Robin Good: Academic Torrents = Big Data + Open Access

Access, Advanced Cyber/IO
Robin Good
Robin Good

Big Data: Large Dataset Curation & Sharing with AcademicTorrents

AcademicTorrents is a new web service which allows any organization owning large datasets (no size limits) to easily distribute them without needing a dedicated infrastructure. The brainchild of Joseph Cohen and Henry Lo, two PhD students working at the University of Massachusetts in Boston, Academic Torrents facilitates the job of researchers, journalists and information analysts in finding, accessing, curating and downloading large-size datasets. Technically-speaking AcademicTorrents is a bittorrent-type redundant high-speed network and a full distributed system for sharing enormous datasets. As a P2P system it doesn't require intermediate servers, is also fully scalable, secure, fault-tolerant and can act as a reliable repository for data allowing fast downloads. Users can also search the full index, and can create curated datasets collections containing any kind of files and which can be downloaded as a full bundle. This type of system could prove to be an excellent resource for libraries storing digital papers as they would store books, and for simplifying the distribution requirements of any organization needing to publish, curate and share large datasets. “A robust distributed replication design allows libraries to utilize this system as their backbone. Providing fault tolerant hosting of curated data for a university, research lab, or home library. …Also, this system can be used as the foundation of a new open-access publishing system where libraries manage data instead of licenses for external data sources.”

Find out more: http://academictorrents.com/

More info: http://academictorrents.com/about.php

Browse Datasets: http://academictorrents.com/browse.php?cat=6

Browse Papers: http://academictorrents.com/browse.php?cat=5

Berto Jongman: WIRED on Crypto Breakthrough — Unhackable Software?

Advanced Cyber/IO
Berto Jongman
Berto Jongman

Cryptography Breakthrough Could Make Software Unhackable

  • By Erica Klarreich, Quanta Magazine

As a graduate student at the Massachusetts Institute of Technology in 1996, Amit Sahai was fascinated by the strange notion of a “zero-knowledge” proof, a type of mathematical protocol for convincing someone that something is true without revealing any details of why it is true. As Sahai mulled over this counterintuitive concept, it led him to consider an even more daring notion: What if it were possible to mask the inner workings not just of a proof, but of a computer program, so that people could use the program without being able to figure out how it worked?'

The idea of “obfuscating” a program had been around for decades, but no one had ever developed a rigorous mathematical framework for the concept, let alone created an unassailable obfuscation scheme. Over the years, commercial software companies have engineered various techniques for garbling a computer program so that it will be harder to understand while still performing the same function. But hackers have defeated every attempt. At best, these commercial obfuscators offer a “speed bump,” said Sahai, now a computer science professor at the University of California, Los Angeles. “An attacker might need a few days to unlock the secrets hidden in your software, instead of a few minutes.”

Learn more.

Stephen E. Arnold: IBM Flails at Cloud and Machine Learning

IO Impotency
Stephen E. Arnold
Stephen E. Arnold

Watson with its Head in the Cloud

IBM’s Watson is proceeding to the cloud. Apparently, though, the journey is proving more challenging than expected. The Register reports, “IBM’s Watson-as-a-Cloud: Is it a Bird? Is it a Plane? No, it’s Another Mainframe.” Writer Jack Clark peers through the marketing hype, maintaining that Watson does not translate to the cloud as easily as IBM would have us believe.

The key to Watson’s functionality is its DeepQA analysis engine, which uses an amalgam of Apache‘s Hadoop, Apache’s UIMA, and other tools to achieve machine learning. This means, says Clark, that more work than one might expect must be done to get set up with the cloudy Watson.

He specifies:

“Applying DeepQA to any new domain requires adaptation in three areas:

Continue reading “Stephen E. Arnold: IBM Flails at Cloud and Machine Learning”

Berto Jongman: The Year the USA (Courts, NSA, Google) Broke the Internet

#OSE Open Source Everything, Advanced Cyber/IO, Commerce, Corruption, Government, Idiocy, IO Impotency
Berto Jongman
Berto Jongman

2014: The Year America Broke The Internet

A recent decision by a US Appeals court ended the regulation of the internet as we know it. The Federal Communications Commission (FCC) was deemed to have created a framework for ensuring the concept of “net neutrality” out-with the remit for the organisation it created itself. Now, a former FCC chairman has called for a “nuclear option” to reclassify Internet Service Providers (ISPs) as common carriers.

Click on Image to Enlarge
Click on Image to Enlarge

Doing so would force ISPs to be treated more like public utilities and subject them to FCC regulations over issues such as rate setting and universal service obligations. There has already been a lot of commentary and speculation about what the ruling means for the average user, and I don't want to add to the hyperbole all ready out there, but I think it is important to clarify a few things.

Net neutrality, or the end of it, has the potential to bring about the end of the internet as we know it. In a practical sense, it opens the doors for companies to manage the traffic across the network as they see most profitable, which means these companies can take measures that not only affect content creators, but end users. The ruling overturns the 20 years of treating the internet as a ‘dumb' network that processed packets of information without prioritising them.

Read full article.

Continue reading “Berto Jongman: The Year the USA (Courts, NSA, Google) Broke the Internet”

Robin Good: 10 Content Curation Best Practices

Advanced Cyber/IO, Civil Society, Ethics
Robin Good
Robin Good

If you are new to content curation here the ten, key fundamental steps you need to take to out yourself on the right course. Content curation is not about saving time. It is about selecting, organizing, adding value and context, and finally about effectively presenting information on a specific topic to a selected group of people. Here the ten key steps to take to effetively curate content, visualized by the great team at Scoop.it. Slideshare presentation: http://www.slideshare.net/Scoopit/10-tips-to-curate-like-a-rockstar

Content Curation Ten Fundamentals

1. Choose a topic that you care deeply about.

2. Be specific with your topic choice.

Continue reading “Robin Good: 10 Content Curation Best Practices”

Stephen E. Arnold: Google Books Ruling — Just Wait…

Commerce, Corruption, IO Models
Stephen E. Arnold
Stephen E. Arnold

Google Books Ruling Appealed

It’s not over until it’s over. The long process of determining whether Google’s giant Books project counts as “fair use” continues, we learn from “Authors Guild Appeals Ruling in Google Books Case” at Phys.org. The Authors Guild would like to see limits on the herculean digitization project, which has scanned more than 20 million books to date.

The brief write-up reveals:

Continue reading “Stephen E. Arnold: Google Books Ruling — Just Wait…”

Berto Jongman: NSA Whistleblower William Binney – Full Transcript (19 Screens) Covering Corruption within NSA at All Levels

Corruption, Government, IO Deeds of War, IO Impotency, Military
Berto Jongman
Berto Jongman

NSA 30 Year Veteran, Whistleblower William Binney on Corrupt NSA– the Inside Story– Transcript

By

OpEdNews.com, 1 February 2014

A transcript of my interview with William Binney. Listen here: Podcast/NSA-Whistlebower-American-by-Rob-Kall-America-Freedom-To-Fascism_FISA_IMPEACHMENT-OFF-THE-TABLE-PELOSI_

R.K.:  And welcome to the Rob Kall Bottom Up Radio Show WNJC 1360 AM out of Washington Township reaching Metro Philadelphia and South New Jersey, sponsored by opednews.com.  Tonight my guest is an American Hero.  He is a Whistleblower  His name is William Binney, Bill Binney.  He was technical director of the World Geopolitical and Military Analysis and Reporting Group at NSA.  It's a high level position at NSA.  He left to become a Whistleblower, basically, to report problems.  In exchange for reporting problems he had his home raided, he was charged with crimes and his life was destroyed in so many ways because that's what the Federal Government does to Whistleblowers.  Welcome to the show, Bill.

Continue reading “Berto Jongman: NSA Whistleblower William Binney – Full Transcript (19 Screens) Covering Corruption within NSA at All Levels”

noble gold