Create an Account
username: password:
 
  MemeStreams Logo

Post Haste

search

possibly noteworthy
Picture of possibly noteworthy
My Blog
My Profile
My Audience
My Sources
Send Me a Message

sponsored links

possibly noteworthy's topics
Arts
Business
Games
Health and Wellness
Home and Garden
Miscellaneous
  Humor
Current Events
  War on Terrorism
Recreation
Local Information
  Food
Science
Society
  International Relations
  Politics and Law
   Intellectual Property
  Military
Sports
Technology
  Military Technology
  High Tech Developments

support us

Get MemeStreams Stuff!


 
Being "always on" is being always off, to something.

The United States Lacks Comprehensive Plan to Destroy the Terrorist Threat and Close the Safe Haven in Pakistan’s Federally Administered Tribal Areas
Topic: War on Terrorism 7:06 am EDT, Apr 18, 2008

The United States has not met its national security goals to destroy terrorist threats and close the safe haven in Pakistan’s FATA. Since 2002, the United States relied principally on the Pakistan military to address U.S. national security goals. Of the approximately $5.8 billion the United States provided for efforts in the FATA and border region from 2002 through 2007, about 96 percent reimbursed Pakistan for military operations there. According to the Department of State, Pakistan deployed 120,000 military and paramilitary forces in the FATA and helped kill and capture hundreds of suspected al Qaeda operatives; these efforts cost the lives of approximately 1,400 members of Pakistan’s security forces. However, GAO found broad agreement, as documented in the National Intelligence Estimate, State, and embassy documents, as well as Defense officials in Pakistan, that al Qaeda had regenerated its ability to attack the United States and had succeeded in establishing a safe haven in Pakistan’s FATA.

The United States Lacks Comprehensive Plan to Destroy the Terrorist Threat and Close the Safe Haven in Pakistan’s Federally Administered Tribal Areas


Assessing the Cyber Security Threat
Topic: Military Technology 7:06 am EDT, Apr 18, 2008

Following a fascinating debate that ranged from bullet-proof hosting to onion-routing, the conclusion had to be that the cyber security threat was evolving rapidly and was touching all aspects of society. Its political importance is also increasing and in a cyber society that “has no rules or borders, according to Estonia’s Minister of Defence Jaak Aaviksoo, there is a need for improved coordination at the highest level.

Assessing the Cyber Security Threat


Air Traffic Control Modernization
Topic: Technology 7:06 am EDT, Apr 18, 2008

On April 14, 2008, we issued our report on the Federal Aviation Administration’s (FAA) air traffic control modernization efforts. At the request of the House Committee on Transportation and Infrastructure, we examined three objectives: (1) trends in recent FAA capital spending, (2) changes in cost and schedule baselines of major acquisitions, and (3) the effect of the transition to the Next Generation Air Transportation System (NextGen) on existing projects.

Air Traffic Control Modernization


Six Technologies with Potential Impacts on US Interests out to 2025
Topic: High Tech Developments 7:24 am EDT, Apr 17, 2008

Six civil technologies offer the potential to enhance or degrade US power over the next fifteen years according to National Intelligence Council (NIC) sponsored contractor research. These include biogerontechnology, a energy storage technology, biofuels and bio-based chemical technology, clean coal technology, service robotic technology, and information technology devoted to increased connectivity of people and things.

Six Technologies with Potential Impacts on US Interests out to 2025


Will Google Earnings Save Tech?
Topic: Business 7:24 am EDT, Apr 17, 2008

The internet bellwether has reported fewer clicks on its ads. The billion-dollar question is what that means.

Will Google Earnings Save Tech?


Paul Kedrosky: Bring on the Data Blogs
Topic: Business 7:24 am EDT, Apr 17, 2008

I'm largely tired of opinion -- my own included. I am, however, increasingly fascinated with capturing and incorporating useful, alternative data sources from the edge. You see some of that beginning to happen via Twitter (and I'm advising an interesting company doing work here), but there are all sorts of opportunities at the confluence of unstructured data, companies like QL9 and Kirix, webcams and video analytics, and, yes, blogs.

While I've long incorporated meta-data from blogs in my thinking, I want to make it more explicit. I want blogs about data, sites that reshape and repurpose data as their central purpose. Sort of like a Bespoke with an API, to use one example, but there are lots of others. Bring 'em on.

Paul Kedrosky: Bring on the Data Blogs


Avatars, Virtual Reality Technology, and the U.S. Military: Emerging Policy Issues
Topic: Technology 7:24 am EDT, Apr 17, 2008

This report describes virtual reality technology, which uses three-dimensional user-generated content, and its use by the U.S. military and intelligence community for training and other purposes. Both the military and private sector use this new technology, but terrorist groups may also be using it to train more realistically for future attacks, while still avoiding detection on the Internet. The issues for Congress to consider may include the cost-benefit implications of this technology, whether sufficient resources are available for the communications infrastructure needed to support expanded use of virtual reality technology, and whether there might be national security considerations if the United States falls behind other nations in developing or adopting this new technology. This report will be updated as events warrant.

Avatars, Virtual Reality Technology, and the U.S. Military: Emerging Policy Issues


Al-Qaeda Media Nexus: The Virtual Network Behind the Global Message
Topic: War on Terrorism 7:24 am EDT, Apr 17, 2008

Key Findings

The ”original” Al-Qaeda led by Osama bin Laden accounts for a mere fraction of jihadist media production.

Virtual media production and distribution entities (MPDEs) link varied groups under the general ideological rubric of the global jihadist movement. The same media entities that “brand” jihadist media also create virtual links between the various armed groups that fall into the general category of Al-Qaeda and affiliated movements.

Three key entities connect Al-Qaeda and affiliated movements to the outside world through the internet. These three media entities — Fajr, the Global Islamic Media Front, and Sahab — receive materials from more than one armed group and post those materials to the internet.

Information operations intended to disrupt or undermine the effectiveness of jihadist media can and should target the media entities that brand these media and act as the virtual connective tissue of the global movement.

While video is an important component of jihadist media, text products comprise the bulk of the daily media flow. Within text products, periodicals focused on specific “fronts” of the jihad are an important genre that deserves more attention from researchers.

The vast majority of jihadist media products focus on conflict zones: Iraq, Afghanistan, and Somalia.

The priorities of the global jihadist movement, as represented by its media arm, are operations in Iraq, Afghanistan, Somalia, and North Africa.

Jihadist media are attempting to mimic a “traditional” structure in order to boost credibility and facilitate message control. While conventional wisdom holds that jihadist media have been quick to exploit technological innovations to advance their cause, they are moving toward a more structured approach based on consistent branding and quasi-official media entities. Their reasons for doing so appear to be a desire to boost the credibility of their products and ensure message control.

In line with this strategy, the daily flow of jihadist media that appears on the internet is consistently and systematically branded.

Al-Qaeda Media Nexus: The Virtual Network Behind the Global Message


The Natural World: Tigerland
Topic: Science 7:24 am EDT, Apr 17, 2008

A journey through the mangrove forest of Bengal.

The Natural World: Tigerland


Network Effects: The Influence of Structural Social Capital on Open Source Project Success
Topic: Business 7:24 am EDT, Apr 17, 2008

What determines open source project success? In this study, we investigate the impact of network social capital - the benefits open source developers secure from their memberships in a developer collaboration network - on open source project success. We focus on one specific type of success as measured by the productivity of open source project team. Specific hypotheses are developed and tested on a longitudinal panel of 2378 projects hosted at Sourceforge. We find that network social capital is not equally accessible to or appropriated by all projects. Our main results are (1) teams with greater internal cohesion are more successful, (2) external cohesion (cohesion among the external contacts of a team) has an inverse U-shaped relationship with the project's success; moderate levels of external cohesion are the best for a project's success, rather than very low or very high levels of this variable, (3) the technological diversity of a contact also has the greatest benefit when it is neither too low nor too high, and (4) the number of direct and indirect external contacts are positively correlated with a project's success with the effect of the number of direct contacts being moderated by the number of indirect contacts. These results are robust to a number of control variables and alternate model specifications. Several theoretical and managerial implications are provided.

Network Effects: The Influence of Structural Social Capital on Open Source Project Success


(Last) Newer << 142 ++ 152 - 153 - 154 - 155 - 156 - 157 - 158 - 159 - 160 ++ 170 >> Older (First)
 
 
Powered By Industrial Memetics
RSS2.0