Steele on Reality, Intelligence, Ethics, & Solutions [Yale, 6 February 2014]

#Events, Advanced Cyber/IO, Communities of Practice, Ethics
Click on Image to Enlarge
Click on Image to Enlarge

SHORT URL: http://tinyurl.com/Steele-Yale-6

On Thursday 6 February 2014 from 1800-1930, Robert Steele will address a group of undergraduates convened by Yale Politic. The event is free, open to the public without RSVP required, and the media has been invited.

Yale University, Branford College
Trumbull Room
74 High Street
New Haven, CT 06511

Downloadable PPT (30 Pages): Steele @ Yale

YouTube as Presented (Verbatim, Slides Not Really Visible)

Briefing as Planned Below the Line in Full Text

See Also:

YALE The Politic Interviews Robert Steele

2014 Intelligence Reform (Robert Steele)

Continue reading “Steele on Reality, Intelligence, Ethics, & Solutions [Yale, 6 February 2014]”

Robin Good: Academic Torrents = Big Data + Open Access

Access, Advanced Cyber/IO
Robin Good
Robin Good

Big Data: Large Dataset Curation & Sharing with AcademicTorrents

AcademicTorrents is a new web service which allows any organization owning large datasets (no size limits) to easily distribute them without needing a dedicated infrastructure. The brainchild of Joseph Cohen and Henry Lo, two PhD students working at the University of Massachusetts in Boston, Academic Torrents facilitates the job of researchers, journalists and information analysts in finding, accessing, curating and downloading large-size datasets. Technically-speaking AcademicTorrents is a bittorrent-type redundant high-speed network and a full distributed system for sharing enormous datasets. As a P2P system it doesn't require intermediate servers, is also fully scalable, secure, fault-tolerant and can act as a reliable repository for data allowing fast downloads. Users can also search the full index, and can create curated datasets collections containing any kind of files and which can be downloaded as a full bundle. This type of system could prove to be an excellent resource for libraries storing digital papers as they would store books, and for simplifying the distribution requirements of any organization needing to publish, curate and share large datasets. “A robust distributed replication design allows libraries to utilize this system as their backbone. Providing fault tolerant hosting of curated data for a university, research lab, or home library. …Also, this system can be used as the foundation of a new open-access publishing system where libraries manage data instead of licenses for external data sources.”

Find out more: http://academictorrents.com/

More info: http://academictorrents.com/about.php

Browse Datasets: http://academictorrents.com/browse.php?cat=6

Browse Papers: http://academictorrents.com/browse.php?cat=5

Berto Jongman: WIRED on Crypto Breakthrough — Unhackable Software?

Advanced Cyber/IO
Berto Jongman
Berto Jongman

Cryptography Breakthrough Could Make Software Unhackable

  • By Erica Klarreich, Quanta Magazine

As a graduate student at the Massachusetts Institute of Technology in 1996, Amit Sahai was fascinated by the strange notion of a “zero-knowledge” proof, a type of mathematical protocol for convincing someone that something is true without revealing any details of why it is true. As Sahai mulled over this counterintuitive concept, it led him to consider an even more daring notion: What if it were possible to mask the inner workings not just of a proof, but of a computer program, so that people could use the program without being able to figure out how it worked?'

The idea of “obfuscating” a program had been around for decades, but no one had ever developed a rigorous mathematical framework for the concept, let alone created an unassailable obfuscation scheme. Over the years, commercial software companies have engineered various techniques for garbling a computer program so that it will be harder to understand while still performing the same function. But hackers have defeated every attempt. At best, these commercial obfuscators offer a “speed bump,” said Sahai, now a computer science professor at the University of California, Los Angeles. “An attacker might need a few days to unlock the secrets hidden in your software, instead of a few minutes.”

Learn more.

Berto Jongman: The Year the USA (Courts, NSA, Google) Broke the Internet

#OSE Open Source Everything, Advanced Cyber/IO, Commerce, Corruption, Government, Idiocy, IO Impotency
Berto Jongman
Berto Jongman

2014: The Year America Broke The Internet

A recent decision by a US Appeals court ended the regulation of the internet as we know it. The Federal Communications Commission (FCC) was deemed to have created a framework for ensuring the concept of “net neutrality” out-with the remit for the organisation it created itself. Now, a former FCC chairman has called for a “nuclear option” to reclassify Internet Service Providers (ISPs) as common carriers.

Click on Image to Enlarge
Click on Image to Enlarge

Doing so would force ISPs to be treated more like public utilities and subject them to FCC regulations over issues such as rate setting and universal service obligations. There has already been a lot of commentary and speculation about what the ruling means for the average user, and I don't want to add to the hyperbole all ready out there, but I think it is important to clarify a few things.

Net neutrality, or the end of it, has the potential to bring about the end of the internet as we know it. In a practical sense, it opens the doors for companies to manage the traffic across the network as they see most profitable, which means these companies can take measures that not only affect content creators, but end users. The ruling overturns the 20 years of treating the internet as a ‘dumb' network that processed packets of information without prioritising them.

Read full article.

Continue reading “Berto Jongman: The Year the USA (Courts, NSA, Google) Broke the Internet”

Robin Good: 10 Content Curation Best Practices

Advanced Cyber/IO, Civil Society, Ethics
Robin Good
Robin Good

If you are new to content curation here the ten, key fundamental steps you need to take to out yourself on the right course. Content curation is not about saving time. It is about selecting, organizing, adding value and context, and finally about effectively presenting information on a specific topic to a selected group of people. Here the ten key steps to take to effetively curate content, visualized by the great team at Scoop.it. Slideshare presentation: http://www.slideshare.net/Scoopit/10-tips-to-curate-like-a-rockstar

Content Curation Ten Fundamentals

1. Choose a topic that you care deeply about.

2. Be specific with your topic choice.

Continue reading “Robin Good: 10 Content Curation Best Practices”

Sepp Hasslberger: new hydrogel uses holograms to warn you about your health

07 Health, Advanced Cyber/IO
Sepp Hasslberger
Sepp Hasslberger

Get your hydrogel, throw in some silver nanoparticles, treat with a laser and you have a hologram. When that interacts with a substance, like insulin it will naturally adjust the color of the hologram giving a diagnosis.

A new hydrogel uses holograms to warn you about your health

This new hydrogel concept uses a simple hydrogel that has been “impregnated” with silver nanoparticles. A specially developed treatment with a laser, just a single short burst upon manufacturing, aligns these silver particles in a three-dimensional hologram.

Click on Image to Enlarge
Click on Image to Enlarge

When the hydrogel comes into contact with certain trigger substances (like glucose, or insulin) it will physically deform relative to the concentration of the chemical. So, a higher blood glucose level results in a more deformed gel — which naturally adjusts the color of the hologram.

This allows the hologram to have analog output of information. That is, it can display not just a binary yes-no on healthy blood glucose, but can slowly darken to let the user know when they are approaching unsafe levels.

This tech combines quick response time with low cost and ease of use…

Stephen E. Arnold: All the Stuff Google Will Do

Advanced Cyber/IO, Commerce, IO Impotency
Stephen E. Arnold
Stephen E. Arnold

All The Stuff Google Will Do

Ray Kurzwell knows how to predict the future. He is not a psychic, but he is Google’s director of engineering and he is designing the technology that will impact the future. Kurzwell has a long list of accomplishments, highlighted on Jimi Disu’s Blog in a recent post: “Google’s Ray Kurzweil Predicts How The World Will Change.”

Kurzwell invented the first print-to-speech reading machine for the blind, flatbed image scanner, and music synthesizer capable of recreating orchestra instruments. His current projects include the Google Brain and finding a cure for aging. His personal goal is immortality by way of technology. He also predicted the Internet revolution; a computer would beat a human at chess, and the fall of the Soviet Union. One has to give him credit for his accuracy and he has even come up with a timeline for what will happen in the next forty years.

What can we expect? Kurzwell believe we will have self-driving cars, personal assistant search engines, be able to switch off our fat cells, click and print designer clothes at home, full-immersion virtual reality, 100 percent solar energy, and vertical meat and vegetable farms. There are some other ideas listed with Kurzwell’s timeline that supplement his predictions.

Continue reading “Stephen E. Arnold: All the Stuff Google Will Do”

noble gold