There's no doubting the cloud invasion. But the research firm Gartner believes the personal cloud will replace the PC as the center of our digital lives sooner than you might think: 2014.
"Major trends in client computing have shifted the market away from a focus on personal computers to a broader device perspective that includes smartphones, tablets and other consumer devices," Steve Kleynhans, research vice president at Gartner, said in a statement on Monday. "Emerging cloud services will become the glue that connects the web of devices that users choose to access during the different aspects of their daily life."
The aim of the Askemos project is to enable reliable and justiciable data processing, with the goal of producing "Software that can last 200 years."
The first implementations of an Askemos peer can be obtained from ball.askemos.org.
The Askemos web site itself is served from the Askemos/BALL development network. Follow here for more details.
Note that Askemos concerns the abstract specification exclusively; including data formats, protocols, service interfaces etc. - not the actual implementations.
Askemos combines incorruptible privilege delegation and non-repudiable replication of communicating processes into a trustworthy network. Physical machines under control of their operators execute applications processes under permanent multilateral audit. The network's honest majority of hosts provides users with exclusive control, and thus real ownership of processes. Askemos models a kind of "virtual constitutional state" where physical hosts bear witness to the interactions of virtual agents (akin to citizens). Self verifying identifiers can confirm that original documents have not beentampered with.
The real potential for using Askemos is for identity and time stamp services, informationmanagement in public administration and libraries attaching metadata and archives, with the goal of establishing robust systems that can endure for centuries. German tax law, for instance, has storage requirements, which makes Askemos interesting even for private, individual use. Also Activist groups, non-profits and people who desire privacy and reliability in a chaotic and unpredictable world have much to gain from this software.
In this day and age, it seems everything online has a price associated with it. Whether you're subscribing to a pay site for full articles or clicking on ads in a blog, everything online seems to have money associated with it. Luckily there is still a large, and very healthy, movement online for media files listed under the Creative Commons licenses.
Create Video Through Collaboration
Share Large Files in Public or Private
SpinXpress is used by independent global media producers to create videos, music compilations, and other collaborative media projects.
* Works with any file format
* Place free ads for your services
* Built in Wiki for open forum
* Publish your work
* Search for Creative Commons Licensed Media
* Share your files with anyone, anywhere, anytime
The World Knowledge Dialogue Symposium was streamed live from Crans Montana, Switzerland from 10 to 13 September 2008. All plenaries, roundtables and talks have been archived and may be watched anytime here.
With the Oscars just 3 days away, movies have been on our mind lately here at CDC's Office of Public Health Preparedness and Response. Especially disaster movies. They come in all kinds of flavors: deadly viruses, tornadoes, earthquakes, and, yes, even snakes on a plane.
Their special effects can be realistic enough to make us feel like we are right there in the heart of the storm. But frequently, the heroes and heroines of these movies respond to disasters in ways that bear no resemblance to what people in the real world should do.
We can nevertheless use disaster films to consider how the characters could have been more prepared or how they should have reacted if the situation they faced was real. Check out some of our favorite disaster movies and the lessons we can learn from them.
Summary: How can we reclaim and reform America? Here is a five-step program. All it requires is time and effort. This is a content-free path. I do not know where this will take us. Only that if widely followed America will become what we wish it to be. No matter what the outcome, we will meet the future as citizens. Not sheep.
Unthinkable as it may be, humanity, every last person, could someday be wiped from the face of the Earth. We have learned to worry about asteroids and supervolcanoes, but the more-likely scenario, according to Nick Bostrom, a professor of philosophy at Oxford, is that we humans will destroy ourselves.
Summary: Sharks often use the "bump and bite" attack: The shark tests its prey by repeatedly bumping it. If the prey gives no dangerous response, the shark begins its attack - biting the prey repeatedly and viciously. It works for sharks, as it has worked for our leaders. Now the bumping phase ends and the attack begins. Attorney General Eric Holder explains the new order.
The independent Media Inquiry commissioned last year by the federal government has proposed the creation of a national watchdog that would keep watch on the conduct of all media outlets in Australia - print, broadcast and online.
Having at least six months of expenses provides financial stability, helps you avoid debt with high interest payments, and lowers stress levels. We have a full year of expenses put aside in liquid cash, and it lets me sleep well at night.
Emergency funds can actually have a better return on investment than what you see on a bank account. But that doesn't mean I shouldn't still maximize my interest earned, especially as cash is an asset class where you can increase your return without having to take on additional risk (if you stay FDIC-insured or equivalent).
Do you know what is the most common question that I get every day on social media, forums or email?
"How to get insights about my Google Analytics data?" People approach me saying that they have a Google Analytics account for years, but they look only at page views or the number of visitors they get.
In a nutshell
The Data Journalism Awards (DJA) is the first international contest recognising outstanding work in the field of data journalism worldwide.
By recognising outstanding work and editorial excellence in the field of data journalism, the DJA seeks to:
Contribute to setting high standards and highlighting the best practices in data journalism.
Demonstrate the value of data journalism among editors and media executives.
Forgetting that cloak of invisibility - how about a device that hides you in the very fabric of time? New research published in Nature reveals that scientists have successfully hidden an object in both space and time - even if for only for 40 picoseconds. Rather than bending light around the object, their technique creates a temporal hole in light beams where an event can be hidden.
Beyond any shadow of a doubt, a shit storm of epic proportions has just gone down. Something which had the potential to affect practically every coder. (Top four stories on HackerNews all related to this crisis).
Every GitHub repository was vulnerable to attack and absolutely nothing was safe.
If you are one of those strange coders that don't use GitHub and think you are in the clear because you use SVN, well the potential damage from the ripples of this vulnerability would of eventually reached you. When the large portion of the technical world all depends on a single service, and that service is vulnerable to a variety of attacks, that makes *anyone* who consumes these services also vulnerable.
Today's lead story in the Observer is a maddening and excellent investigative piece revealing that for three decades, the UK's biggest construction companies worked with British police and spy-agencies to build illegal dossiers on whistle-blowers who complained about unsafe working conditions and trade-unionists. The victims of these investigations -- thousands of them -- were economically ruined as the firms conspired to keep them from being hired at any job-site, and saw to it that if they were ever hired, they were promptly fired.
Some Internet piracy groups decided to implement some new regulations and standards last week. Instead of releasing TV shows in the Xvid/avi format, groups responsible for putting major TV shows online switched to MP4/x264. Outraged by the lack of democracy, some BitTorrent users are directing their anger at bewildered torrent sites and even threatening to boycott releases. For those who understand, the whole thing is pretty amusing.
You want to start your own blog but you don't want to look tacky by using an existing design. Creating your own theme can be daunting, but with some assistance you can have a unique design for your blog in no time. This post will help you put it all together using WordPress, the most popular (and free) blogging software available.
A lot of us stare at a computer monitor for the bulk of our day and reading long articles or books is rarely a comfortable experience. With that in mind, here's a few steps you can take to make you reading experience less terrible.