Create an Account
username: password:
 
  MemeStreams Logo

Fickt nicht mit dem Raketemensch!

search

bucy
My Blog
My Profile
My Audience
My Sources
Send Me a Message

sponsored links

bucy's topics
Arts
  Literature
  Movies
  Music
  TV
   Cartoons
Business
Games
  Video Games
   Console Video Games
Health and Wellness
Home and Garden
Miscellaneous
Current Events
Recreation
Local Information
Science
  Environment
  Space
Society
  Politics and Law
Sports
Technology
  Computers
   Computer Security
    Cryptography
   Computer Networking
   Computing Platforms

support us

Get MemeStreams Stuff!


 
New Tech Prevents DVD Copying, Kills 'Rippers'
Topic: Technology 4:51 pm EST, Feb 15, 2005

] Content protection company Macrovision Corp. plans to
] announce on Tuesday that it has developed a way to
] eliminate the vast majority of DVD copying.

I don't see how this can possibly work. Macrovision is dumb.

New Tech Prevents DVD Copying, Kills 'Rippers'


Liberty Alliance Project
Topic: Technology 2:32 pm EST, Feb 11, 2005

] Liberty Alliance Project, February 10, 2005 --Liberty
] Alliance, the global consortium for open federated
] identity standards and identity-based Web services, today
] announced the public draft release of ID-WSF 2.0, a
] second-generation framework for identity-based Web
] services.

I think Liberty Alliance's #1 problem is: too much weird jargon!

Liberty Alliance Project


North Korea Says It Has Nuclear Weapons and Rejects Talks
Topic: Society 3:49 pm EST, Feb 10, 2005

] TOKYO, Feb. 10 - In a surprising admission, North Korea's
] hard-line Communist government declared publicly today
] for the first time that it has nuclear weapons.

North Korea Says It Has Nuclear Weapons and Rejects Talks


GCC: SSA for Trees
Topic: Computers 2:31 pm EST, Feb 10, 2005

] The goal of this project is to build an optimization
] framework for trees based on the Static Single Assignment
] (SSA) form [1]. The implementation currently lives in the
] tree-ssa-20020619-branch branch.

Some folks have implemented a new intermediate representation to
enable a bunch of optimizations; its now been merged in GCC 4.

GCC: SSA for Trees


Sony/Toshiba/IBM Launch Cell
Topic: Business 2:28 pm EST, Feb 10, 2005

] ANALOGIES are often drawn between the fields of computer
] science and biology. The information-processing abilities
] of DNA are a form of natural molecular computing, and
] computer viruses leap from machine to machine in ways
] reminiscent of their disease-causing namesakes. At the
] International Solid-State Circuits Conference in San
] Francisco this week, a trio of mighty
] information-technology firms%u2014Sony, Toshiba and
] IBM%u2014pushed the analogy a little further. They
] unveiled a much anticipated new computer chip, four years
] in the making, the very name of which is a biological
] metaphor: the Cell.

It sounds like Cell is basically a Power core with a bunch of IO and some special units to do PS3 things, etc.

Sony/Toshiba/IBM Launch Cell


EarthLink Sues Alleged Spammers
Topic: Politics and Law 2:25 pm EST, Feb 10, 2005

]
] Earthlink Inc. on Wednesday said is has filed four
] lawsuits that accuse alleged spammers in four states of
] violating the federal CAN-SPAM act.

EarthLink Sues Alleged Spammers


Authentication in Distributed Systems: Theory and Practice
Topic: Miscellaneous 1:11 pm EST, Feb 10, 2005

] We describe a theory of authentication and a system that
] implements it. Our theory is based on the notion of
] principal and a %u2018speaks for%u2019 relation between
] principals. A simple principal either has a name or is a
] communication channel; a compound principal can express
] an adopted role or delegated authority. The theory shows
] how to reason about a principal%u2019s authority by
] deducing the other principals that it can speak for;
] authenticating a channel is one important application. We
] use the theory to explain many existing and proposed
] security mechanisms. In particular, we describe the
] system we have built. It passes principals efficiently as
] arguments or results of remote procedure calls, and it
] handles public and shared key encryption, name lookup in
] a large name space, groups of principals, program
] loading, delegation, access control, and revocation.

I may have memed this before. It is an outstanding paper.

Authentication in Distributed Systems: Theory and Practice


More SCO
Topic: Politics and Law 12:31 pm EST, Feb 10, 2005

] U.S. lawyers know that what judges do is to pick winners
] and losers, then help the winners win and help the losers
] lose. The goal is finality in a dispute. That means
] helping the winner create a record that has the best
] chance of being sustained on appeal. Even more
] importantly, however, Judge Kimball has decided that this
] case is going to get what judges call "active case
] management." That means that the judge is dropping the
] default mode of just letting the lawyers develop the
] record while the judge plays referee. The judge is going
] to actively manage development of the record.

Remember SCO? It sounds like the judge is finally pissed off
now...

More SCO


Keep Voice Off the Internet
Topic: Computer Networking 2:40 pm EST, Feb  9, 2005

]
] Opinion: The new VOIP Security Alliance worries about
] threats from the Internet, but should you even be there?

This is idiotic.

Keep Voice Off the Internet


SpamHaus: Spam Approaches 95 Percent of All E-mail
Topic: Technology 2:46 pm EST, Feb  7, 2005

] AOL now reports that over 90 percent of its incoming spam
] comes directly from other ISPs' mail relays. "Spamhaus
] sees this change and the increase in spam it is producing
] as a threat to be taken seriously," the company stated.

SpamHaus: Spam Approaches 95 Percent of All E-mail


(Last) Newer << 103 ++ 113 - 114 - 115 - 116 - 117 - 118 - 119 - 120 - 121 ++ 131 >> Older (First)
 
 
Powered By Industrial Memetics
RSS2.0