Create an Account
username: password:
 
  MemeStreams Logo

Post Haste

search

possibly noteworthy
Picture of possibly noteworthy
My Blog
My Profile
My Audience
My Sources
Send Me a Message

sponsored links

possibly noteworthy's topics
Arts
Business
Games
Health and Wellness
Home and Garden
Miscellaneous
  Humor
Current Events
  War on Terrorism
Recreation
Local Information
  Food
Science
Society
  International Relations
  Politics and Law
   Intellectual Property
  Military
Sports
Technology
  Military Technology
  (High Tech Developments)

support us

Get MemeStreams Stuff!


 
Current Topic: High Tech Developments

Cloud computing is a trap
Topic: High Tech Developments 7:33 am EDT, Oct  1, 2008

Stallman:

"It's stupidity. It's worse than stupidity: it's a marketing hype campaign."

Ellison:

"The computer industry is the only industry that is more fashion-driven than women's fashion. Maybe I'm an idiot, but I have no idea what anyone is talking about. What is it? It's complete gibberish. It's insane. When is this idiocy going to stop?"

Cloud computing is a trap


Large-Scale Recommender Systems and the Netflix Prize Competition
Topic: High Tech Developments 7:28 am EDT, Aug 26, 2008

Papers from a workshop:

A Modified Fuzzy C-Means Algorithm For Collaborative Filtering

Putting the collaborator back into collaborative filtering

From hits to niches? or how popular artists can bias music recommendation and discovery

Investigation of Various Matrix Factorization Methods for Large Recommender Systems

Improved Neighborhood-Based Algorithms for Large-Scale Recommender Systems

Large-Scale Recommender Systems and the Netflix Prize Competition


The End is Near, but is IPv6?
Topic: High Tech Developments 7:28 am EDT, Aug 26, 2008

As of this blog posting, exactly 900 days remain until the end of the Internet, or at least the exhaustion of IPv4 registry allocations. And you don’t have to take my word for it, even the normally staid London Times and Fox News proclaimed, “Internet meltdown ... The world is heading for a digital doomsday”.

Heady stuff.

Of course, IPv6 (or the new IPv4) was supposed to take care of all of this — billions of billions of new IP addresses, hardened security built in from the start, and an elegant new architecture to replace all of IPv4’s hacks.

So what happened to IPv6?

The End is Near, but is IPv6?


History of Predictive Text Swearing
Topic: High Tech Developments 7:24 am EDT, Aug 19, 2008

Armstrong and Miller genius work on why texting won't let you swear.

(pnsfw for language)

History of Predictive Text Swearing


pHash, the perceptual hash extraction library
Topic: High Tech Developments 7:51 am EDT, Aug 14, 2008

What is a perceptual hash?

A perceptual hash is a fingerprint of an audio, video or image file that is mathematically based on the audio or visual content contained within. Unlike usual hash functions that rely on the avalanche effect of small changes in input leading to drastic changes in the output, perceptual hashes are "close" to one another if the inputs are visually or auditorily similar. As a result, perceptual hashes must also be robust enough to take into account transformations that could have been performed on the input, such as rotation, skew, altering contrast, etc. All of these properties make perceptual hashes a very interesting computer science problem to study.

What is pHash?

pHash is an open source library released under the GPLv3 license that implements several perceptual hashing algorithms and provides a C++ API to use those functions in your own programs.

pHash, the perceptual hash extraction library


Applied Security Visualization
Topic: High Tech Developments 7:51 am EDT, Aug 14, 2008

As networks become ever more complex, securing them becomes more and more difficult. The solution is visualization. Using today’s state-of-the-art data visualization techniques, you can gain a far deeper understanding of what’s happening on your network right now. You can uncover hidden patterns of data, identify emerging vulnerabilities and attacks, and respond decisively with countermeasures that are far more likely to succeed than conventional methods.

In Applied Security Visualization, leading network security visualization expert Raffael Marty introduces all the concepts, techniques, and tools you need to use visualization on your network. You’ll learn how to identify and utilize the right data sources, then transform your data into visuals that reveal what you really need to know. Next, Marty shows how to use visualization to perform broad network security analyses, assess specific threats, and even improve business compliance.

He concludes with an introduction to a broad set of visualization tools. The book’s CD also includes DAVIX, a compilation of freely available tools for security visualization.

Applied Security Visualization


Down for everyone or just me?
Topic: High Tech Developments 7:26 am EDT, Aug 12, 2008

Is **** down for everyone or just me?

Try it with recursion!

Down for everyone or just me?


WaveScope
Topic: High Tech Developments 7:26 am EDT, Aug 12, 2008

WaveScope is a system for developing distributed, high-rate applications that need to process streams of data from various sources (e.g., sensors) using a combination of signal processing and database (event stream processing) operations. The execution environment for these applications ranges from embedded sensor nodes to multicore/multiprocessor servers.

WaveScope


Beautiful Code, Compelling Evidence: Functional Programming for Information Visualization and Visual Analytics
Topic: High Tech Developments 7:26 am EDT, Aug 12, 2008

OpenGL is powerful, but it can also be more complicated than actually necessary. For applications involving 2D graphics, a low amount of interactivity, and a smaller amount of data, it would be simpler not to bother with the video card and the rendering pipeline. Additionally, some visualizations are meant for print form. The Gnome Foundation’s Cairo 2D graphics toolkit is perfect for these applications. As luck would have it, Haskell also has an excellent binding to Cairo.

Three other things make Haskell ideally suited to information visualization and visual analytics: a well-thought out and extensible library of generic data structures, lazy evaluation, and the separation of data transformation code from input/output inherent in a pure functional programming language. Visualizations written in Haskell tend naturally to break up into portions of reusable and visualization specific code. Thus, programs for visualization written in Haskell maintain readability and reusability as well or better than Python, but do not suffer the performance problems of an interpreted language.

For much the same reason as Simon Peyton-Jones put together Tackling the Awkward Squad, I have put together these lecture notes. I hope these will bring a programmer interested in visualization and open to the aesthetic advantages of functional programming up to speed on both topics.

Beautiful Code, Compelling Evidence: Functional Programming for Information Visualization and Visual Analytics


Touch Is the Future at H-P
Topic: High Tech Developments 7:45 am EDT, Aug  7, 2008

H-P says it's working on an array of products, including notebooks, that use the very same type of finger-tapping interface popularized by Apple Inc.'s iPhone. H-P's so keen on the idea that it says it's trying to get touch-enabled notebook computers on the market within the next 18 months.

"We're focused on recognizing the potential of touch now," said Phil McKinney, the chief technology officer for the company's laptop-making Personal Systems Group. "We see touch as the almost preferred method for nontechnical users."

Touch Is the Future at H-P


(Last) Newer << 1 - 2 - 3 - 4 - 5 - 6 - 7 - 8 ++ 18 >> Older (First)
 
 
Powered By Industrial Memetics
RSS2.0