Create an Account
username: password:
 
  MemeStreams Logo

What questions are you asking yourself?

search

Jeremy
My Blog
My Profile
My Audience
My Sources
Send Me a Message

sponsored links

Jeremy's topics
Arts
  Literature
   Classical
   Fiction
   Horror
   Non-Fiction
   Sci-Fi/Fantasy Literature
  Movies
   Movie Genres
    Action/Adventure
    Cult Films
    Documentary
    Drama
    Horror
    Independent Films
    Film Noir
    Sci-Fi/Fantasy Films
    War
  Music
   Music Styles
    Classical
    Electronic Music
    Rap & Hip Hop
    IDM
    Jazz
    World Music
  TV
   TV Documentary
   TV Drama
   SciFi TV
Business
  Finance & Accounting
  Industries
   Tech Industry
   Telecom Industry
  Management
  Markets & Investing
Games
  Video Games
   PC Video Games
   Console Video Games
Health and Wellness
  Medicine
Home and Garden
  Cooking
  Entertaining
Miscellaneous
  Humor
  MemeStreams
   Using MemeStreams
Current Events
  War on Terrorism
  Elections
  Israeli/Palestinian
Recreation
  Cars and Trucks
  Travel
Local Information
  United States
   California
    SF Bay Area
   Events in Washington D.C.
   News for Washington D.C.
   Georgia
    Atlanta
     Atlanta Events
Science
  Biology
  History
  Math
  Medicine
  Nano Tech
  Physics
Society
  Economics
  Education
  Futurism
  International Relations
  History
  Politics and Law
   Civil Liberties
    Internet Civil Liberties
    Surveillance
   Intellectual Property
  Media
   Blogging
  Military
  Philosophy
Technology
  Biotechnology
  Computers
   Computer Security
    Cryptography
   PC Hardware
   Human Computer Interaction
   Computer Networking
   Macintosh
   Software Development
    Open Source Development
  Military Technology
  High Tech Developments

support us

Get MemeStreams Stuff!


 
compos mentis. Concision. Media. Clarity. Memes. Context. Melange. Confluence. Mishmash. Conflation. Mellifluous. Conviviality. Miscellany. Confelicity. Milieu. Cogent. Minty. Concoction.

Presentation Abstracts, Ninth Foresight Conference
Topic: Nano Tech 11:14 pm EST, Nov 26, 2001

Abstracts and selected papers from the Foresight's Ninth Conference on Molecular Nanotechnology are becoming available online. The conference was held at the Westin Hotel in Santa Clara, California from 9 -11 November 2001. Papers include:

"Molecular Electronics and Chemical/Biological Sensors"
"Nanostructures in Nature and Technology"
"Fullerene Nanotools from Biology"
"MolSpice: Designing Molecular Logic Circuits"
"Wireless Communication in Multi-Agent Networked Nano- and Micro-Electromechanical Systems"
"The hypernetwork architecture as a model for molecular computing"

Presentation Abstracts, Ninth Foresight Conference


Bugs enjoy hamster sex
Topic: Biology 8:32 pm EST, Nov 26, 2001

Here's true comedic science writing as only the Brits can produce it ... from the 19 November issue of Nature:

"Cross-species coupling is generally frowned upon. But in the liberal labs of California it is actively being encouraged. Bugs that are persuaded to get down and dirty with hamster cells are rewriting sex manuals in the act."

Bugs enjoy hamster sex


Programmable and autonomous computing machine made of biomolecules
Topic: Science 8:29 pm EST, Nov 26, 2001

Devices that convert information from one form into another according to a definite procedure are known as automata. One such hypothetical device is the universal Turing machine ... The Turing machine ... operate[s] by scanning a data tape, whose striking analogy to information-encoding biopolymers inspired several designs for molecular DNA computers. Laboratory-scale computing using DNA ... has been demonstrated, but realization ... remains rare.

Here we describe a programmable finite automaton comprising DNA and DNA-manipulating enzymes that solves computational problems autonomously.

Programmable and autonomous computing machine made of biomolecules


The Official String Theory Web Site
Topic: Physics 8:20 pm EST, Nov 26, 2001

(Summary excerpted from Science, 9 November 2001)

According to string theory, fundamental particles such as electrons and quarks are concealing something. They may actually be composed of unobservable, shimmying loops, or strings, the vibrations of which dictate the particle's character. If that sounds fantastic, drop by The Official String Theory Web Site for a cheeky tutorial on string theory, the framework that many physicists believe will allow them to tie down a unifying "theory of everything."

Written by a Caltech Ph.D., the tutorial explains strings at two levels of difficulty: advanced for the calculus-savvy and basic for those stymied by the first chapter of Stephen Hawking's A Brief History of Time. In the introduction, you'll learn how these quivering filaments may reconcile the seemingly irreconcilable theories of quantum mechanics and general relativity and why we can't detect them even with mammoth particle accelerators (strings are too small). Other sections explain how string theory ties in with cosmology and black holes. To learn more from the experts themselves, try the audio files of interviews with string savants such as Brian Greene of Columbia University, who's billed as "string theory's answer to John Cusack."

The Official String Theory Web Site


The Implicit Association Test
Topic: Society 8:16 pm EST, Nov 26, 2001

(Summary excerpted from Science, 23 November 2001)

"It may not expose the dark recesses of your soul, but the Implicit Association Test can reveal attitudes you may not admit to your closest friend--or even to yourself. By gauging your immediate reactions to sequences of words or images flashed on the screen, the five versions of the test supposedly disinter deep-seated biases on race, gender, age, politics, and academic subjects. The results can be illuminating and are occasionally disconcerting: In the racial associations test, the site reports, most Americans betray some preference for whites over blacks. To get in-depth explanations of the scoring and background, however, you have to visit the researchers' home pages, where you can peruse their papers on what they've learned from 3 years of probing attitudes online and read about the test's limitations."

The Implicit Association Test


On the Security and Vulnerability of PING
Topic: Computer Security 7:55 pm EST, Nov 26, 2001

"We present a formal specification of the PING protocol, and use three concepts of convergence theory, namely closure, convergence, and protection, to show that this protocol is secure against weak adversaries (and insecure against strong ones). We then argue that despite the security of PING against weak adversaries, the natural vulnerability of this protocol (or of any other protocol for that matter) can be exploited by a weak adversary to launch a denial of service attack against any computer that hosts the protocol. Finally, we discuss three mechanisms, namely ingress filtering, hop integrity, and soft firewalls that can be used to prevent denial of service attacks in the Internet."

On the Security and Vulnerability of PING


Defining the Boundaries of 21st Century Science
Topic: Science 7:46 pm EST, Nov 26, 2001

The Institute for Genomic Research, based in Maryland, is sponsoring a series of lectures on the future of science. The series begins on Thursday, November 29, with a talk by Hans Moravec of CMU. It continues through at least May 2002 with talks by Bill Cheswick of Lumeta (author of _Firewalls and Internet Security_) and Ralph Merkle of Zyvex (and _The Diamond Age_ fame), among others.

Defining the Boundaries of 21st Century Science


An Active-Network-Powered Defense Mechanism against DDoS Attacks
Topic: Software Development 7:36 pm EST, Nov 26, 2001

"Distributed Denial of Service (DDoS) attacks are a pressing problem on the Internet as demonstrated by recent attacks on major e-commerce servers and ISPs. Since their threat lies in the inherited weaknesses of the TCP/IP, an effective solution to DDoS attacks must be formulated in conjunction with a new networking paradigm, such as Active Networks. In this paper, we introduce a conceptual framework called Aegis, which we propose as a defense mechanism against DDoS attacks."

An Active-Network-Powered Defense Mechanism against DDoS Attacks


Network Camouflaging
Topic: Open Source Development 7:33 pm EST, Nov 26, 2001

"It is expected that, within a few years, the majority of traffic on the Internet will be encrypted. Traffic contents will then be very difficult to access, and obsevers will use traffic analysis to infer information about a system. Within the NetCamo ( Network Camouflaging ) project, we study how to prevent traffic analysis in mission-critical QoS-guaranteed networks.

In NetCamo, we achieve prevention of traffic analysis by traffic rerouting and padding based on real-time traffic modeling theory. We implemented both host-based version (called NetCamo/M) on Windows NT and appliance-based version (called NetCamo/N) on Linux."

Network Camouflaging


Date set for BT hyperlink patent case
Topic: Intellectual Property 7:31 pm EST, Nov 26, 2001

BT's court case against ISP Prodigy Communications over the hyperlink patent will begin on 11 February 2002 in New York. BT is claiming unspecified damages for alleged infringement of its patent, which covers the basic navigation method on which the Web is built.

...

The patent, number 4,873,662, was issued to BT in America in 1989 and expires in 2006. The company said it only discovered the patent in a routine trawl through its own patents four years ago. But the priority date for the patent is July 1976, which means that for the patent to be successfully challenged a company must show prior art before that date, according to Gregory Aharonian, editor of the Internet Patent News Service and a vocal critic of what he calls poor-quality patents.

Date set for BT hyperlink patent case


(Last) Newer << 188 ++ 198 - 199 - 200 - 201 - 202 - 203 - 204 - 205 - 206 ++ 216 >> Older (First)
 
 
Powered By Industrial Memetics
RSS2.0