Journal: Constant Technical Stare vs. Engaged Brain

05 Civil War, Methods & Process, Military, Real Time, Technologies

Full Story Online
Full Story Online

Military Refines A ‘Constant Stare Against Our Enemy'

The rapidly increasing surveillance power of unmanned aircraft gives U.S. officials an option beside s troops

By Julian E. Barnes    November 2, 2009   Pg. 1

WASHINGTON — The Pentagon plans to dramatically increase the surveillance capabilities of its most advanced unmanned aircraft next year, adding so many video feeds that a drone which now stares down at a single house or vehicle could keep constant watch on nearly everything that moves within an area of 1.5 square miles.

The year after that, the capability will double to 3 square miles.

Continue reading “Journal: Constant Technical Stare vs. Engaged Brain”

Journal: Real-Time Analytics, Bye to SQL, Oracle, SAP

InfoOps (IO), Methods & Process, Technologies

logo cloud computing journalCloud Analytics: Dataflow versus Databases

Realtime analytics drives a migration away from databases to more scalable parallel dataflow architectures.

Bill McColl, 29 October 2009

Over the past year or so, a new movement, the “NoSQL” movement has emerged promoting the advantages of doing a variety of kinds of analytics without using any relational database technologies at all.

Continue reading “Journal: Real-Time Analytics, Bye to SQL, Oracle, SAP”

Journal: $600K in Grants for Wireless Innovation

Collaboration Zones, Communities of Practice, Mobile, Real Time, Technologies

Full Story Online
Full Story Online

Vodafone Americas Foundation Launches Second Annual Wireless Innovation Project

The Vodafone Americas Foundation has announced the launch of the second annual Vodafone Wireless Innovation Project, a competition to identify and reward the most promising advances in wireless related technologies that can be used to solve critical problems around the globe.

The Vodafone Americas Foundation will award a total of $600,000 to the first-, second-, and third-prize winners.

Complete competition information and application instructions are available at the project's Web site.

Deadline: February 1, 2010

Contact:
Link to Complete RFP

Phi Beta Iota: Bottom-Up Wireless (See Haggle) is part of the tri-fecta along with Free/Open Source Software (F/OSS) and Open Source Intelligence (OSINT).

Journal: Haggle, Freenet, TOOZL, and Syllable

Technologies
Document Online
Document Online

Clean-slate networking for mobile devices

2007 Abstract: Haggle is a layerless networking architecture for mobile devices.  It is motivated by the infrastructure dependence of applications such as email and web browing, even in situations where infrastructure is not necessary to accomplish the end user goal, e.g. when the destination is reachable by ad hoc neighborhood communication.  In this paper we present details of Haggle's architecture, and of the prototype implementation which allows existing email and web applications to become infrastructure-independent, as we show with an experimental evaluation.  [Emphasis added.]

Below the Fold: Freenet, TOOZL, and Syllable

Continue reading “Journal: Haggle, Freenet, TOOZL, and Syllable”

Journal: Time Warner Cable Exposes 65,000 Customer Routers to Remote Hacks

Technologies
Full Story Online
Full Story Online

A vulnerability in a Time Warner cable modem and Wi-Fi router deployed to 65,000 customers would allow a hacker to remotely access the device’s administrative menu over the internet, and potentially change the settings to intercept traffic, according to a blogger who discovered the issue.

Time Warner acknowledged the problem to Threat Level on Tuesday, and says it’s in the process of testing replacement firmware code from the router manufacturer, which it plans to push out to customers soon.

All of this means that a hacker who wanted to target a specific router and change its settings could access a customer’s admin panel from anywhere on the net through a web browser, log in with the master password, and then start tinkering. Among the possibilities, the intruder could alter the router’s DNS settings — for example, to redirect the customer’s browser to malicious websites — or change the Wi-Fi settings to open the user’s home network to the neighbors.

Continue reading “Journal: Time Warner Cable Exposes 65,000 Customer Routers to Remote Hacks”

Journal: IC on Twitter, Still Not Making Sense

Government, Law Enforcement, Mobile, Technologies

Full Story Online
Full Story Online

Exclusive: U.S. Spies Buy Stake in Firm That Monitors Blogs, Tweets

By Noah Shachtman
October 19, 2009

America’s spy agencies want to read your blog posts, keep track of your Twitter updates — even check out your book reviews on Amazon.

In-Q-Tel, the investment arm of the CIA and the wider intelligence community, is putting cash into Visible Technologies, a software firm that specializes in monitoring social media. It’s part of a larger movement within the spy services to get better at using ”open source intelligence” — information that’s publicly available, but often hidden in the flood of TV shows, newspaper articles, blog posts, online videos and radio reports generated every day.

Continue reading “Journal: IC on Twitter, Still Not Making Sense”