| |
compos mentis. Concision. Media. Clarity. Memes. Context. Melange. Confluence. Mishmash. Conflation. Mellifluous. Conviviality. Miscellany. Confelicity. Milieu. Cogent. Minty. Concoction. |
|
The Code War | Beyond Discovery |
|
|
Topic: Cryptography |
12:14 am EST, Feb 15, 2003 |
The newest release in the Beyond Discovery series, "The Code War," explores the trail of developments in the branch of mathematics known as number theory that led to modern-day encryption techniques. Learn about historical ciphers, Fermat's "little theorem" and why mathematics is vital for encryption today. The Code War | Beyond Discovery |
|
The National Strategy to Secure Cyberspace [PDF] |
|
|
Topic: Technology |
8:41 pm EST, Feb 14, 2003 |
The National Strategy to Secure Cyberspace is part of our overall effort to protect the Nation. It is an implementing component of the National Strategy for Homeland Security and is complemented by a National Strategy for the Physical Protection of Critical Infrastructures and Key Assets. The purpose of this document is to engage and empower Americans to secure the portions of cyberspace that they own, operate, control, or with which they interact. Securing cyberspace is a difficult strategic challenge that requires coordinated and focused effort from our entire society.the federal government, state and local governments, the private sector, and the American people. The National Strategy to Secure Cyberspace [PDF] |
|
National Strategy for the Physical Protection of Critical Infrastructures and Key Assets [PDF] |
|
|
Topic: Technology |
8:39 pm EST, Feb 14, 2003 |
The National Strategy for Physical Protection of Critical Infrastructures and Key Assets serves as a critical bridge between the National Strategy for Homeland Security and a national protection plan to be developed by the Department of Homeland Security. The strategic objectives that underpin the national infrastructure and key asset protection effort include: * Identifying and assuring the protection of those infrastructure and assets we deem most critical; * Providing timely warning and assuring the protection of those infrastructures and assets that face a specific, imminent threat; and * Assuring the protection of other infrastructures and assets that may become targets over time by pursuing specific initiatives and enabling a collaborative environment between the public and private sector. National Strategy for the Physical Protection of Critical Infrastructures and Key Assets [PDF] |
|
A Technique for Counting NATted Hosts [PDF] |
|
|
Topic: Computer Security |
12:32 pm EST, Feb 8, 2003 |
Decius wrote: "Steven Bellovin is at it again." Abstract: There have been many attempts to measure how many hosts are on the Internet. Many of those endpoints, however, are NAT boxes (Network Address Translators), and actually represent several different computers. We describe a technique for detecting NATs and counting the number of active hosts behind them. The technique is based on the observation that on many operating systems, the IP headers ID field is a simple counter. By suitable processing of trace data, packets emanating from individual machines can be isolated, and the number of machines determined. Our implementation, tested on aggregated local trace data, demonstrates the feasibility (and limitations) of the scheme. A Technique for Counting NATted Hosts [PDF] |
|
Feds Building Internet Monitoring Center |
|
|
Topic: Computer Security |
1:27 am EST, Feb 3, 2003 |
The Bush administration is quietly assembling an Internet-wide monitoring center to detect and respond to attacks on vital information systems and key e-commerce sites. The center, which has been in development for the past 15 months, is a key piece of the White House's national cybersecurity strategy and represents a major leap in the federal government's effort to achieve real-time tracking of the Internet's health. Feds Building Internet Monitoring Center |
|
Project: Space Station | A C64 Classic |
|
|
Topic: Video Games |
2:40 pm EST, Feb 2, 2003 |
Project: Space Station was one of my favorite titles for the Commodore 64. It was an extremely multi-faceted game, especially for its time, but, for me, the most challenging tasks were 1) getting into the proper orbit on launch; and 2) safely returning to Earth (always to Edwards AFB at the time) following a Shuttle mission. Yesterday's events brought back many fond memories of playing this game during the 1980's. I've linked here to the ROM file; you'll also need an emulator, such as CCS64 (ccs64.com), to play. (Description clipped from "The Underdogs" web site): "Before he developed a string of venerable flight sims for LucasArts, Larry Holland designed this exceptional NASA mission simulator that gives you the chance to build a space station. This gargantuan task requires astute planning of shuttle launches over the next 15 years to carry the necessary components for the station. NASA's help in the game shows in the excellent realistic factors, from budgetary concerns to R&D projects you can take in hopes of making discoveries that will save lives and time. An excellent simulation." Project: Space Station | A C64 Classic |
|
Kino International Presents Fritz Lang's Metropolis |
|
|
Topic: Movies |
11:47 pm EST, Jan 25, 2003 |
Perhaps the most famous and influential of all silent films, Metropolis had for 75 years been seen only in shortened or truncated versions. Now, restored in Germany with state-of-the-art digital technology and with the original 1927 orchestral score by Gottfried Huppertz added, Metropolis can be appreciated in its full glory. It is, as A. O. Scott of The New York Times declared, "A fever dream of the future. At last we have the movie every would-be cinematic visionary has been trying to make since 1927." Lavish and spectacular, with elaborate sets and modern science fiction style, Metropolis stands today as the crowning achievement of the German silent cinema. Kino is proud to present the definitive, authorized version of this towering classic, at a length over one-third longer than any previous release. "Spectacular...the greatest of all pulp fantasies." -- The Village Voice Order your copy today! On sale February 18, 2003. Kino International Presents Fritz Lang's Metropolis |
|
Connect, They Say, Only Connect |
|
|
Topic: Society |
12:30 pm EST, Jan 25, 2003 |
The whiteboard in Duncan J. Watts's office at Columbia University was a thicket of squiggly blue lines, circles and calculus equations. Mr. Watts, an associate professor of sociology, had just begun a passionate disquisition on the virtues and liabilities of scale-free networks when the telephone rang. It was Alfred Berkeley, the vice chairman of Nasdaq, hoping to chat about the exchange's design. Duncan Watts needs to know about Memestreams. Connect, They Say, Only Connect |
|
Six Degrees: The Science of a Connected Age |
|
|
Topic: Science |
11:46 pm EST, Jan 24, 2003 |
Duncan Watts, a Columbia University sociology professor and a former Fullbright scholar, has written a new book about the science of social networks. He has studied at the Sante Fe Institute, and his work has been published in Nature, Physical Review, Physical Review Letters, numerous arXiv working papers, and a prior book, _Small Worlds_. Six Degrees: The Science of a Connected Age |
|
The Law & Technology of DRM |
|
|
Topic: Intellectual Property |
10:33 pm EST, Jan 23, 2003 |
What will DRM technologies mean for the future of information? The Berkeley Center for Law and Technology (BCLT), Berkeley Technology Law Journal (BTLJ), the Samuelson Law, Technology & Public Policy Clinic and the School of Information Management & Systems (SIMS) are proud to announce this year's ground-breaking conference confronting the controversies surrounding digital rights management. This conference will be held at Berkeley from Feb 27 through March 1. Speakers include: Brian LaMacchia, Pamela Samuelson, Carl Shapiro, Hal Varian, David Farber, Lucky Green, Hal Abelson, Edward Felten, Larry Lessig, Jerry Berman, Mark Lemley, and many others. The Law & Technology of DRM |
|