Create an Account
username: password:
 
  MemeStreams Logo

Post Haste

search

possibly noteworthy
Picture of possibly noteworthy
My Blog
My Profile
My Audience
My Sources
Send Me a Message

sponsored links

possibly noteworthy's topics
Arts
Business
Games
Health and Wellness
Home and Garden
Miscellaneous
  Humor
Current Events
  War on Terrorism
Recreation
Local Information
  Food
Science
Society
  International Relations
  Politics and Law
   Intellectual Property
  Military
Sports
(Technology)
  Military Technology
  High Tech Developments

support us

Get MemeStreams Stuff!


 
Current Topic: Technology

Interview with Donald Knuth
Topic: Technology 6:44 am EDT, Apr 28, 2008

Andrew Binstock and Donald Knuth converse on the success of open source, the problem with multicore architecture, the disappointing lack of interest in literate programming, the menace of reusable code, and that urban legend about winning a programming contest with a single compilation.

Interview with Donald Knuth


Designing and implementing malicious hardware
Topic: Technology 6:44 am EDT, Apr 28, 2008

Hidden malicious circuits provide an attacker with a stealthy attack vector. As they occupy a layer below the entire software stack, malicious circuits can bypass traditional defensive techniques. Yet current work on trojan circuits considers only simple attacks against the hardware itself, and straightforward defenses. More complex designs that attack the software are unexplored, as are the countermeasures an attacker may take to bypass proposed defenses.

We present the design and implementation of Illinois Malicious Processors (IMPs). There is a substantial design space in malicious circuitry; we show that an attacker, rather than designing one specific attack, can instead design hardware to support attacks. Such flexible hardware allows powerful, general purpose attacks, while remaining surprisingly low in the amount of additional hardware. We show two such hardware designs, and implement them in a real system. Further, we show three powerful attacks using this hardware, including a login backdoor that gives an attacker complete and highlevel access to the machine. This login attack requires only 1341 additional gates: gates that can be used for other attacks as well. Malicious processors are more practical, more flexible, and harder to detect than an initial analysis would suggest.

Designing and implementing malicious hardware


l33t-eyechart
Topic: Technology 9:10 pm EDT, Apr 25, 2008

l33t-eyechart


The Photoshop Guys Revealed!
Topic: Technology 9:09 pm EDT, Apr 25, 2008

So who is responsible for the success of the 10-part serial? The series features a hapless, angry, cuckolded, mad-Photoshop-skillz-enabled narrator named Donnie Hoyle and does three things amazingly well: it gives a terrific overview of some key Photoshop techniques; it has an oddly compelling narrative; and it's wildly funny. It started in December 2007 and ended earlier this month when Donnie suddenly disappeared. Some eight million page views and two Webby Award 2008 nominations (Best Comedy and Best How-To Series) after it launched, a mystery remains: Who is Donnie Hoyle?

The Photoshop Guys Revealed!


Vee
Topic: Technology 9:09 pm EDT, Apr 25, 2008

Vee is a command-line blog tool that is very portable across Unix systems. It provides an interactive as well as a batch interface to maintain a log of entries. Formatting is done using a module architecture that allows a high degree of customization. There are minimal flags and no set up is required.

Vee


A summary of design rules, by Jef Raskin
Topic: Technology 6:57 am EDT, Apr 23, 2008

An interface should be effective, habituating, reliable, efficient, and tested. To the extent that doing so does not conflict with these essentials, an interface should also be attractive.

A summary of design rules, by Jef Raskin


BBC - BBC Four - The Medieval Season - Stephen Fry and the Gutenberg Press
Topic: Technology 9:52 am EDT, Apr 21, 2008

In this revealing documentary, Stephen Fry investigates the story of one of the most important machines ever invented - the Gutenberg Press.

The printing press was the world's first mass-production machine. Its invention in the 1450s changed the world as dramatically as splitting the atom or sending men into space, sparking a cultural revolution that shaped the modern age. It is the machine that made us who we are today.

Stephen's investigation combines historical detective work and a hands-on challenge. He travels to France and Germany on the trail of Johannes Gutenberg, the inventor of the printing press and early media entrepreneur. Along the way he discovers the lengths Gutenberg went to keep his project secret, explores the role of avaricious investors and unscrupulous competitors, and discovers why printing mattered so much in medieval Europe.

But to really understand the man and his machine, Stephen gets his hands dirty - assembling a team of craftsmen and helping them build a working replica of Gutenberg's original press. He learns how to make paper the 15th-century way and works as an apprentice in a metal foundry in preparation for the experiment to put the replica press through its paces. Can Stephen's modern-day team match the achievement of Gutenberg's medieval craftsmen?

BBC - BBC Four - The Medieval Season - Stephen Fry and the Gutenberg Press


Micro-bloggers get mobilised
Topic: Technology 9:52 am EDT, Apr 21, 2008

"A beautiful blog entry is an art form, and it takes time. So, micro-blogging fits into your life where you take a minute or two to see what's going on and go back to work."

Micro-bloggers get mobilised


iodine
Topic: Technology 9:52 am EDT, Apr 21, 2008

iodine lets you tunnel IPv4 data through a DNS server. This can be usable in different situations where internet access is firewalled, but DNS queries are allowed.

It runs on Linux, Mac OS X, FreeBSD, NetBSD and OpenBSD and needs a TUN/TAP device. The bandwidth is assymetrical with limited upstream and up to 1 Mbit/s downstream.

iodine


Digsby
Topic: Technology 9:52 am EDT, Apr 21, 2008

Instant Messaging. digsby is a multiprotocol IM client that lets you chat with all your friends on AIM, MSN, Yahoo, ICQ, Google Talk, and Jabber with one simple to manage buddy list.

Email Notifications. digsby is an email notification tool that alerts you of new email and lets you perform actions such as 'Delete' or 'Report Spam' with just one click.

Social Networking. digsby is a social networking tool that alerts you of events like new messages and gives you a live Newsfeed of what your friends are up to.

Digsby


(Last) Newer << 2 ++ 12 - 13 - 14 - 15 - 16 - 17 - 18 - 19 - 20 ++ 30 >> Older (First)
 
 
Powered By Industrial Memetics
RSS2.0