Nir Eyal 23.6.2012: “What people aren’t telling you,” Peter Thiel taught his class at Stanford, “can very often give you great insight as to where you should be directing your attention.” - "monetizable secrets" abt "user behavior", and network effects - "software continues to eat the world"
in a Swedish book about libraries I found this reference to Vinton Cerf's lecture "The Future of Information and Communication Technology" However, the lecture is presented in a commercial format, which is not accessible with the web browser I use. I wish the new library of Alexandria would offer this lecture, and all web content, also in formats which are compatible and readable with open standards and free software.
The gradual disappearance of open wireless networks is a tragedy of the commons, with a confusing twist of privacy and security debate. This essay explains why the progressive locking of wireless networks is harmful — for convenience, for privacy and for
While Android may have the legal licensing to qualify as open source, it utterly fails on the equally important issues of transparency and community. Android basically gives you two options: Accept what Google gives you, or fork the entire codebase. Other
From the late 90s, illegal filesharing gradually brought the music industry to its knees. Exclusive extracts from Stephen Witt’s book pinpoint how music ‘got free’
abt Alan Ellis
a comment: ""Brought the music industry to it's knees"? Bollocks. End of story."
The Contact Summit will take place October 20, 2011 at the Angel Orensanz Foundation in New York City. Doors open at 7:30am. The summit will commence promptly at 9:00am.
Today (24 March 2010) two computer security researchers, Christopher Soghoian and Sid Stamm, released a draft of a forthcoming research paper in which they present evidence that certificate authorities (CAs) may be cooperating with government agencies to
camille - February 7, 2014 "A theoretical question on my mind: has anyone ever tried putting a voluntary botnet at work to mine crypto-currencies for philanthropic fundraising purposes? "
There are so many hackers involved, even at this early stage, because FLOK (which stands for “Free/Libre Open Knowledge”) proposes a fundamental disruption of society. FLOK’s reason-to-be is to create a legal, economic and social framework for an entire country (Ecuador) that is consistent with principles that are the basic foundations of the Internet: peer-to-peer collaboration and shared knowledge FLOK Society is, at its core, a research project occurring within a university: Ecuador’s post-graduate-focused state school the IAEN.
Andy Greenberg and Kim Zetter Security Date of Publication: 12.28.15.
12.28.15
From cars to medical devices to guns, this was the year hackers found and exploited computers in everything.
" “There’s a message here for TrackingPoint and other companies,” Sandvik told WIRED at the time. “When you put technology on items that haven’t had it before, you run into security challenges you haven’t thought about before.” That rule certainly applies to any consumer-focused company thinking of connecting their product to the Internet of Things. But for those whose product can kill—whether a gun, a medical implant, or a car—let’s hope the lesson is taken more seriously in 2016."
NetMiner is an innovative software tool for Exploratory Analysis and Visualization of Network Data. NetMiner allows you to explore your network data visually and interactively, and helps you to detect underlying patterns and structures of the network
The most popular visualization of RDF - the underlying language to represent the Semantic Web ? is a Big Fat Graph (BFG). By graph, we mean representations with nodes and edges to model the relationships within the space represented. Take a look at any o
December 1, 2004. "Mr. Tenet, who retired in July as director of the CIA after seven years, warned that ...""I know that these actions will be controversial in this age when we still think the Internet is a free and open society with no control or accoun
The social potential embodied in Slashcode was available when Naomi Klein's January 2000 book No Logo: Taking Aim at the Brand Bullies became a sudden international best-seller. .. A book is a highly hierarchical and centralized form of communication - t
"GPT-3 is the latest and greatest in the AI world, achieving state-of-the-art in a range of tasks. Its main breakthrough is eliminating the need for task-specific fine-tuning. In terms of size, the model drastically scales up once again, reaching 175 billion parameters, or 116x the size of its predecessor."
In 2017, researchers asked: Could AI write most code by 2040? OpenAI’s GPT-3, now in use by beta testers, can already code in any language. Machine-dominated coding is almost at our doorstep. GPT-3…
The "International Journal of Critical Computer-Based Systems" (IJCCBS) is a quarterly research journal by Inderscience Publishers. It focuses on engineering and verification of complex computer-based systems (where complex means large, distributed and heterogeneous) in critical applications, with special emphasis on model-based approaches and industrial case-studies. Critical computer-based systems include real-time control, fly/brake-by-wire, on-line transactional and web servers, biomedical apparels, networked devices for telecommunications, environmental monitoring, infrastructure protection, etc.
J. Xu, Y. Gao, S. Christley, und G. Madey. HICSS '05: Proceedings of the Proceedings of the 38th Annual Hawaii International Conference on System Sciences (HICSS'05) - Track 7, Seite 198. Washington, DC, USA, IEEE Computer Society, (2005)