Create an Account
username: password:
 
  MemeStreams Logo

It's always easy to manipulate people's feelings. - Laura Bush

search

Decius
Picture of Decius
Decius's Pics
My Blog
My Profile
My Audience
My Sources
Send Me a Message

sponsored links

Decius's topics
Arts
  Literature
   Sci-Fi/Fantasy Literature
  Movies
   Sci-Fi/Fantasy Films
  Music
   Electronic Music
Business
  Finance & Accounting
  Tech Industry
  Telecom Industry
  Management
  Markets & Investing
Games
Health and Wellness
Home and Garden
  Parenting
Miscellaneous
  Humor
  MemeStreams
Current Events
  War on Terrorism
Recreation
  Cars and Trucks
  Travel
Local Information
  United States
   SF Bay Area
    SF Bay Area News
Science
  Biology
  History
  Math
  Nano Tech
  Physics
Society
  Economics
  Politics and Law
   Civil Liberties
    Internet Civil Liberties
    Surveillance
   Intellectual Property
  Media
   Blogging
Sports
(Technology)
  Computer Security
  Macintosh
  Spam
  High Tech Developments

support us

Get MemeStreams Stuff!


 
Current Topic: Technology

Experiments - Pixelfest collaborative artwork
Topic: Technology 12:23 pm EST, Jan 17, 2005

Feel free to add your own pixel!

Experiments - Pixelfest collaborative artwork


Mu-Card Alliance’s new 2-terabyte flash memory ready to go!
Topic: Technology 1:24 pm EST, Jan 14, 2005

The latest information confirms the ucard specifications quoted in the August 6 DigiTimes article and adds the number of connection pads (20), the operating voltage (legacy 5V, 3.3V, 1.8V), the frequency (60MHz) and the interface (MMC SPI USB, x1, x4, x8, x16). There is also a micro-size card added at 24×18×1.4mm (14mm shorter than the full size 24×32×1.4mm)

Mu-Card Alliance’s new 2-terabyte flash memory ready to go!


RE: Scraping and ad-stripping Google's results
Topic: Technology 11:32 pm EST, Jan 11, 2005

noteworthy wrote:
] Of course, a SHA1 hash of two octets is completely reversible
] by brute force, so this doesn't really offer any strong form
] of protection, does it? It seems to be little more than
] obfuscation.

Well, I suppose so. How do they tabulate unique visitors without saving full IP information?

RE: Scraping and ad-stripping Google's results


Scraping and ad-stripping Google's results
Topic: Technology 1:14 pm EST, Jan 11, 2005

] This step that we have taken has implications for all
] search engines. These engines crawl the public web
] without asking permission, and cache and reproduce the
] content without asking permission, and then use this
] information as a carrier for ads that generate private
] profit. We are convinced that if citizens scrape Google
] and strip the ads, and make the scraped results available
] as a nonprofit public service, that this is legal. This
] is especially the case if there are public policy
] concerns behind the scraping.
]
] Google Watch has been the most prominent critic of
] Google's outrageous privacy policies for more than two
] years. This is why we started the proxy, and it's why we
] continue the proxy. We invite Google to serve us with a
] cease and desist letter as a first step toward resolving
] this issue. So far, we have yet to hear from Google's
] lawyers. By releasing the source code for our proxy,
] we're trying to escalate the issue.

Google should not save all 4 octets of your IP address. There is no "good" use of that data. Of course, MemeStreams does this too, so yes I'm being hyprocritical, but I didn't just make a fortune in a public offering either. They should store a SHA1 hash of the last 2 octets so they can identify unique visitors without storing identifying data. And the cookie could use some end user control.

Scraping and ad-stripping Google's results


Sxip Networks - personal digital identity
Topic: Technology 1:57 pm EST, Jan  9, 2005

] Login to a website in seconds versus minutes
]
] Create multiple identities ("personas")
]
] Control both the security and type of personal data (your
] "attributes") when logging into a website
]
] You decide a safe location ("Homesite") to store your
] personal data

When I have sat down and thought about how online identity should work I've imagined solutions that sound a lot like this. It will be interesting to see how this develops.

Sxip Networks - personal digital identity


Futurismic: Fiction
Topic: Technology 10:02 pm EST, Jan  4, 2005

] Reenie's head chip woke her by steadily increasing
] the perceived volume of a song by a British comedy
] troupe. Lots of trippy dreams last night. She
] couldn't remember them all this morning, but she was
] sure they were cool. She rolled out of bed and prepared
] for her "Commute" to the adjoining room. Reenie
] loved her job, well, as much as she could love any job.
] She got to work from home as much as she liked.

If you liked "Ownz0red" by Cory Doctorow, which many of you did, you will definitely like this quick little 10 minute read.

Futurismic: Fiction


Slashdot | Wikipedia Criticised by Its Co-founder
Topic: Technology 11:11 am EST, Jan  3, 2005

] Wikipedia is under criticism by its co-founder Larry
] Sanger who has left the project. He warns of a possible
] future fork due to Wikipedia's Anti-Elitism and he
] presents his view on Wikipedia's (lack of) reliability.

I've been wondering when this was going to start. The "anyone can edit this" mantra has finally found some respected detractors. The question is, how do you decide who is an expert?

Slashdot | Wikipedia Criticised by Its Co-founder


Shovelware: Mark Dery's Blog
Topic: Technology 1:25 pm EST, Dec 23, 2004

Mark Dery, author of "Escape Velocity," has a blog...

Shovelware: Mark Dery's Blog


Skunkworks At Apple -- The Graphing Calculator Story
Topic: Technology 12:28 am EST, Dec 23, 2004

] The secret to programming is not intelligence, though of
] course that helps. It is not hard work or experience,
] though they help, too. The secret to programming is
] having smart friends.
]
] Once we had a plausible way to ship, Apple became the
] ideal work environment. Every engineer we knew was
] willing to help us. We got resources that would never
] have been available to us had we been on the payroll.

Totally Amazing. Gold Star!

Skunkworks At Apple -- The Graphing Calculator Story


The New York Times - A Toy With a Story
Topic: Technology 1:26 pm EST, Dec 20, 2004

] There is a story behind every electronic gadget sold on
] the QVC shopping channel. This one leads to a ramshackle
] farmhouse in rural Oregon, which is the home and circuit
] design lab of Jeri Ellsworth, a 30-year-old high school
] dropout and self-taught computer chip designer.

This is kind of a cool story, although I continue to be frustrated by the propagation of Richard Stallman's lie about the definition of the word hacker.

The work hacker, in computerdom, orginally (ie in the 60's) meant a poor programmer, or someone who broke into a computer. It was in the 70's that the word was applied with respect. In the 80's Stallman attempted to separate the word as it is applied with respect from the word as it is applied to people who break into computers. Its hard to apply this split consistently, (for example, which one is Woz?) because what Stallman meant to do was separate boomers and Xers. This has resulted in endless fallacies, such as people who parrot the phrase "hacker in the original meaning," the concept of "white hat and black hat hackers," etc... More infuriating to me is "The Hackers Conference," at which self proclaimed "good hackers" have created a closed and reculsive culture that serves no one but themselves, while so called "bad hackers" have create a wide open culture that is vibrant and reaches out to anyone who has an interest in the subject matter...

Stallman's damage to the word must be repaired.

The New York Times - A Toy With a Story


(Last) Newer << 17 ++ 27 - 28 - 29 - 30 - 31 - 32 - 33 - 34 - 35 ++ 45 >> Older (First)
 
 
Powered By Industrial Memetics
RSS2.0