- Hacker monthly (since June, free online + pay4print) issue1 | issue2 | issue3
- “Hacker News”
- Ask Hacker News archive
- Ask YC Archive
Comment: very different from 2600 magazine, but worth exploring with an open mind.
Related:
http://paulgraham.com
Comment: very different from 2600 magazine, but worth exploring with an open mind.
Related:
http://paulgraham.com
Defense News August 23, 2010
Experts: DoD Could Have Prevented WikiLeaks Leak
By William Matthews
While senior Pentagon officials resort to bluster in hopes of preventing the WikiLeaks website from posting any more secret Afghan war documents on the Internet, security experts say there is a lot the U.S. military could have done to prevent the classified documents from being leaked in the first place.
Steps range from the sophisticated — installing automated monitoring systems on classified networks — to the mundane — disabling CD burners and USB ports on network computers.
“The technology is available” to protect highly sensitive information, said Tom Conway, director of federal business development at computer security giant McAfee. “The Defense Department doesn’t have it, but it is commercially available. We’ve got some major commercial clients using it.”
Full Article Below the Line (Not Easily Available on Internet); Lengthy Comment Follows Article
Continue reading “Journal: DoD, WikiLeaks, JCS, Security Ad Naseum…”
UPDATE of 22 Aug 2010 to add Viral Video (John Pourdehnad) that started the dialog.
Ackoff Virtual Inqiry Center (AVIC)
Mats Bjore, a pioneer in both military and commercial intelligence, continues to innovate. Below is Worth a Look.
Below is updated information followed by the original response.
With the permission of Robert Horn, a co-founder of Earth Intelligence Network and also the “owner” of the term “information mapping,” we have posted his seminal work in easy to download and exploit segments:
Reference: Mapping Hypertext (1989)
Latest example of Robert Horn's work:
Reference: Sustainable World by 2050
Below: Two “New Media” Programs, One Pace-Setting Informatics Program, Comment, and original 2009 search response.
Continue reading “Search: Information Mapping (2010 Update)”
Crowdmap allows you to…
+ Collect information from cell phones, news and the web.
+ Aggregate that information into a single platform.
+ Visualize it on a map and timeline.
Crowdmap is designed and built by the people behind Ushahidi, a platform that was originally built to crowdsource crisis information. As the platform has evolved, so have its uses. Crowdmap allows you to set up your own deployment of Ushahidi without having to install it on your own web server.
Graphics: Twitter as an Intelligence Tool
Reference: How to Use Twitter to Build Intelligence
Phi Beta Iota: Previously recommended in Worth a Look: New Book Engaging Emergence, we reiterate our regard for Peggy Holman, arguably one of a handful of leaders shaping our collective intelligence capacity today–Tom Atlee, Barbara Marx Hubbard, Harrison Owen, Thom Hartman, Jim Rough, Robert Fuller, Mark Tovey, are others, all helping shape community Open Space Open Source Collaborative Information-Sharing and Sense-Making.
See Also:
Review: The Handbook of Large Group Methods–Creating Systemic Change in Organizations and Communities
From the Author
At long last, it is available. I am delighted to say that Engaging Emergence: Turning Upheaval into Opportunity is now for sale from Amazon, Berrett-Koehler, Barnes and Noble, or through local bookstores.
I have a confession. I have an ambitious goal for the book: to meet today's needs in the way The Fifth Discipline did 20 years ago. And you can help make that happen.