| |
Current Topic: Technology |
|
Topic: Technology |
2:24 pm EST, Nov 13, 2004 |
Google said it is adding free POP access to Gmail for all users over the next couple of weeks. Gmail adds POP access |
|
CacheLogic - P2P Traffic Analysis |
|
|
Topic: Technology |
9:04 am EST, Nov 9, 2004 |
This is the CacheLogic study referred to in the Reuters story. Peer-to-Peer [is] a huge problem for last mile providers, where it makes up 80% or more of the traffic on the network. CacheLogic - P2P Traffic Analysis |
|
File-Sharing Thrives Under Radar |
|
|
Topic: Technology |
8:56 am EST, Nov 9, 2004 |
According to British web analysis firm CacheLogic, BitTorrent accounts for an astounding 35 percent of all the traffic on the Internet -- more than all other peer-to-peer programs combined -- and dwarfs mainstream traffic like web pages. "I don't think Hollywood is willing to let it slide, but whether they're able to (stop it) is another matter," Bram Cohen, the programmer who created BitTorrent, told Reuters. !!! File-Sharing Thrives Under Radar |
|
Topic: Technology |
5:43 pm EDT, Oct 24, 2004 |
It's a beta. It has limitations. For example, it won't index multiple disk drives on your system. My fundamental complaint is that this product lacks the fundamental essence of Google. That is, it has no sense of link structure. It is a simple full text indexer. As many have already pointed out, existing products perform this function more effectively and with better and more complete system integration. In time, they could migrate this product into a remembrance agent. That would present a good opportunity for Google's famed PhDs to demonstrate their supreme geekiness. Here's to hoping ... Google Desktop Search |
|
Is Your FPGA Design Secure? |
|
|
Topic: Technology |
11:53 am EDT, Oct 2, 2004 |
After spending months on your design, the last thing you want is to find your design has been stolen. Say goodbye to "locks," "fuses," "antifuses," and other contraptions. You can sleep peacefully when you design with Xilinx. Here at Xilinx, we want you to rest at ease. All Xilinx devices have robust security mechanisms that make it nearly impossible to steal designs. With security mechanisms you can "bank" on, let's get into the details of design security and how Xilinx protects your valuable proprietary designs. Is Your FPGA Design Secure? |
|
Topic: Technology |
9:55 am EDT, Sep 27, 2004 |
Today, Sir Richard Branson starts a new music store. What's interesting is that Virgin is putting its biggest emphasis on its subscription service. For a $7.99 monthly fee, listen to an unlimited amount of music from Virgin's one-million-track library. A premium subscription service that will allow those tracks to be moved to a portable music player will be introduced soon. "Two or three years out, subscriptions will overtake à la carte because it is a much more interesting proposition." Told you so. Why Buy If You Can Rent? |
|
Topic: Technology |
1:29 am EDT, Sep 1, 2004 |
Context is everything. Who has 687,389 trusted friends? Nobody. Friendships are not defined by links. Real social relationships are subtle, complex and grounded in trust. And trust is built on the quality of the relationship within a context. Trusted relationships are the fabric that connects people into the communities that are the context. But communities need to be able to spontaneously form, and to define their own rules for self-governance and organization. Our mission is to create useful software tools to manage our interactions on an open source peer-to-peer platform. A platform that restores control over our digital identities and supports a variety of regimes for self-governance and self-expression. Through new and existing apps that use this platform we expect to find new forms of economic and civic participation and organization. Social Physics |
|
Interfaces for Staying in the Flow |
|
|
Topic: Technology |
1:11 am EDT, Sep 1, 2004 |
Computers should help us concentrate on our work, without concentrating on the computer Psychologists have studied "optimal human experience" for many years, often called "being in the flow". Through years of study, the basic characteristics of flow have been identified. This paper reviews the literature, and interprets the characteristics of flow within the context of interface design with the goal of understanding what kinds of interfaces are most conducive to supporting users being in the flow. Several examples to demonstrate the connection to flow are given. Interfaces for Staying in the Flow |
|
Shilling Recommender Systems for Fun and Profit |
|
|
Topic: Technology |
6:13 pm EDT, Jul 31, 2004 |
Recommender systems have emerged in the past several years as an effective way to help people cope with the problem of information overload. One application in which they have become particularly common is in e-commerce, where recommendation of items can often help a customer find what she is interested in and, therefore can help drive sales. Unscrupulous producers in the never-ending quest for market penetration may find it profitable to shill recommender systems by lying to the systems in order to have their products recommended more often than those of their competitors. This paper explores four open questions that may affect the effectiveness of such shilling attacks: which recommender algorithm is being used, whether the application is producing recommendations or predictions, how detectable the attacks are by the operator of the system, and what the properties are of the items being attacked. The questions are explored experimentally on a large data set of movie ratings. Taken together, the results of the paper suggest that new ways must be used to evaluate and detect shilling attacks on recommender systems. Shilling Recommender Systems for Fun and Profit |
|
So You're A Programmer ... |
|
|
Topic: Technology |
9:29 pm EDT, Jul 29, 2004 |
... how many lives did your code save today? |
|