the National University of Defense Technology (NUDT) in China has set a new performance record of 2.507 petaflops, making it the fastest system in the world today.

Thursday, October 21, 2010

I, Product

I tweet, therefore I am...

You may think of yourself as a user of Google, Facebook or Amazon, but you are actually their product.

 Photos Uncategorized 2008 02 21 Barcode 2Forget 1984 and Brave New World. The men who wrote those books were dangerously naïve and not as prescient as we once believed. Instead of Big Brother looking after us, we're immersed in a dizzily delightful system that cares so much about us that it anticipates our every pleasure, like a giant planetary-class Vegas, an immense, inexhaustible Disney World. All we have to do is to preserve the illusion that we, "the users," have the power: in that ignorance, we can live happily ever after.

Sure, Google will provide you with search results, but they are not in the search business; they are in the advertising business. Their profits come from marketing firms that buy your behavior.

Similarly, Amazon is not in the book business, although they will send you the books you've ordered. They are in the personal information business.

The assets of modern web-based companies are the intimate profiles of those who "use" them, like you and me. Time to forget the nice pronouncements like "Do no evil" that accompany the wholesale destruction of privacy now taking place on the web, or rather within the walled gardens that companies like Facebook, Google and Apple are erecting around us on the web. Compared to them, the Chinese censors re-inventing their Great Wall are a bunch of sissies.

Well, who cares? Look at what we've gained: We now have access to unprecedented new riches. Movies and songs by the thousands; new "friends" by the hundreds; timely pieces of data by the millions. Our lives have become richer, more intelligent, more interesting.

The world moves on. You may have had privacy rights as a customer or a user but what makes you think you should retain those rights now that you're just a product?

Read More at the Boing2

Sunday, October 10, 2010

Wiretapping the Internet - To tech with IT all!

SCHNEIER On Monday, The New York Times reported that President Obama will seek sweeping laws enabling law enforcement to more easily eavesdrop on the internet. Technologies are changing, the administration argues, and modern digital systems aren't as easy to monitor as traditional telephones. http://www.synapseproductions.org/whatson/images/1984web.jpg

...Formerly reserved for totalitarian countries, this wholesale surveillance of citizens has moved into the democratic world as well. Governments like Sweden, Canada and the United Kingdom are debating or passing laws giving their police new powers of internet surveillance, in many cases requiring communications system providers to redesign products and services they sell. More are passing data retention laws, forcing companies to retain customer data in case they might need to be investigated later.

HTML clipboard

Obama isn't the first U.S. president to seek expanded digital eavesdropping. The 1994 (CLINTON) CALEA law required phone companies to build ways to better facilitate FBI eavesdropping into their digital phone switches. Since 2001, the National Security Agency has built substantial eavesdropping systems within the United States.

These laws are dangerous, both for citizens of countries like China and citizens of Western democracies. Forcing companies to redesign their communications products and services to facilitate government eavesdropping reduces privacy and liberty; that's obvious. But the laws also make us less safe. Communications systems that have no inherent eavesdropping capabilities are more secure than systems with those capabilities built in.

Any surveillance system invites both criminal appropriation and government abuse. Function creep is the most obvious abuse: New police powers, enacted to fight terrorism, are already used in situations of conventional nonterrorist crime. Internet surveillance and control will be no different.

Please read more from the SCHNEIER

Tuesday, September 14, 2010

The Day The Data Died - Long live useless social networking

Wired HTML clipboard"Two decades after its birth, the World Wide Web is in decline, as simpler, sleeker services — think apps — are less about the searching and more about the getting. Chris Anderson explains how this new paradigm reflects the inevitable course of capitalism. And Michael Wolff explains why the new breed of media titan is forsaking the Web for more promising (and profitable) pastures."
ff_webrip_chart2.jpg

Friday, August 27, 2010

Newbies attack Microsoft between 7000 and 9000 times per second.

"When hackers crash Windows in the course of developing malware, they'll often accidentally agree to send the virus code straight to Microsoft, according to senior security architect Rocky Heckman. 'It's amazing how much stuff we get.' Heckman also said Microsoft was a common target for people testing their attacks. 'The first thing [script kiddies] do is fire off all these attacks at Microsoft.com. On average we get attacked between 7000 and 9000 times per second.'" Read more at /.

Thursday, August 26, 2010

Teens addicted to texting like Heroin

cbs3.com - Teenagers are becoming addicted to texting, according to a new study. In fact experts are saying being hooked on texting can be like being addicted to drugs.

Walking, sitting, it doesn't matter where it happens, teenagers seem to need to text. Statistics show 80 percent of all 15 to 18-year-olds own a cell phone. And the rate of texting has sky rocketed 600 percent in three years. The average teen sends 3,000 texts a month

Wednesday, August 25, 2010

40 Critical Windows Bugs used to hijack & infect PC's with malware

ComputerWorld About 40 different Windows applications contain a critical flaw that can be used by attackers to hijack PCs and infect them with malware, a security researcher said Wednesday through iTunes bug...

HD Moore, chief security officer at Rapid7 and creator of the open-source Metasploit penetration-testing toolkit. Moore did not reveal the names of the vulnerable applications or their makers, however. 

"The cat is out of the bag, this issue affects about 40 different apps, including the Windows shell,"

"Solving the flaw requires every affected vendor to produce a patch," he said. "HTML clipboard

The bug in Apple in its iTunes... According to Apple, the bug does not affect Mac machines.

Moore confirmed that the flaw "applies to a wide range of Windows applications," and added that he stumbled across it while researching the Windows shortcut vulnerability, a critical bug that Microsoft acknowledged in July and patched on Aug. 2 using one of its rare "out of band" emergency updates.

Moore declined to name the applications that contain the bug or to go into great detail about the vulnerability. But he was willing to share some observations.

"The vector is slightly different between applications, but the end result is an attacker-supplied .dll being loaded after the user opens a 'safe' file type from a network share [either on the local network or the Internet]," Moore said in an e-mail reply to questions. "It is possible to force a user to open a file from the share, either through their Web browser or by abusing other applications, for example, Office documents with embedded content."

Some of what Moore described was reminiscent of the attacks using the Windows shortcut vulnerability. For instance, hackers were able to launch drive-by attacks exploiting the shortcut bug from malicious sites via WebDAV, and could embed their exploits into Office documents, which would presumably be delivered to victims as seemingly innocuous e-mail attachments.

His advice until the vulnerable applications are patched was also taken from Microsoft's shortcut bug playbook.

"Users can block outbound SMB [by blocking TCP ports] 139 and 445, and disable the WebDAV client [in Windows] to prevent these flaws from being exploited from outside of their local network," Moore recommended.

Both work-arounds were among those Microsoft told users they could apply if they were unable to apply the emergency update.

But although Microsoft was able to plug the shortcut hole with a patch for Windows, Moore was pessimistic that the company would be able to do the same with this vulnerability.

Please read full at ComputerWorld



Tuesday, August 24, 2010

National Park Service Says Tech Is Enabling Stupidity

SlashDot:
"The National Park Service... Last fall, a group of hikers in the Grand Canyon called in rescue helicopters three times by pressing the emergency button on their satellite location device. When rangers arrived the second time, the hikers complained that their water supply tasted salty. 'Because of having that electronic device, people have an expectation that they can do something stupid and be rescued,' said a spokeswoman for Grand Teton National Park. 'Every once in a while we get a call from someone who has gone to the top of a peak, the weather has turned and they are confused about how to get down and they want someone to personally escort them. The answer is that you are up there for the night.'"

Tuesday, August 3, 2010

Console owners are “most depressed and socially awkward”

HTML clipboardHTML clipboard

The Harm Of Gaming: We Present The Facts
The perennial questions of the harm that games may be causing us and our children are extremely troubling. Every week seems to bring a new survey or study that demonstrates links between gaming and problematic behavior, with renowned psychologists, sociologists and publicists explaining to us what it is we need to be scared of. Over the last fifteen years I have been studying this data and reading these papers, and I am now ready to publish my findings. Below is the result of a decade-and-a-half's research, and I think will once and for all answer the questions every parent, teacher, child and teenager should be asking.

 

Grand Theft Auto Causes Marriages To Break DownChinatown wars actually caused more marriages, strangely.

While no one is left in any doubt that playing Grand Theft Auto causes anyone under the age of 17 to become dangerously exposed to murder, the longer-term effects on adults have been less examined. As part of my research I thought to compare the sales of each GTA game with what the orce rate must have been when each came out. As you can see each new GTA game has been directly correlated with an increase in orces. While the graph may give the impression that GTA IV has caused fewer orces than Vice City or San Andreas, this game only came out in 2008, so most of the orces it has induced will still be going through the courts and awaiting completion. Expect to see this number soar in the next twelve months.


 

Owning Consoles More Serious Than Gun Crime

A lot of videogames include the use of guns. While these may not be real guns, but rather recreations made of pixels and polygons, it is obvious to anyone playing one of these "simulations" that it is in no meaningful way different from firing a real gun in a school. But it's far scarier than you might have first thought. Nearly twice as many Americans own gun-displaying consoles than those who own the types of guns that require a license and paperwork to purchase. No such paperwork is necessary when buying an Xbox, and yet still teenagers will kill each other in the streets.

Not including guns that are thrown at people.


Please read full from RockPaperShootGun
 

Saturday, July 31, 2010

temporal analytics engine

"goes beyond search" by "looking at the 'invisible links' between documents that talk about the same, or related, entities and events."

The idea is to figure out for each incident who was involved, where it happened and when it might go down. Recorded Future then plots that chatter, showing online "momentum" for any given event.

The "How People Use It" page on Recorded Future's website makes absolutely no attempt to hide The Creepy:
Research a person
Monitor news on public figures to...
Identify future travel plans; spot past travel trends and patterns
Search for communication with other individuals; graph their network
Monitor career history and announced job changes
Find quotations and sound bites in the news and blogs
Discover future and past strategic positioning
Uncover public political ties and family relationships
Exclusive: Google, CIA Invest in 'Future' of Web Monitoring (Wired Danger Room blog)

Wednesday, July 28, 2010

Google Alarm Firefox add-on

Get notified when Google is monitoring your web browsing

animated-siren.gif

Google Alarm shows notifications, plays sound effects and keeps running stats about the % of websites you've visit with Google bugs present. Stay alert – install Google Alarm today.

Sunday, July 25, 2010

Google Bends Over for China

Washington Post-Google promised to "obey Chinese law" and avoid linking to material deemed a threat to national security or social stability, said Zhang Feng, director of the Ministry of Industry and Information Technology's Telecoms Development Department, at a news conference.

China renewed Google's Internet license after it pledged to obey censorship laws and stop automatically switching mainland users to its unfiltered Hong Kong site, an official said Tuesday.

It was Beijing's first public comment on its decision to allow Google to continue operating a China website following a public clash over censorship. The company closed its China search engine in March but still offers music and other services in China.


Thursday, July 22, 2010

Looking for a few good IT

"US security officials say the country's cyberdefenses are not up to the challenge. In part, it's due to a severe shortage of computer security specialists and engineers with the skills and knowledge necessary to do battle against would-be adversaries. The protection of US computer systems essentially requires an army of cyberwarriors, but the recruitment of that force is suffering. 'We don't have sufficiently bright people moving into this field to support those national security objectives as we move forward in time,' says James Gosler

Read more of this story at Slashdot.

Thursday, July 8, 2010

Germans taking on Facebook and google privacy

SlashDot "Not only are Germany and Facebook not friends, they might end up opponents in a courtroom. Germany has begun legal action over privacy. A German data protection official accuses Facebook of illegally saving personal data of people who don't use the site and haven't given permission to access their private information. Germany, which has also launched an investigation into Google over its Street View mapping program, has some of the strictest privacy laws in the world."

Things 2dolist - Crack the "Cyber Command" logo

From da Boing2

The U.S. Military's new "Cyber Command" logo contains a hidden code. Noah Shachtman at Wired News says, "Help us crack it!"

Related reading today: Bruce Schneier says "The Threat of Cyberwar Has Been Grossly Exaggerated."

As usual I have to agree with Bruce...

Wednesday, July 7, 2010

AI - paradoxical mix of intelligence and stupidity

Boing2: While strong AI still lies safely beyond the Maes-Garreau horizon (a vanishing point, perpetually fifty years ahead) a host of important new developments in weak AI are poised to be commercialized in the next few years. But because these developments are a paradoxical mix of intelligence and stupidity, they defy simple forecasts, they resist hype.  Siteimages Hal2 13550They are not unambiguously better, cheaper, or faster. They are something new. What are the implications of a car that adjusts its speed to avoid collisions … but occasionally mistakes the guardrail along a sharp curve as an oncoming obstacle and slams on the brakes? What will it mean when our computers know everything — every single fact, the entirety of human knowledge — but can only reason at the level of a cockroach?

I mention these specific examples — smart cars and massive knowledge-bases — because they came up repeatedly in my recent conversations with AI researchers. These experts expressed little doubt that both technologies will reach the market far sooner, and penetrate it more pervasively, than most people realize.

But confidence to the point of arrogance is practically a degree requirement for computer scientists. Which, actually, is another reason why these particular developments caught my interest: for all their confidence about the technologies per se, every researcher I spoke to admitted they had no clue - but were intensely curious - how these developments will affect society. - "new developments in AI"