| |
Being "always on" is being always off, to something. |
|
Topic: Arts |
11:03 pm EST, Jan 3, 2008 |
I found a collection of over 200 35mm Kodachrome slides of travel and marketing posters from the 1950's and 1960's.. There are some real gems in here! I've done my best to identify them however quite a number are in languages I can't translate. If you see any you recognize add a note to improve the record!
Unfortunately they don't have high-resolution images. Classic Posters |
|
Topic: Military Technology |
11:03 pm EST, Jan 3, 2008 |
Did you read the original Unrestricted Warfare meme? (No one re-recommended it.) How about the one that Acidus recently posted? Or Rattle's notes from September? Having long relied upon military prowess and diplomatic skills to project and protect its interests on the seas, on land and in aerospace, the United States now is in conflict with stateless entities seeking hearts and minds, not land or treasure. It is a global contest of words and images, waged on a battlefield called cyberspace where rules of engagement that govern traditional conflict don’t apply and plans for a multiagency effort to protect the information infrastructure have not yet been adopted. Should we call this struggle a war? If so, what laws and rules govern conduct? How serious is the threat of malicious intrusions into—and manipulation of—information systems, and can the vulnerabilities, particularly in the Internet, be sufficiently reduced? Should we respond to these intrusions in kind, and if so, by which agencies and by what means? And what is the role of U.S. armed forces in a battle of words? Recent events have converged to bring the subject of network vulnerability, threats, risks and responses to the fore.
Cyberwar, Anyone? |
|
Air Force Refocuses Network Defense |
|
|
Topic: Military Technology |
11:03 pm EST, Jan 3, 2008 |
Did you read the original Unrestricted Warfare meme? (No one re-recommended it.) How about the one that Acidus recently posted? Or Rattle's notes from September? Cyberspace is the latest realm that the U.S. Defense Department is seeking to dominate in its efforts to protect national security and to project force. But this goal has not gone unchallenged as hackers from a variety of nations and criminal and terrorist organizations have tried to penetrate government networks to steal information or cause damage. The Defense Department has become adept at protecting its network perimeters with firewalls and intrusion detection systems. However, in recent years, hackers have found ways to access government networks through weaknesses in existing applications such as logistics or command and control systems. To counter these threats, the U.S. Air Force recently launched the Application Software Assurance Center of Excellence (ASACE) to assess and strengthen its defenses against internal attack.
See also, Service Improves Defense Against Application-Level Attacks: The U.S. Air Force is building an Application Software Assurance Center of Excellence to detect threats to its applications and prevent scans from becoming full-blown attacks. The move is due in part to the increase in the number of scans the Global Information Grid receives each day, now up to more than 3 million. The center will be located at the Air Force’s 754th Electronic Systems Group, Maxwell Air Force Base. Among the security measures that will be used are source code analysis, penetration testing, application shielding and database monitoring. Telos Corporation is providing the software and services for the project.
This transition is raising concern in military circles that there will be break-in attempts, such as using SQL injection attacks, cross-site scripting or other assault methods to try to throw Web-based logistics systems into disarray.
Fortify Software won the biggest piece of the initiative and will provide the Air Force with more than $7 million in software. The Air Force will buy and use three Fortify software packages, each designed to look for a specific class of security vulnerabilities during the software development process when flaws are most likely to occur and are the easiest to fix.
As the prime contractor, Telos assembled a team including application security industry leaders that specialize in source code analysis, Web application penetration and security testing, application shielding, database monitoring, training, and implementation services. The team includes Cigital Inc., Fortify Software Inc., IBM/Watchfire Corporation, and Application Security Inc.
No sign of HP/SPI? Air Force Refocuses Network Defense |
|
New Study Shows Remixes Could Be Quoting Copyrighted Material Legally |
|
|
Topic: Intellectual Property |
11:03 pm EST, Jan 3, 2008 |
When college kids make mashups of Hollywood movies, are they violating the law? Not necessarily, according to the latest study on copyright and creativity from the Center for Social Media and American University’s Washington College of Law. The study, Recut, Reframe, Recycle: Quoting Copyrighted Material in User-Generated Video, by Center director Pat Aufderheide and Peter Jaszi, co-director of the law school’s Program on Information Justice and Intellectual Property, shows that many uses of copyrighted material in today’s online videos are eligible for fair use consideration. The study points to a wide variety of practices—satire, parody, negative and positive commentary, discussion-triggers, illustration, diaries, archiving and of course, pastiche or collage (remixes and mashups)—all of which could be legal in some circumstances. Aufderheide and Jaszi are appearing at the Consumer Electronics Show, the largest such trade show in the world, on Jan. 7 to discuss the research.
On review, this seems like a lot of nothing, or rather, a publicity ploy for this Center. New Study Shows Remixes Could Be Quoting Copyrighted Material Legally |
|
Topic: War on Terrorism |
11:03 pm EST, Jan 3, 2008 |
Presidential candidate Bill Richardson, in Wednesday's Boston Globe: PRESIDENT PERVEZ MUSHARRAF of Pakistan must go. Rather than waging the "unstinted" war against Al Qaeda that he promised, he has become a source of instability that terrorists are exploiting. Pakistan urgently needs a new government, and the United States should suspend all nonterrorism-related military aid until Musharraf steps aside.
Musharraf must go |
|
US needs to get tough with Pakistan |
|
|
Topic: War on Terrorism |
11:03 pm EST, Jan 3, 2008 |
Instead of treating Pakistan like the ally it isn't, the country should be treated like the national security problem it has become. Moreover, Bush should be careful with his language. The United States needs to be tough with Pakistan, not gullible.
Good luck with that ... US needs to get tough with Pakistan |
|
Three cures for three crises | Brad DeLong, in the Taipei Times |
|
|
Topic: Politics and Law |
11:03 pm EST, Jan 3, 2008 |
Since late summer, the US Federal Reserve has been attempting to manage the slow-moving financial crisis triggered by the collapse of the US housing bubble. At the start, the Fed assumed that it was facing a first-mode crisis -- a mere liquidity crisis -- and that the principal cure would be to ensure the liquidity of fundamentally solvent institutions. But the Fed has shifted over the past two months toward policies aimed at a second-mode crisis -- more significant monetary loosening, despite the risks of higher inflation, extra moral hazard and unjust redistribution. As Fed Vice Chair Don Kohn recently put it: "We should not hold the economy hostage to teach a small segment of the population a lesson." No policymakers are yet considering the possibility that the financial crisis might turn out to be in the third mode.
Three cures for three crises | Brad DeLong, in the Taipei Times |
|
Ridicule That's Getting On Our Nerds |
|
|
Topic: Society |
11:03 pm EST, Jan 3, 2008 |
On this New Year's Day, spare a thought for the hapless nerd. Clad in too-short, too-tight pants, armed with a pocket protector, glasses firmly taped together and pimples unpopped, the nerds of this nation most likely rang in the New Year with a rousing game of World of Warcraft. They probably didn't even hear the ball drop at midnight. That is, if there really is such a thing as a nerd.
Contrast this with: What is a nerd? Mary Bucholtz, a linguist at UCSB, has concluded that nerdiness is largely a matter of racially tinged behavior. People who are considered nerds tend to act in ways that are, as she puts it, “hyperwhite.”
See also: The mediocrity of American public schools has worse consequences than just making kids unhappy for six years. It breeds a rebelliousness that actively drives kids away from the things they're supposed to be learning.
Ridicule That's Getting On Our Nerds |
|
Review of 'The Rough Guide to Film' |
|
|
Topic: Arts |
11:03 pm EST, Jan 3, 2008 |
Following on the [citation needed] tip: Undisclosed sources for contents are rarely a good sign in a British meat product. This book suggests that much the same rule pertains to collections of criticism.
(This book is not recommended, but I found the quote amusing.) Review of 'The Rough Guide to Film' |
|