Create an Account
username: password:
 
  MemeStreams Logo

What questions are you asking yourself?

search

Jeremy
My Blog
My Profile
My Audience
My Sources
Send Me a Message

sponsored links

Jeremy's topics
Arts
  Literature
   Classical
   Fiction
   Horror
   Non-Fiction
   Sci-Fi/Fantasy Literature
  Movies
   Movie Genres
    Action/Adventure
    Cult Films
    Documentary
    Drama
    Horror
    Independent Films
    Film Noir
    Sci-Fi/Fantasy Films
    War
  Music
   Music Styles
    Classical
    Electronic Music
    Rap & Hip Hop
    IDM
    Jazz
    World Music
  TV
   TV Documentary
   TV Drama
   SciFi TV
Business
  Finance & Accounting
  Industries
   Tech Industry
   Telecom Industry
  Management
  Markets & Investing
Games
  Video Games
   PC Video Games
   Console Video Games
Health and Wellness
  Medicine
Home and Garden
  Cooking
  Entertaining
Miscellaneous
  Humor
  MemeStreams
   Using MemeStreams
Current Events
  War on Terrorism
  Elections
  Israeli/Palestinian
Recreation
  Cars and Trucks
  Travel
Local Information
  United States
   California
    SF Bay Area
   Events in Washington D.C.
   News for Washington D.C.
   Georgia
    Atlanta
     Atlanta Events
Science
  Biology
  History
  Math
  Medicine
  Nano Tech
  Physics
Society
  Economics
  Education
  Futurism
  International Relations
  History
  Politics and Law
   Civil Liberties
    Internet Civil Liberties
    Surveillance
   Intellectual Property
  Media
   Blogging
  Military
  Philosophy
Technology
  Biotechnology
  Computers
   Computer Security
    Cryptography
   PC Hardware
   Human Computer Interaction
   Computer Networking
   Macintosh
   Software Development
    Open Source Development
  Military Technology
  High Tech Developments

support us

Get MemeStreams Stuff!


 
compos mentis. Concision. Media. Clarity. Memes. Context. Melange. Confluence. Mishmash. Conflation. Mellifluous. Conviviality. Miscellany. Confelicity. Milieu. Cogent. Minty. Concoction.

The Code War | Beyond Discovery
Topic: Cryptography 12:14 am EST, Feb 15, 2003

The newest release in the Beyond Discovery series, "The Code War," explores the trail of developments in the branch of mathematics known as number theory that led to modern-day encryption techniques. Learn about historical ciphers, Fermat's "little theorem" and why mathematics is vital for encryption today.

The Code War | Beyond Discovery


The National Strategy to Secure Cyberspace [PDF]
Topic: Technology 8:41 pm EST, Feb 14, 2003

The National Strategy to Secure Cyberspace is part of our overall effort to protect the Nation. It is an implementing component of the National Strategy for Homeland Security and is complemented by a National Strategy for the Physical Protection of Critical Infrastructures and Key Assets. The purpose of this document is to engage and empower Americans to secure the portions of cyberspace that they own, operate, control, or with which they interact. Securing cyberspace is a difficult strategic challenge that requires coordinated and focused effort from our entire society.the federal government, state and local governments, the private sector, and the American people.

The National Strategy to Secure Cyberspace [PDF]


National Strategy for the Physical Protection of Critical Infrastructures and Key Assets [PDF]
Topic: Technology 8:39 pm EST, Feb 14, 2003

The National Strategy for Physical Protection of Critical Infrastructures and Key Assets serves as a critical bridge between the National Strategy for Homeland Security and a national protection plan to be developed by the Department of Homeland Security. The strategic objectives that underpin the national infrastructure and key asset protection effort include:

* Identifying and assuring the protection of those infrastructure and assets we deem most critical;

* Providing timely warning and assuring the protection of those infrastructures and assets that face a specific, imminent threat; and

* Assuring the protection of other infrastructures and assets that may become targets over time by pursuing specific initiatives and enabling a collaborative environment between the public and private sector.

National Strategy for the Physical Protection of Critical Infrastructures and Key Assets [PDF]


A Technique for Counting NATted Hosts [PDF]
Topic: Computer Security 12:32 pm EST, Feb  8, 2003

Decius wrote: "Steven Bellovin is at it again."

Abstract: There have been many attempts to measure how many hosts are on the Internet. Many of those endpoints, however, are NAT boxes (Network Address Translators), and actually represent several different computers. We describe a technique for detecting NATs and counting the number of active hosts behind them. The technique is based on the observation that on many operating systems, the IP header’s ID field is a simple counter. By suitable processing of trace data, packets emanating from individual machines can be isolated, and the number of machines determined. Our implementation, tested on aggregated local trace data, demonstrates the feasibility (and limitations) of the scheme.

A Technique for Counting NATted Hosts [PDF]


Feds Building Internet Monitoring Center
Topic: Computer Security 1:27 am EST, Feb  3, 2003

The Bush administration is quietly assembling an Internet-wide monitoring center to detect and respond to attacks on vital information systems and key e-commerce sites.

The center, which has been in development for the past 15 months, is a key piece of the White House's national cybersecurity strategy and represents a major leap in the federal government's effort to achieve real-time tracking of the Internet's health.

Feds Building Internet Monitoring Center


Project: Space Station | A C64 Classic
Topic: Video Games 2:40 pm EST, Feb  2, 2003

Project: Space Station was one of my favorite titles for the Commodore 64. It was an extremely multi-faceted game, especially for its time, but, for me, the most challenging tasks were 1) getting into the proper orbit on launch; and 2) safely returning to Earth (always to Edwards AFB at the time) following a Shuttle mission.

Yesterday's events brought back many fond memories of playing this game during the 1980's.

I've linked here to the ROM file; you'll also need an emulator, such as CCS64 (ccs64.com), to play.

(Description clipped from "The Underdogs" web site): "Before he developed a string of venerable flight sims for LucasArts, Larry Holland designed this exceptional NASA mission simulator that gives you the chance to build a space station. This gargantuan task requires astute planning of shuttle launches over the next 15 years to carry the necessary components for the station. NASA's help in the game shows in the excellent realistic factors, from budgetary concerns to R&D projects you can take in hopes of making discoveries that will save lives and time. An excellent simulation."

Project: Space Station | A C64 Classic


Kino International Presents Fritz Lang's Metropolis
Topic: Movies 11:47 pm EST, Jan 25, 2003

Perhaps the most famous and influential of all silent films, Metropolis had for 75 years been seen only in shortened or truncated versions.

Now, restored in Germany with state-of-the-art digital technology and with the original 1927 orchestral score by Gottfried Huppertz added, Metropolis can be appreciated in its full glory.

It is, as A. O. Scott of The New York Times declared, "A fever dream of the future. At last we have the movie every would-be cinematic visionary has been trying to make since 1927."

Lavish and spectacular, with elaborate sets and modern science fiction style, Metropolis stands today as the crowning achievement of the German silent cinema. Kino is proud to present the definitive, authorized version of this towering classic, at a length over one-third longer than any previous release.

"Spectacular...the greatest of all pulp fantasies." -- The Village Voice

Order your copy today! On sale February 18, 2003.

Kino International Presents Fritz Lang's Metropolis


Connect, They Say, Only Connect
Topic: Society 12:30 pm EST, Jan 25, 2003

The whiteboard in Duncan J. Watts's office at Columbia University was a thicket of squiggly blue lines, circles and calculus equations.

Mr. Watts, an associate professor of sociology, had just begun a passionate disquisition on the virtues and liabilities of scale-free networks when the telephone rang.

It was Alfred Berkeley, the vice chairman of Nasdaq, hoping to chat about the exchange's design.

Duncan Watts needs to know about Memestreams.

Connect, They Say, Only Connect


Six Degrees: The Science of a Connected Age
Topic: Science 11:46 pm EST, Jan 24, 2003

Duncan Watts, a Columbia University sociology professor and a former Fullbright scholar, has written a new book about the science of social networks. He has studied at the Sante Fe Institute, and his work has been published in Nature, Physical Review, Physical Review Letters, numerous arXiv working papers, and a prior book, _Small Worlds_.

Six Degrees: The Science of a Connected Age


The Law & Technology of DRM
Topic: Intellectual Property 10:33 pm EST, Jan 23, 2003

What will DRM technologies mean for the future of information?

The Berkeley Center for Law and Technology (BCLT), Berkeley Technology Law Journal (BTLJ), the Samuelson Law, Technology & Public Policy Clinic and the School of Information Management & Systems (SIMS) are proud to announce this year's ground-breaking conference confronting the controversies surrounding digital rights management.

This conference will be held at Berkeley from Feb 27 through March 1. Speakers include: Brian LaMacchia, Pamela Samuelson, Carl Shapiro, Hal Varian, David Farber, Lucky Green, Hal Abelson, Edward Felten, Larry Lessig, Jerry Berman, Mark Lemley, and many others.

The Law & Technology of DRM


(Last) Newer << 103 ++ 113 - 114 - 115 - 116 - 117 - 118 - 119 - 120 - 121 ++ 131 >> Older (First)
 
 
Powered By Industrial Memetics
RSS2.0