| |
Current Topic: Technology |
|
Stick a fork in it; 10 GigE is done -- but still too hot to eat |
|
|
Topic: Technology |
11:27 am EDT, Jun 14, 2002 |
The first fiber-only Ethernet standard was approved Wednesday, opening the door for a new generation of Ethernet products. The IEEE 802.3 standards group gave the go-ahead to 802.3ae, a version of Ethernet that runs at 10 gigabits per second. Extreme Networks: "We will have a 10gbps module within the next few months." It will cost around $60,000. Stick a fork in it; 10 GigE is done -- but still too hot to eat |
|
Robotic fly gets its buzz |
|
|
Topic: Technology |
7:36 pm EDT, Jun 7, 2002 |
Summary from ICT Today: The University of California in Berkeley has made a breakthrough in its programme to develop a robot fly weighing less than a paper clip which can leave the ground and hover in mid-air. Scientists have constructed a wing mechanism that can flap and rotate at 150 times a second. Recent discoveries about the way flies use their wings have helped the project considerably. A real fly has a 'delayed stall' which enables the beating wings to have a high angle of attack and high lift at the same time. 'Wing rotation' at the bottom and top of the stroke gives the insect more lift, and 'wake capture' provides even more lift by swishing back through air it set in motion on the previous stroke. The scientists' version of the wing is made from polyester and a stainless steel strut that flaps and rotates. Still to come is a lightweight power source, a gyroscope to tell up from down, and a light sensor. A microprocessor with a small operating system has already been developed. Eventually it would carry sensors chosen for a specific use. Big brother will be watching you... Robotic fly gets its buzz |
|
Read Darwin -What Are the Dangerous Technologies? - Technology Fear Factor: Part 1 |
|
|
Topic: Technology |
3:22 pm EDT, May 24, 2002 |
"These biotech terrors are far more likely to be unleashed in a world where the positive powers have relinquished biotech research and development. A society that's full of vibrant, productive and creative biotech companies is going to be far more alert to potential threats. " An intelligent discussion on the threats and risks posed by new technologies. Its one sided discussion, and there are points I agree with and points I disagree with. Whats most interesting about this discussion is the perspective it offers on the effect of corporate globalization. Read Darwin -What Are the Dangerous Technologies? - Technology Fear Factor: Part 1 |
|
O'Reilly Emerging Technologies 2002 [Audio] |
|
|
Topic: Technology |
2:31 pm EDT, May 19, 2002 |
TechNetCast is making available the audio tracks for the keynote speeches given at the recent O'Reilly Emerging Technology Conference. As I log this URL, only four are available, but the rest of them are promised within days. (Hopefully that will include Steven Johnson ...) The keynotes include: Rethinking The Modern Operating System, by Richard Rashid, Microsoft. Fixing Network Security by Hacking the Business Climate, by Bruce Schneier. Autonomic Computing, by Robert Morris, IBM. The Shape of Things to Come, by Tim O'Reilly. O'Reilly Emerging Technologies 2002 [Audio] |
|
PingID.org - Open Digital Identity Project - Home |
|
|
Topic: Technology |
2:29 pm EDT, May 3, 2002 |
Ping Identity is an open, principles based project focused on building digital identity infrastructure capable of ensuring that the rights and privileges we enjoy with our real world identities are not lost, changed or abused with respect to our digital ones. PingID stands for personal choice, privacy, security and control while ensuring maximum interoperability, openness, accessibility and an adherence to open standards. The Ping Digital Identity Infrastructure project provides a complete open framework for developers, enterprises and service providers to deploy and embed digital identity services and functionality within their applications, devices or services. PingID provides everything required for end-users to establish, grow and exchange Digital Identity information in a secure environment, and for enterprises and service providers to provide trusted services to employees and end-users. PingID.org - Open Digital Identity Project - Home |
|
ACM: Ubiquity - Where the Algorithm Meets the Electronics |
|
|
Topic: Technology |
10:08 pm EDT, Apr 30, 2002 |
Prabhakar Raghavan, CTO at Verity, Inc., on building a secure foundation for information retrieval. On the Web: a few tens of TBytes. In enterprises: many orders of magnitude more than that. The technical challenges inside companies are very different from those for the Web. The primary factor is what we call "fine-grained security." In summary, fine-grained security is the ability to interlace search with security at the document and individual levels. A huge technical challenge! Another challenge is the diverse types of documents. I'll describe some of the framework for the solution ... Security is every bit as important as searching. This aspect of secure search is the foundation from which we build up deeper functionality ... [What] I think really is the harbinger of the future, is to invoke ideas from social network theory. Prabhakar Raghavan gave the most recent talk in the Dertouzos Lecturer Series, which I attended. In this interview, he's talking about some of the same topics. Worth reading (and thinking about). At the interface between academia and industry, the first few bits and pieces of a solution are starting to come together. At least people are now thinking about the right problems ... Additionally, Raghavan discusses his experiences working at IBM's Almaden laboratory. As I read this section, I was thinking about the future impact of IBM's recent sale of part (most?) of this lab to Hitachi. (See my recent log entry for more details.) ACM: Ubiquity - Where the Algorithm Meets the Electronics |
|