Skip to main content

Home/ Brian links/ Group items tagged using

Rss Feed Group items tagged

Kevin DiVico

Synthesis - 0 views

    • Kevin DiVico
       
      check out the communities page - philosophy 
  •  
    Synthesis is a think-tank devoted to using the emerging paradigm of complex networks in the social sciences to tackle social and public policy concerns. Over the past 20 years or so, social scientists have increasingly made use of advances in the natural sciences to make better sense of social systems. Fields such as network theory, non-linear mathematics and systems theory, which we refer to as the study of complex networks, give us much greater insights that help us make sense of social systems. Armed with a greater understanding, this collection of paradigm-changing toolboxes can help us to make better policy decisions, in the public, private, and "third" sectors.
Kevin DiVico

Beyond stunnel: Secure, high-speed network connections in the public cloud | vCider - 0 views

  •  
    Let's say you have two hosts, somewhere out on the Internet: Maybe dedicated servers, maybe Amazon EC2 or Rackspace instances, maybe a mix of the above. Now assume it's your job to provide secure, encrypted connectivity between two services running on those hosts. If those services do not use an encrypted protocol by themselves - such as non-SSL capable SMTP mail servers - then the standard answer has always been: "Use stunnel or OpenVPN!". While both of those are good, cross-platform solutions which can forward unsecure traffic over an encrypted tunnel, I believe that they come not only with administrative overhead, but also introduce a significant performance hit. I believe that there are now solutions that are easier to use, more flexible and most importantly, deliver much better performance. In this article, I will compare stunnel performance  characteristics with vCider's virtual private network solution (sign up for use with up to 8 nodes is free). You will see that vCider not only offers more flexibility and is easier to use, but also provides significantly better network performance and reduced CPU load. For my test, I have created two Ubuntu instances on Rackspace. Please note that both stunnel as well as vCider can work across network and cloud provider boundaries.
Kevin DiVico

BBC News - 3D printers could create customised drugs on demand - 0 views

  •  
    Scientists are pioneering the use of 3D printers to create drugs and other chemicals at the University of Glasgow. Researchers have used a £1,250 system to create a range of organic compounds and inorganic clusters - some of which are used to create cancer treatments. Longer term, the scientists say the process could be used to make customised medicines.
Kevin DiVico

Do You Like Online Privacy? You May Be a Terrorist | Public Intelligence - 0 views

  •  
    A flyer designed by the FBI and the Department of Justice to promote suspicious activity reporting in internet cafes lists basic tools used for online privacy as potential signs of terrorist activity.  The document, part of a program called "Communities Against Terrorism", lists the use of "anonymizers, portals, or other means to shield IP address" as a sign that a person could be engaged in or supporting terrorist activity.  The use of encryption is also listed as a suspicious activity along with steganography, the practice of using "software to hide encrypted data in digital photos" or other media.  In fact, the flyer recommends that anyone "overly concerned about privacy" or attempting to "shield the screen from view of others" should be considered suspicious and potentially engaged in terrorist activities.
Kevin DiVico

Shareable: Life, Liberty, and the Pursuit of Open Data - 0 views

  •  
    As organizations like Code for America encourage government transparency and the concept of Open Data at multiple levels of government in the US, I think it's useful for us to take a look at how Open Data is handled in other countries. Given my non-existent skills in other languages and my distrust of Google Translate, I'll focus on English-speaking countries first.
Kevin DiVico

MAKE | NEWS FROM THE FUTURE - Computer Chips Track Students - 0 views

  •  
    Grade-school students in a northeastern Brazilian city are using uniforms embedded with computer chips that alert parents if they are cutting classes, the city's education secretary, Coriolano Moraes, said Thursday. Twenty-thousand students in 25 of Vitória da Conquista's 213 public schools started using T-shirts with chips this week, Mr. Moraes said. By 2013, all of the city's 43,000 public school students will be using them, he added. The chips send a text message to the cellphones of parents when their children enter the school or alert the parents if their children have not arrived 20 minutes after classes have begun. The city government invested $670,000 in the project, Mr. Moraes said.
Kevin DiVico

Ask Stack: How to develop deep programming knowledge? | Ars Technica - 0 views

  •  
    Robert Harvey asks: Occasionally I see questions about edge cases on Stack Overflow that are easily answered by the likes of Jon Skeet or Eric Lippert-experts who demonstrate a deep knowledge of a particular language and its many intricacies. Here's an example of this from Lippert's MSDN blog: You might think that in order to use a foreach loop, the collection you are iterating over must implement IEnumerable or IEnumerable. But as it turns out, that is not actually a requirement. What is required is that the type of the collection must have a public method called GetEnumerator, and that must return some type that has a public property getter called Current and a public method MoveNext that returns a bool. If the compiler can determine that all of those requirements are met then the code is generated to use those methods. Only if those requirements are not met do we check to see if the object implements IEnumerable or IEnumerable. This is cool stuff to know. I can understand why Eric knows this; he's on the compiler team, so it's explicitly in his job description to know. But how do mere mortals, those of us on the outside, find out about stuff like this?
Kevin DiVico

GitHub and Rails: You have let us all down. - Code Space - 0 views

  •  
    Beyond any shadow of a doubt, a shit storm of epic proportions has just gone down. Something which had the potential to affect practically every coder. (Top four stories on HackerNews all related to this crisis).    Every GitHub repository was vulnerable to attack and absolutely nothing was safe.  If you are one of those strange coders that don't use GitHub and think you are in the clear because you use SVN, well the potential damage from the ripples of this vulnerability would of eventually reached you. When the large portion of the technical world all depends on a single service, and that service is vulnerable to a variety of attacks, that makes *anyone* who consumes these services also vulnerable. 
Kevin DiVico

Swiss Scientists Program Mammalian Cells to Work As Logic Gates | Popular Science - 0 views

  •  
    A new biologic logic gate based on proteins can perform binary calculations, serving as the first "cellular calculator," researchers say. Various combinations of components can be arranged into circuit elements, leading to specific metabolic processes inside a cell. The setup can answer mathematical questions in a similar fashion to a computer. Bioengineers led by Martin Fussenegger at ETH Zurich built a molecular logic gate using two substances as the transistor elements: the molecule phloretin, which is used to activate nerve fibers and comes from apples, and the widely used antibiotic erythromycin. The substances work as Boolean switches.
Kevin DiVico

Cybercriminals using digitally signed Java exploits to trick users | Security - InfoWorld - 0 views

  •  
    "Security researchers warn that cybercriminals have started using Java exploits signed with digital certificates to trick users into allowing the malicious code to run inside browsers. A signed Java exploit was discovered Monday on a website belonging to the Chemnitz University of Technology in Germany that was infected with a Web exploit toolkit called g01pack, security researcher Eric Romang said Tuesday in a blog post. "
Kevin DiVico

Android apps used by millions vulnerable to password, e-mail theft | Ars Technica - 0 views

  •  
    Android applications downloaded by as many as 185 million users can expose end users' online banking and social networking credentials, e-mail and instant-messaging contents because the programs use inadequate encryption protections, computer scientists have found. The researchers identified 41 applications in Google's Play Market that leaked sensitive data as it traveled between handsets running the Ice Cream Sandwich version of Android and webservers for banks and other online services. By connecting the devices to a local area network that used a variety of well-known exploits, some of them available online, the scientists were able to defeat the secure sockets layer and transport layer security protocols implemented by the apps. Their research paper didn't identify the programs, except to say they have been downloaded from 39.5 million and 185 million times, based on Google statistics.
Kevin DiVico

Jimmy Wales May Use Encryption To Fight Snooper's Charter - 0 views

  •  
    "Wikipedia founder Jimmy Wales has spoken out against the Draft Communications Bill, the UK government plans to monitor and store all digital communications, dubbed the "Snooper's Charter". In case Draft Communications Data Bill becomes the law, the US entrepreneur has promised to encrypt all connections between Wikipedia servers and the UK, effectively reducing the government's ability to snoop on use of Wikipedia. Wales was speaking to a  joint committee tasked with scrutinising the proposed Communications Bill before it is debated in the House of Commons."
Kevin DiVico

What Turned Jaron Lanier Against the Web? | Arts & Culture | Smithsonian Magazine - 0 views

  •  
    Only Lanier would attribute Nie­tzschean longings to Violentacrez. "And he's not that different from any of us. The difference is that he's scared and possibly hurt a lot of people." Read more: http://www.smithsonianmag.com/arts-culture/What-Turned-Jaron-Lanier-Against-the-Web-183832741.html#ixzz2GMBQC2He  Follow us: @SmithsonianMag on Twitter
Kevin DiVico

This Scientific Coffee Machine Could Satisfy the Biggest Coffee Nerd - 0 views

  •  
    "This system of burners, pipes, flasks and gauges looks like it came straight out of a laboratory. In fact, though, it's a prototype coffee machine-and it could satisfy the technical desires of even the biggest coffee nerd. The Laboratory Espresso Machine was dreamt up by israeli designers David Budzik and Adi Schlesinger. Its design aesthetic is clearly inspired by the contents of a chemistry lab, but it also uses science in the coffee-making process, too: it uses the Venturi effect to adjust pressures and relies on a bunch of complex thermodynamics to ensure water temperature and pressure are consistent."
Kevin DiVico

Robot Invasion: Can computers replace scientists? - Slate Magazine - 0 views

  •  
    Can robots work as scientists? At first, this seems like a silly question. Computers are pervasive in science, and if you walk into a large university lab today, there's a good chance you'll find a fully fledged robot working alongside the lab-coat-wearing humans. Robots fill test tubes, make DNA microarrays, participate in archaeological digs, and survey the oceans. There are entire branches of science-climate modeling and genomics, for example-that wouldn't exist without powerful microprocessors. Machines even play an integral part in abstract fields of discovery. In experimental mathematics, humans rely on computers to inspire new lines of thinking and investigate hypotheses. In 1976, mathematicians used computers to prove the four-color theorem, and machines have since been used in several other proofs.
Kevin DiVico

Arcfinity - Phantom Menaces - 0 views

  •  
    Google's swooshy new concept video for augmented reality goggles (or "spex", if you will) has certainly put the virtual cat among the digital pigeons. An attempt, perhaps, to leapfrog the iPad - if Google can persuade us that what we really want is headwear that will let us see things that aren't really there.
Kevin DiVico

How A Geek Dad And His 3D Printer Aim To Liberate Legos - Forbes - 0 views

  •  
    Last year Golan Levin's son decided to build a car. Aside from the minor inconvenience of being 4 years old, the younger Levin faced an engineering challenge. His Tinkertoys, which he wanted to use for the vehicle's frame, wouldn't attach to his K'Nex, the pieces he wanted to use for the wheels. It took his father, an artist, hacker and professor at Carnegie Mellon, a year to solve that problem. In the process he cracked open a much larger one: In an age when anyone can share, download and create not just digital files but also physical things, thanks to the proliferation of cheap 3-D printers, are companies at risk of losing control of the objects they sell?
Kevin DiVico

Start-Ups Aim to Help Users Put a Price on Their Personal Data - NYTimes.com - 0 views

  •  
    Facebook's pending initial public offering gives credence to the argument that personal data is the oil of the digital age. The company was built on a formula common to the technology industry: offer people a service, collect information about them as they use that service and use that information to sell advertising.
Kevin DiVico

CDC - Blogs - Public Health Matters Blog - Disaster Movies: Lessons Learned - 0 views

  •  
    With the Oscars just 3 days away, movies have been on our mind lately here at CDC's Office of Public Health Preparedness and Response.  Especially disaster movies.  They come in all kinds of flavors: deadly viruses, tornadoes, earthquakes, and, yes, even snakes on a plane.   Their special effects can be realistic enough to make us feel like we are right there in the heart of the storm.  But frequently, the heroes and heroines of these movies respond to disasters in ways that bear no resemblance to what people in the real world should do.  We can nevertheless use disaster films to consider how the characters could have been more prepared or how they should have reacted if the situation they faced was real.  Check out some of our favorite disaster movies and the lessons we can learn from them.
Kevin DiVico

Askemos - 0 views

  •  
    The aim of the Askemos project is to enable reliable and justiciable data processing, with the goal of producing "Software that can last 200 years." The first implementations of an Askemos peer can be obtained from ball.askemos.org. The Askemos web site itself is served from the Askemos/BALL development network. Follow here for more details. Note that Askemos concerns the abstract specification exclusively; including data formats, protocols, service interfaces etc. - not the actual implementations. Askemos combines incorruptible privilege delegation and non-repudiable replication of communicating processes into a trustworthy network. Physical machines under control of their operators execute applications processes under permanent multilateral audit. The network's honest majority of hosts provides users with exclusive control, and thus real ownership of processes. Askemos models a kind of "virtual constitutional state" where physical hosts bear witness to the interactions of virtual agents (akin to citizens). Self verifying identifiers can confirm that original documents have not beentampered with. The real potential for using Askemos is for identity and time stamp services, informationmanagement in public administration and libraries attaching metadata and archives, with the goal of establishing robust systems that can endure for centuries. German tax law, for instance, has storage requirements, which makes Askemos interesting even for private, individual use. Also Activist groups, non-profits and people who desire privacy and reliability in a chaotic and unpredictable world have much to gain from this software.
1 - 20 of 95 Next › Last »
Showing 20 items per page