Create an Account
username: password:
 
  MemeStreams Logo

Twice Filtered

search

noteworthy
Picture of noteworthy
My Blog
My Profile
My Audience
My Sources
Send Me a Message

sponsored links

noteworthy's topics
Arts
  Literature
   Fiction
   Non-Fiction
  Movies
   Documentary
   Drama
   Film Noir
   Sci-Fi/Fantasy Films
   War
  Music
  TV
   TV Documentary
Business
  Tech Industry
  Telecom Industry
  Management
Games
Health and Wellness
Home and Garden
Miscellaneous
  Humor
  MemeStreams
   Using MemeStreams
Current Events
  War on Terrorism
  Elections
  Israeli/Palestinian
Recreation
  Cars and Trucks
  Travel
   Asian Travel
Local Information
  Food
  SF Bay Area Events
Science
  History
  Math
  Nano Tech
  Physics
  Space
Society
  Economics
  Education
  Futurism
  International Relations
  History
  Politics and Law
   Civil Liberties
    Surveillance
   Intellectual Property
  Media
   Blogging
  Military
  Philosophy
Sports
(Technology)
  Biotechnology
  Computers
   Computer Security
    Cryptography
   Human Computer Interaction
   Knowledge Management
  Military Technology
  High Tech Developments

support us

Get MemeStreams Stuff!


 
Current Topic: Technology

Gmail adds POP access
Topic: Technology 2:24 pm EST, Nov 13, 2004

Google said it is adding free POP access to Gmail for all users over the next couple of weeks.

Gmail adds POP access


CacheLogic - P2P Traffic Analysis
Topic: Technology 9:04 am EST, Nov  9, 2004

This is the CacheLogic study referred to in the Reuters story.

Peer-to-Peer [is] a huge problem for last mile providers, where it makes up 80% or more of the traffic on the network.

CacheLogic - P2P Traffic Analysis


File-Sharing Thrives Under Radar
Topic: Technology 8:56 am EST, Nov  9, 2004

According to British web analysis firm CacheLogic, BitTorrent accounts for an astounding 35 percent of all the traffic on the Internet -- more than all other peer-to-peer programs combined -- and dwarfs mainstream traffic like web pages.

"I don't think Hollywood is willing to let it slide, but whether they're able to (stop it) is another matter," Bram Cohen, the programmer who created BitTorrent, told Reuters.

!!!

File-Sharing Thrives Under Radar


Google Desktop Search
Topic: Technology 5:43 pm EDT, Oct 24, 2004

It's a beta. It has limitations. For example, it won't index multiple disk drives on your system.

My fundamental complaint is that this product lacks the fundamental essence of Google. That is, it has no sense of link structure. It is a simple full text indexer. As many have already pointed out, existing products perform this function more effectively and with better and more complete system integration.

In time, they could migrate this product into a remembrance agent. That would present a good opportunity for Google's famed PhDs to demonstrate their supreme geekiness.

Here's to hoping ...

Google Desktop Search


Is Your FPGA Design Secure?
Topic: Technology 11:53 am EDT, Oct  2, 2004

After spending months on your design, the last thing you want is to find your design has been stolen. Say goodbye to "locks," "fuses," "antifuses," and other contraptions. You can sleep peacefully when you design with Xilinx.

Here at Xilinx, we want you to rest at ease. All Xilinx devices have robust security mechanisms that make it nearly impossible to steal designs. With security mechanisms you can "bank" on, let's get into the details of design security and how Xilinx protects your valuable proprietary designs.

Is Your FPGA Design Secure?


Why Buy If You Can Rent?
Topic: Technology 9:55 am EDT, Sep 27, 2004

Today, Sir Richard Branson starts a new music store. What's interesting is that Virgin is putting its biggest emphasis on its subscription service.

For a $7.99 monthly fee, listen to an unlimited amount of music from Virgin's one-million-track library. A premium subscription service that will allow those tracks to be moved to a portable music player will be introduced soon.

"Two or three years out, subscriptions will overtake à la carte because it is a much more interesting proposition."

Told you so.

Why Buy If You Can Rent?


Social Physics
Topic: Technology 1:29 am EDT, Sep  1, 2004

Context is everything. Who has 687,389 trusted friends? Nobody. Friendships are not defined by links. Real social relationships are subtle, complex and grounded in trust. And trust is built on the quality of the relationship within a context. Trusted relationships are the fabric that connects people into the communities that are the context. But communities need to be able to spontaneously form, and to define their own rules for self-governance and organization.

Our mission is to create useful software tools to manage our interactions on an open source peer-to-peer platform. A platform that restores control over our digital identities and supports a variety of regimes for self-governance and self-expression. Through new and existing apps that use this platform we expect to find new forms of economic and civic participation and organization.

Social Physics


Interfaces for Staying in the Flow
Topic: Technology 1:11 am EDT, Sep  1, 2004

Computers should help us concentrate on our work, without concentrating on the computer

Psychologists have studied "optimal human experience" for many years, often called "being in the flow". Through years of study, the basic characteristics of flow have been identified. This paper reviews the literature, and interprets the characteristics of flow within the context of interface design with the goal of understanding what kinds of interfaces are most conducive to supporting users being in the flow. Several examples to demonstrate the connection to flow are given.

Interfaces for Staying in the Flow


Shilling Recommender Systems for Fun and Profit
Topic: Technology 6:13 pm EDT, Jul 31, 2004

Recommender systems have emerged in the past several years as an effective way to help people cope with the problem of information overload. One application in which they have become particularly common is in e-commerce, where recommendation of items can often help a customer find what she is interested in and, therefore can help drive sales.

Unscrupulous producers in the never-ending quest for market penetration may find it profitable to shill recommender systems by lying to the systems in order to have their products recommended more often than those of their competitors.

This paper explores four open questions that may affect the effectiveness of such shilling attacks: which recommender algorithm is being used, whether the application is producing recommendations or predictions, how detectable the attacks are by the operator of the system, and what the properties are of the items being attacked. The questions are explored experimentally on a large data set of movie ratings.

Taken together, the results of the paper suggest that new ways must be used to evaluate and detect shilling attacks on recommender systems.

Shilling Recommender Systems for Fun and Profit


So You're A Programmer ...
Topic: Technology 9:29 pm EDT, Jul 29, 2004

... how many lives did your code save today?


(Last) Newer << 9 - 10 - 11 - 12 - 13 - 14 - 15 - 16 >> Older (First)
 
 
Powered By Industrial Memetics
RSS2.0