Create an Account
username: password:
 
  MemeStreams Logo

What questions are you asking yourself?

search

Jeremy
My Blog
My Profile
My Audience
My Sources
Send Me a Message

sponsored links

Jeremy's topics
Arts
  Literature
   Classical
   Fiction
   Horror
   Non-Fiction
   Sci-Fi/Fantasy Literature
  Movies
   Movie Genres
    Action/Adventure
    Cult Films
    Documentary
    Drama
    Horror
    Independent Films
    Film Noir
    Sci-Fi/Fantasy Films
    War
  Music
   Music Styles
    Classical
    Electronic Music
    Rap & Hip Hop
    IDM
    Jazz
    World Music
  TV
   TV Documentary
   TV Drama
   SciFi TV
Business
  Finance & Accounting
  Industries
   Tech Industry
   Telecom Industry
  Management
  Markets & Investing
Games
  Video Games
   PC Video Games
   Console Video Games
Health and Wellness
  Medicine
Home and Garden
  Cooking
  Entertaining
Miscellaneous
  Humor
  MemeStreams
   Using MemeStreams
Current Events
  War on Terrorism
  Elections
  Israeli/Palestinian
Recreation
  Cars and Trucks
  Travel
Local Information
  United States
   California
    SF Bay Area
   Events in Washington D.C.
   News for Washington D.C.
   Georgia
    Atlanta
     Atlanta Events
Science
  Biology
  History
  Math
  Medicine
  Nano Tech
  Physics
Society
  Economics
  Education
  Futurism
  International Relations
  History
  Politics and Law
   Civil Liberties
    Internet Civil Liberties
    Surveillance
   Intellectual Property
  Media
   Blogging
  Military
  Philosophy
Technology
  Biotechnology
  Computers
   Computer Security
    Cryptography
   PC Hardware
   Human Computer Interaction
   Computer Networking
   Macintosh
   Software Development
    Open Source Development
  Military Technology
  High Tech Developments

support us

Get MemeStreams Stuff!


 
compos mentis. Concision. Media. Clarity. Memes. Context. Melange. Confluence. Mishmash. Conflation. Mellifluous. Conviviality. Miscellany. Confelicity. Milieu. Cogent. Minty. Concoction.

Trusted Computing, Peer-To-Peer Distribution, and the Economics of Pirated Entertainment [PDF]
Topic: Intellectual Property 12:23 am EDT, May 14, 2003

Abstract: The entertainment industry, facing a formidable threat from peer-to-peer piracy networks, is exploring every possible means to attack these networks.

The industry is also employing defensive strategies to protect media and media players from those who would extract and copy their content. These content protection systems depend on the computer industry’s newly announced ‘trusted computing’ technologies.

While "trusted computing" technologies may better protect media and media players from content extraction by pirates, we assert that the very same technologies can be employed to better protect pirates and their peer-to-peer distribution networks from the entertainment industry.

Trusted Computing, Peer-To-Peer Distribution, and the Economics of Pirated Entertainment [PDF]


Reputation in P2P Anonymity Systems [PDF]
Topic: Technology 6:20 pm EDT, May  3, 2003

Decentralized anonymity systems tend to be unreliable, because users must choose paths through the network without knowing the entire state of the network. Reputation systems can improve reliability by predicting the state of the network. In this paper we focus on anonymous remailers and anonymous publishing, explain why the systems can benefit from reputation, and describe our experiences designing reputation systems for them while still ensuring anonymity. We find that in each example we first must redesign the underlying anonymity system to support verifiable transactions.

Reputation in P2P Anonymity Systems [PDF]


Social Software Alliance
Topic: Software Development 11:08 am EDT, Apr 20, 2003

We propose a trade group of social software developers and other interested parties who work together to create and promote open standards for the social software community. Social software blends tools and modes for richer online social environments and experiences. Some examples of social software are weblogs, wikis, forums, chat environments, or instant messaging, and related tools and data structures for identity, integration, interchange and analysis.

Social software is a dynamic and constantly evolving environment, rich with possibilities to create better connections between people. With a growing number of active developers, we need a central nexus to help drive the process of coordination and interoperability between different developers' products.

Founding members include Ross Mayfield, Clay Shirky, and David Weinberger. Howard Rheingold also participated in the most recent Happening.

Social Software Alliance


DRM {and, or, vs.} the Law
Topic: Intellectual Property 7:39 pm EDT, Apr 19, 2003

Though mandates for ubiquitous DRM are unlikely to be legislated soon, the threat of DRM mandates should be taken seriously.

The main purpose of DRM is not to prevent copyright infringement but to change consumer expectations about what they are entitled to do with digital content.

The DMCA impedes the progress of science, is economically unjustifiable, and lacks the balance the Constitution requires of intellectual property legislation.

Pamela Samuelson of UC Berkeley writes about DRM in the April 2003 issue of Communications of the ACM. She has made the article freely available from her web site; no subscription is required. Note: the linked document has no DRM :)

DRM {and, or, vs.} the Law


Eluding the Web's Snare
Topic: Technology 11:00 pm EDT, Apr 16, 2003

Katie Hafner writes about "Net evaders" -- people who steer clear of the Internet and its services despite being in close proximity to connected computers and other avid Internet users. The article is based on survey research by the Pew Trust.

As a bit of a "cellular evader" myself, I would submit that this phenomenon is not specific to the Internet.

Eluding the Web's Snare


Defending Against an Internet-based Attack on the Physical World [PDF]
Topic: Computer Security 6:39 am EDT, Apr 16, 2003

We discuss the dangers that scalable Internet functionality may present to the real world, focusing on a simple yet impactful attack that we believe may occur quite soon. We offer and critique various solutions to this class of attack and hope to provide a warning to the Internet community of what is currently possible. The attack is, to some degree, a consequence of the availability of private information on the Web, and the increase in the amount of personal information that users must reveal to obtain Web services.

Avi Rubin's latest effort; this paper is profiled in today's NYT.

Defending Against an Internet-based Attack on the Physical World [PDF]


Unweaving the Web: Deception and Adaptation in Future Urban Operations | RAND
Topic: Military Technology 12:38 am EDT, Apr 15, 2003

Deception is a powerful yet understudied instrument of war.

Using the extensive literature on deception in the animal kingdom, where ruses of near-infinite variety are applied to offense, defense, and intelligence gathering, the authors delve into the theory of deception to reveal new avenues of experimentation.

These pathways may lead to new technologies or training techniques and provoke a new look at deception doctrine applicable at every level of war.

Unweaving the Web: Deception and Adaptation in Future Urban Operations | RAND


A Social Network Caught in the Web [PDF]
Topic: Technology 3:24 pm EDT, Apr 12, 2003

We present an analysis of Club Nexus, an online community at Stanford University. Through the Nexus site we were able to study a reflection of the real world community structure within the student body.

We observed and measured social network phenomena such as the small world effect, clustering, and the strength of weak ties.

Using the rich profile data provided by the users we were able to deduce the attributes contributing to the formation of friendships, and to determine how the similarity of users decays as the distance between them in the network increases.

This research is a collaboration between HP Labs and Google. It will appear in a future issue of First Monday.

A Social Network Caught in the Web [PDF]


NYT Archive Policy Gets More Aggressive
Topic: Intellectual Property 2:52 pm EDT, Apr 12, 2003

Try to visit this URL for an NYT article by Amy Harmon entitled, "More Than Just a Game, But How Close to Reality?" It's from April 3, 2003 -- only nine days ago, and yet NYT has already moved the article into its pay-per-view archive. Lame.

Even articles from April 4 have already been moved to the archive.

NYT Archive Policy Gets More Aggressive


Commute to Nowhere
Topic: Business 1:54 am EDT, Apr 12, 2003

"There were about 20 people in the room, and each one of us had to introduce ourselves and talk about our most recent position.

There was a cashier from McDonald's, a woman who had worked at Baby Gap, a ticket collector from Loews, a gift wrapper from Barnes & Noble.

Then it came to me. I said I used to be an executive vice president and a director of interactive marketing for Rapp Digital, a digital media company with 300 employees and a P. and L. of $40 million."

Commute to Nowhere


(Last) Newer << 94 ++ 104 - 105 - 106 - 107 - 108 - 109 - 110 - 111 - 112 ++ 122 >> Older (First)
 
 
Powered By Industrial Memetics
RSS2.0