Skip to main content

Home/ Future of the Web/ Group items matching "relation" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
3More

Update: Google rolls out semantic search capabilities | InfoWorld | News | 2009-03-24 |... - 0 views

  •   Google has given its Web search engine an injection of semantic technology, as the search leader pushes into what many consider the future of search on the Internet. Oracle White Paper - Nucleus Report: Who's ready for SMB? - read this white paper. getRelatedBoxOne("/article/09/03/24/Google_rolls_out_semantic_search_capabilities_1.html","spBoxOne") The new technology will allow Google's search engine to identify associations and concepts related to a query, improving the list of related search terms Google displays along with its results, the company announced in an official blog on Tuesday.
  • Google has given its Web search engine an injection of semantic technology, as the search leader pushes into what many consider the future of search on the Internet.
  • The new technology will allow Google's search engine to identify associations and concepts related to a query, improving the list of related search terms Google displays along with its results, the company announced in an official blog on Tuesday.
2More

[# ! #Tech:] Discover to which package a file belongs to - Linux Audit - 0 views

  •  
    "Sometimes you want to know the related package of a file, before installation, or when it is already there. This is of great help during system hardening or general system cleanups. In this article we have a look at several ways to determine the relationships between files and the package they belong to."
  •  
    "Sometimes you want to know the related package of a file, before installation, or when it is already there. This is of great help during system hardening or general system cleanups. In this article we have a look at several ways to determine the relationships between files and the package they belong to."
1More

voip-info.org - voip-info.org - 0 views

  •  
    "This Wiki covers everything related to VOIP, software, hardware, VoIP service providers, reviews, configurations, standards, tips and tricks and everything else related to voice over IP networks, IP telephony and Internet Telephony. Your contributions are welcome, please read the How to add information to this wiki page and the Posting Guidelines before you post."
4More

U.S. knocks plans for European communication network | Reuters - 0 views

  • The United States on Friday criticized proposals to build a European communication network to avoid emails and other data passing through the United States, warning that such rules could breach international trade laws. In its annual review of telecommunications trade barriers, the office of the U.S. Trade Representative said impediments to cross-border data flows were a serious and growing concern.It was closely watching new laws in Turkey that led to the blocking of websites and restrictions on personal data, as well as calls in Europe for a local communications network following revelations last year about U.S. digital eavesdropping and surveillance."Recent proposals from countries within the European Union to create a Europe-only electronic network (dubbed a 'Schengen cloud' by advocates) or to create national-only electronic networks could potentially lead to effective exclusion or discrimination against foreign service suppliers that are directly offering network services, or dependent on them," the USTR said in the report.
  • Germany and France have been discussing ways to build a European network to keep data secure after the U.S. spying scandal. Even German Chancellor Angela Merkel's cell phone was reportedly monitored by American spies.The USTR said proposals by Germany's state-backed Deutsche Telekom to bypass the United States were "draconian" and likely aimed at giving European companies an advantage over their U.S. counterparts.Deutsche Telekom has suggested laws to stop data traveling within continental Europe being routed via Asia or the United States and scrapping the Safe Harbor agreement that allows U.S. companies with European-level privacy standards access to European data. (www.telekom.com/dataprotection)"Any mandatory intra-EU routing may raise questions with respect to compliance with the EU's trade obligations with respect to Internet-enabled services," the USTR said. "Accordingly, USTR will be carefully monitoring the development of any such proposals."
  • U.S. tech companies, the leaders in an e-commerce marketplace estimated to be worth up to $8 trillion a year, have urged the White House to undertake reforms to calm privacy concerns and fend off digital protectionism.
  •  
    High comedy from the office of the U.S. Trade Representative. The USTR's press release is here along with a link to its report. http://www.ustr.gov/about-us/press-office/press-releases/2014/March/USTR-Targets-Telecommunications-Trade-Barriers The USTR is upset because the E.U. is aiming to build a digital communications network that does not route internal digital traffic outside the E.U., to limit the NSA's ability to surveil Europeans' communications. Part of the plan is to build an E.U.-centric cloud that is not susceptible to U.S. court orders. This plan does not, of course, sit well with U.S.-based cloud service providers.  Where the comedy comes in is that the USTR is making threats to go to the World Trade organization to block the E.U. move under the authority of the General Agreement on Trade in Services (GATS). But that treaty provides, in article XIV, that:  "Subject to the requirement that such measures are not applied in a manner which would constitute a means of arbitrary or unjustifiable discrimination between countries where like conditions prevail, or a disguised restriction on trade in services, nothing in this Agreement shall be construed to prevent the adoption or enforcement by any Member of measures: ... (c)      necessary to secure compliance with laws or regulations which are not inconsistent with the provisions of this Agreement including those relating to:   ... (ii)     the protection of the privacy of individuals in relation to the processing and dissemination of personal data and the protection of confidentiality of individual records and accounts[.]" http://www.wto.org/english/docs_e/legal_e/26-gats_01_e.htm#articleXIV   The E.U., in its Treaty on Human Rights, has very strong privacy protections for digital communications. The USTR undoubtedly knows all this, and that the WTO Appellate Panel's judges are of the European mold, sticklers for protection of human rights and most likely do not appreciate being subjects o
1More

Is Streaming Pirated Movies Illegal? EU Court to Decide - TorrentFreak - 0 views

  •  
    " Ernesto on October 12, 2015 C: 35 Breaking Seeking clarification, a Dutch court has referred several streaming related questions to the EU Court of Justice. The questions relate to a case between local anti-piracy group BREIN and a seller of so-called "pirate boxes" that come pre-loaded with streaming plugins. It is currently unclear whether streaming pirated movies is permitted under EU law."
3More

Leak Exposes Hollywood's Global Anti-Piracy Strategy | TorrentFreak [# ! Via...] - 1 views

    • Gonzalo San Gil, PhD.
       
      [# ! Via, TY, Francisco Manuel HS' FB...]
  •  
    # ! ...there are no 'Leaks' but Public Relations strategy. # ! Hollywood are #educating '#pirates' to #circumvent its measures, # ! as '#They' know that #sharers are its #best #customers...
  •  
    # ! ...there are no 'Leaks' but Public Relations strategy. # ! Hollywood are #educating '#pirates' to #circumvent its measures, # ! as '#They' know that #sharers are its #best #customers...
6More

No, Department of Justice, 80 Percent of Tor Traffic Is Not Child Porn | WIRED [# ! Via... - 0 views

  • The debate over online anonymity, and all the whistleblowers, trolls, anarchists, journalists and political dissidents it enables, is messy enough. It doesn’t need the US government making up bogus statistics about how much that anonymity facilitates child pornography.
  • he debate over online anonymity, and all the whistleblowers, trolls, anarchists, journalists and political dissidents it enables, is messy enough. It doesn’t need the US government making up bogus statistics about how much that anonymity facilitates child pornography. At the State of the Net conference in Washington on Tuesday, US assistant attorney general Leslie Caldwell discussed what she described as the dangers of encryption and cryptographic anonymity tools like Tor, and how those tools can hamper law enforcement. Her statements are the latest in a growing drumbeat of federal criticism of tech companies and software projects that provide privacy and anonymity at the expense of surveillance. And as an example of the grave risks presented by that privacy, she cited a study she said claimed an overwhelming majority of Tor’s anonymous traffic relates to pedophilia. “Tor obviously was created with good intentions, but it’s a huge problem for law enforcement,” Caldwell said in comments reported by Motherboard and confirmed to me by others who attended the conference. “We understand 80 percent of traffic on the Tor network involves child pornography.” That statistic is horrifying. It’s also baloney.
  • In a series of tweets that followed Caldwell’s statement, a Department of Justice flack said Caldwell was citing a University of Portsmouth study WIRED covered in December. He included a link to our story. But I made clear at the time that the study claimed 80 percent of traffic to Tor hidden services related to child pornography, not 80 percent of all Tor traffic. That is a huge, and important, distinction. The vast majority of Tor’s users run the free anonymity software while visiting conventional websites, using it to route their traffic through encrypted hops around the globe to avoid censorship and surveillance. But Tor also allows websites to run Tor, something known as a Tor hidden service. This collection of hidden sites, which comprise what’s often referred to as the “dark web,” use Tor to obscure the physical location of the servers that run them. Visits to those dark web sites account for only 1.5 percent of all Tor traffic, according to the software’s creators at the non-profit Tor Project. The University of Portsmouth study dealt exclusively with visits to hidden services. In contrast to Caldwell’s 80 percent claim, the Tor Project’s director Roger Dingledine pointed out last month that the study’s pedophilia findings refer to something closer to a single percent of Tor’s overall traffic.
  • ...1 more annotation...
  • So to whoever at the Department of Justice is preparing these talking points for public consumption: Thanks for citing my story. Next time, please try reading it.
  •  
    [# Via Paul Merrell's Diigo...] "That is a huge, and important, distinction. The vast majority of Tor's users run the free anonymity software while visiting conventional websites, using it to route their traffic through encrypted hops around the globe to avoid censorship and surveillance. But Tor also allows websites to run Tor, something known as a Tor hidden service. This collection of hidden sites, which comprise what's often referred to as the "dark web," use Tor to obscure the physical location of the servers that run them. Visits to those dark web sites account for only 1.5 percent of all Tor traffic, according to the software's creators at the non-profit Tor Project."
  •  
    [# Via Paul Merrell's Diigo...] "That is a huge, and important, distinction. The vast majority of Tor's users run the free anonymity software while visiting conventional websites, using it to route their traffic through encrypted hops around the globe to avoid censorship and surveillance. But Tor also allows websites to run Tor, something known as a Tor hidden service. This collection of hidden sites, which comprise what's often referred to as the "dark web," use Tor to obscure the physical location of the servers that run them. Visits to those dark web sites account for only 1.5 percent of all Tor traffic, according to the software's creators at the non-profit Tor Project."
6More

CISA Security Bill: An F for Security But an A+ for Spying | WIRED - 0 views

  • When the Senate Intelligence Committee passed the Cybersecurity Information Sharing Act by a vote of 14 to 1, committee chairman Senator Richard Burr argued that it successfully balanced security and privacy. Fifteen new amendments to the bill, he said, were designed to protect internet users’ personal information while enabling new ways for companies and federal agencies to coordinate responses to cyberattacks. But critics within the security and privacy communities still have two fundamental problems with the legislation: First, they say, the proposed cybersecurity act won’t actually boost security. And second, the “information sharing” it describes sounds more than ever like a backchannel for surveillance.
  • On Tuesday the bill’s authors released the full, updated text of the CISA legislation passed last week, and critics say the changes have done little to assuage their fears about wanton sharing of Americans’ private data. In fact, legal analysts say the changes actually widen the backdoor leading from private firms to intelligence agencies. “It’s a complete failure to strengthen the privacy protections of the bill,” says Robyn Greene, a policy lawyer for the Open Technology Institute, which joined a coalition of dozens of non-profits and cybersecurity experts criticizing the bill in an open letter earlier this month. “None of the [privacy-related] points we raised in our coalition letter to the committee was effectively addressed.” The central concern of that letter was how the same data sharing meant to bolster cybersecurity for companies and the government opens massive surveillance loopholes. The bill, as worded, lets a private company share with the Department of Homeland Security any information construed as a cybersecurity threat “notwithstanding any other provision of law.” That means CISA trumps privacy laws like the Electronic Communication Privacy Act of 1986 and the Privacy Act of 1974, which restrict eavesdropping and sharing of users’ communications. And once the DHS obtains the information, it would automatically be shared with the NSA, the Department of Defense (including Cyber Command), and the Office of the Director of National Intelligence.
  • In a statement posted to his website yesterday, Senator Burr wrote that “Information sharing is purely voluntary and companies can only share cyber-threat information and the government may only use shared data for cybersecurity purposes.” But in fact, the bill’s data sharing isn’t limited to cybersecurity “threat indicators”—warnings of incoming hacker attacks, which is the central data CISA is meant to disseminate among companies and three-letter agencies. OTI’s Greene says it also gives companies a mandate to share with the government any data related to imminent terrorist attacks, weapons of mass destruction, or even other information related to violent crimes like robbery and carjacking. 
  • ...2 more annotations...
  • The latest update to the bill tacks on yet another kind of information, anything related to impending “serious economic harm.” All of those vague terms, Greene argues, widen the pipe of data that companies can send the government, expanding CISA into a surveillance system for the intelligence community and domestic law enforcement. If information-sharing legislation does not include adequate privacy protections, then...It’s a surveillance bill by another name. Senator Ron Wyden
  • “CISA goes far beyond [cybersecurity], and permits law enforcement to use information it receives for investigations and prosecutions of a wide range of crimes involving any level of physical force,” reads the letter from the coalition opposing CISA. “The lack of use limitations creates yet another loophole for law enforcement to conduct backdoor searches on Americans—including searches of digital communications that would otherwise require law enforcement to obtain a warrant based on probable cause. This undermines Fourth Amendment protections and constitutional principles.”
  •  
    I read the legislation. It's as bad for privacy as described in the aritcle. And its drafting is incredibly sloppy.
1More

Introduction to OpenCalais | OpenCalais - 0 views

  •  
    "The free OpenCalais service and open API is the fastest way to tag the people, places, facts and events in your content.  It can help you improve your SEO, increase your reader engagement, create search-engine-friendly 'topic hubs' and streamline content operations - saving you time and money. OpenCalais is free to use in both commercial and non-commercial settings, but can only be used on public content (don't run your confidential or competitive company information through it!). OpenCalais does not keep a copy of your content, but it does keep a copy of the metadata it extracts there from. To repeat, OpenCalais is not a private service, and there is no secure, enterprise version that you can buy to operate behind a firewall. It is your responsibility to police the content that you submit, so make sure you are comfortable with our Terms of Service (TOS) before you jump in. You can process up to 50,000 documents per day (blog posts, news stories, Web pages, etc.) free of charge.  If you need to process more than that - say you are an aggregator or a media monitoring service - then see this page to learn about Calais Professional. We offer a very affordable license. OpenCalais' early adopters include CBS Interactive / CNET, Huffington Post, Slate, Al Jazeera, The New Republic, The White House and more. Already more than 30,000 developers have signed up, and more than 50 publishers and 75 entrepreneurs are using the free service to help build their businesses. You can read about the pioneering work of these publishers, entrepreneurs and developers here. To get started, scroll to the bottom section of this page. To build OpenCalais into an existing site or publishing platform (CMS), you will need to work with your developers.  Why OpenCalais Matters The reason OpenCalais - and so-called "Web 3.0" in general (concepts like the Semantic Web, Linked Data, etc.) - are important is that these technologies make it easy to automatically conne
2More

Fighting Government Waste One Google App At a Time - CIO.com - Business Technology Lead... - 0 views

  • Vivek Kundra, CTO of the District of Columbia, says he found two compelling reasons to switch the D.C. government over to Gmail and Google Apps: first, its cheap cost would save the taxpayer money by avoiding bloated software contracts. Second, he believes Google technology will help ensure business continuity and the safety of data in the event of a disaster or disruption.
  •  
    Vivek Kundra, CTO of the District of Columbia, says he found two compelling reasons to switch the D.C. government over to Gmail and Google Apps: first, its cheap cost would save the taxpayer money by avoiding bloated software contracts. Second, he believes Google technology will help ensure business continuity and the safety of data in the event of a disaster or disruption. ......... Now we know why Google needs Chrome: they have the killer apps but are in need of a high end Web-App browser to run them in. Otherwise they can't begin to solve the problems of security and business continuity.
2More

Linux Practicality vs Activism - Datamation - 0 views

  •  
    " ...For some, the freedom enjoyed by using Linux is the freedom from vendor lock-in or high software costs. Most would call this a practical consideration. Others users would tell you the freedom they enjoy is software freedom. This means embracing Linux distributions that support the Free Software Movement, avoiding proprietary software completely and all things related. In this article, I'll walk you through some of the differences between these two freedoms and how they affect Linux usage. ...."
  •  
    " ...For some, the freedom enjoyed by using Linux is the freedom from vendor lock-in or high software costs. Most would call this a practical consideration. Others users would tell you the freedom they enjoy is software freedom. This means embracing Linux distributions that support the Free Software Movement, avoiding proprietary software completely and all things related. In this article, I'll walk you through some of the differences between these two freedoms and how they affect Linux usage. ...."
2More

Command Line Tool to Monitor Linux Containers Performance - 0 views

  •  
    "ctop is a new command line based tool available to monitor the processes at the container level. Containers provide operating system level virtualization environment by making use of the cgroups resource management functionality. This tool collects data related to memory, cpu, block IO and metadata like owner, uptime etc from cgroups and presents it in a user readable format so that one can quickly asses the overall health of the system. Based on the data collected, it tries to guess the underlying container technology. ctop is useful in detecting who is using large amounts of memory under low memory situations."
  •  
    "ctop is a new command line based tool available to monitor the processes at the container level. Containers provide operating system level virtualization environment by making use of the cgroups resource management functionality. This tool collects data related to memory, cpu, block IO and metadata like owner, uptime etc from cgroups and presents it in a user readable format so that one can quickly asses the overall health of the system. Based on the data collected, it tries to guess the underlying container technology. ctop is useful in detecting who is using large amounts of memory under low memory situations."
2More

MPAA Complained So We Seized Your Funds, PayPal Says | TorrentFreak - 1 views

    • Gonzalo San Gil, PhD.
       
      # ! ... and what happens with the hundreds of -non-IP-Infringement-related projects...?
  •  
    [ Andy on May 17, 2015 C: 0 Breaking Developers considering adding a torrent search engine to their portfolio should proceed with caution, especially if they value their income streams. Following a complaint from the MPAA one developer is now facing a six month wait for PayPal to unfreeze thousands in funds, the vast majority related to other projects. ...]
2More

Review: Puppet vs. Chef vs. Ansible vs. Salt | InfoWorld - 0 views

  •  
    "The leading configuration management and orchestration tools take different paths to server automation By Paul Venezia Follow InfoWorld | Nov 21, 2013 RELATED TOPICS Data Center Cloud Computing Server Provisioning The proliferation of virtualization coupled with the increasing power of industry-standard servers and the availability of cloud computing has led to a significant uptick in the number of servers that need to be managed within and without an organization"
  •  
    "The leading configuration management and orchestration tools take different paths to server automation By Paul Venezia Follow InfoWorld | Nov 21, 2013 RELATED TOPICS Data Center Cloud Computing Server Provisioning The proliferation of virtualization coupled with the increasing power of industry-standard servers and the availability of cloud computing has led to a significant uptick in the number of servers that need to be managed within and without an organization"
2More

'Fast-Track' Trade Bill Derailed in House in Blow to Obama | Fox Business - 0 views

  •  
    "The U.S. House of Representatives on Friday blocked legislation to "fast-track" trade deals through Congress as lawmakers defeated a related measure on aid to workers hurt by trade, dealing a big blow to President Barack Obama."
  •  
    "The U.S. House of Representatives on Friday blocked legislation to "fast-track" trade deals through Congress as lawmakers defeated a related measure on aid to workers hurt by trade, dealing a big blow to President Barack Obama."
2More

Red Hat Teams with Telefonica, Expands Focus on OpenStack and Telecom - 0 views

  •  
    "Earlier this month, when Red Hat was busy delivering a flurry of OpenStack-related announcements, news also came from the company that it is collaborating to drive Network Functions Virtualization (NFV) and telecommunications technology into OpenStack. Red Hat is forming alliances aimed at delivering a carrier-grade telecommunications offering based on Linux, Kernel-based Virtual Machine (KVM), and OpenStack. "
  •  
    "Earlier this month, when Red Hat was busy delivering a flurry of OpenStack-related announcements, news also came from the company that it is collaborating to drive Network Functions Virtualization (NFV) and telecommunications technology into OpenStack. Red Hat is forming alliances aimed at delivering a carrier-grade telecommunications offering based on Linux, Kernel-based Virtual Machine (KVM), and OpenStack. "
2More

France Implements Administrative Net Censorship | La Quadrature du Net - 0 views

  •  
    "Paris, February 6, 2015 - After review by the French Cabinet last Wednesday, the implementation decree for the administrative blocking of pedopornographic and terrorist websites was published today. This decree implements the provisions of to the Loppsi Act (15 March 2011) and the "Terrorism" Act (13 November 2014), both of which La Quadrature du Net opposed. It gives the government the power to directly order French telecom operators to block access to websites deemed to convey content relating to child abuse or terrorism, without any court order."
  •  
    "Paris, February 6, 2015 - After review by the French Cabinet last Wednesday, the implementation decree for the administrative blocking of pedopornographic and terrorist websites was published today. This decree implements the provisions of to the Loppsi Act (15 March 2011) and the "Terrorism" Act (13 November 2014), both of which La Quadrature du Net opposed. It gives the government the power to directly order French telecom operators to block access to websites deemed to convey content relating to child abuse or terrorism, without any court order."
2More

Open Source Software List: 2015 Ultimate List - Datamation - 0 views

  •  
    "Every month, Datamation highlights a list of open source software related to a particular category, such as security, cloud computing, small businesses, big data, games, etc."
  •  
    "Every month, Datamation highlights a list of open source software related to a particular category, such as security, cloud computing, small businesses, big data, games, etc."
2More

Evaluation of the EU Copyright Directive | Discuto - 0 views

  •  
    "DRAFT REPORT on the implementation of Directive 2001/29/EC of the European Parliament and of the Council of 22 May 2001 on the harmonisation of certain aspects of copyright and related rights in the information society (2014/2256(INI))"
  •  
    "DRAFT REPORT on the implementation of Directive 2001/29/EC of the European Parliament and of the Council of 22 May 2001 on the harmonisation of certain aspects of copyright and related rights in the information society (2014/2256(INI))"
2More

GM45 chipsets: remove the ME (manageability engine) - 0 views

  •  
    "This sections relates to disabling and removing the ME (Intel Management Engine) on GM45. This was originally done on the ThinkPad X200, and later adapted for the ThinkPad R400/T400/T500. It can in principle be done on any GM45 or GS45 system. The ME is a blob that typically must be left inside the flash chip (in the ME region, as outlined by the default descriptor). On GM45, it is possible to remove it without any ill effects. All other parts of coreboot on GM45 systems (provided GMA MHD4500 / Intel graphics) can be blob-free, so removing the ME was the last obstacle to make GM45 a feasible target in libreboot (the systems can also work without the microcode blobs). "
  •  
    "This sections relates to disabling and removing the ME (Intel Management Engine) on GM45. This was originally done on the ThinkPad X200, and later adapted for the ThinkPad R400/T400/T500. It can in principle be done on any GM45 or GS45 system. The ME is a blob that typically must be left inside the flash chip (in the ME region, as outlined by the default descriptor). On GM45, it is possible to remove it without any ill effects. All other parts of coreboot on GM45 systems (provided GMA MHD4500 / Intel graphics) can be blob-free, so removing the ME was the last obstacle to make GM45 a feasible target in libreboot (the systems can also work without the microcode blobs). "
1 - 20 of 134 Next › Last »
Showing 20 items per page