Skip to main content

Home/ Future of the Web/ Group items tagged side

Rss Feed Group items tagged

Gary Edwards

AJAX World RIA Conference News - AJAX & RIA with Server-Side JavaScript @ WEB 2.0 JOURNAL - 0 views

  • Server-side JavaScript (SSJS) is growing in popularity fast since developers realize it can drastically simplify Web app creation by letting you use using the same technology stack on both the client and the server.
  •  
    Server side and client side JavaScript
  •  
    Visit News www.killdo.de.gg. How to make the 1000 visitor from PR9 backlinks. Buy cheap service www.fiverr.com/radjaseotea/making-best-super-backlink-143445
Gary Edwards

Zoho Blogs » Firefox 3.1 & Google Chrome: Javascript Wins, Flash/Silverlight ... - 0 views

  •  
    ZOHO Speaks about Chrome: "The biggest losers in Google's announcement are not really competing browsers, but competing rich client engines like Flash and Silverlight. As Javascript advances rapidly, it inevitably encroaches on the territory currently held by Flash. Native browser video is likely the last nail in the coffin - and Google needs native browser based video for its own YouTube, so we can be confident Google Chrome and Firefox will both have native video support, with Javascript-accessible VOM (video object model) APIs for web applications to manipuate video. As for Silverlight, let me just say that if Silverlight is the future of web computing, companies like us might as well find another line of work - and I suspect Google and Yahoo probably see it the same way too. More speculatively, I believe we will witness the emergence of Javascript as the dominant language of computing, as it sweeps the client side and starts encroaching on the server. The server landscape today is split between "enterprise" platforms like Java and .NET on the one side (we ourselves are in the Java camp on the server side), and "scripting" languages like PHP, Python, Ruby on the other, with Javascript firmly entrenched on the client. Languages like Ruby promise tremendous dynamism and flexibility to the developer, but their relatively weak execution environments have held them back. It is telling that both Java and .NET come with state of the art just-in-time compilers, while none of the major scripting languages do......" Interestingly, ZOHO already has a prototype running on Chrome! Solves tons of performance problems for them, as well as givign them an on-line / off-line story (Gears). The success of Chrome depends on Chrome "killer apps"; Not browser surfing features! And we already have a number of killer apps that will immediately take advantage of Chrome: gMail, gReader, gMaps and Google Docs! ZOHO will no doubt use Chrome to put themselves squarely i
Gonzalo San Gil, PhD.

Farmers Unable to Repair Tractors Because Copyright: Never a Side Effect, But Core Inte... - 0 views

  •  
    "...Being locked out of your own possessions is not a side effect - it was the central point of the legislation and its core purpose...."
  •  
    "...Being locked out of your own possessions is not a side effect - it was the central point of the legislation and its core purpose...."
Gonzalo San Gil, PhD.

A Guide to the Dark Web's Lighter Side | WIRED - 2 views

  •  
    "Diego Patiño That underground warren of anonymous sites known as the dark web has a reputation for nightmarish stuff like child porn and hit men for hire. It does indeed contain those horrors-and a lot of perfectly decent things. Fire up your Tor browser and explore the lighter sides of the dark web with your conscience intact."
Gonzalo San Gil, PhD.

Power in the Age of the Feudal Internet - CoLab - 0 views

  •  
    "Discussion Papers > Internet and Security > Proposition PROPOSITION Bruce Schneier, Cryptographer and Computer Security Specialist and Author of Liars and Outliers: Enabling the Trust Society Needs to Thrive We're in the middle of an epic battle for power in cyberspace. On one side are the nimble, unorganized, distributed powers such as dissident groups, criminals, and hackers. On the other side are the traditional, organized, institutional powers such as governments and large multinational corporations. During its early days, the Internet gave coordination and efficiency to the powerless. It made them powerful, and seem unbeatable. But now the more traditional institutional powers are winning, and winning big. How these two fare long-term, and the fate of the majority of us that don't fall into either group, is an open question - and one vitally important to the future of the Internet."
Gonzalo San Gil, PhD.

Wikileaks and the Control of the Internet | La Quadrature du Net - 2 views

  •  
    [ Op'Ed by Jérémie Zimmermann initially published in French in Mediapart WikiLeaks has become the symbol of disturbing information that can't be stopped. Recent declarations and actions against the organization clearly expose the will of governments to control the Internet. From now on, it seems that both sides are fighting a battle that could be one of the most important that we must wage for the future of our democracies. On one side, those who would like to put the Internet under control, through administrative or privatized censorship, in order to remain in power. On the other, citizens of the word at large ready build networked societies in which the sharing of knowledge, freedom of expression and the increased transparency allowed for by the Internet must be protected and strengthened at all costs. ]
Gary Edwards

WebKit and the Future of the Open Web - 0 views

  •  
    I reformatted my response to marbux concerning HTML5 and web application lack of interoperability. The original article these comments were posted to is titled, "Siding with HTML over XHTML, My Decision to Switch.... ".
Gary Edwards

Was JavaScript a mistake? |Fatal Exception | Neil McAllister | InfoWorld - 0 views

  • Maybe if we focused on what we are trying to accomplish (deliver business results more efficiently) vs the gee whiz of all the tools we would be in better shape.
  •  
    Rather than shoehorning more and more functionality into the browser itself (and going through all the rigorous standardization procedures that this requires), maybe it's time we separated the UI from the underlying client-side logic. Let the browser handle the View. Let the Controller exist somewhere else, independent of the presentation layer. We already have a means to achieve this separation for client-side code today: browser plug-ins.
Gary Edwards

The real reason Google is making Chrome | Computerworld Blogs - 0 views

  •  
    Good analysis by Stephen Vaughan-Nichols. He gets it right. Sort of. Stephen believes that Chrome is desinged to kill MSOffice. Maybe, but i think it's way too late for that. IMHO, Chrome is designed to keep Google and the Open Web in the game. A game that Microsoft is likely to run away with. Microsoft has built an easy to use transiton bridge form MSOffice desktop centric "client/server" computing model to a Web centirc but proprietary RiA-WebStack-Cloud model. In short, there is an on going great transtion of traditional client/server apps to an emerging model we might call client/ WebStack-Cloud-RiA /server computing model. As the world shifts from a Web document model to one driven by Web Applications, there is i believe a complimentary shift towards the advantage Micorsoft holds via the desktop "client/server" monopoly. For Microsoft, this is just a transtion. Painful from a monopolist profitability view point - but unavoidably necessary. The transition is no doubt helped by the OOXML <> XAML "Fixed/flow" Silverlight ready conversion component. MS also has a WebStack-Cloud (Mesh) story that has become an unstoppable juggernaut (Exchange/SharePoint/SQL Server as the WebSTack). WebKit based RiA challengers like Adobe Apollo, Google Chrome, and Apple SproutCore-Cocoa have to figure out how to crack into the great transition. MS has succeeded in protecting their MSOffice monopoly until such time as they had all the transtion pieces in place. They have a decided advantage here. It's also painfully obvious that the while the WebKit guys have incredible innovation on their side, they are still years behind the complete desktop to WebStack-RiA-Cloud to device to legacy servers application story Microsoft is now selling into the marketplace. They also are seriously lacking in developer tools. Still, the future of the Open Web hangs in the balance. Rather than trying to kill MSOffice, i would think a better approach would be that of trying to
  •  
    There are five reasons why Google is doing this, and, if you read the comic book closely - yes, I'm serious - and you know technology you can see the reasons for yourself. These, in turn, lead to what I think is Google's real goal for Chrome.
  •  
    I'm still keeping the door open on a suspicion that Microsoft may have planned to end the life of MS Office after the new fortress on the server side is ready. The code base is simply too brittle to have a competitive future in the feature wars. I can't get past my belief that if Microsoft saw any future in the traditional client-side office suite, it would have been building a new one a decade ago. Too many serious bugs too deeply buried in spaghetti code to fix; it's far easier to rebuild from the ground up. Word dates to 1984, Excel to 1985, Powerpoint to 1987, All were developed for the Mac, ported years later to Windows. At least Word is still running a deeply flawed 16-bit page layout engine. E.g., page breaks across subdocuments have been broken since Word 1.0. Technology designed to replace yet still largely defined by its predecessor, the IBM Correcting Selectric electro-mechanical typewriter. Mid-80s stand-alone, non-networked computer technology in the World Wide Web era? Where's the future in software architecture developed two decades ago, before the Connected World? I suspect Office's end is near. Microsoft's problem is migrating their locked-in customers to the new fortress on the server side. The bridge is OOXML. In other words, Google doesn't have to kill Office; Microsoft will do that itself. Giving the old cash cow a face lift and fresh coat of lipstick? That's the surest sign that the old cow's owner is keeping a close eye on prices in the commodity hamburger market while squeezing out the last few buckets of milk.
Gonzalo San Gil, PhD.

IDG Connect - Friday Rant: The Internet Is Broken - 0 views

  •  
    " Posted by Alex Cruickshank on May 30 2014 The internet has come a long way in 20 years. The infrastructure is older than that, of course, but it was 1994 when the amazing new World Wide Web started to make a serious impression on me and my colleagues and friends. Firing up Netscape Navigator 1.0 on Windows 3.11 with a wobbly TCP/IP stack and a 14.4kbps modem, typing in a cryptic URL and seeing information from the other side of the world, instantly! It was an incredible experience."
  •  
    " Posted by Alex Cruickshank on May 30 2014 The internet has come a long way in 20 years. The infrastructure is older than that, of course, but it was 1994 when the amazing new World Wide Web started to make a serious impression on me and my colleagues and friends. Firing up Netscape Navigator 1.0 on Windows 3.11 with a wobbly TCP/IP stack and a 14.4kbps modem, typing in a cryptic URL and seeing information from the other side of the world, instantly! It was an incredible experience."
Gonzalo San Gil, PhD.

Senators opposing net neutrality rake in more campaign cash | Ars Technica - 0 views

  •  
    "Money and the public lining up on opposite sides of the net neutrality debate." [# ! Until #Money were out from #Politics... # ! ... there will be no Politics at all... nor #Democracy]
  •  
    "Money and the public lining up on opposite sides of the net neutrality debate."
Paul Merrell

W3C Public Newsletter 2008 06 09 - 0 views

  • W3C launched a new Web Applications (WebApps) Working Group, co-Chaired by Art Barstow (Nokia) and Charles McCathieNevile (Opera Software). This group merges the former Web APIs and Web Application Formats Working Groups. Per the charter for the Web Applications Working Group, the group's mission is to provide specifications that enable improved client-side application development on the Web, including specifications both for application programming interfaces (APIs) for client-side development and for markup vocabularies for describing and controlling client-side application behavior.
Gonzalo San Gil, PhD.

Microsoft to open source more of .NET, and bring it to Linux, Mac OS X | ZDNet [# Via M... - 0 views

  •  
    [http://www.muylinux.com/2014/11/13/microsoft-plataforma-dot-net-open-source-linux?PageSpeed=noscript] "Summary: Microsoft is porting its server-side .NET stack to Linux and Mac OS X, and is making more of that stack available as open source." # ! #OpenSource is the @¡#way.
  •  
    [http://www.muylinux.com/2014/11/13/microsoft-plataforma-dot-net-open-source-linux?PageSpeed=noscript] "Summary: Microsoft is porting its server-side .NET stack to Linux and Mac OS X, and is making more of that stack available as open source."
Gonzalo San Gil, PhD.

Hollywood vs. Silicon Valley (AAPL, CSCO, DIS, INTC, MSFT, TWX, VIA) - 0 views

  •  
    "By Anders Bylund | More Articles January 7, 2011 | Comments (0) The entertainment industry has always been split in two very distinct, extremely incompatible sides: content and technology. Let's call these factions "Hollywood" and "Silicon Valley" for the sake of discussion, because it just sounds a lot nicer."
  •  
    "By Anders Bylund | More Articles January 7, 2011 | Comments (0) The entertainment industry has always been split in two very distinct, extremely incompatible sides: content and technology. Let's call these factions "Hollywood" and "Silicon Valley" for the sake of discussion, because it just sounds a lot nicer."
Gonzalo San Gil, PhD.

Authors side with Apple in e-book price-fixing Supreme Court appeal | Ars Technica UK - 0 views

  •  
    "Case undermines "the very objective of antitrust law-to ensure robust competition." by David Kravets (US) - Dec 4, 2015 12:37am CET"
Paul Merrell

BitTorrent Sync creates private, peer-to-peer Dropbox, no cloud required | Ars Technica - 6 views

  • BitTorrent today released folder syncing software that replicates files across multiple computers using the same peer-to-peer file sharing technology that powers BitTorrent clients. The free BitTorrent Sync application is labeled as being in the alpha stage, so it's not necessarily ready for prime-time, but it is publicly available for download and working as advertised on my home network. BitTorrent, Inc. (yes, there is a legitimate company behind BitTorrent) took to its blog to announce&nbsp;the move from a pre-alpha, private program to the publicly available alpha. Additions since the private alpha include one-way synchronization, one-time secrets for sharing files with a friend or colleague, and the ability to exclude specific files and directories.
  • BitTorrent Sync provides "unlimited, secure file-syncing," the company said. "You can use it for remote backup. Or, you can use it to transfer large folders of personal media between users and machines; editors and collaborators. It’s simple. It’s free. It’s the awesome power of P2P, applied to file-syncing." File transfers are encrypted, with private information never being stored on an external server or in the "cloud." "Since Sync is based on P2P and doesn’t require a pit-stop in the cloud, you can transfer files at the maximum speed supported by your network," BitTorrent said. "BitTorrent Sync is specifically designed to handle large files, so you can sync original, high quality, uncompressed files."
  •  
    Direct P2P encrypted file syncing, no cloud intermediate, which should translate to far more secure exchange of files, with less opportunity for snooping by governments or others, than with cloud-based services. 
  • ...5 more comments...
  •  
    Hey Paul, is there an open source document management system that I could hook the BitTorrent Sync to?
  •  
    More detail please. What do you want to do with the doc management system? Platform? Server-side or stand-alone? Industrial strength and highly configurable or lightweight and simple? What do you mean by "hook?" Not that I would be able to answer anyway. I really know very little about BitTorrent Sync. In fact, as far as I'd gone before your question was to look at the FAQ. It's linked from . But there's a link to a forum on the same page. Giving the first page a quick scan confirms that this really is alpha-state software. But that would probably be a better place to ask. (Just give them more specific information of what you'd like to do.) There are other projects out there working on getting around the surveillance problem. I2P is one that is a farther along than BitTorrent Sync and quite a bit more flexible. See . (But I haven't used it, so caveat emptor.)
  •  
    There is a great list of PRISM Proof software at http://prism-break.org/. Includes a link to I2P. I want to replace gmail though, but would like another Web based system since I need multi device access. Of course, I need to replace my Google Apps / Google Docs system. That's why I asked about a PRISM Proof sync-share-store DMS. My guess is that there are many users similarly seeking a PRISM Proof platform of communications, content and collaborative computing systems. BusinessIndiser.com is crushed with articles about Google struggling to squirm out from under the NSA PRISM boot-on-the-back-of-their-neck situation. As if blaming the NSA makes up for the dragnet that they consented/allowed/conceded to cover their entire platform. Perhaps we should be watching Germany? There must be tons of startup operations underway, all seeking to replace Google, Amazon, FaceBook, Microsoft, Skype and so many others. It's a great day for Libertyware :)
  •  
    Is the NSA involvement the "Kiss of Death"? Google seems to think so. I'm wondering what the impact would be if ZOHO were to announce a PRISM Proof productivity platform?
  •  
    It is indeed. The E.U. has far more protective digital privacy rights than we do (none). If you're looking for a Dropbox replacement (you should be), for a cloud-based solution take a look at . Unlike Dropbox, all of the encryption/decryption happens on your local machine; Wuala never sees your files unencrypted. Dropbox folks have admitted that there's no technical barrier to them looking at your files. Their encrypt/decrypt operations are done in the cloud (if they actually bother) and they have the key. Which makes it more chilling that the PRISM docs Snowden link make reference to Dropbox being the next cloud service NSA plans to add to their collection. Wuala also is located (as are its servers) in Switzerland, which also has far stronger digital data privacy laws than the U.S. Plus the Swiss are well along the path to E.U. membership; they've ratified many of the E.U. treaties including the treaty on Human Rights, which as I recall is where the digital privacy sections are. I've begun to migrate from Dropbox to Wuala. It seems to be neck and neck with Dropbox on features and supported platforms, with the advantage of a far more secure approach and 5 GB free. But I'd also love to see more approaches akin to IP2 and Bittorrent Sync that provide the means to bypass the cloud. Don't depend on government to ensure digital privacy, route around the government voyeurs. Hmmm ... I wonder if the NSA has the computer capacity to handle millions of people switching to encrypted communication? :-) Thanks for the link to the software list.
  •  
    Re: Google. I don't know if it's the 'kiss of death" but they're definitely going to take a hit, particularly outside the U.S. BTW, I'm remembering from a few years back when the ODF Foundation was still kicking. I did a fair bit of research on the bureaucratic forces in the E.U. that were pushing for the Open Document Exchange Formats. That grew out of a then-ongoing push to get all of the E.U. nations connected via a network that is not dependent on the Internet. It was fairly complete at the time down to the national level and was branching out to the local level and the plan from there was to push connections to business and then to Joe Sixpack and wife. Interop was key, hence ODEF. The E.U. might not be that far away from an ability to sever the digital connections with the U.S. Say a bunch of daisy-chained proxy anonymizers for communications with the U.S. Of course they'd have to block the UK from the network and treat it like it is the U.S. There's a formal signals intelligence service collaboration/integration dating back to WW 2, as I recall, among the U.S., the U.K., Canada, Australia, and New Zealand. Don't remember its name. But it's the same group of nations that were collaborating on Echelon. So the E.U. wouldn't want to let the UK fox inside their new chicken coop. Ah, it's just a fantasy. The U.S. and the E.U. are too interdependent. I have no idea hard it would be for the Zoho folk to come up with desktop/side encryption/decryption. And I don't know whether their servers are located outside the reach of a U.S. court's search warrant. But I think Google is going to have to move in that direction fast if it wants to minimize the damage. Or get way out in front of the hounds chomping at the NSA's ankles and reduce the NSA to compost. OTOH, Google might be a government covert op. for all I know. :-) I'm really enjoying watching the NSA show. Who knows what facet of their Big Brother operation gets revealed next?
  •  
    ZOHO is an Indian company with USA marketing offices. No idea where the server farm is located, but they were not on the NSA list. I've known Raju Vegesna for years, mostly from the old Web 2.0 and Office 2.0 Conferences. Raju runs the USA offices in Santa Clara. I'll try to catch up with him on Thursday. How he could miss this once in a lifetime moment to clean out Google, Microsoft and SalesForce.com is something I'd like to find out about. Thanks for the Wuala tip. You sent me that years ago, when i was working on research and design for the SurDocs project. Incredible that all our notes, research, designs and correspondence was left to rot in Google Wave! Too too funny. I recall telling Alex from SurDocs that he had to use a USA host, like Amazon, that could be trusted by USA customers to keep their docs safe and secure. Now look what i've done! I've tossed his entire company information set into the laps of the NSA and their cabal of connected corporatists :)
Paul Merrell

Commentary: Don't be so sure Russia hacked the Clinton emails | Reuters - 0 views

  • By James Bamford Last summer, cyber investigators plowing through the thousands of leaked emails from the Democratic National Committee uncovered a clue.A user named “Феликс Эдмундович” modified one of the documents using settings in the Russian language. Translated, his name was Felix Edmundovich, a pseudonym referring to Felix Edmundovich Dzerzhinsky, the chief of the Soviet Union’s first secret-police organization, the Cheka.It was one more link in the chain of evidence pointing to Russian President Vladimir Putin as the man ultimately behind the operation.During the Cold War, when Soviet intelligence was headquartered in Dzerzhinsky Square in Moscow, Putin was a KGB officer assigned to the First Chief Directorate. Its responsibilities included “active measures,” a form of political warfare that included media manipulation, propaganda and disinformation. Soviet active measures, retired KGB Major General Oleg Kalugin told Army historian Thomas Boghart, aimed to discredit the United States and “conquer world public opinion.”As the Cold War has turned into the code war, Putin recently unveiled his new, greatly enlarged spy organization: the Ministry of State Security, taking the name from Joseph Stalin’s secret service. Putin also resurrected, according to James Clapper, the U.S. director of national intelligence, some of the KGB’s old active- measures tactics.&nbsp;On October 7, Clapper issued a statement: “The U.S. Intelligence community is confident that the Russian government directed the recent compromises of emails from U.S. persons and institutions, including from U.S. political organizations.” Notably, however, the FBI declined to join the chorus, according to reports by the New York Times and CNBC.A week later, Vice President Joe Biden said on NBC’s Meet the Press that "we're sending a message" to Putin and "it will be at the time of our choosing, and under the circumstances that will have the greatest impact." When asked if the American public would know a message was sent, Biden replied, "Hope not."&nbsp;Meanwhile, the CIA was asked, according to an NBC report on October 14, “to deliver options to the White House for a wide-ranging ‘clandestine’ cyber operation designed to harass and ‘embarrass’ the Kremlin leadership.”But as both sides begin arming their cyberweapons, it is critical for the public to be confident that the evidence is really there, and to understand the potential consequences of a tit-for-tat cyberwar escalating into a real war.&nbsp;
  • This is a prospect that has long worried Richard Clarke, the former White House cyber czar under President George W. Bush. “It’s highly likely that any war that began as a cyberwar,” Clarke told me last year, “would ultimately end up being a conventional war, where the United States was engaged with bombers and missiles.”The problem with attempting to draw a straight line from the Kremlin to the Clinton campaign is the number of variables that get in the way.&nbsp;For one, there is little doubt about Russian cyber fingerprints in various U.S. campaign activities.&nbsp;Moscow, like Washington, has long spied on such matters.&nbsp;The United States, for example, inserted malware in the recent Mexican election campaign. The question isn’t whether Russia spied on the U.S. presidential election, it’s whether it released the election emails.Then there’s the role of Guccifer 2.0, the person or persons supplying WikiLeaks and other organizations with many of the pilfered emails.&nbsp;Is this a Russian agent? A free agent? A cybercriminal? A combination, or some other entity? No one knows.There is also the problem of groupthink that led to the war in Iraq. For example, just as the National Security Agency, the Central Intelligence Agency and the rest of the intelligence establishment are convinced Putin is behind the attacks, they also believed it was a slam-dunk that Saddam Hussein had a trove of weapons of mass destruction.&nbsp;Consider as well the speed of the political-hacking investigation, followed by a lack of skepticism, culminating in a rush to judgment. After the Democratic committee discovered the potential hack last spring, it called in the cybersecurity firm CrowdStrike in May to analyze the problem.
  • CrowdStrike took just a month or so before it conclusively determined that Russia’s FSB, the successor to the KGB, and the Russian military intelligence organization, GRU, were behind it. Most of the other major cybersecurity firms quickly fell in line and agreed. By October, the intelligence community made it unanimous.&nbsp;That speed and certainty contrasts sharply with a previous suspected Russian hack in 2010, when the target was the Nasdaq stock market. According to an extensive investigation by Bloomberg Businessweek in 2014, the NSA and FBI made numerous mistakes over many months that stretched to nearly a year.&nbsp;“After months of work,” the article said, “there were still basic disagreements in different parts of government over who was behind the incident and why.”&nbsp; There was no consensus­, with just a 70 percent certainty that the hack was a cybercrime. Months later, this determination was revised again: It was just a Russian attempt to spy on the exchange in order to design its own.&nbsp;The federal agents also considered the possibility that the Nasdaq snooping was not connected to the Kremlin. Instead, “someone in the FSB could have been running a for-profit operation on the side, or perhaps sold the malware to a criminal hacking group.”&nbsp;Again, that’s why it’s necessary to better understand the role of Guccifer 2.0 in releasing the Democratic National Committee and Clinton campaign emails before launching any cyberweapons.
  • ...2 more annotations...
  • t is strange that clues in the Nasdaq hack were very difficult to find ― as one would expect from a professional, state-sponsored cyber operation. Conversely, the sloppy, Inspector Clouseau-like nature of the Guccifer 2.0 operation, with someone hiding behind a silly Bolshevik cover name, and Russian language clues in the metadata, smacked more of either an amateur operation or a deliberate deception.Then there’s the Shadow Brokers, that mysterious person or group that surfaced in August with its farcical “auction” to profit from a stolen batch of extremely secret NSA hacking tools, in essence, cyberweapons. Where do they fit into the picture? They have a small armory of NSA cyberweapons, and they appeared just three weeks after the first DNC emails were leaked.&nbsp;On Monday, the Shadow Brokers released more information, including what they claimed is a list of&nbsp;hundreds of organizations that the NSA has targeted over more than a decade, complete with technical details. This offers further evidence that their information comes from a leaker inside the NSA rather than the Kremlin. The Shadow Brokers also discussed Obama’s threat of cyber retaliation against Russia. Yet they seemed most concerned that the CIA, rather than the NSA or Cyber Command, was given the assignment.&nbsp;This may be a&nbsp;possible indication of a connection to NSA’s elite group, Tailored Access Operations, considered by many the A-Team of hackers.“Why is DirtyGrandpa threating CIA cyberwar with Russia?” they wrote. “Why not threating with NSA or Cyber Command? CIA is cyber B-Team, yes? Where is cyber A-Team?”&nbsp;Because of legal and other factors, the NSA conducts cyber espionage, Cyber Command conducts cyberattacks in wartime, and the CIA conducts covert cyberattacks.&nbsp;
  • The Shadow Brokers connection is important because Julian Assange, the founder of WikiLeaks, claimed to have received identical copies of the Shadow Brokers cyberweapons even before they announced their “auction.” Did he get them from the Shadow Brokers, from Guccifer, from Russia or from an inside leaker at the NSA?Despite the rushed, incomplete investigation and unanswered questions, the Obama administration has announced its decision to retaliate against Russia.&nbsp; But a public warning about a secret attack makes little sense. If a major cyber crisis happens in Russia sometime in the future, such as a deadly power outage in frigid winter, the United States could be blamed even if it had nothing to do with it.&nbsp;That could then trigger a major retaliatory cyberattack against the U.S. cyber infrastructure, which would call for another reprisal attack ― potentially leading to Clarke’s fear of a cyberwar triggering a conventional war. President Barack Obama has also not taken a nuclear strike off the table as an appropriate response to a devastating cyberattack.
  •  
    Article by James Bamford, the first NSA whistleblower and author of three books on the NSA.
Gonzalo San Gil, PhD.

In battle of online piracy, it's Hollywood vs. Silicon Valley - The Reporter - 1 views

  •  
    [LOS ANGELES -- In a move that heightens the growing tension between Silicon Valley and Hollywood, Wikipedia and other websites went dark Wednesday in protest of two congressional proposals intended to thwart the online piracy of copyrighted movies and TV programs. The web-based encyclopedia is part of a loose coalition of dot-coms and large technology companies that fear Congress is prepared to side with Hollywood and enact extreme measures -- possibly including the blocking of entire websites -- to stop the online sharing and unauthorized use of Hollywood productions. ...]
Gonzalo San Gil, PhD.

In Response To Growing Protests, EU Pulls Corporate Sovereignty Chapter From TAFTA/TTIP... - 0 views

  •  
    "from the more-of-this,-please dept Here on Techdirt, we've been writing about the dangers of corporate sovereignty for a while. In recent months, more and more people and organizations have pointed out that the plan to include an investor-state dispute settlement (ISDS) in the TAFTA/TTIP agreement currently being negotiated is fraught with dangers -- and also completely unnecessary given the fair and efficient legal systems that exist on both sides of the Atlantic. It seems that this chorus of disapproval has finally been noticed, in Brussels at least: "
Gary Edwards

Google Apps Ad On Store - You use Google Docs and Sheets to get lots of stuff... - 1 views

  •  
    This morning Google announced Google Docs Ad Ons using server side JavaScript. The Ad-Ons are available at the Google Apps Store. The short videos provide a glimpse at some of the new Ad-Ons, including the mail (Avery) and email (MailChimp) MERGE features. Yes, this is what Cloud Productivity has been waiting for; mail merge and data merge that the Office desktop productivity suites first featured in 1992! Still, better late than never. MERGE is a critical feature for office productivity, and now the Cloud has it in a general purpose productivity platform. Good stuff. Now, how about getting a Diigo Ad-On for the Bibliography MERGE feature set!!!!
1 - 20 of 79 Next › Last »
Showing 20 items per page