Skip to main content

Home/ Groups/ The Order of the Spork
1More

Platform Versions | Android Developers - 0 views

  •  
    Get near real time data on Android versions by what is accessing the market in the last 14 days.  
1More

Apple deals massive patent blow to HTC, Android in serious trouble | ZDNet - 0 views

  •  
     an ITC judge ruled that smartphone maker HTC has infringed two Apple patents, and it seems likely that every single Android device out there infringes the same patents.
1More

A 'Spooks And Suits' Red Team Game - Dark Reading - 0 views

  •  
    A 'Spooks And Suits' Red Team Game Social media apps meet national security Jul 20, 2011 | 12:40 PM | 0 Comments By Kelly Jackson Higgins Dark Reading What if a former Navy SEAL petty officer were a member of Anonymous? Senior members of the U.S. intelligence agency, including Michael Chertoff, the former Secretary of Homeland Security, and a former SEAL officer, will participate in a red-team exercise in September where they'll play the role of Anonymous/LulzSec and APT attackers, as well as the defenders trying to fend off these adversaries. Sure, simulated cyberattack games are nothing new these days. But this one is part and parcel of the upcoming Spooks and Suits summit in Silicon Valley on Sept. 23 and 24, and it throws together intell officials and attendees. It's the brainchild of cybersecurity expert Jeffrey Carr, who wanted to bring together three-letter agencies, like the CIA, NSA, and DoD, with social media and Web 2.0 developers and start-ups to actually communicate one-on-one with each another and with general attendees. It works like this: Attendees will be randomly assigned to one of four teams of 25 to 30 people: Anarchist hackers (a la Anonymous and LulzSec), APT attackers, or one of two defending organizations. The teams then must observe all of the panel discussions -- which will cover threats against the intell community, as well as demonstrations of new and existing social media applications -- from the perspective of either adversary or defender, depending on which team they are assigned. "If one of the apps presented has to do with a game, the objective for the attendee is to say, 'How can I use that game as an adversary? Or how can I use it to uncover or defend against an adversary?'" says Carr, who is the founder and CEO of Taia Global, an executive cybersecurity firm, and author of "Inside Cyber Warfare." "During breaks, they can play with the apps with an eye to their mission." The teams will have a working lunch period for buildi
1More

Give Me My Data | A Facebook application to reclaim your information - 0 views

shared by Iam me on 05 Jul 11 - Cached
  •  
    "Give Me My Data is a Facebook application that helps users export their data out of Facebook for reuse in visualizations, archives, or any possible method of digital storytelling. Data can be exported in common formats like CSV, XML, and JSON as well as customized network graph formats."
1More

Friends to Gmail - 0 views

  •  
    One way to get your Facebook friends into Google so you can connect with them on Google+
1More

NASA Releases Proceedings, Recommendations From First Open Source Summit | FedScoop - 0 views

  •  
    Organizers of NASA's first Open Source Summit have released a summary of its proceedings that could serve as a model for other federal agencies wanting to conduct similar conferences for their own open source developer communities. The 85-page report documents how the event was organized, collaboration tools used, user statistics, attendee list, schedule and media coverage.
1More

This is Google's first self-driving car crash - 0 views

  •  
    Not clear yet what actually happened but a car that can drive itself autonomously was involved in a crash, which may be the first such accident of its kind.  
1More

Welcome! - WorldMap - 0 views

  •  
    Explore, Visualize, and Publish Geographic Information.  Build your own mapping portal and publish it to the world or to just a few collaborators. WorldMap is open source software.
1More

Reflections on Public Service, by Vivek Kundra, August 15, 2011 - 0 views

  •  
    Last Friday was my last day at the White House. As I begin my fellowship at Harvard University, I'd like to share my reflections on public service.  "On a bright February day, the previous morning's dusting of snow melting on the ground, I arrived at a White House that was, as the Washington Post put it, "stuck" in the "Dark Ages of technology." In their words, "If the Obama campaign represented a sleek, new iPhone kind of future, the first day of the Obama administration looked more like the rotary-dial past." As my team congratulated me on the new job, they handed me a stack of documents with $27 billion worth of technology projects that were years behind schedule and millions of dollars over budget. At the time, those documents were what passed for real-time updates on the performance of IT projects. My neighbor's ten year old could look up the latest stats of his favorite baseball player on his phone on the school bus, but I couldn't get an update on how we were spending billions of taxpayer dollars while at my desk in the White House. And at the same time, the President of the United States had to fight tooth and nail to simply get a blackberry.  These were symptoms of a much larger problem.
2More

Data-Crunching Program Guides Santa Cruz Police Before a Crime - NYTimes.com - 0 views

  • But the presence of the police officers in the garage that Friday afternoon in July was anything but ordinary: They were directed to the parking structure by a computer program that had predicted that car burglaries were especially likely there that day. The program is part of an unusual experiment by the Santa Cruz Police Department in predictive policing — deploying officers in places where crimes are likely to occur in the future.
  •  
    But the presence of the police officers in the garage that Friday afternoon in July was anything but ordinary: They were directed to the parking structure by a computer program that had predicted that car burglaries were especially likely there that day. The program is part of an unusual experiment by the Santa Cruz Police Department in predictive policing - deploying officers in places where crimes are likely to occur in the future.
1More

Quantified Self Guide - 0 views

  •  
    This guide is funded by the Robert Wood Johnson Foundation Pioneer Portfolio, which supports bold ideas at the cutting edge of health and health care, in partnership with Institute for the Future. Our goal is to gather and organize the world's collective self-tracking resources in one place, in a way that is useful and encourages collaboration between self-tracking experts and beginners who are just starting out.
1More

Is Every Browser Unique? Results Fom The Panopticlick Experiment | Electronic Frontier ... - 0 views

  •  
    Today we are publishing a report of the statistical results from the Panopticlick experiment on web browser fingerprintability. The results show that the overwhelming majority of Internet users could be uniquely fingerprinted and tracked using only the configuration and version information that their browsers make available to websites. These types of system information should be regarded as identifying, in much the same way that cookies, IP addresses, and supercookies are.
1More

Gene Therapy Cures Adult Leukemia - 0 views

  •  
    Aug. 10, 2011 -- Two of three patients dying of chronic lymphocytic leukemia (CLL) appear cured and a third is in partial remission after infusions of genetically engineered T cells...."Our results were absolutely dramatic. It is tremendously exciting," Porter tells WebMD. 
1More

3D Printed Bikini is the first ready to wear 3D printed clothing and fitted exactly usi... - 0 views

  •  
    The N12 bikini is the world's first ready-to-wear, completely 3D-printed article of clothing. All of the pieces, closures included, are made directly by 3D printing and snap together without any sewing. N12 represents the beginning of what is possible for the near future. The same process can be used to make shirts, dresses and suits that are custom fitted using body scanning. It is 0.7 millimeters (1/36th of a inch) thick nylon. 
1More

Choosing the right license for open data - O'Reilly Radar - 0 views

  •  
    We have a multi-year process to re-license based on advice from multiple sources that Creative Commons is not applicable to data. We wish it were, and it probably will be in the future but it wasn't clear when we began. Until that happens we have a process to move to the Open Database License, which explicitly covers data and not just creative works like photographs or text. The ODbL was in fact started as a result of investigations around the needs of Science Commons and we just helped it to its conclusion. At some point down the line I personally expect the ODbL and CC to be compatible and we will be able to cross-pollinate once more.
1More

Making It Easier to Share With Who You Want - 0 views

  •  
    Facebook copies Google+'s sharing ideas. .  
1More

Researchers Graph Social Networks to spot Spammers | threatpost - 0 views

  •  
    Spammers don't fit the life patterns of regular users.  "[Microsoft researchers]  are using studies of legitimate and malicious social networks to spot bogus email accounts that are used to push spam, malware, and otherwise malicious links."
1More

Futurity.org - Sex appeal: Women kiss science goodbye - 0 views

  •  
    "U. BUFFALO (US) - When a woman's goal is to be romantically desirable, she distances herself from academic majors and activities related to science, technology, engineering, and math."
1More

USAJOBS - Search Jobs - 0 views

  •  
    Huh.
1More

Google+ Project: It's Social, It's Bold, It's Fun, And It Looks Good - Now For The Hard... - 0 views

  •  
    Google might actually get social networking right this time with a completely integrated suite of new tools called Google+
« First ‹ Previous 81 - 100 Next › Last »
Showing 20 items per page