| |
Current Topic: Technology |
|
Protecting privacy by randomizing input in a controlled manner |
|
|
Topic: Technology |
10:19 am EDT, Jun 4, 2002 |
"In an example, a consumer registering for a web site truthfully enters their age as 30. Software in the page, perhaps a Java applet, is set to randomly add or subject years in a range of, say, five years, before submitting the data to the site, so submits the user's age as 26. Before allowing the data to be input to a data mining application, IBM's software "corrects" the randomized data to provide a "close approximation of the true distribution"." This is a neat idea... Protecting privacy by randomizing input in a controlled manner |
|
Linux Vendors Gang Up On Red Hat |
|
|
Topic: Technology |
12:16 pm EDT, May 29, 2002 |
"A number of Linux vendors will announce on Thursday that they have agreed to standardize on a single Linux distribution to try to take on Red Hat Inc.'s dominance in the industry. A media advisory issued on Tuesday said executives from Caldera, Conectiva, SuSE and Turbolinux on Thursday will make "a major announcement that will change the shape of Linux worldwide." Linux Vendors Gang Up On Red Hat |
|
Topic: Technology |
10:54 am EDT, May 28, 2002 |
This search engine draws a map showing the relationships between documents returned from a web search. It can shorten the time spent finding the page that you want out of the list returned by the search, but its more interesting then practical... Kartoo metasearch engine |
|
Welcome to Cyber-Geography Research |
|
|
Topic: Technology |
10:49 am EDT, May 28, 2002 |
"Exploring the geographies of the Internet, the Web and other emerging Cyberspaces." There are some good links on this site to interesting data visualization projects. Welcome to Cyber-Geography Research |
|
Read Darwin -What Are the Dangerous Technologies? - Technology Fear Factor: Part 1 |
|
|
Topic: Technology |
3:22 pm EDT, May 24, 2002 |
"These biotech terrors are far more likely to be unleashed in a world where the positive powers have relinquished biotech research and development. A society that's full of vibrant, productive and creative biotech companies is going to be far more alert to potential threats. " An intelligent discussion on the threats and risks posed by new technologies. Its one sided discussion, and there are points I agree with and points I disagree with. Whats most interesting about this discussion is the perspective it offers on the effect of corporate globalization. Read Darwin -What Are the Dangerous Technologies? - Technology Fear Factor: Part 1 |
|
Wearable Computer Laboratory |
|
|
Topic: Technology |
11:42 pm EDT, May 22, 2002 |
Using the Tinmith system described earlier, the students at UNISA (in Australia) have been able to get Quake working as an Augmented Reality system on campus. Movement is controled by GPS positioning and firing is controled by a toy gun. Wearable Computer Laboratory |
|
HTTP Extensions for a Content-Addressable Web |
|
|
Topic: Technology |
9:46 am EDT, May 21, 2002 |
"A particularly useful class of URI schemes are "Self-Verifiable URIs". These are URIs with which the URI itself can be used to verify that the content has been received intact. We also want URIs that are content-specific and can be independently generated by any host with the content. Finally, to show the intent that these addresses are location-independent, a URN scheme will be used. Cryptographic hashes of the content provide the capabilities that we are looking for. For example we can take the SHA-1 hash of a piece of content and then encode it using Base32 to provide the following URN. urn:sha1:RMUVHIRSGUU3VU7FJWRAKW3YWG2S2RFB" This is awesome. I explained this concept to Jeremy about 6 months ago. Its whats needed to allow MemeStreams to be used to access and recommend p2p content. Glad I don't have to do it myself. :) Only issue is that they are looking for browser implementation. They can't rely on browsers. They need to build a driver that sits on top of your ethernet driver, looks for these urns, and modifies the access method appropriately... HTTP Extensions for a Content-Addressable Web |
|
Copy-proof CDs foiled by a marker |
|
|
Topic: Technology |
9:13 pm EDT, May 20, 2002 |
LONDON, May 20 Technology buffs have cracked music publishing giant Sony Musics elaborate disc copy-protection technology with a decidedly low-tech method: scribbling around the rim of a disk with a felt-tip marker. Copy-proof CDs foiled by a marker |
|