Skip to main content

Home/ Science Technology Society/ Group items tagged information

Rss Feed Group items tagged

Todd Suomela

Apomediation - P2P Foundation - 0 views

  •  
    Apomediation is a new scholarly socio-technological term that characterizes the process of disintermediation (intermediaries are middlemen or "gatekeeper", e.g. health professionals giving "relevant" information to a patient, and disintermediation means to bypass them), whereby the former intermediaries are functionally replaced by apomediaries, i.e. network/group/collaborative filtering processes [Eysenbach, 2008 [WebCite] and 2007b]. The difference between an intermediary and an apomediary is that an intermediary stands "in between" (latin: inter- means "in between") the consumer and information/service, i.e. is absolutely necessary to get a specific information/service. In contrast, apomediation means that there are agents (people, tools) which "stand by" (latin: apo- means separate, detached, away from) to guide a consumer to high quality information/services/experiences, without being a prerequisite to obtain that information/service in the first place. The switch from an intermediation model to an apomediation model has broadimplications for example for the way people judge credibility, as hypothesized and elaborated in more detail elsewhere [
thinkahol *

Humanity Needs to Keep Pace with Technology (cont'd) | The Veracious Blog - 0 views

  •  
    When we talk about participation, we have to be a bit more specific. On the publishing side, there's clearly more participation than we've ever seen in the past. But in order for this tidal wave of information to be useful, we need to be able to separate fact from fiction. We need to encourage participation on the receiving end. What we need is evaluating participation. With the breadth of niche information and sources we have the ability to get at the best of what is known on a myriad of topics and contexts. Every niche has its experts and its hacks, its enthusiasts and detractors. But for the remaining 95% of us who are not subject matter experts, deriving the accurate or useful information from the sea of what is available can be complicated, time-consuming and simply unverifiable. We need a way to quantify the value of information, or more specifically, the veracity of information.
thinkahol *

The World's Technological Capacity to Store, Communicate, and Compute Information | Kur... - 0 views

  •  
    A study appearing Feb. 10 in Science Express calculates the world's total technological capacity to store, communicate and compute information, part of a Special Online Collection: Dealing with Data. The study by the USC Annenberg School for Communication & Journalism estimates that in 2007, humankind was able to store 2.9 × 1020 optimally compressed bytes, communicate almost 2 × 1021 bytes, and carry out 6.4 × 1018 instructions per second on general-purpose computers. General-purpose computing capacity grew at an annual rate of 58%. The world's capacity for bidirectional telecommunication grew at 28% per year, closely followed by the increase in globally stored information (23%). Humankind's capacity for unidirectional information diffusion through broadcasting channels has experienced comparatively modest annual growth (6%). Telecommunication has been dominated by digital technologies since 1990 (99.9% in digital format in 2007), and the majority of our technological memory has been in digital format since the early 2000s (94% digital in 2007).
thinkahol *

Eric Schmidt: Every 2 Days We Create As Much Information As We Did Up To 2003 - 0 views

  •  
    Today at the Techonomy conference in Lake Tahoe, CA, the first panel featured Google CEO Eric Schmidt. As moderator David Kirkpatrick was introducing him, he rattled off a massive stat. Every two days now we create as much information as we did from the dawn of civilization up until 2003, according to Schmidt. That's something like five exabytes of data, he says. Let me repeat that: we create as much information in two days now as we did from the dawn of man through 2003.
thinkahol *

The American Wikileaks Hacker | Rolling Stone Culture - 0 views

  •  
    On July 29th, returning from a trip to Europe, Jacob Appelbaum, a lanky, unassuming 27-year-old wearing a black T-shirt with the slogan "Be the trouble you want to see in the world," was detained at customs by a posse of federal agents. In an interrogation room at Newark Liberty airport, he was grilled about his role in Wikileaks, the whistle-blower group that has exposed the government's most closely guarded intelligence reports about the war in Afghanistan. The agents photocopied his receipts, seized three of his cellphones - he owns more than a dozen - and confiscated his computer. They informed him that he was under government surveillance. They questioned him about the trove of 91,000 classified military documents that Wikileaks had released the week before, a leak that Vietnam-era activist Daniel Ellsberg called "the largest unauthorized disclosure since the Pentagon Papers." They demanded to know where Julian Assange, the founder of Wikileaks, was hiding. They pressed him on his opinions about the wars in Afghanistan and Iraq. Appelbaum refused to answer. Finally, after three hours, he was released. Sex, Drugs, and the Biggest Cybercrime of All Time Appelbaum is the only known American member of Wikileaks and the leading evangelist for the software program that helped make the leak possible. In a sense, he's a bizarro version of Mark Zuckerberg: If Facebook's ambition is to "make the world more open and connected," Appelbaum has dedicated his life to fighting for anonymity and privacy. An anarchist street kid raised by a heroin- addict father, he dropped out of high school, taught himself the intricacies of code and developed a healthy paranoia along the way. "I don't want to live in a world where everyone is watched all the time," he says. "I want to be left alone as much as possible. I don't want a data trail to tell a story that isn't true." We have transferred our most intimate and personal information - our bank accounts, e-mails, photographs, ph
Todd Suomela

Technology Review: Keeping Tabs - 1 views

  •  
    But the tab as an information technology metaphor is everywhere in use. And whether our tabs are cardboard extensions or digital projections, they all date to an invention little more than a hundred years old. The original tab signaled an information storage revolution and helped enable everything from management consulting to electronic data processing.
Todd Suomela

Journal of the History of Ideas, Volume 64, 2003 - Table of Contents - 0 views

  •  
    Articles Early Modern Information Overload
thinkahol *

How much information is there in the world? - 0 views

  •  
    ScienceDaily (Feb. 11, 2011) - Think you're overloaded with information? Not even close.
Todd Suomela

Human Computer Interaction (HCI) by John M. Carroll - Interaction-Design.org: HCI, Usab... - 0 views

  • The challenge of personal computing became manifest at an opportune time. The broad project of cognitive science, which incorporated cognitive psychology, artificial intelligence, linguistics, cognitive anthropology, and the philosophy of mind, had formed at the end of the 1970s. Part of the programme of cognitive science was to articulate systematic and scientifically-informed applications to be known as "cognitive engineering". Thus, at just the point when personal computing presented the practical need for HCI, cognitive science presented people, concepts, skills, and a vision for addressing such needs. HCI was one of the first examples of cognitive engineering. Other historically fortuitous developments contributed to establishment of HCI. Software engineering, mired in unmanageable software complexity in the 1970s, was starting to focus on nonfunctional requirements, including usability and maintainability, and on non-linear software development processes that relied heavily on testing. Computer graphics and information retrieval had emerged in the 1970s, and rapidly came to recognize that interactive systems were the key to progressing beyond early achievements. All these threads of development in computer science pointed to the same conclusion: The way forward for computing entailed understanding and better empowering users.
  • One of the most significant achievements of HCI is its evolving model of the integration of science and practice. Initially this model was articulated as a reciprocal relation between cognitive science and cognitive engineering. Later, it ambitiously incorporated a diverse science foundation, notably Activity Theory, distributed cognition, and ethnomethodology, and a culturally embedded conception of human activity, including the activities of design and technology development. Currently, the model is incorporating design practices and research across a broad spectrum. In these developments, HCI provides a blueprint for a mutual relation between science and practice that is unprecedented.
  • In the latter 1980s and early 1990s, HCI assimilated ideas from Activity Theory, distributed cognition, and ethnomethodology. This comprised a fundamental epistemological realignment. For example, the representational theory of mind, a cornerstone of cognitive science, is no longer axiomatic for HCI science. Information processing psychology and laboratory user studies, once the kernel of HCI research, became important, but niche areas. The most canonical theory-base in HCI now is socio-cultural, Activity Theory. Field studies became typical, and eventually dominant as an empirical paradigm. Collaborative interactions, that is, groups of people working together through and around computer systems (in contrast to the early 1980s user-at-PC situation) have become the default unit of analysis. It is remarkable that such fundamental realignments were so easily assimilated by the HCI community.
thinkahol *

Algorithms identify and track the most important privately-held technology companies | ... - 0 views

  •  
    A startup called Quid has developed algorithms that analyze Internet-based data from corporations to make fast-moving technology developments visible, navigable, and understandable. Quid has built a data set combining information about firms that succeeded and sank, patent documents, government grants, help wanted advertisements, and tweets. Its algorithms use the collection of information to analyze the prospects of around 35,000 firms and research groups working on new technologies. By extracting words and phrases from the collected documents, Quid constructs a "technology genome" that describes the primary focus of each of those 35,000 entities. A map of the connections between those genomes can be used by investors to find hints about interesting companies or ideas. Most companies cluster around established sectors, but a few will sit in the white spaces between the clusters and can represent the seeds of new technology sectors.
thinkahol *

Anonymous exposes 1,589 internet child porn users OPDarknet | MGx - Musings, Essays & B... - 0 views

  •  
    Anonymous uses its skills to extract user information from darknet websites specializing in child pornography. Tuesday, after hacking into Lolita City, a darknet website used by pedophiles to trade in child pornography, Anonymous released usernames and other information of 1,589 pedophiles trading in kiddie porn. The move comes after the group managed to take down more than 40 pedophile websites last week which were swapping images through the Tor anonymization network. A darknet website is a closed private network of computers used for file sharing. Darknet websites are part of the Invisible Web, sometimes called the Deep Web, containing content that is not part of the Surface Web, which is indexed by standard search engines. Yesterday Pastebin release, Anonymous enthusiasts explain the technical side of how they were able to locate and identify Lolita City and access their user data base. In a prior Pastebin release, Anonymous offers a timeline of events detailing the discovery of the hidden cache of more than 100 gigabytes of child porn associated with Lolita City.
Aman Khani

Know the Importance of TV Advertising - 1 views

  •  
    The above explained piece of writing will inform the readers about the essentialness of TV advertising.
julia Dexter

How to Fix and Remove Nettraveler Infection - 0 views

  •  
    Nettraveler is a cyber-threat to the computers. It is an infection with high risk and capability to collapse the entire system, within no time. The intruder interferes into the system, steals significant and sensitive information, and reports this information to its users. It usually skins with frequently used applications or Windows processes to hide from security shields.
thinkahol *

Contrary Brin - 0 views

  •  
    "David Brin is a scientist and best-selling author whose future-oriented novels include Earth and Hugo Award winners Startide Rising and The Uplift War. (The Postman inspired a major film in 1998.) Brin is also known as a leading commentator on modern technological trends. His non fiction book -- The Transparent Society - won the Freedom of Speech Award of the American Library Association. For more informations see: http://www.davidbrin.com"
thinkahol *

Your Brain on Computers - Attached to Technology and Paying a Price - NYTimes.com - 0 views

  •  
    Scientists say our ability to focus is being undermined by bursts of information from e-mail and other interruptions.
Todd Suomela

ISHPSSB - 0 views

  •  
    The International Society for History, Philosophy, and Social Studies of Biology (ISHPSSB) brings together scholars from diverse disciplines, including the life sciences as well as history, philosophy, and social studies of science. ISHPSSB summer meetings are known for innovative, transdisciplinary sessions, and for fostering informal, co-operative exchanges and on-going collaborations.
thinkahol *

Medical Daily: UVic biomedical engineer 'outsmarts' HIV - 0 views

  •  
    Willerth and her team studied approximately 15,000 different versions of the virus-something that has never been done before. This information has allowed them to locate the specific genes of the virus that were resistant to the drugs-knowledge that could ultimately help researchers develop more effective treatments for HIV.
Infogreen Global

Quantum mechanics can offer a secure way of communicating - 0 views

  •  
    There are differences between the group's demonstrations. For crystals, Tittel's group used thulium-doped lithium niobate, whereas Gisin's group opted for neodymium-doped yttrium silicate. In addition, a different type of laser set-up has favoured Gisin's group, which reports a maximum storage time of some 200 ns at an efficiency of more than 20%; Tittel's group reports a storage time of 7 ns at an efficiency of 2%. On the other hand, the quantum memory of Tittel's group functions at a bandwidth of 5 GHz - some 40 times greater than Gisin's group - which means, potentially, far more information could be sent in the same time.
thinkahol *

Personalized medicine comes within reach - 0 views

  •  
    ScienceDaily (Feb. 18, 2011) - A team of biologists, clinical oncologists, pathologists and information scientists has established a strategy for identifying biomarkers. If a particular pattern of these biomarkers can be detected in the blood, this indicates a cancerous disease. An interdisciplinary research breakthrough that opens many doors.
1 - 20 of 52 Next › Last »
Showing 20 items per page