Skip to main content

Home/ The Order of the Spork/ Group items tagged technology

Rss Feed Group items tagged

Iam me

Reflections on Public Service, by Vivek Kundra, August 15, 2011 - 0 views

  •  
    Last Friday was my last day at the White House. As I begin my fellowship at Harvard University, I'd like to share my reflections on public service.  "On a bright February day, the previous morning's dusting of snow melting on the ground, I arrived at a White House that was, as the Washington Post put it, "stuck" in the "Dark Ages of technology." In their words, "If the Obama campaign represented a sleek, new iPhone kind of future, the first day of the Obama administration looked more like the rotary-dial past." As my team congratulated me on the new job, they handed me a stack of documents with $27 billion worth of technology projects that were years behind schedule and millions of dollars over budget. At the time, those documents were what passed for real-time updates on the performance of IT projects. My neighbor's ten year old could look up the latest stats of his favorite baseball player on his phone on the school bus, but I couldn't get an update on how we were spending billions of taxpayer dollars while at my desk in the White House. And at the same time, the President of the United States had to fight tooth and nail to simply get a blackberry.  These were symptoms of a much larger problem.
Adam Roades

U.S. Government Slips Through China Internet Censors With New Technology - FoxNews.com - 0 views

  •  
    Great news for folks in China, but now that we've publicized how we plan to circumvent the country's censorship technology, can a countermeasure be far behind?
Iam me

New Disposable, Medical Camera Is the Size of a Grain of Salt | Singularity Hub - 0 views

  •  
    It's clear that the Fraunhofer researchers didn't set out to hit this milestone in camera technology. What they were really interested in was trying to improve upon endoscope technology. An endoscope involves a camera at the tip of a tube. The tube contains a wire that transmits the image back to a computer. The tube also serves as a way to physically manipulative the camera to snake it through the gastrointestinal tract, for instance. Typical endoscopes cost around $25,000-30,000 so they must be reused many times. Because the endoscope is going in and out of people's bodies, it must be cleaned and sterilized between each use, which just drives up the cost of maintaining the instrument. It's no wonder that hospitals charge more than $2,000 per endoscopy. All of this, however, would change if the camera was cheap enough to throw away.
Adam Roades

Connecting (Full Film) on Vimeo - 0 views

  •  
    An excellent documentary that addresses technology and design. Includes interviews with several design leaders from Twitter, Microsoft, and Arduino.
Steve Baxter

Dual-Core Phones and Tablets - 0 views

  •  
    New mobile computing hardware provide 3D graphics and faster processing due to dual-core chips. Gaming and virtual worlds should follow movies as the beneficiaries of this technology.
Iam me

Surveillance robots know when to hide - tech - 21 March 2011 - New Scientist - 0 views

  •  
    "Lockheed Martin's approach does include a sort of basic theory of mind, in the sense that the robot makes assumptions about how to act covertly in the presence of humans," says Alan Wagner of the Georgia Institute of Technology in Atlanta, who works on artificial intelligence and robot deception.
Raq Winchester

Revealed: US spy operation that manipulates social media | Technology | The Guardian - 0 views

  •  
    Positive government transparency or a "D'oh!" moment for the intelligence community (starting to think that's an oxymoron).
  •  
    Which? "government transparency" or "intelligence community" ?
Iam me

Futurity.org - Sex appeal: Women kiss science goodbye - 0 views

  •  
    "U. BUFFALO (US) - When a woman's goal is to be romantically desirable, she distances herself from academic majors and activities related to science, technology, engineering, and math."
Iam me

Cloud-Powered Facial Recognition Is Terrifying - Jared Keller - Technology - The Atlantic - 0 views

  •  
    "The relevant point here is not Schmidt's thought on behavior and choice but the fact that, no matter what you choose to do or not do, your life exists in the cloud, indexed by Google, in the background of a photo album on Facebook, and across thousands of spammy directories that somehow know where you live and where you went to high school. These little bits of information exist like digital detritus. With software like PittPatt that can glean vast amounts of cloud-based data when prompted with a single photo, your digital life is becoming inseparable from your analog one. You may be able to change your name or scrub your social networking profiles to throw off the trail of digital footprints you've inadvertently scattered across the Internet, but you can't change your face. And the cloud never forgets a face. "
Iam me

For Android Users, a Cure for iTunes Withdrawal - NYTimes.com - 0 views

  •  
    DoubleTwist, which is free, gives people a way to easily sync their iTunes music library with their Android phones. As such, it's one of the most important, yet often overlooked, pieces of software on the Android market.
Iam me

New Chrome Blurs The Line Between Web and Native Apps - 0 views

  •  
    Google just shipped a new stable release of the Chrome browser that includes two new technologies: Native Client, which allows execution of C and C++ code within the browser, and the Web Audio API, which brings advanced audio capabilities to JavaScript. 
Iam me

Cisco Telepresence On-Stage Hologram System Video - 0 views

  •  
    "The 'Cisco On-Stage TelePresence Experience' was an ambitious collaboration between Cisco and Musion Systems, which took place during the opening of Cisco's Globalization Centre East in Bangalore, India. Musion seamlessly integrated their 3D holographic display technology with Cisco's TelePresence's system to create the world's first real time virtual presentation."
Iam me

Why mobile data encryption doesn't matter (as much) | VentureBeat - 0 views

  •  
    encryption, as a preventive measure, assumes the primary threat is coming from the "outside" - typically (but not exclusively), in the form of a hacker trying to intercept communications or extract data from a lost or stolen device. While such threats are real and you absolutely must guard against them, we've reached a crucial point in the evolution of mobile technology, and just as importantly, user behavior where the primary mobile security threat is no longer the faceless and malicious hacker, but instead the legitimate, fully authenticated owner of the device itself.
Iam me

Your Gmail Hacking Finale: Official Advice from Google - James Fallows - Technology - T... - 0 views

  •  
    What to do if your gmail account gets hacked and tips for avoiding getting hacked in the first place. 
Raq Winchester

A 'Spooks And Suits' Red Team Game - Dark Reading - 0 views

  •  
    A 'Spooks And Suits' Red Team Game Social media apps meet national security Jul 20, 2011 | 12:40 PM | 0 Comments By Kelly Jackson Higgins Dark Reading What if a former Navy SEAL petty officer were a member of Anonymous? Senior members of the U.S. intelligence agency, including Michael Chertoff, the former Secretary of Homeland Security, and a former SEAL officer, will participate in a red-team exercise in September where they'll play the role of Anonymous/LulzSec and APT attackers, as well as the defenders trying to fend off these adversaries. Sure, simulated cyberattack games are nothing new these days. But this one is part and parcel of the upcoming Spooks and Suits summit in Silicon Valley on Sept. 23 and 24, and it throws together intell officials and attendees. It's the brainchild of cybersecurity expert Jeffrey Carr, who wanted to bring together three-letter agencies, like the CIA, NSA, and DoD, with social media and Web 2.0 developers and start-ups to actually communicate one-on-one with each another and with general attendees. It works like this: Attendees will be randomly assigned to one of four teams of 25 to 30 people: Anarchist hackers (a la Anonymous and LulzSec), APT attackers, or one of two defending organizations. The teams then must observe all of the panel discussions -- which will cover threats against the intell community, as well as demonstrations of new and existing social media applications -- from the perspective of either adversary or defender, depending on which team they are assigned. "If one of the apps presented has to do with a game, the objective for the attendee is to say, 'How can I use that game as an adversary? Or how can I use it to uncover or defend against an adversary?'" says Carr, who is the founder and CEO of Taia Global, an executive cybersecurity firm, and author of "Inside Cyber Warfare." "During breaks, they can play with the apps with an eye to their mission." The teams will have a working lunch period for buildi
1 - 20 of 34 Next ›
Showing 20 items per page