Create an Account
username: password:
 
  MemeStreams Logo

What questions are you asking yourself?

search

Jeremy
My Blog
My Profile
My Audience
My Sources
Send Me a Message

sponsored links

Jeremy's topics
Arts
  Literature
   Classical
   Fiction
   Horror
   Non-Fiction
   Sci-Fi/Fantasy Literature
  Movies
   Movie Genres
    Action/Adventure
    Cult Films
    Documentary
    Drama
    Horror
    Independent Films
    Film Noir
    Sci-Fi/Fantasy Films
    War
  Music
   Music Styles
    Classical
    Electronic Music
    Rap & Hip Hop
    IDM
    Jazz
    World Music
  TV
   TV Documentary
   TV Drama
   SciFi TV
Business
  Finance & Accounting
  Industries
   Tech Industry
   Telecom Industry
  Management
  Markets & Investing
Games
  Video Games
   PC Video Games
   Console Video Games
Health and Wellness
  Medicine
Home and Garden
  Cooking
  Entertaining
Miscellaneous
  Humor
  MemeStreams
   Using MemeStreams
Current Events
  War on Terrorism
  Elections
  Israeli/Palestinian
Recreation
  Cars and Trucks
  Travel
Local Information
  United States
   California
    SF Bay Area
   Events in Washington D.C.
   News for Washington D.C.
   Georgia
    Atlanta
     Atlanta Events
Science
  Biology
  History
  Math
  Medicine
  Nano Tech
  Physics
Society
  Economics
  Education
  Futurism
  International Relations
  History
  Politics and Law
   Civil Liberties
    Internet Civil Liberties
    Surveillance
   Intellectual Property
  Media
   Blogging
  Military
  Philosophy
Technology
  Biotechnology
  Computers
   Computer Security
    Cryptography
   PC Hardware
   Human Computer Interaction
   Computer Networking
   Macintosh
   Software Development
    Open Source Development
  Military Technology
  High Tech Developments

support us

Get MemeStreams Stuff!


 
compos mentis. Concision. Media. Clarity. Memes. Context. Melange. Confluence. Mishmash. Conflation. Mellifluous. Conviviality. Miscellany. Confelicity. Milieu. Cogent. Minty. Concoction.

The Darknet and the Future of Content Distribution [DOC]
Topic: Intellectual Property 9:53 pm EDT, Sep  8, 2003

We investigate the darknet – a collection of networks and technologies used to share digital content. The darknet is not a separate physical network but an application and protocol layer riding on existing networks. Examples of darknets are peer-to-peer file sharing, CD and DVD copying, and key or password sharing on email and newsgroups. The last few years have seen vast increases in the darknet’s aggregate bandwidth, reliability, usability, size of shared library, and availability of search engines. In this paper we categorize and analyze existing and future darknets, from both the technical and legal perspectives. We speculate that there will be short-term impediments to the effectiveness of the darknet as a distribution mechanism, but ultimately the darknet-genie will not be put back into the bottle. In view of this hypothesis, we examine the relevance of content protection and content distribution architectures.

This paper, co-authored by Peter Biddle, Paul England, Marcus Peinado, and Bryan Willman (all Microsoft employees), was presented at the DRM 2002 conference hosted by Stanford.

The Darknet and the Future of Content Distribution [DOC]


Keepers of the Magic Kingdom
Topic: Society 3:16 pm EDT, Sep  7, 2003

Watch closely among Disneyland’s tourists and you might spot the Disneyana people, protecting Walt’s vision and living most of their waking lives in the happiest place on Earth.

If you thought that Down and Out in the Magic Kingdom was a work of science fiction ... well, you were half right.

Keepers of the Magic Kingdom


The Many Paradoxes of Broadband | Andrew Odlyzko [PDF]
Topic: Telecom Industry 11:19 pm EDT, Sep  2, 2003

There is much dismay and even despair over the slow pace at which broadband is advancing in the United States. This slow pace is often claimed to be fatally retarding the recovery of the entire IT industry. As a result there are increasing calls for government action, through regulation or even through outright subsidies.

A careful examination shows that broadband is full of puzzles and paradoxes, which suggests caution before taking any drastic action. As one simple example, the basic meaning of broadband is almost universally misunderstood, since by the official definition, we all have broadband courtesy of the postal system. Also, broadband penetration, while generally regarded as disappointingly slow, is actually extremely fast by most standards, faster than cell phone diffusion at a comparable stage. Furthermore, many of the policies proposed for advancing broadband are likely to have perverse effects. There are many opportunities for narrowband services that are not being exploited, some of which might speed up broadband adoption.

There are interesting dynamics to the financial and technological scenes that suggest broadband access may arrive sooner than generally expected. It may also arrive through unexpected channels. On the other hand, fiber-to-the-home, widely regarded as the Holy Grail of residential broadband, might never become widespread. In any case, there is likely to be considerable turmoil in the telecom industry over the next few years. Robust growth in demand is likely to be combined with a restructuring of the industry.

This paper also appears in the September 2003 issue of First Monday. You'll want to print it to read it, so I've linked directly to the PDF version.

The Many Paradoxes of Broadband | Andrew Odlyzko [PDF]


Digital Vandalism Spurs a Call for Oversight
Topic: Computer Security 12:14 pm EDT, Sep  1, 2003

As Internet users brace for the next round of digital vandalism, some experts say that it is time ...

"What we're seeing is that voluntary efforts are insufficient, and the repercussions are vast," says Michael A. Vatis, former director of the National Infrastructure Protection Center at the Federal Bureau of Investigation.

... One proposal would require public companies to disclose potential computer security risks in SEC filings. [ Ha! ]

"There's a reason this kind of thing doesn't happen with automobiles," says Bruce Schneier.

A new California law requires disclosure of computer security breaches if they result in unauthorized access to residents' personal information; customers can sue businesses in violation for civil damages. A new Pew survey said 60 percent favor requiring corporations to disclose vulnerability information.

"I kind of despair of the government doing anything," said Richard A. Clarke.

I can see it now: "This software may contain certain forward-looking statements ... [which] are necessary estimates reflecting the best judgment of jun^h^h^hsenior programmers that rely on a number of assumptions ..."

If you are unable to actually solve your problems, you can at least generate a lot of paperwork to document those failures for posterity.

From the new employee manual: "All source code must be reviewed by legal ... A financial impact statement must be provided for each entry in the programmer-provided risk assessment ..."

Digital Vandalism Spurs a Call for Oversight


Blackboard to Set Up Chinese Colleges With Its Software
Topic: Tech Industry 11:58 am EDT, Sep  1, 2003

Just six years after it was founded by two new graduates of American University, Blackboard Inc. has entered a partnership with Cernet, which provides Internet services to more than 1,000 universities in China, to create a software platform that will allow professors to post course materials, conduct discussions and administer tests online.

Cernet CIO Walter Hu predicted the number of Chinese Blackboard users could possibly reach 20 million within 10 years.

Blackboard is succeeding because ...

"Easy", 2. "Security", 0.

Blackboard to Set Up Chinese Colleges With Its Software


Salon.com | Truncat by Cory Doctorow
Topic: Sci-Fi/Fantasy Literature 1:58 am EDT, Sep  1, 2003

What if you could file-share someone's consciousness? Would it be a violation, or the ultimate communication therapy?

A new short story by Cory Doctorow.

Salon.com | Truncat by Cory Doctorow


Technologies of Power | MIT Press
Topic: Technology 12:34 am EDT, Aug 29, 2003

This collection explores how technologies become forms of power, how people embed their authority in technological systems, and how the machines and the knowledge that make up technical systems strengthen or reshape social, political, and cultural power.

The authors suggest ways in which a more nuanced investigation of technology's complex history can enrich our understanding of the changing meanings of modernity.

They consider the relationship among the state, expertise, and authority; the construction of national identity; changes in the structure and distribution of labor; political ideology and industrial development; and political practices during the Cold War.

The essays show how insight into the technological aspects of such broad processes can help synthesize material and cultural methods of inquiry and how reframing technology's past in broader historical terms can suggest new directions for science and technology studies.

Technologies of Power | MIT Press


IBM | History Flow
Topic: Technology 12:04 am EDT, Aug 29, 2003

Most documents are the product of continual evolution. An essay may undergo dozens of revisions; source code for a computer program may undergo thousands. And as online collaboration becomes increasingly common, we see more and more ever-evolving group-authored texts.

This site is a preliminary report on a simple visual technique, history flow, that provides a clear view of complex records of contributions and collaboration.

IBM | History Flow


DARPA Grand Challenge
Topic: Military Technology 12:01 am EDT, Aug 29, 2003

DARPA intends to conduct a challenge of autonomous ground vehicles between Los Angeles and Las Vegas in March of 2004.

A cash award of $1 million will be granted to the team that fields the first vehicle to complete the designated route within a specified time limit.

The purpose of the challenge is to leverage American ingenuity to accelerate the development of autonomous vehicle technologies that can be applied to military requirements.

DARPA Grand Challenge


The Cognitive Style of Powerpoint
Topic: Human Computer Interaction 11:57 pm EDT, Aug 28, 2003

In corporate and government bureaucracies, the standard method for making a presentation is to talk about a list of points organized onto slides projected up on the wall. For many years, overhead projectors lit up transparencies, and slide projectors showed high-resolution 35mm slides. Now "slideware" computer programs for presentations are nearly everywhere. Early in the 21st century, several hundred million copies of Microsoft PowerPoint were turning out trillions of slides each year.

Alas, slideware often reduces the analytical quality of presentations. In particular, the popular PowerPoint templates (ready-made designs) usually weaken verbal and spatial reasoning, and almost always corrupt statistical analysis. What is the problem with PowerPoint? And how can we improve our presentations?

Edward Tufte, author of the classic book The Visual Display of Quantitative Information, has written a short essay about PowerPoint. You can buy it directly for $7.

The Cognitive Style of Powerpoint


(Last) Newer << 88 ++ 98 - 99 - 100 - 101 - 102 - 103 - 104 - 105 - 106 ++ 116 >> Older (First)
 
 
Powered By Industrial Memetics
RSS2.0