Create an Account
username: password:
 
  MemeStreams Logo

Post Haste

search

possibly noteworthy
Picture of possibly noteworthy
My Blog
My Profile
My Audience
My Sources
Send Me a Message

sponsored links

possibly noteworthy's topics
Arts
Business
Games
Health and Wellness
Home and Garden
Miscellaneous
  Humor
Current Events
  War on Terrorism
Recreation
Local Information
  Food
Science
Society
  International Relations
  Politics and Law
   Intellectual Property
  Military
Sports
(Technology)
  Military Technology
  High Tech Developments

support us

Get MemeStreams Stuff!


 
Current Topic: Technology

Grand Challenges for Engineering
Topic: Technology 10:52 am EDT, May  4, 2008

With input from people around the world -- much of it on this website -- an international group of leading technological thinkers were asked to identify the Grand Challenges for Engineering in the 21st Century. Now their conclusions are revealed on this website.

Grand Challenges for Engineering


SAGE: Open Source Mathematics Software
Topic: Technology 10:52 am EDT, May  4, 2008

Creating a viable free open source alternative to
Magma, Maple, Mathematica, and Matlab

SAGE: Open Source Mathematics Software


JSONVid: Pure JavaScript Video Player
Topic: Technology 10:52 am EDT, May  4, 2008

Jacob Seidelin went on a ( crazy :) ) mission to create a pure JavaScript video player that didn't use Flash:

My first thought was to read binary video files using a technique like the Andy Na posted about here, figuring that there must be some really simple to parse video formats around, but I soon changed directions and decided to make up a whole new video format. Enter.. JSONVid. Using a player like mplayer, it is easy to export all frames in a movie clip to individual jpeg files, and using whichever language you prefer it is also fairly trivial to collect these files, base64 encode the bunch of them and throw them all together in a nice JSON file (I used this PHP script).

JSONVid: Pure JavaScript Video Player


Matasano Chargen » Retsaot is Toaster, Reversed: Quick ‘n Dirty Firmware Reversing
Topic: Technology 6:01 am EDT, May  2, 2008

I recently worked on a project that involved embedded systems and reverse engineering. This sort of territory can be a little hairy the first few times out. I ran into some interesting challenges and discoveries along the way which I thought might be worth writing a little bit about. I can’t tell you what the target was. But, it was important. And, we beat the crap out of it. So instead, I’ll tell you what I wish it was: a networked 4-slot toaster.

Now… to make things interesting; Early on, I’d discovered a vulnerability in the toaster that allowed any attacker to load their own firmware on the device. Ouch! My toast! My beautiful toast!

In order to drive home the risk (mostly to the vendor) of the firmware loading vulnerability, I was asked by my customer (also the vendor’s customer) to demonstrate the attack by actually loading malicious firmware onto the device and getting it to run.

Mind you, the request to prove this is actually pretty sane. I had little knowledge of the boot loader, or even of the firmware image format. I couldn’t say for sure that there wasn’t a code-signing feature, which would prevent the toaster from loading any image that wasn’t cryptographically signed by the vendor. That would have rendered the firmware loading attack impotent. To make things worse, the vendor was being pretty light on details. Can’t say I blame them.

Matasano Chargen » Retsaot is Toaster, Reversed: Quick ‘n Dirty Firmware Reversing


Zorba: The XQuery Processor
Topic: Technology 6:01 am EDT, May  2, 2008

Zorba is a general purpose XQuery processor implementing in C the W3C family of specifications. It is not an XML database. The query processor has been designed to be embeddable in a variety of environments such as other programming languages extended with XML processing capabilities, browsers, database servers, XML message dispatchers, or smartphones. Its architecture employes a modular design, which allows customizing the Zorba query processor to the environment’s needs. In particular the architecture of the query processor allows a pluggable XML store (e.g. main memory, DOM stores, persistent disk-based large stores, S3 stores). Zorba runs on most platforms and is available under the Apache license v2.

Zorba: The XQuery Processor


Regional Computer Forensics Laboratory: Program Annual Report
Topic: Technology 6:01 am EDT, May  2, 2008

RCFLs are a network of digital forensics labs sponsored by the FBI and staffed by local, state, and federal law enforcement personnel. These labs are available—free of charge—to 4,750 law enforcement agencies across 17 states.

Yes, RCFLs perform digital forensic exams in cyber crime cases, but they contribute to so many more kinds of investigations: terrorism, espionage, public corruption, civil rights, organized crime, white-collar crime, and violent crime. These days, computers and other technological devices are such a part of daily life that you’d be hard-pressed to find any type of criminal or terrorist who doesn’t use one. And when they do, RCFL examiners are there to extract and enhance information from these devices that may serve as evidence at trial.

You can read all about the accomplishments of these 14 labs—collectively and individually—in the RCFL Program’s Fiscal Year 2007 Annual Report.

Regional Computer Forensics Laboratory: Program Annual Report


An Exploration of Technology Diffusion
Topic: Technology 6:01 am EDT, May  2, 2008

How long are technology adoption lags? Can cross-country differences in technology adoption lags account for a significant fraction of cross-country GDP disparities? Diego Comin of Harvard Business School and Bart Hobijn of the Federal Reserve Bank of New York develop a new benchmark to understand the diffusion process of individual technologies and the consequences that this has for aggregate growth. This benchmark provides a rationale for the evolution of diffusion measures that include how many units of technology each adopter has adopted in addition to the traditional extensive margin. The model is estimated to obtain measures of adoption lags for 15 technologies in 166 countries. Key concepts include:

* Adoption lags are large. On average, countries have adopted technologies 47 years after their invention.
* There is substantial variation across technologies and countries.
* Over the past two centuries, newer technologies have been adopted faster than old ones.
* The remarkable development records of Japan between 1870 and 1970 and of the so-called East Asian Tigers in the second half of the 20th century all coincided with a catch-up in the range of technologies used with respect to industrialized countries.
* Adoption lags account for at least 25 percent of cross-country per capita income differences.

An Exploration of Technology Diffusion


Ze Frank and the poetics of Web video
Topic: Technology 5:58 am EDT, Apr 29, 2008

This article initiates a poetics of Web video by considering the central features of one kind of video on the Web, the amateur videoblog, in terms of its functions, which include various affordances of use, and constraints, which include economics, technology, and viewing conditions. It takes as its central example an American videoblog called The Show With Ze Frank, which ran from 2006–2007, and which drew a passionate community of fans into collaborating in its creation. This article considers amateur Web video as a potentially democratic space for media production, offering an alternative to commercial media that involves ordinary citizens as participants and champions their creativity.

Ze Frank and the poetics of Web video


Mapping the distraction that is Wikipedia
Topic: Technology 6:44 am EDT, Apr 28, 2008

Do you remember the classic xkcd diagram about Wikipedia?

The code is uglier than Fergie on a rainy day, but it works and I find the results to be pretty fascinating.

Mapping the distraction that is Wikipedia


Security Engineering - A Guide to Building Dependable Distributed Systems
Topic: Technology 6:44 am EDT, Apr 28, 2008

We've talked about this book before, but if you don't have a copy, there's something new:

Free chapters from the second edition! Wiley has agreed to let me put six sample chapters online for free. Here they are.

Security Engineering - A Guide to Building Dependable Distributed Systems


(Last) Newer << 10 - 11 - 12 - 13 - 14 - 15 - 16 - 17 - 18 - 19 ++ 29 >> Older (First)
 
 
Powered By Industrial Memetics
RSS2.0