Search tips
  • Phone hacking, News International and operational disaster for News Corp by Guy Rundle | Crikey | 7 July 2011
    Back in the day, the analogue and offline day, when a plenitude of images did not circulate, one of the most vital jobs in the newspaper industry was that of the “picture-snatcher”?—?the reporter, often a cub/cadet, who would accompany a senior colleague to the house of a grieving widow whose family member had just been trampled by a horse/died of dropsy/ etc, and, while the bereaved was being engaged in conversation, snatch a picture of the decedent from the mantelpiece, and then sprint back to the office with it.
    in Public bookmarks with blogs cryptography geostrategy media net oz
  • Platform Wars: TCP/IP vs. the Dollar
    Donna Bogatin : � Social Web or Business Web: where is the money? Naturally, people are fascinated by this question of "where's the money?" But it's the wrong question. The more interesting one is "why the money"? And it's still gonna take us a long time to get our heads around that. But that's what we're all gonna be asking at some point. The more effective the internet and the web are at helping us communicate and co-ordinate, the less money will be involved. Because ultimately the economy is a communication network and money is its protocol The network is not the means to the end of money.
    in Public bookmarks with biz blogs computer economylogy geostrategy net system:unfiled w2 w4
    Note: OTHER POST ON http://globalguerrillas.typepad.com/johnrobb/2007/02/open_source_eco.html#comments
  • Technology Review: Physics arXiv blog Best Connectd Individuals Are Not the Most Influential Spreadrs in Social Networks 100202
    The study of social networks has thrown up more than a few surprises over the years. It's easy to imagine that because the links that form between various individuals in a society are not governed by any overarching rules, they must have a random structure. So the discovery in the 1980s that social networks are very different came as something of a surprise. In a social network, most nodes are not linked to each other but can easily be reached by a small number of steps. This is the so-called small worlds network.
    in Public bookmarks with blogs evo evolution geostrategy net science w4
    Note: Ref: arxiv.org/abs/1001.5285: Identifying Influential Spreaders in Complex Networks
  • Tele Atlas Map Insight
    Tele Atlas uses a unique approach to update our maps, including the latest mobile mapping technology, professional drivers and tens of thousands of data sources to provide you with the freshest, richest, and most accurate map data available.
    in Public bookmarks with design map net utils
    Note: adress finder for all western countries!
  • The Playboy Interview: Marshall McLuhan
    In 1961, the name of Marshall McLuhan was unknown to everyone but his English students at the University of Toronto--and a coterie of academic admirers who followed his abstruse articles in small-circulation quarterlies. But then came two remarkable books-- "The Gutenberg Galaxy" (1962) and "Understanding Media" (1964)--and the graying professor from Canada's western hinterlands soon found himself characterized by the San Francisco Chronicle as "the hottest academic property around." He has since won a world-wide following for his brilliant--and frequently baffling--theories about the impact of the media on man; and his name has entered the French language as mucluhanisme, a synonym for the world of pop culture.
    in Public bookmarks with art audio book design economylogy geostrategy graph history linglang media net philosophy psy science script videofilm w2
  • touchgraph amazon browser (data visualization & visual idesign - nformation aesthetics)
    an interactive network visualization that aims to reveal the intricate network structure within purchase pattern recommendations. users can explore related books or albums, see how similar items form clusters around common subjects, & discover how the clusters themselves are connected within the information space. it seems the visual information design & interactive features have been dramatically enhanced since their first google browser version about 2 years ago.
    in Public bookmarks with art book design ebook graph net script utils w2
  • 10MinuteMail.com: This e-mail adress will self-destruct in 10 minutes
    Welcome to 10 Minute Mail. By clicking on the link below, you will be given a temporary e-mail address. Any e-mails sent to that address will show up automatically on the web page. You can read them, click on links, and even reply to them. The e-mail address will expire after 10 minutes. Why would you use this? Maybe you want to sign up for a site which requires that you provide an e-mail address to send a validation e-mail to. And maybe you don't want to give up your real e-mail address and end up on a bunch of spam lists. This is nice and disposable. And it's free. Enjoy! Get my 10 Minute Mail e-mail address.
    Temporary e-mail or mail service. Free secure e-mail addresses.
    address e-mail email free secure temporary
    in Public bookmarks with net utils by 9 users
  • ArtMam Art in Internet»
    A great collection of links to Asian art sites We are currently gathering a collection of links, Orientations readers, and indeed all Asian art enthusiasts, will find most useful. Our goal is to be able to present a collection of sites each focusing on a various Asian-art related topic. Category Directory: » Directories Region Region: » Hong Kong http://www.orientations.com.hk/link.htm » A.F.T.R.A. "The American Federation of Television and Radio Artists."
    in Public bookmarks with art blogs china design graph net
  • BBC NEWS: Middle East | Iraqis use internet to survive war
    Google is playing an unlikely role in the Iraq war. Its online satellite map of the world, Google Earth, is being used to help people survive sectarian violence in Baghdad. As the communal bloodshed has worsened, some Iraqis have set up advice websites to help others avoid the death squads. One tip - on the Iraq League site, one of the best known - is for people to draw up maps of their local area using Google Earth's detailed imagery of Baghdad so they can work out escape routes and routes to block. It's another example of the central role technology plays in the conflict - with the widespread use of mobile phones, satellite television as well as the internet - by all sides and for many purposes.
    bbc british foreign international news online service world
    in Public bookmarks with geostrategy map mecf media mesopotamia net w4
  • Clay Shirky’s Writings About the Internet - Economics & Culture, Media & Community, Open Source
    NEC@Shirky.com -- Networks, Economics, and Culture NEC is a mix of essays written for the list, essays written for other outlets, drafts of ideas I’m pursuing, and reader commentary (re-printed only with permission, of course). The list will be very low volume, with an approximately twice-monthly frequency, and the contents will also be archived on shirky.com. <<management>>
    Clay Shirky's writings about the Internet
    economics internet media open source
    in Public bookmarks with biz design economylogy media net w2 by 8 users
    Note: A Group Is Its Own Worst Enemy
  • Color Schemer: Online Color Scheme Generator
    Enter an RGB or HEX value, or click on the Color Palette below
    Generate matching color schemes like never before!
    color colorschemer design hex html page pick picker rgb scheme schemer web
    in Public bookmarks with art design net utils by 54 users
  • From Tesla Motors to the “Patriot Hack” Martin Eberhard on Protecting Your Privacy Online
    Nursing the best dark brew I’ve ever had, I moved from a great article on free global phone calls to another on the language of gang signs, ultimately landing on a column signed not with an anonymous pseudonym but by Martin Eberhard, co-founder of Tesla Motors. It was so interesting, in fact, that I reached out to Martin after my bear-rich Pacific Northwest roadtrip and asked for permission to reprint his article here. He graciously agreed. This article is broken up into four sections, which I titled: The Patriot Hack - From China’s Firewall to Lockpicking (15%) The Political and Technical Landscape (60%) Strategies to Protect Your Privacy (10%) The “Haystack” Call to Action (15%)
    in Public bookmarks with blogs computer cryptography net
  • How To Look Like A UNIX Guru Terence Parr http://www.cs.usfca.edu/~parrt
    Terence Parr Last updated: August 30, 2006 UNIX is an extremely popular platform for deploying server software partly because of its security and stability, but also because it has a rich set of command line and scripting tools. Programmers use these tools for manipulating the file system, processing log files, and generally automating as much as possible. If you want to be a serious server developer, you will need to have a certain facility with a number of UNIX tools; about 15. You will start to see similarities among them, particularly regular expressions, and soon you will feel very comfortable. Combining the simple commands, you can build very powerful tools very quickly--much faster than you could build the equivalent functionality in C or Java, for e
    in Public bookmarks with computer net system:unfiled tutorial utils
  • In Defense of Piracy - WSJ.com by LAWRENCE LESSIG professor of law at Stanford Law School, and co-founder
    In early February 2007, Stephanie Lenz's 13-month-old son started dancing. Pushing a walker across her kitchen floor, Holden Lenz started moving to the distinctive beat of a song by Prince, "Let's Go Crazy." He had heard the song before. The beat had obviously stuck. So when Holden heard the song again, he did what any sensible 13-month-old would do -- he accepted Prince's invitation and went "crazy" to the beat. Holden's mom grabbed her camcorder and, for 29 seconds, captured the priceless image of Holden dancing, with the barely discernible Prince playing on a CD player somewhere in the background.
    in Public bookmarks with computer cryptography economylogy media net p2p
  • In the Next Industrial Revolution, Atoms Are the New Bits | By Chris Anderson | Wired Magazine
    Chris Anderson, the editor of Wired, has a very good article in his magazine on the desktop manufacturing revolution. It's definitely worth the read and is complimentary with thinking being done on this blog re: resilient communities. Thus the new industrial organizational model. It’s built around small pieces, loosely joined. Companies are small, virtual, and informal. Most participants are not employees. They form and re-form on the fly, driven by ability and need rather than affiliation and obligation. It doesn’t matter who the best people work for; if the project is interesting enough, the best people will find it.
    in Public bookmarks with biz computer design economylogy net w4
    Note: chinese industrial piracy mountain fastness http://www.google.com/search?hl=en&safe=off&num=100&newwindow=1&q=%22tommy+m%C3%B6ller+%22+schweden+-drag&lr=lang_de&aq=f&aqi=&oq=
  • indi.ca » Google as Artificial Intelligence
    The way things are going, I think Google will be the first AI. That is, I think Google will become conscious. As a note, if I can have a conversation with something, I’ll consider it conscious. That’s the Turing Test for intelligence. Right now Google fails miserably. For example, I entered the terms Jesus will return and got: jesus will return to Kings Associated Press July End did did Nature build the worlds largest Sex personals site! I suppose nature can’t explain everything. I got an earlier response which was more relevant - it asked if Nature build the body and emotion, and said the brain was the most important invention … then it went on to mention the Quran and The Prophet by K
    in Public bookmarks with computer design evo evolution net w2 w4
  • Internet Filtering in China in 2004-2005: A Country Study
    Paper on opennetinitiative.net. Links to other studies on Internet Filtering in Bahrain,Burma, Iran, Saudi Arabia, Singapore, Tunisia, United Arab Emirates * ONI Country Studies See also the Economist article "The party, the people and the power of cyber-talk"
    in Public bookmarks with china computer geostrategy net
  • Light Blue Touchpaper » Ignoring the “Great Firewall of China”
    It turns out [caveat: in the specific cases we’ve closely examined, YMMV] that the keyword detection is not actually being done in large routers on the borders of the Chinese networks, but in nearby subsidiary machines. When these machines detect the keyword, they do not actually prevent the packet containing the keyword from passing through the main router (this would be horribly complicated to achieve and still allow the router to run at the necessary speed). Instead, these subsiduary machines generate a series of TCP reset packets, which are sent to each end of the connection. When the resets arrive, the end-points assume they are genuine requests from the other end to close the connection — and obey. Hence the censorship occurs.
    in Public bookmarks with china geostrategy net
  • memepool
    in Public bookmarks with blogs net by 3 users
  • Our Favorite Cheat Sheets - a definition from Whatis.com
    All Categories Cheat Sheets
    This page of cheat sheets from WhatIs.com includes quick references and printable cards for programming, operating systems, blogging, online slang, network and computer administration and much, much more.
    cheat cheet programming quick reference sheet sheets
    in Public bookmarks with computer net utils by 7 users

« Previous Next »
net from all users