Bookmark
Your Brain on Computers - Attached to Technology and Paying a Price - NYTimes.com
www.nytimes.com/2010/06/07/technology/07brain.html, posted 2010 by peter in cognition communication health
Scientists say juggling e-mail, phone calls and other incoming information can change how people think and behave. They say our ability to focus is being undermined by bursts of information.
Bookmark
Researchers spy on BitTorrent users in real-time • The Register
www.theregister.co.uk/2010/04/30/bittorrent_continuous_spying/, posted 2010 by peter in communication distributed msm networking p2p privacy science
In a paper presented earlier this week at the Usenix Workshop on Large-Scale Exploits and Emergent Threats, the researchers demonstrated how they used the technique to continuously spy on BitTorrent users for 103 days. They collected 148 million IP addresses and identified 2 billion copies of downloads, many of them copyrighted.
The researchers, from the French National Institute for Research in Computer Science and Control, also identified the IP addresses where much of the content originated. They discovered the the vast majority of the material on BitTorrent started with a relatively small number of individuals.
Bookmark
Edge 313: Time to Start Taking the Internet Seriously
www.edge.org/documents/archive/edge313.html, posted 2010 by peter in communication inspiration media networking people science toread
No moment in technology history has ever been more exciting or dangerous than now. The Internet is like a new computer running a flashy, exciting demo. We have been entranced by this demo for fifteen years. But now it is time to get to work, and make the Internet do what we want it to.
-- DAVID GELERNTER is a professor of computer science at Yale and chief scientist at Mirror Worlds Technologies (New Haven). His research centers on information management, parallel programming, and artificial intelligence. The "tuple spaces" introduced in Nicholas Carriero and Gelernter's Linda system (1983) are the basis of many computer communication systems worldwide. He is the author of Mirror Worlds, and Drawing a Life: Surviving the Unabomber.
Bookmark
The Mobile Phone That Could "Read Lips"
www.cellular-news.com/story/42211.php, posted 2010 by peter in communication mobile nlp
Researchers at Germany's Karlsruhe Institute of Technology (KIT) have developed a method for mobile phones to convert silent mouth movements into speech. The technology is based on the principle of electromyography, that is the acquisition and recording of electrical potentials generated by muscle activity. This muscle activity is measured in the face and converted into speech.
An example is soundless calling.
The user can speak into the phone soundlessly, but is still understood by the conversation partner on the other end of the line. As a result, it is possible to communicate in silent environments, at the cinema or theater, without disturbing others. Another field of use is the transmission of confidential information.
Bookmark
Nimbuzz - learn more: Mobile web pc widgets
www.nimbuzz.com/en/mobile/, posted 2010 by peter in communication free messaging mobile software symbian voice
Nimbuzz Mobile lets you call, chat, message, and send files on the go, for free. It combines all your buddies from Skype, MSN, Yahoo, ICQ, AIM, Google Talk and more. One login, one contact list, all accounts.
Bookmark
fring- talk, video, chat and interact with Skype®, MSN Messenger®, Google Talk™, ICQ, SIP, Facebook, Yahoo!™ and AIM®
www.fring.com/, posted 2010 by peter in communication free messaging mobile software symbian voice
fring™ is a mobile internet community and communication service that allows friends to connect, share experiences and enhance their online communities together.
Using your handset′s internet connection, you can interact with friends on all your favourite social networks including Skype®, MSN Messenger®, Google Talk™, ICQ, SIP, Twitter, Yahoo!™ and AIM®. You can listen to music with your Last.fm friends, check out what each other are up to on Facebook, receive alerts of new Google Mail™ and tailor make your very own fring by adding more cool experiences from fringAdd-ons™.
Bookmark
Protecting SSH from brute force attacks - The H Security: News and Features
www.h-online.com/security/features/Protecting-SSH-from-brute-force-attacks-746235.html, posted 2010 by peter in communication howto networking security toread
Using just open source tools and a few tweaks, it is possible to detect and block suspicious login attempts.
Bookmark
Services' E-Mail Hacking Illegal, but Officials Need More Than That to Prosecute - washingtonpost.com
www.washingtonpost.com/wp-dyn/content/article/2009/09/06/AR2009090602238.html, posted 2009 by peter in business cloudcomputing communication email messaging privacy security
But such services as YourHackerz.com are still active and plentiful, with clever names like "piratecrackers.com" and "hackmail.net." They boast of having little trouble hacking into such Web-based e-mail systems as AOL, Yahoo, Gmail, Facebook and Hotmail, and they advertise openly.
Bookmark
Priser utomlands - Kundservice - Tele2
www.tele2.se/utomlands-priser.html, posted 2009 by peter in communication inswedish list messaging reference sweden travel
Bookmark
The Web Sockets API
dev.w3.org/html5/websockets/, posted 2009 by peter in communication development html networking reference specification webdesign
This specification defines an API that enables Web pages to use the Web Sockets protocol for two-way communication with a remote host.
|< First < Previous 51–60 (81) Next > Last >|