| |
Current Topic: Technology |
|
New York Times Link Generator |
|
|
Topic: Technology |
3:42 pm EST, Feb 24, 2007 |
Need to link to a New York Times article from your weblog? Enter your link here, and we'll give you the weblog-safe link.
What does "weblog-safe" mean? If you look at the URLs of each of the stories, you'll see that there's information encoded after the question mark. Here's an example. The special coding tells the Times's server that the link is coming from a weblog, and now and in the future, this link will work without a fee to access the archive.
There's also a bookmarklet, but I can't include the link here (directly). The source code (in Python) is available. Basically they're just doing a database lookup. With this, perhaps MemeStreams could normalize NYT URLs as they are blogged, so that the click-throughs continue to work later on. Alternately, they could be used on click-through, in conjunction with the redirect function. For example: if you visit this page from 2005, entitled "A Film Offers Buckets of Blood in Three Designer Colors", you're hoping to see a review of Sin City. If you click through, you hit the walled garden and are served only the abstract. If you pass it through the link generator, you get a link that takes you through to the full text, complete with images. New York Times Link Generator |
|
Government research to track online networking |
|
|
Topic: Technology |
3:37 pm EST, Feb 24, 2007 |
The Department of Homeland Security is paying Rutgers $3 million to oversee development of computing methods that could monitor suspicious social networks and opinions found in news stories, Web blogs and other Web information to identify indicators of potential terrorist activity. The software and algorithms could rapidly detect social networks among groups by identifying who is talking to whom on public blogs and message boards, researchers said. Computers could ideally pick out entities trying to conceal themselves under different aliases.
Researcher Nick Belkin is one of the PIs; check out his presentation on the "Prospects for information 'selection'" for the Unified Cryptologic Architecture Office. Also: GSA on SIS: The Unified Cryptologic Architecture Office (UCAO) is developing a secure information sharing architecture, called HatWizard, to support intelligence information dissemination within the cryptologic community.
Also: Trust Architecture for Future Intelligence Processing, alternately titled "A Trust Framework for the DoD Network-Centric Enterprise Services (NCES) Environment". Government research to track online networking |
|
Against Well-designed Reputation Systems |
|
|
Topic: Technology |
11:51 pm EST, Feb 19, 2007 |
This Clay Shirky piece is a couple of weeks old now, but no one else mentioned it, and I just found it. Intro: I was part of a group of people asked by Beth Noveck to advise the Community Patent review project about the design of a reputation and ranking system, to allow the widest possible input while keeping system gaming to a minimum. This was my reply, edited slightly for posting here.
Against Well-designed Reputation Systems |
|
Topic: Technology |
11:51 pm EST, Feb 19, 2007 |
Soundflower is a Mac OS X (10.2 and later) system extension that allows applications to pass audio to other applications. Soundflower is easy to use, it simply presents itself as an audio device, allowing any audio application to send and receive audio with no other support needed. Soundflower is free, open-source, and runs on Mac Intel and PPC computers.
soundflower |
|
Topic: Technology |
8:34 am EST, Feb 18, 2007 |
Haskell is a computer programming language. In particular, it is a polymorphicly typed, lazy, purely functional language, quite different from most other programming languages. The language is named for Haskell Brooks Curry, whose work in mathematical logic serves as a foundation for functional languages. Haskell is based on lambda calculus, hence the lambda we use as a logo.
Haskell |
|
Books: Mapped | Inside Google Book Search |
|
|
Topic: Technology |
11:28 am EST, Feb 3, 2007 |
Why not visualize places mentioned in books on a map? Now you can. Our team has begun to animate the static information found in books by organizing a sample of locations from them on an interactive Google Map, with snippets of text from the book, and links to the actual pages where the locations are mentioned. When our automatic techniques determine that there are a good number of quality locations from a book to show you, you'll find a map on the "About this book" page.
Books: Mapped | Inside Google Book Search |
|
Many Eyes: for shared visualization and discovery |
|
|
Topic: Technology |
11:28 am EST, Feb 3, 2007 |
Welcome to the alpha version of Many Eyes! View your data, ask questions, and share your discoveries. Harness the collective intelligence of the net for insight and analysis. Many Eyes is a bet on the power of human visual intelligence to find patterns. Our goal is to "democratize" visualization and to enable a new social kind of data analysis. Jump right to our visualizations now, take a tour, or read on for a leisurely explanation of the project.
Many Eyes: for shared visualization and discovery |
|
Open Web Application Security Project |
|
|
Topic: Technology |
9:21 pm EST, Dec 5, 2006 |
The Open Web Application Security Project (OWASP) is dedicated to finding and fighting the causes of insecure software. Everything here is free and open source. The OWASP Foundation is a 501c3 not-for-profit charitable organization that ensures the ongoing availability and support for our work. Participation in OWASP is free and open to all.
Open Web Application Security Project |
|
Mobile Communication and Society, by Manuel Castells |
|
|
Topic: Technology |
10:25 am EST, Nov 19, 2006 |
In April, I noted that Manuel Castells "has a new book on the way". This book is now on sale. Wireless networks are the fastest growing communications technology in history. Are mobile phones expressions of identity, fashionable gadgets, tools for life--or all of the above? Mobile Communication and Society looks at how the possibility of multimodal communication from anywhere to anywhere at any time affects everyday life at home, at work, and at school, and raises broader concerns about politics and culture both global and local. Drawing on data gathered from around the world, the authors explore who has access to wireless technology, and why, and analyze the patterns of social differentiation seen in unequal access. They explore the social effects of wireless communication--what it means for family life, for example, when everyone is constantly in touch, or for the idea of an office when workers can work anywhere. Is the technological ability to multitask further compressing time in our already hurried existence? The authors consider the rise of a mobile youth culture based on peer-to-peer networks, with its own language of texting, and its own values. They examine the phenomenon of flash mobs, and the possible political implications. And they look at the relationship between communication and development and the possibility that developing countries could "leapfrog" directly to wireless and satellite technology. This sweeping book--moving easily in its analysis from the United States to China, from Europe to Latin America and Africa--answers the key questions about our transformation into a mobile network society.
You can read Chapter 1 as an introduction. The purpose of this book is to use social research to answer the questions surrounding the transformation of human communication by the rise and diffusion of wireless digital communication technologies.
The data-intensive appendices are also freely available. Mobile Communication and Society, by Manuel Castells |
|