Create an Account
username: password:
 
  MemeStreams Logo

Post Haste

search

possibly noteworthy
Picture of possibly noteworthy
My Blog
My Profile
My Audience
My Sources
Send Me a Message

sponsored links

possibly noteworthy's topics
Arts
Business
Games
Health and Wellness
Home and Garden
Miscellaneous
  Humor
Current Events
  War on Terrorism
Recreation
Local Information
  Food
Science
Society
  International Relations
  Politics and Law
   Intellectual Property
  Military
Sports
Technology
  Military Technology
  High Tech Developments

support us

Get MemeStreams Stuff!


 
Being "always on" is being always off, to something.

The Victorian iPod
Topic: High Tech Developments 10:50 am EST, Dec 15, 2007

Amazon’s new e-reader, Kindle, is good because it feels old. Wonder how long that’ll last.

The Victorian iPod


The DOMEX challenge is to turn digital bits into actionable intelligence.
Topic: High Tech Developments 10:50 am EST, Dec 15, 2007

The U.S. intelligence community defines DOMEX as "the processing, translation, analysis, and dissemination of collected hard-copy documents and electronic media, which are under the U.S. government's physical control and are not publicly available." That definition goes on to exclude "the handling of documents and media during the collection, initial review, and inventory process." DOMEX is not about being a digital librarian; it's about being a digital detective.

...

This article introduces electronic document and media exploitation from an academic perspective. It presents a model for performing this kind of exploitation and discusses some of the relevant academic research. Properly done, DOMEX goes far beyond recovering documents from hard drives and storing them in searchable archives. Understanding this engineering problem gives insight that will be useful for designing any system that works with large amounts of unstructured, heterogeneous data.

The DOMEX challenge is to turn digital bits into actionable intelligence.


ETech: Linda Stone
Topic: High Tech Developments 10:50 am EST, Dec 15, 2007

Linda Stone gave a fantastic talk at ETech, continuing to build out her thesis on the changing ways we pay attention. Her talk began by orienting the audience in the same way as her 2005 Supernova talk, but it then went into new territory. Continuous partial attention is neither good nor bad, it just is. And like all evolved techniques, there are situations in which it's useful and situations in which it's a hindrance. Her thoughts on the new strategies we're building were, with Clay's magnificent talk, the highlights of the conference for me.

ETech: Linda Stone


Codename Nemo
Topic: High Tech Developments 10:50 am EST, Dec 15, 2007

What is it?

It's a new way of managing files. Or rather not manage files. Currently it's a cross between a calendar and a file browser with labels. It's a free/open source GTK application written in C#.

Codename Nemo


Covert channel vulnerabilities in anonymity systems
Topic: Technology 10:50 am EST, Dec 15, 2007

The spread of wide-scale Internet surveillance has spurred interest in anonymity systems that protect users’ privacy by restricting unauthorised access to their identity. This requirement can be considered as a flow control policy in the well established field of multilevel secure systems. I apply previous research on covert channels (unintended means to communicate in violation of a security policy) to analyse several anonymity systems in an innovative way.

One application for anonymity systems is to prevent collusion in competitions. I show how covert channels may be exploited to violate these protections and construct defences against such attacks, drawing from previous covert channel research and collusion-resistant voting systems.

In the military context, for which multilevel secure systems were designed, covert channels are increasingly eliminated by physical separation of interconnected single-role computers. Prior work on the remaining network covert channels has been solely based on protocol specifications. I examine some protocol implementations and show how the use of several covert channels can be detected and how channels can be modified to resist detection.

I show how side channels (unintended information leakage) in anonymity networks may reveal the behaviour of users. While drawing on previous research on traffic analysis and covert channels, I avoid the traditional assumption of an omnipotent adversary. Rather, these attacks are feasible for an attacker with limited access to the network. The effectiveness of these techniques is demonstrated by experiments on a deployed anonymity network, Tor.

Finally, I introduce novel covert and side channels which exploit thermal effects. Changes in temperature can be remotely induced through CPU load and measured by their effects on crystal clock skew. Experiments show this to be an effective attack against Tor. This side channel may also be usable for geolocation and, as a covert channel, can cross supposedly infallible air-gap security boundaries.

This thesis demonstrates how theoretical models and generic methodologies relating to covert channels may be applied to find practical solutions to problems in real-world anonymity systems. These findings confirm the existing hypothesis that covert channel analysis, vulnerabilities and defences developed for multilevel secure systems apply equally well to anonymity systems.

Covert channel vulnerabilities in anonymity systems


W00t the Heck?
Topic: Arts 10:50 am EST, Dec 15, 2007

Merriam-Webster’s Word of the Year is …. “W00t”.

I’m not a great language purist (I’m a Webster’s New World fan, and don’t much care for the overly prescriptivist American Heritage), but I don’t know that I would call this interjection from leetspeak a ‘word’ exactly.

I’d have gone with ‘waterboarding’ myself.

W00t the Heck?


Jon Udell: Discovering versus teaching principles of social information management
Topic: Technology 10:50 am EST, Dec 15, 2007

In response to Josh Catone’s observation that del.icio.us has failed to go mainstream, Richard Ziade offers three hypotheses:

1. Nobody really needs a way to centrally store their bookmarks
2. Most people don’t understand what del.icio.us does
3. People don’t feel compelled to share del.icio.us with others

The winning explanation, I am sure, is #2. Nobody understands what del.icio.us does. I am constantly explaining the nature and value of its social information management capabilities. Just this week, in various meetings on Microsoft’s Redmond campus, I found myself reiterating four of my major uses of del.icio.us.

Jon Udell: Discovering versus teaching principles of social information management


Have Afghans Lost Hope?
Topic: Society 10:50 am EST, Dec 15, 2007

Afghans are often credited with maintaining a stubborn optimism in the face of 30 years of war, drought, displacement and lawlessness. Two writers fresh from visits to the country have delivered sharply differing views on whether that sense of hope has survived the country’s latest round of hardship.

Have Afghans Lost Hope?


None of the Above | Malcolm Gladwell
Topic: Science 10:50 am EST, Dec 15, 2007

What I.Q. doesn’t tell you about race.

If what I.Q. tests measure is immutable and innate, what explains the Flynn effect -- the steady rise in scores across generations?

Gladwell reviews What is Intelligence?

None of the Above | Malcolm Gladwell


shopping guide for the data-addicted
Topic: Arts 10:50 am EST, Dec 15, 2007

confess. if you read this blog, you are addicted to data. this means you do not like Christmas presents. in fact, you hate those information-less presents your friends buy you each year. even after patiently telling them "any present should self-update at least each 30 seconds", last year's Christmas was still a disaster, despite that wireless weather station from your wife that is now measuring the temperature & humidity of those boxes on your attic.

starting from $15, here are infosthetics' 20 most wanted Christmas gifts for the info-addicted.

shopping guide for the data-addicted


(Last) Newer << 239 ++ 249 - 250 - 251 - 252 - 253 - 254 - 255 - 256 - 257 ++ 267 >> Older (First)
 
 
Powered By Industrial Memetics
RSS2.0