Create an Account
username: password:
 
  MemeStreams Logo

What questions are you asking yourself?

search

Jeremy
My Blog
My Profile
My Audience
My Sources
Send Me a Message

sponsored links

Jeremy's topics
Arts
  Literature
   Classical
   Fiction
   Horror
   Non-Fiction
   Sci-Fi/Fantasy Literature
  Movies
   Movie Genres
    Action/Adventure
    Cult Films
    Documentary
    Drama
    Horror
    Independent Films
    Film Noir
    Sci-Fi/Fantasy Films
    War
  Music
   Music Styles
    Classical
    Electronic Music
    Rap & Hip Hop
    IDM
    Jazz
    World Music
  TV
   TV Documentary
   TV Drama
   SciFi TV
Business
  Finance & Accounting
  Industries
   Tech Industry
   Telecom Industry
  Management
  Markets & Investing
Games
  Video Games
   PC Video Games
   Console Video Games
Health and Wellness
  Medicine
Home and Garden
  Cooking
  Entertaining
Miscellaneous
  Humor
  MemeStreams
   Using MemeStreams
Current Events
  War on Terrorism
  Elections
  Israeli/Palestinian
Recreation
  Cars and Trucks
  Travel
Local Information
  United States
   California
    SF Bay Area
   Events in Washington D.C.
   News for Washington D.C.
   Georgia
    Atlanta
     Atlanta Events
Science
  Biology
  History
  Math
  Medicine
  Nano Tech
  Physics
Society
  Economics
  Education
  Futurism
  International Relations
  History
  Politics and Law
   Civil Liberties
    Internet Civil Liberties
    Surveillance
   Intellectual Property
  Media
   Blogging
  Military
  Philosophy
Technology
  Biotechnology
  Computers
   Computer Security
    Cryptography
   PC Hardware
   Human Computer Interaction
   Computer Networking
   Macintosh
   Software Development
    Open Source Development
  Military Technology
  High Tech Developments

support us

Get MemeStreams Stuff!


 
compos mentis. Concision. Media. Clarity. Memes. Context. Melange. Confluence. Mishmash. Conflation. Mellifluous. Conviviality. Miscellany. Confelicity. Milieu. Cogent. Minty. Concoction.

Building Secure Software: How to Avoid Security Problems the Right Way
Topic: Computer Security 2:35 pm EST, Jan  5, 2002

"Building Secure Software cuts to the heart of computer security to help you get security right the first time. If you are serious about computer security, you need to read this book, which includes essential lessons for both security professionals who have come to realize that software is the problem, and software developers who intend to make their code behave. Written for anyone involved in software development and use--from managers to coders--this book is your first step toward building more secure software. Building Secure Software provides expert perspectives and techniques to help you ensure the security of essential software. If you consider threats and vulnerabilities early in the devel-opment cycle you can build security into your system. With this book you will learn how to determine an acceptable level of risk, develop security tests, and plug security holes before software is even shipped."

One of the chapters of this book is entitled "trust management and input." Although the site appears to offer a sample chapter, it is not currently available at the specified URL.

Building Secure Software: How to Avoid Security Problems the Right Way


Who Owns Academic Work? Battling for Control of Intellectual Property
Topic: Intellectual Property 2:19 pm EST, Jan  5, 2002

Who Owns Academic Work? Battling for Control of Intellectual Property

By Corynne McSherry

Who owns academic work? This question is provoking political and legal battles, fought on uncertain terrain, for ever-higher stakes. The posting of faculty lecture notes on commercial Web sites is being hotly debated in multiple forums, even as faculty and university administrators square off in a battle for professorial copyright. In courtrooms throughout the country, universities find themselves embroiled in intricate and expensive patent litigation. Meanwhile, junior researchers are appearing in those same courtrooms, using intellectual property rules to challenge traditional academic hierarchies. All but forgotten in these ownership disputes is a more fundamental question: should academic work be owned at all? Once characterized as a kind of gift, academic work -- and academic freedom -- are now being reframed as private intellectual property.

Drawing on legal, historical, and qualitative research, Corynne McSherry explores the propertization of academic work and shows how that process is shaking the foundations of the university, the professoriate, and intellectual property law. The modern university's reason for being is inextricably tied to that of the intellectual property system. The rush of universities and scholars to defend their knowledge as property dangerously undercuts a working covenant that has sustained academic life -- and intellectual property law--for a century and a half. As the value structure of the research university is replaced by the inequalities of the free market, academics risk losing a language for talking about knowledge as anything other than property. McSherry has written a book that ought to deeply trouble everyone who cares about the academy.

The full text of this Harvard University Press book is available for online browsing in PDF format. (287 pages)

Who Owns Academic Work? Battling for Control of Intellectual Property


New Trajectories of the Internet: Umbrellas, Traction, Lift and Other Phenomena
Topic: High Tech Developments 2:14 pm EST, Jan  5, 2002

Excerpts from the publisher's overview:

Stephen Arnold?s latest book provides a clear statement of the new uses of the Internet and how to take advantage of these remarkable developments. The central argument of the book is that the Internet is not a function, like electronic mail, but a new architecture. This structure can enable functions and data on legacy systems and new peer-to-peer architectures.

This study places equal emphasis on technology and business strategy. [...]

This book provides a balanced view of portals, personalisation, intranets, knowledge management and content management, among other trends.

Search and retrieval has become a ubiquitous service. However, the search-and-retrieval function often disappoints more than it satisfies. Important new developments in indexing, searching and displaying information are moving from test centres to the mainstream. [...]

Pricing services is a key component of a successful business model. As the economic environment undergoes rapid change, online users need guidelines for assembling pricing models. [...]

A wealth of tables, illustrations, examples, a glossary, and pointers to useful Web resources make this a must-have study [...]

The book's table of contents and a sample chapter are available in PDF at the publisher's web site.

New Trajectories of the Internet: Umbrellas, Traction, Lift and Other Phenomena


Biological Security in a Changed World
Topic: Politics and Law 10:55 pm EST, Jan  4, 2002

Continuing the biotech regulation/security theme, here's one from the September 28 issue of _Science_. This was referenced by a letter (and response) in the 4 Jan 2002 issue of _Science_, entitled "A Unified Definition of Biosecurity". (No summary is available; full text at http://www.sciencemag.org/cgi/content/full/295/5552/44a for subscribers only.)

Biological Security in a Changed World
Christopher F. Chyba

The horrifying events of 11 September 2001 serve notice that civilization will confront severe challenges in the 21st century. As national security budgets expand in response, we should recognize that only a broad conception of security will be adequate to meet some of the threats that we may face. Biological security provides a powerful example. It must address both the challenge of biological weapons and that of infectious disease. The right approach should benefit public health even if major acts of biological terrorism never occur. Our thinking about biological security must transcend old misplaced analogies to nuclear and chemical security.

Nuclear security has been based on nonproliferation, deterrence, and defense, with intelligence woven throughout. [...]

Effective biological security requires a different mix. [...]

The transfer of dangerous biological agents should be controlled where possible, and the spread of the technologies and personnel to weaponize them should be impeded. But any biological nonproliferation regime will necessarily be less robust than its nuclear counterpart, [...]

Biological terrorism also challenges requirements for successful deterrence. [...]

In the face of these difficulties, good intelligence is all the more important. [...]

Because of disease incubation times, the first responders to a biological attack may well be health care workers at hospitals and clinics rather than specialized units. The speed and effectiveness of a response will depend on disease surveillance [...]

Disease surveillance and response are not nonproliferation measures, so cannot substitute for an effective verification regime under the Biological Weapons Convention. But biological security requires the developed world, especially the United States, to see that its ongoing self-interest is closely allied with sustainable public health improvements in the developing world. And the explosion of biotechnology, with the weapons implications that follow from it, requires the scientific community to discuss its responsibilities in earnest. [...]

Christopher Chyba is co-director of Stanford's Center for International Security and Cooperation, associate professor (Research) in the Department of Geological and Environmental Sciences, and Carl Sagan Chair for the Study of Life in the Universe at the SETI Institute. He served on the staff of the National Security Council under President Clinton.

The article summary is available with free registration; full text available by subscription.

Biological Security in a Changed World


How to regulate science | Francis Fukuyama, The Public Interest, Winter 2002
Topic: Politics and Law 8:32 pm EST, Jan  4, 2002

In the ongoing debate that was (re)ignited with Bill Joy's April 2000 article in Wired magazine ("Why the future doesn't need us"), Francis Fukuyama writes about biotech regulation in the Winter 2002 issue of The Public Interest. Abstract/summary/intro included below.

How to Regulate Science
By Francis Fukuyama

Both those who embrace new biotechnologies and those who are wary of them tend to claim that the advance of science is beyond social control. Francis Fukuyama argues that this fatalism is mistaken: Science can be effectively regulated, if we possess the political will to do so. Existing regulatory agencies such as the FDA, however, are not the right organizations for this new and distinctive work.

(Note: this is a temporary URL -- this article will go offline or be moved in Spring 2002.)

How to regulate science | Francis Fukuyama, The Public Interest, Winter 2002


CryptoHeaven Secure Free Email, Online Storage, File Sharing
Topic: Cryptography 10:05 pm EST, Jan  1, 2002

CryptoHeaven offers online, Internet accessible secure services: Secure Free and Premium Email; Secure File Storage, File Sharing and File Distribution; Secure Instant Messaging and Chatting

CryptoHeaven ... accelerates wide spread use of ... cryptography ... without restrictions. ... CryptoHeaven is a user-friendly, no-compromise information-heaven crypto system. ... Information is stored in encrypted form on the server as generated by the client, and only the sender and the recipient possess the keys to gain access to the information. ... We use ... AES ... Rijndael cipher, ... public-key cryptography, ... and SHA-256 ...

CryptoHeaven Secure Free Email, Online Storage, File Sharing


SXSW Interactive Festival - March 8-12 2002, Austin, TX
Topic: High Tech Developments 9:37 pm EST, Jan  1, 2002

SXSW -- basically a new media meet-and-greet networking event. Find work, food, fun, and maybe some money for your projects-to-be.

Larry Lessig (author/lawyer/professor), Steven Levy (author), Jeff Veen (Webmonkey), Bruce Sterling (author, etc.), Cory Doctorow (author/OpenCola/BoingBoing), and numerous others are on the list of speakers.

Here's a promo quote from the web site:

"I was overly impressed with the SXSW conference last year, as in the past I had mostly gone to large conferences with sessions that focused on VPs of companies who were trying to sell their products. At SXSW the sharing of experiences and knowledge by people actually doing the development, design, and/or project management was a blessing."

For the keynote, Doctorow and Sterling will discuss "the death of scarcity."

SXSW Interactive Festival - March 8-12 2002, Austin, TX


Scientists Sequence Largest Human Chromosome
Topic: Science 4:17 pm EST, Dec 30, 2001

Summary excerpted from the Scout report:

Scientists announced Wednesday [December 19, 2001] that they had deciphered chromosome 20, the largest of the three chromosomes to be sequenced thus far. Researchers hope that this latest advance by the Human Genome Project will help explain why some people are more susceptible to diseases such as diabetes or obesity. Also the gene that seems to make some a higher risk for Cruetzfeldt--Jakob Disease, the human version of Mad Cow Disease, is found on chromosome 20.

This page includes links to news coverage from Reuters, AP, and BBC, as well as technical articles published in _Nature_.

Scientists Sequence Largest Human Chromosome


The Campaign against International Terrorism: prospects after the fall of the Taliban [PDF]
Topic: Politics and Law 4:14 pm EST, Dec 30, 2001

Summary excerpted from the Scout Report:

The library of the United Kingdom's House of Commons has published this research paper entitled The Campaign against International Terrorism: prospects after the fall of the Taliban_, available for download in .pdf format from the Parliament Website. The authors are Tim Youngs, Paul Bowers and Mark Oakes of the International Affairs and Defence Section. Contents of the text include details of fighting and bombing in Afghanistan, the Bonn Agreement and future political arrangements in Afghanistan, the Al-Qaeda in other countries, and measures by the United Nations to counter terrorism. The 65-page report includes the text of the Bonn Agreement and a nicely detailed color map of Afghanistan.

The Campaign against International Terrorism: prospects after the fall of the Taliban [PDF]


'Bit Player' -- James Gleick on Claude Shannon | NYT
Topic: Science 3:50 pm EST, Dec 30, 2001

Bestselling science author James Gleick (_Chaos_, _Faster_, _Genius_) recalls the many achievements of Claude Shannon, father of information theory and accomplished scientist at Bell Labs and MIT. Shannon died in Massachusetts early in 2001.

Published in the December 30 issue of the New York Times Magazine.

'Bit Player' -- James Gleick on Claude Shannon | NYT


(Last) Newer << 182 ++ 192 - 193 - 194 - 195 - 196 - 197 - 198 - 199 - 200 ++ 210 >> Older (First)
 
 
Powered By Industrial Memetics
RSS2.0