Create an Account
username: password:
 
  MemeStreams Logo

Spontaneous Sociability and The Enthymeme

search

Rattle
Picture of Rattle
Rattle's Pics
My Blog
My Profile
My Audience
My Sources
Send Me a Message

sponsored links

Rattle's topics
Arts
  Literature
   Sci-Fi/Fantasy Literature
  Movies
  Music
Business
  Tech Industry
  Telecom Industry
Games
Health and Wellness
Holidays
Miscellaneous
  Humor
  MemeStreams
   Using MemeStreams
Current Events
  War on Terrorism
  Elections
Recreation
  Travel
Local Information
  SF Bay Area
   SF Bay Area News
Science
  Biology
  History
  Nano Tech
  Physics
  Space
Society
  Economics
  Futurism
  International Relations
  Politics and Law
   Civil Liberties
    Internet Civil Liberties
    Surveillance
   Intellectual Property
  Media
   Blogging
  Military
  Security
Sports
(Technology)
  Biotechnology
  Computers
   Computer Security
    Cryptography
   Cyber-Culture
   PC Hardware
   Computer Networking
   Macintosh
   Linux
   Software Development
    Open Source Development
    Perl Programming
    PHP Programming
   Spam
   Web Design
  Military Technology
  High Tech Developments

support us

Get MemeStreams Stuff!


 
Current Topic: Technology

AOL pulls Nullsoft file-sharing software | CNET News.com
Topic: Technology 10:52 pm EDT, May 30, 2003

] A day after developers at America Online's Nullsoft unit
] quietly released file-sharing software, AOL pulled the
] link to the product from the subsidiary's Web site.
]
] The software, called Waste, lets groups set up private,
] secure file-sharing networks. The product became
] available on Nullsoft's Web site on Wednesday, just days
] shy of the four-year anniversary of being acquired by
] AOL. Waste is a software application that combines
] peer-to-peer file sharing with instant messaging, chat
] and file searches. Users can set up their own network of
] friends and share files between each other.

Deja-vu

AOL pulls Nullsoft file-sharing software | CNET News.com


Waste - Nullsoft strikes again
Topic: Technology 7:51 am EDT, May 29, 2003

] WASTE is a software product and protocol that enables
] secure distributed communication for small (on the order
] of 10-50 nodes) trusted groups of users.
]
] WASTE is designed to enable small companies and small
] teams within larger companies to easily communicate and
] collaborate in a secure and efficient fashion,
] independent of physical network topology.

] WASTE is licensed under the GPL.

] # Network architecture: WASTE uses a distributed
] architecture that allows for nodes to connect in a partial
] mesh type network. Nodes on the network can broadcast
] and route traffic. Nodes that are not publicly accessible
] or on slow links can choose not to route traffic. This
] network is built such that all services utilize the
] network, so firewall issues become moot. more information.
]
] # Security: WASTE uses link-level encryption to secure
] links, and public keys for authentication. RSA is used for
] session key exchange and authentication, and the links are
] encrypted using Blowfish in PCBC mode. The automatic key
] distribution security model is very primitive at the
] moment, and may not lend itself well to some social
] situations. more information.

Waste - Nullsoft strikes again


Someday the mountain might get 'em, but the law never will.
Topic: Technology 8:22 pm EDT, May 28, 2003

] I know this whole SCO/Linux thing can be very confusing,
] so I created this summary page to explain what's going
] on.
]
] To make it easier to understand, I put it in familiar
] terms.
]
]
] Cast:
]
] Daisy - Linux
]
] Roscoe P. Coltrane - SCO
]
] Boss Hogg - Microsoft
]
] Bo - Free Software Foundation
]
] Luke - Open Source Initiative
]
] Cooter - Bruce Perens
]
] Uncle Jesse - Novell

Someday the mountain might get 'em, but the law never will.


Information Flow in Social Groups [PDF]
Topic: Technology 12:24 pm EDT, May 24, 2003

We present a study of information flow that takes into account the observation that an item relevant to one person is more likely to be of interest to individuals in the same social circle than those outside of it. This is due to the fact that the similarity of node attributes in social networks decreases as a function of the graph distance.

An epidemic model on a scale-free network with this property has a finite threshold, implying that the spread of information is limited.

We tested our predictions by measuring the spread of messages in an organization and also by numerical experiments that take into consideration the organizational distance among individuals.

This paper is sort of a follow-up to the Email as Spectroscopy paper. You can find a PowerPoint briefing on it at

http://www.hpl.hp.com/shl/papers/flow/justflow.ppt

Information Flow in Social Groups [PDF]


Kernel Traffic #216 For 20 May | Some WLAN Chip Specs Secret To Protect Military Communications
Topic: Technology 5:40 am EDT, May 22, 2003

] David S. Miller also said:
]
] Don't expect specs or opensource drivers for any of
] these pieces of hardware until these vendors figure out a
] way to hide the frequency programming interface.
]
] Ie. these cards can be programmed to transmit at any
] frequency, and various government agencies don't like it
] when f.e. users can transmit on military frequencies and
] stuff like that.
]
] The only halfway plausible idea I've seen is to not
] document the frequency programming registers, and users
] get a "region" key file that has opaque register values
] to program into the appropriate registers. The file is
] per-region (one for US, Germany, etc.)and the wireless
] kernel driver reads in this file to do the frequency
] programming.
]
] So don't blame the vendors on this one, several of
] them would love to publish drivers public for their
] cards, but simply cannot with upsetting federal
] regulators.

The 802.11g card in my Powerbook is one of these chipsets. Its the only reason I have not done a Linux install on it yet. I need the wireless to use the net.

/me thinks about forcing Abaddon at gunpoint to code him a driver..

I'm sure I don't have to go into too much detail why this is interesting.. In short, it may be possible to code software using these cards that could be used by several systems to roughly triangulate the position of a specific cell phone, police car(s), etc.. Among other things..

Kernel Traffic #216 For 20 May | Some WLAN Chip Specs Secret To Protect Military Communications


TouchGraph GoogleBrowser V1.01
Topic: Technology 4:06 pm EDT, May 21, 2003

Requires Java.

Visual Google Browser. Type in a URL, and it displays a visual representation of that URL and all the other URLs that are related to it (somewhat similar to visualthesaurus.com, if you've played with that).

Extremely cool to look at and play with.

I could have sworn I had recommended this before. Yes, the Touchgraph Google Browser is extrememly cool. I have been playing with Touchgraph..

TouchGraph GoogleBrowser V1.01


The Lemon: History Of The Internet
Topic: Technology 5:00 pm EDT, May 20, 2003

A fairly accurate timeline, er, from some points of view, of the progression that the internet has taken over time.

Enjoy!

Hiliarious!

The Lemon: History Of The Internet


Microsoft Mum on Unix Licensing Move
Topic: Technology 6:25 pm EDT, May 19, 2003

] Microsoft Corp., which on Monday announced it was
] licensing the Unix source code and patent from the SCO
] Group, is remaining tight-lipped about its reasons for
] the move.

This keeps getting weirder and weirder...

Microsoft Mum on Unix Licensing Move


The T-Mobile Election Rigger
Topic: Technology 11:23 pm EDT, May 18, 2003

] Here's the idea: you promise a voter 50 euros (31 pounds)
] to cast their ballot for your candidate, send them into
] the booth with a 3G phone, they send a picture via the
] phone proving that they have voted as instructed and then
] they get the cash.

The T-Mobile Election Rigger


Reputation in P2P Anonymity Systems [PDF]
Topic: Technology 11:43 am EDT, May  5, 2003

Decentralized anonymity systems tend to be unreliable, because users must choose paths through the network without knowing the entire state of the network. Reputation systems can improve reliability by predicting the state of the network. In this paper we focus on anonymous remailers and anonymous publishing, explain why the systems can benefit from reputation, and describe our experiences designing reputation systems for them while still ensuring anonymity. We find that in each example we first must redesign the underlying anonymity system to support verifiable transactions.

Reputation in P2P Anonymity Systems [PDF]


(Last) Newer << 6 ++ 16 - 17 - 18 - 19 - 20 - 21 - 22 - 23 - 24 - 25 >> Older (First)
 
 
Powered By Industrial Memetics
RSS2.0