Posted by cadsmith on December 19, 2010
Arbor graphs DDOS stats. The US is establishing an Internet Privacy Office. Supercomputer benchmark measures graph handling. CrisisCommons handles disaster data. List of computer mishaps. A simple site registration utility is provided by Facebook. S4 Momentum tracks social media. Social branding is marketed by Wildfire. Recommendations for Personal Media streaming. Spabba does bookmarking since delicious may be divested. SEO tips for ebooks. 750 Words has online writing editor. Video of Health 2.0 keynote by Tim O’Reilly. Contest offers health prize for in-patient predictions. Body Browser searches anatomy. Muro does browser-based art. Game development is free using UDK. Film-like mocap improves games. Cyborg beetles can fly. PR2 robots sold. Humanoid bot announced in France. Automated round vac prototyped. Startup tech trends listed in addition to Crowdfunding and Chile. Molten Salt stores energy. MapQuest has site in US. Thirty-one recent links added.
This book is about how to improve findability. Major sections include theory, content, process, applications and security. Personalization refers to an individual’s or group’s unique needs and preferences. Adaptive features fit to these, context, and structure. Some of the common topics are user profiles, recommendation, models, hypermedia and e-government. Seventeen studies by thirty-eight contributors discuss categories such as privacy-enhanced personalization, emotional intelligence, e-learning assistants, open learner modeling, digital memories, cognitive style, adaptive parallel media stream servers, web usage mining, visualization methods, ontology-based, semantically adaptive, intelligent information, middleware architecture, web-based instruction, access/navigation/search, and adaptive hypermedia.
Surviving Cyberwar, Stiennon 2010
This book details methods of cyber intelligence. Cyberwar is dated from 2008 since, though there were network attacks a decade before, they were not coordinated military offensives. The author proposes four essential pillars which drive the war: technology, logistics, command and intelligence. Cases of social media being used for this as geopolitical tools are shown. Trojans are effective. Denial of service, the classic internet asault, is currently defended in ad hoc fashion. The simple assumption by network and endpoint security are that eachother are hostile, similarly by data for the user. It looks at the level of preparedness of major states and explains the US CNCI. Counterespionage has entered a new age. Future government depends upon how network security and privacy develop. There are fifteen chapters. It was published before the wikileaks controversy.
This entry was posted on December 19, 2010 at 9:23 am and is filed under Uncategorized. Tagged: 3D, anatomy, art, benchmark, bookmark, books, contest, debug, Del.icio.us, disaster, energy, Facebook, games, internet, maps, marketing, robotics, search, security, social-media, startup, streams, urban, video, writing. You can follow any responses to this entry through the RSS 2.0 feed. You can leave a response, or trackback from your own site.