Live Mag Content YogaJournal.com — covering yoga poses, yoga lifestyle, health and yoga, yoga wisdom, yoga community, yoga conferences and yoga video.
Tagged with “2011” (79)
The Semantic Link LIVE at #SemTech + Schema.org commentary – Episode 6, June 2011
Download Orientering Weekend som podcast eller direkte ned på computeren.
Hat Trick, Mudsplatter
This presentation will touch upon broad aspects of forensics, encryption, and social engineering, and how they relate to the tracking of extremists.
Hat Trick has over seven years of experience in this very unique field, and has put together one of the world’s largest open source databases of extremist multimedia. Topics covered include common vulnerabilities of extremist sites, the unique behaviors of extremists, how to get terrorist IPs and passwords, and what to do with them when you’ve got them.
Mudsplatter will discuss the psychology of manipulation, and how to gain access to even the most secure networks using simple tricks of social engineering. Topics include how to lie with confidence, getting the paranoid to trust you, using trolling to your advantage, and some of the most common liabilities of social networking.
In the late 1990s, advances in digital content creation and distribution raised hopes that journalism and the media were becoming radically democratized. While these hopes have been borne out to some degree, old hierarchies and fissures are reasserting themselves as new forms of journalism become normalized. What’s more, digital technology affords more than just participation; it affords surveillance and algorithmically driven visions of consumption. This conversational talk will address these issues, with a jumping off point being a comparison of different journalistic “visions of their audience.”
With the 2010 Winter Olympics having come and gone, it’s not too late to look back at what an event it was. From a technology standpoint, CCTV cameras and ticket sales will be looked at, and from a social standpoint, matters involving intellectual property as well as the police will be examined.
Some time ago, Karen Sandler was diagnosed with hypertrophic cardiomyopathy, a medical condition in which the heart muscle thickens, greatly increasing the chances of sudden death. A defibrillator implant was recommended. Of rightful curiosity, Karen asked what software ran the implant, and if she could have a look at its source code before entrusting her life to a gamble on its quality. After many a confused look, much finger pointing and buck passing, the buck landed back on her, and the cat was let out of the bag.
Medical devices are approved by the Food and Drug Administration (FDA), which never reviews source code unless the administration has a sense that there might be a problem with the device. Instead, it relies on the self-appraised reports published by the device manufacturer or the software vendor. Beside a general guideline as to format, there are no specific requirements mandated by the FDA about what these reports must contain.
The rationale behind this approach is that, each device being different, the FDA worries that if they mandate specific requirements, they might miss something important. And because they do not understand the intricacies of each device as well as the manufacturer does, it makes more sense for the manufacture to determine what tests to perform to validate the quality, correctness and accuracy of the device.
We all know that software has bugs. The Software Engineering Institute (SEI) estimates one bug for every onehundred lines of code. How many lines of code would a typical device have, and thus how many bugs? Research indicates that 98% of the recalls the FDA made on these devices due to software failures could have been corrected simply by all-pairs testing. This lack of transparent testing costs lives, and there is little or no legal recourse.
Karen’s message is simple. The way we use software has changed. From the early days of using it only for simple tasks such as word processing, today software use permeates every aspect of our lives. We need the freedom to be able to inspect it and put it under the scrutiny of an open eye; especially for something as critical as life-saving technology. In sharp, clear tones, Karen tells her story, presenting a new and refreshing perspective on the importance of freedom and open source software
The way people code is very interesting—there is a lot of forking, a lot of thinking, and there are projects across multiple mirrors. Google has crawled over 3 Billion lines of computer code, revealing some surprising trends. Chris DiBona presents the latest from his team’s project, Google Code.
Establishing a useful metric for computer code development is an elusive challenge. How are we to make sense of lines of code and commits to repositories as metrics, when these differ widely depending on the purpose of the code and the technique of individual coders?
Research from the Google Code project also reveals the top 10 licenses used from the roughly 50 that are tracked, as well as the trends in popularity of languages and version control systems. Finally, “the most important coder in the world" is identified, "who will be shaping computer science for decades to come.”
Evgeny Morozov | Marriage From Hell: On the Secret Love Affair Between Dictators and Western Technology Companies
The way dictators exploit technology has been a long-time concern for Evgeny Morozov. Morozov believes media and the public have started paying more attention to this in large part because the struggles of the so-called Arab Spring have revealed how fundamental complicity of western-world tech companies has been to the maintenance of oppression in non-industrialized countries. Although the United States has hundreds of laws against engaging in trade with dictatorships, the distribution channels of software or hardware products may conceal transactions with countries that world leaders claim are threats.
Morozov admits that recognizing the good guys from the bad guys is never clear. For example, the new government in Libya that removed Khaddafi, with the technologically sophisticated help of NATO, made banning pornographic websites a priority, while next door, Tunisian security affiliates continue to tamper with email communications of their protestors and dissidents, even inserting pornographic attachments to frame or harass targeted groups. Morozov suspects this kind of attack has an additional effect of undermining confidence that people have in the various technology. As these and many other plots thicken, Morozov says some companies specializing in surveillance complain that regulating or outlawing a corporation’s trade with an offending country is a sure job killer in the U.S. In hi-lighting this opinion he shares a fascinating letter written to the Wall Street Journal regarding their investigative reporting on technology companies’ trading with dictatorships.
Page 1 of 8More