Difference between revisions of "User:Infomaniac/News"
Infomaniac (talk | contribs) (New Ways to Exploit Raw Data May Bring Surge of Innovation) |
Infomaniac (talk | contribs) (3-D Plastic Art for the Masses: Ready to Print) |
||
Line 1: | Line 1: | ||
{{User:Infomaniac/js}} | {{User:Infomaniac/js}} | ||
+ | ==[http://www.nytimes.com/2011/05/14/arts/design/makerbot-is-a-new-3-d-printer.html?nl=technology&emc=techupdateema3 3-D Plastic Art for the Masses: Ready to Print]== | ||
==[http://www.nytimes.com/2011/05/13/technology/13data.html?_r=1&nl=technology&emc=techupdateema1 New Ways to Exploit Raw Data May Bring Surge of Innovation]== | ==[http://www.nytimes.com/2011/05/13/technology/13data.html?_r=1&nl=technology&emc=techupdateema1 New Ways to Exploit Raw Data May Bring Surge of Innovation]== |
Revision as of 19:51, 13 May 2011
Contents
- 1 3-D Plastic Art for the Masses: Ready to Print
- 2 New Ways to Exploit Raw Data May Bring Surge of Innovation
- 3 Has Fed become central bank of the world?
- 4 Tea Party, Bond Vigilantes, Revolt Against Fed's QE2 Plot
- 5 Long Live The Web (Scientific American)
- 6 The State Versus the Internet (Lew Rockwell)
- 7 Fed unleashes second QE bomb on America
- 8 9/11 was an inside job': Full speech by Mahmoud Ahmadinejad at UN (YouTube/RT)
- 9 The Greek Dollar Swap Window (Jim Willie)
- 10 Hubble finds fully-formed galaxy 13.1B light-years away. (Bad Astronomy)
- 11 Officials Push to Bolster Law on Wiretapping
- 12 Pirates In The Sky: Filesharers Want To Build Weather-Balloon-Hosted Download Site (Forbes)
- 13 Keep your PC clean - or we'll shut you down (The Register)
- 14 Government Seeks Back Door Into All Our Communications (EFF)
- 15 Currency wars begin between USA, China, Brazil
- 16 (Wikimedia) Video Labs: P2P Next Community CDN for Video Distribution
- 17 The McEliece Cryptosystem Resists Quantum Fourier Sampling Attacks
- 18 Advances Offer Path to Further Shrink Computer Chips
- 19 Wikileaks encryption use offers 'legal challenge'
- 20 Cancer & Desperation of QE2 - Jim Willie - 24 Hour Gold
- 21 "the most significant breach of U.S. military computers ever"
- 22 Intel Milestone Confirms Light Beams Can Replace Electronic Signals for Future Computers
- 23 The dirty little secret about Google Android
- 24 Software Router Smashes Speed Records
- 25 Google CEO Schmidt: No Anonymity Is The Future Of Web
- 26 One of my long time pet peeves is now being ruined - the textbook racket
3-D Plastic Art for the Masses: Ready to Print
New Ways to Exploit Raw Data May Bring Surge of Innovation
Has Fed become central bank of the world?
Tea Party, Bond Vigilantes, Revolt Against Fed's QE2 Plot
Long Live The Web (Scientific American)
- The Web is critical not merely to the digital revolution but to our continued prosperity—and even our liberty. Like democracy itself, it needs defending.
The State Versus the Internet (Lew Rockwell)
- Why it is imperative to develop a distributed p2p network (including wireless infrastructure) with wartime speed.
Fed unleashes second QE bomb on America
- Enormous mushroom cloud of nanobot fallout turning Dollar into worthless pulp
- "I think that this will quite possibly be the worst mistake by the Fed in a generation," said Stephen Stanley of Pierpont Securities.
9/11 was an inside job': Full speech by Mahmoud Ahmadinejad at UN (YouTube/RT)
- Iran's president sparked a mass walk-out by US delegates October 23 after telling a UN summit that most people believe the American government was behind the 9/11 attacks. He also gives a succinct history of capitalism and colonialism.
The Greek Dollar Swap Window (Jim Willie)
- The latest progress in WW III (The Banker War)
Hubble finds fully-formed galaxy 13.1B light-years away. (Bad Astronomy)
- Astronomers continue to insist the big bang was 13.7B years ago. Ordinary folk find it absurd.
Officials Push to Bolster Law on Wiretapping
- Uncle Sam's need to spy on citizens stands in the way of progress
Keep your PC clean - or we'll shut you down (The Register)
- UK and US users reject Oz supernanny model
From December, ISPs will be encouraged to alert customers when their computers are taken over by hackers. So far, so good. The sting in the tail, however, is a parallel proposal that means ISPs may – or may even be encouraged to – limit access to the net if users fail to take prompt action.
Government Seeks Back Door Into All Our Communications (EFF)
The New York Times reported this morning on a Federal government plan to put government-mandated back doors in all communications systems, including all encryption software. The Times said the Obama administration is drafting a law that would impose a new "mandate" that all communications services be "able to intercept and unscramble encrypted messages" — including ordering "[d]evelopers of software that enables peer-to-peer communication [to] redesign their service to allow interception".
Currency wars begin between USA, China, Brazil
Interesting comparison between Australian and Brazilian currency exchange policy
(Wikimedia) Video Labs: P2P Next Community CDN for Video Distribution
Swarmplayer V2.0 is being released today for Firefox (an Internet Explorer plugin is in testing). The Swamplayer enables visitors to easily share their upload bandwidth to help distribute video. The add-on works with the Kaltura HTML5 library ( aka mwEmbed ) and url2torrent.net, to enable visitors to help offset distribute costs of any Ogg Theora video embed in any web page. We have enabled this for Wikimedia video via the multimedia beta. Once you installed the add-on any video you view on Wikimedia sites with the multimedia beta enabled will be transparently streamed via bittorrent.
The McEliece Cryptosystem Resists Quantum Fourier Sampling Attacks
Quantum computers can break the RSA and El Gamal public-key cryptosystems, since they can factor integers and extract discrete logarithms. If we believe that quantum computers will someday become a reality, we would like to have post-quantum cryptosystems which can be implemented today with classical computers, but which will remain secure even in the presence of quantum attacks. In this article we show that the McEliece cryptosystem over rational Goppa codes resists precisely the attacks to which the RSA and El Gamal cryptosystems are vulnerable---namely, those based on generating and measuring coset states. This eliminates the approach of strong Fourier sampling on which almost all known exponential speedups by quantum algorithms are based.
Advances Offer Path to Further Shrink Computer Chips
“When you get down to these scales, you’re talking about the ability to store hundreds of movies on a single chip.”
Wikileaks encryption use offers 'legal challenge'
"In a sense communications networks can be defined entirely by who has cryptographic keys, and I think a lot of networks will work that way in the future."
Cancer & Desperation of QE2 - Jim Willie - 24 Hour Gold
"THE UNITED STATES WILL BEGIN A RECOVERY WHEN THE TOO BIG TO FAIL BANKS ARE PLOWED UNDER. They are blocking remedy and restructure. They are resisting liquidation of badly impaired assets. They do not lend money, as their credit engines are broken, since they are dead entities that occupy space in the US financial sector. "
"Cancer is a strong word. It conjures up images of internal broken functions, nasty growths, blockage of organs, twisted lives, pain, and death. Yes, that sounds right for describing the USDollar and its flagship the USTreasury Bond, with the accompanying destroyer in Fannie Mae. The word cancer fits perfectly. It has brought a removal of US industry... a wave of bond fraud centered upon mortgages... endless war, paid by foreigners... insolvency to US households... insolvency to the US banks... a tumor of REO homes seized by foreclosures and put the US bank balance sheets... a bloated wrecked USFed balance sheet... chronic $1.5 trillion USGovt deficits... a mass of Food Stamp recipients... Wall Street control of the USGovt finance ministries... a Black of Hole of tainted money... diverse toxic bonds... blockage of any independent audit of the USFed assets or activity."
"the most significant breach of U.S. military computers ever"
“A dozen determined computer programmers can, if they find a vulnerability to exploit, threaten the United States’s global logistics network, steal its operational plans, blind its intelligence capabilities or hinder its ability to deliver weapons on target” (NYT)
Intel Milestone Confirms Light Beams Can Replace Electronic Signals for Future Computers
- Intel Labs has created the world's first silicon-based optical data connection with integrated lasers using Hybrid Silicon Laser technology.
- The experimental chip can move data at 50 billion bits per second (50Gbps). Researchers are now pressing on to demonstrate even faster speeds.
- The availability of low-cost, high-speed fiber-optics based on this technology could allow computer makers to completely rethink traditional system design from netbooks to supercomputers.
- Businesses with server farms or datacenters could eliminate performance bottlenecks while saving significant operational costs in space and energy, replacing many cables with one optical fiber.
The dirty little secret about Google Android
Here’s the dirty little secret about Android: After all the work Apple did to get AT&T to relinquish device control for the iPhone and all the great efforts Google made to get the FCC and the U.S. telecoms to agree to open access rules as part of the 700 MHz auction, Android is taking all of those gains and handing the power back to the telecoms.
This article was originally published on TechRepublic but I thought the reader comments on both sites are worthwhile.
Software Router Smashes Speed Records
Researchers in South Korea have built a networking router that transmits data at record speeds from components found in most high-end desktop computers. A team from the Korea Advanced Institute of Science and Technology created the router, which transmits data at nearly 40 gigabits per second--many times faster than the previous record for such a device.
Google CEO Schmidt: No Anonymity Is The Future Of Web
"In a world of asynchronous threats, it is too dangerous for there not to be some way to identify you. We need a name service for people. Governments will demand it."
- - In the future, people will demand the dismantling of privacy-invading governments and corporations. How about that?
One of my long time pet peeves is now being ruined - the textbook racket
http://www.curriki.org free, open-source curricula (it's a wiki!) NY Times