Test Information Space

Journal of Tech, Testing and Trends

Pace Time

Posted by cadsmith on December 19, 2010

future of cities

Arbor graphs DDOS stats. The US is establishing an Internet Privacy Office. Supercomputer benchmark measures graph handling. CrisisCommons handles disaster data. List of computer mishaps. A simple site registration utility is provided by Facebook. S4 Momentum tracks social media. Social branding is marketed by Wildfire. Recommendations for Personal Media streaming. Spabba does bookmarking since delicious may be divested. SEO tips for ebooks. 750 Words has online writing editor. Video of Health 2.0 keynote by Tim O’Reilly. Contest offers health prize for in-patient predictions. Body Browser searches anatomy. Muro does browser-based art. Game development is free using UDK. Film-like mocap improves games. Cyborg beetles can fly. PR2 robots sold. Humanoid bot announced in France. Automated round vac prototyped. Startup tech trends listed in addition to Crowdfunding and Chile. Molten Salt stores energy. MapQuest has site in US. Thirty-one recent links added.

Books Reviews:

Intelligent User Interfaces: Adaptation and Personalization Systems and Technologies, Panagiotis and Germanakos, 2008

This book is about how to improve findability. Major sections include theory, content, process, applications and security. Personalization refers to an individual’s or group’s unique needs and preferences. Adaptive features fit to these, context, and structure. Some of the common topics are user profiles, recommendation, models, hypermedia and e-government. Seventeen studies by thirty-eight contributors discuss categories such as privacy-enhanced personalization, emotional intelligence, e-learning assistants, open learner modeling, digital memories, cognitive style, adaptive parallel media stream servers, web usage mining, visualization methods, ontology-based, semantically adaptive, intelligent information, middleware architecture, web-based instruction, access/navigation/search, and adaptive hypermedia.

Surviving Cyberwar, Stiennon 2010
This book details methods of cyber intelligence. Cyberwar is dated from 2008 since, though there were network attacks a decade before, they were not coordinated military offensives. The author proposes four essential pillars which drive the war: technology, logistics, command and intelligence. Cases of social media being used for this as geopolitical tools are shown. Trojans are effective. Denial of service, the classic internet asault, is currently defended in ad hoc fashion. The simple assumption by network and endpoint security are that eachother are hostile, similarly by data for the user. It looks at the level of preparedness of major states and explains the US CNCI. Counterespionage has entered a new age. Future government depends upon how network security and privacy develop. There are fifteen chapters. It was published before the wikileaks controversy.

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

 
%d bloggers like this: