Skip to main content

Home/ Brian links/ Group items tagged communication

Rss Feed Group items tagged

Kevin DiVico

Jimmy Wales May Use Encryption To Fight Snooper's Charter - 0 views

  •  
    "Wikipedia founder Jimmy Wales has spoken out against the Draft Communications Bill, the UK government plans to monitor and store all digital communications, dubbed the "Snooper's Charter". In case Draft Communications Data Bill becomes the law, the US entrepreneur has promised to encrypt all connections between Wikipedia servers and the UK, effectively reducing the government's ability to snoop on use of Wikipedia. Wales was speaking to a  joint committee tasked with scrutinising the proposed Communications Bill before it is debated in the House of Commons."
Kevin DiVico

DoD Science and Technology for Communication and Persuasion Abroad Analysis | Public In... - 0 views

  •  
    Over the last 10 years, the U.S. government has made significant investments in science and technology in order to enhance its ability to understand and shape public opinion and behavior abroad-a domain of activity referred to in this report as "shaping," "influencing," or "communication and persuasion." Because this effort is taking place across a vast government bureaucracy, the policy-makers and practitioners engaged in communication and persuasion do not always know what tools are at their disposal and what tools need to be invented.
Kevin DiVico

The 2013 IEEE International Conference on Internet of Things (iThings2013) | the intern... - 0 views

  •  
    The 2013 IEEE International Conference on Internet of Things (iThings2013): These conferences will provide a high-profile, leading-edge forum for researchers, engineers and practitioners to present state-of-art advances and innovations in theoretical foundations, systems, infrastructure, tools, testbeds, and applications for the internet of things, cyber, physical and social computing, green communications and computing, as well as to identify emerging research topics and define the future.    This is a good chance which aims at exchanging research experience in such fields. It will bring together experts from the areas of computational intelligence, communications, networks, distributed systems, and computer science. 
Kevin DiVico

MAKE | LVL1′s MOTHER Automates the Hackerspace - 0 views

  •  
    Louisville's hackerspace LVL1 is working on a home automation setup for the space, and they call it MOTHER. Using open-source home automation software called HOLOS, the capabilities include: * Monitoring of LVL1 Space Occupancy & Zone Occupancy * Measuring of "Hacktivity Levels" of each Zone * Monitoring of individual member occupancy * INSTANT WOMP MODE! (dubstep everywhere at the press of a button) * Notifications of "Abnormal" hacktivity levels * Monitoring of various websites and notifications of LVL1 mentions * Various "Nagging" (Take out the trash, It's cold please shut the door, I haven't seen you in 3 days, please come visit your mother, etc…) * "Member Scenes" - Auto setting of audio, lights, etc.. based on specific members present * Logging and Graphing of ALL data * Voice recognition and communication * Control of Lighting and appliances * Security System monitoring and notification of alerts * Phone calls and emails based notifications * Google Talk communication with AIML chat integration
Kevin DiVico

Making K* work for your research findings - OurWorld 2.0 | OurWorld 2.0 - 0 views

  •  
    UNU Media Centre head Brendan Barrett shares insights derived from a UNU Institute for Water, Environment and Health conference that focused on K* (K-Star) - a spectrum of ideas that covers research communication, science push, knowledge translation, adaptation, transfer and exchange, knowledge brokering and mobilization, and policy pull. * * * To sum up the underlying need for the recent K* Conference 2012, I borrow the words of a co-participant who explained that "as we are seeing with the climate debate and other 'wicked problems', it is not sufficient to assume that scientific consensus about the facts will be influential in policy or the wider community".
Kevin DiVico

New Rules for the New Economy - 0 views

  •  
    The primary role that productivity plays in the network economy is to disperse technologies. A technical advance cannot leverage future opportunities if it is hoarded by a few. Increased productivity lowers the cost of acquisition of knowledge, techniques, or artifacts, allowing more people to have them. When transistors were expensive they were rare, and thus the opportunities built upon them were rare. As the productivity curve kicked in, transistors eventually became so cheap and omnipresent that anyone could explore their opportunities. When ball bearings were dear, opportunities sired by them were dear. As communication becomes everywhere dirt cheap and ubiquitous, the opportunities it kindles will likewise become unlimited.
Kevin DiVico

Projects - Conference: Mobilizing Knowledge Networks for Development - 0 views

  • The goal of the workshop is to explore ways to become better providers and connectors of knowledge in a world where the sources of knowledge are increasingly diverse and dispersed. At the World Bank, for example, we are seeking ways to connect with new centers of research, emerging communities of practice, and tap the practical experience of development organizations and the policy makers in rapidly developing economies. Our goal is to find better ways to connect those that have the development knowledge with those that need it, when they need it.
  •  
    The goal of the workshop is to explore ways to become better providers and connectors of knowledge in a world where the sources of knowledge are increasingly diverse and dispersed. At the World Bank, for example, we are seeking ways to connect with new centers of research, emerging communities of practice, and tap the practical experience of development organizations and the policy makers in rapidly developing economies. Our goal is to find better ways to connect those that have the development knowledge with those that need it, when they need it.
Kevin DiVico

Global E-mail Patterns Reveal "Clash of Civilizations" | MIT Technology Review - 0 views

  •  
    "The global pattern of e-mail communication reflects the cultural fault lines thought to determine future conflict, say computational social scientists."
Kevin DiVico

Shareable: Logic Shrink: A Game to Bring Logic Back into Political Rhetoric - 0 views

  •  
    Heated political rhetoric is everywhere. It sets us apart from one another and erodes what's left of civil discourse. It grinds the worthy concept of "logic" into dust. Not any more. Not when we fight back with an open source game I'm calling Logic Shrink. I'm not selling a thing. You don't need an app, a console, even a board. It's entirely your game. Play a solitary version. Play it during a get-together with your extended family. Play it with kids, especially teens. Bring it to the classroom, community center, or secret Super PAC meeting. It will entertain. Afterwards, when the lively score-keeping has ended there will be something new in the room. It may be unfamiliar at first. It's a state of being that requires no name calling, no slippery slope. It's logical thinking.
Kevin DiVico

Private Investigator News: Reading someone's Gmail doesn't violate federal statute, cou... - 0 views

  •  
    ""In a case decided on Wednesday, the South Carolina Supreme Court ruled that accessing someone's online e-mail without their permission doesn't violate the 1986-era Stored Communications Act (SCA). Though they differed in their reasoning, the justices were unanimous in ruling that e-mail stored in the cloud (like Gmail or Yahoo Mail) does not meet the definition of electronic storage as written in the statute."
Kevin DiVico

Incoma Project - 0 views

  •  
    We are living a unique moment in history. The development of communication technologies has produced a change in the modes of interaction of society, creating new forms of relating which are fundamentally different from those before. These new ways of relating and technologies have contributed to the emergence of new social and political movements. These movements, as exemplified by the Arab Spring, the democratisation movement in Iceland, and the 15M / TakeTheSquare / Occupy movement, are the most strinking examples of the potential of this new phase (together with other phenomena such as Wikileaks and Anonymous).
Kevin DiVico

An Elsevier Boycott. In the Pipeline: - 0 views

  •  
    There's been a movement afoot to boycott Elsevier journals. It's started over in the mathematics community, led by Timothy Gowers, a serious mathematician indeed. The objections to Elsevier are the ones you'd think: high prices, unsplittable bundles of journal subscriptions for institutions, and their strong support for legislation like the Research Works Act.
Kevin DiVico

Askemos - 0 views

  •  
    The aim of the Askemos project is to enable reliable and justiciable data processing, with the goal of producing "Software that can last 200 years." The first implementations of an Askemos peer can be obtained from ball.askemos.org. The Askemos web site itself is served from the Askemos/BALL development network. Follow here for more details. Note that Askemos concerns the abstract specification exclusively; including data formats, protocols, service interfaces etc. - not the actual implementations. Askemos combines incorruptible privilege delegation and non-repudiable replication of communicating processes into a trustworthy network. Physical machines under control of their operators execute applications processes under permanent multilateral audit. The network's honest majority of hosts provides users with exclusive control, and thus real ownership of processes. Askemos models a kind of "virtual constitutional state" where physical hosts bear witness to the interactions of virtual agents (akin to citizens). Self verifying identifiers can confirm that original documents have not beentampered with. The real potential for using Askemos is for identity and time stamp services, informationmanagement in public administration and libraries attaching metadata and archives, with the goal of establishing robust systems that can endure for centuries. German tax law, for instance, has storage requirements, which makes Askemos interesting even for private, individual use. Also Activist groups, non-profits and people who desire privacy and reliability in a chaotic and unpredictable world have much to gain from this software.
Kevin DiVico

China is winning in the teleportation race - 0 views

  •  
    If the Space Race characterized the twentieth century, it's possible the Teleportation Race may characterize the twenty-first. Scientists all over the world are trying to perfect teleportation techniques, for a wide variety of applications including communications technology. (Sorry, this isn't the kind of teleportation that involves sending you through a wormhole to the other side of the galaxy.) And now, a group of researchers led by Juan Yin at the University of Science and Technology of China in Shanghai have published a paper on ArXiv describing how they teleported entangled photons over a distance of 97 kilometres across a lake in China.
Kevin DiVico

LibraryBox: A P2P, DIY Library - 0 views

  •  
    Inside NYU art professor David Darts' black metal lunchbox, painted with a white skull and crossbones, is the PirateBox - a tiny Linux server, a wireless router, and a battery. Turn the PirateBox on and you have a self-contained mobile communications and file-sharing device, whereby those in the vicinity can upload and download files securely and anonymously. (See this 2011 Ars Technica story for photos and details.) Built with free and open source software and openly licensed itself, the PirateBox has inspired a number of other projects, including Alan Levine's Storybox and now Jason Griffey's LibraryBox.
Kevin DiVico

BBC News - 'Cloaking' idea traps a rainbow - 0 views

  •  
    A report in the New Journal of Physics shows how the quest for an invisibility cloak is leading to cleverer ways to use and manipulate light. The trick could aid the analysis of complex samples or even communications.
Kevin DiVico

Dotcom millionaire who lives in a hotel - CNN.com - 0 views

  •  
    As a serial entrepreneur and dotcom millionaire, Neil Patel can afford to be picky about his choice of luxury residence. But instead of a country mansion, penthouse apartment or gated community in the suburbs, the founder of internet start-ups KISSmetrics and Crazy Egg has set up home in a location he says best suits his hectic work schedule -- the Hyatt Hotel in downtown Seattle. "I bought a place in a hotel because its convenient for me," says the 27-year-old, who often finds himself working more than 70 hours a week.
Kevin DiVico

Marblar - 0 views

shared by Kevin DiVico on 23 Jun 12 - No Cached
  •  
    So who are you? You might be a current scientist, a recovering scientist, a revolutionary, or just really into checking out neat innovations. Well, Marblar's a right-brained buffet - and we're about to open the kitchen.  Who says finding homes for inventions can´t be fun? Who says the process has to be closed to just a select few? Marblar.com is a democratic playground for creativity. You´ve got great ideas and we´ve got great inventions. As a Marblar you´ll be part of an artistic community and earn marbles for flexing your imagination in the service of science.  So there you have it. You´re a creative beast. The left brains sure aren´t starting the Fourth Industrial Revolution.  You are.  Join today.
Kevin DiVico

Do You Like Online Privacy? You May Be a Terrorist | Public Intelligence - 0 views

  •  
    A flyer designed by the FBI and the Department of Justice to promote suspicious activity reporting in internet cafes lists basic tools used for online privacy as potential signs of terrorist activity.  The document, part of a program called "Communities Against Terrorism", lists the use of "anonymizers, portals, or other means to shield IP address" as a sign that a person could be engaged in or supporting terrorist activity.  The use of encryption is also listed as a suspicious activity along with steganography, the practice of using "software to hide encrypted data in digital photos" or other media.  In fact, the flyer recommends that anyone "overly concerned about privacy" or attempting to "shield the screen from view of others" should be considered suspicious and potentially engaged in terrorist activities.
1 - 20 of 29 Next ›
Showing 20 items per page