Saturday, July 10, 2010

I've long believed this was the case. It has implications for Identity Theft (e.g. Yesterday's article on a university Parking system that had data from 10 years ago in its hard drive.), e-Discovery and Data Mining (separating wheat from chaff), and of course the cost of storage.

http://hardware.slashdot.org/story/10/07/10/0213210/Dell-Says-90-of-Recorded-Business-Data-Is-Never-Read?from=rss&utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+Slashdot%2Fslashdot+%28Slashdot%29

Dell Says 90% of Recorded Business Data Is Never Read

Posted by timothy on Saturday July 10, @08:04AM

"According to a Dell briefing given to PC Pro, 90% of company data is written once and never read again. If Dell's observation about dead weight is right, then it could easily turn out that splitting your data between live and old, fast and slow, work-in-progress versus archive, will become the dominant way to price and specify your servers and network architectures in the future. 'The only remaining question will then be: why on earth did we squander so much money by not thinking this way until now?'"

As the writer points out, the "90 percent" figure is ambiguous, to put it lightly.



Justice is swift down under... But their laws are as strange as ours. Has anyone considered that if Google can do this “accidentally” then anyone (my Ethical Hackers, eastern European crime syndicates, CNN, NBC, NSA, etc.) could do the same thing deliberately? Remember: “Unencrypted communications has always relied on the kindness of strangers” Blanche DuBois

http://tech.slashdot.org/story/10/07/10/0240242/Google-Found-Guilty-of-Australian-Privacy-Breach?from=rss&utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+Slashdot%2Fslashdot+%28Slashdot%29

Google Found Guilty of Australian Privacy Breach

Posted by timothy on Saturday July 10, @12:06AM

"The Australian Privacy Commissioner has found Google guilty of breaching the country's Privacy Act when it collected unsecured WiFi payload data with its Street View vehicles. While the Commissioner could not penalize the company, Google agreed to publish an apology on its Australian blog, and work more closely with her during the next three years. Globally, Google is said to have collected some 600 GB of data transmitted over public WiFi networks. In May, the company put its high-definition Australian Street View plans on hold to audit its processes."

[From the article:

"[But] under the current Privacy Act, I am unable to impose a sanction on an organisation when I have initiated the investigation.


(Related) Okay, some one has considered the implications (opportunities?) of eavesdropping...

http://www.wired.com/threatlevel/2010/07/congresswoman-wifi-sniffed/?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+wired%2Findex+%28Wired%3A+Index+3+%28Top+Stories+2%29%29

Consumer Group Sniffs Congresswoman’s Open Wi-Fi

We’re not sure what’s more humorous: That California Rep. Jane Harman, the ranking member of the House Intelligence Committee, maintains two unencrypted Wi-Fi networks at her residence, or that a consumer group sniffed her unsecured traffic in a bid to convince lawmakers to hold hearings about Google.



No Privacy issues here. These are not the 'droids we want.” You can think of it as spying or stalking or even as an automated paparazzi.

http://www.makeuseof.com/dir/twitflink-tweets-with-links

TwitFlink: Search For Tweets With Links On Any Twitter Account

TwitFlink is a simple, free to use website that helps visitors easily search for a Twitter user’s Tweets which contain links. On the homepage of the site you see a field where you can enter the Twitter username. The site executes a search for this name and searching for all their Tweets that contains links.

www.twitflink.com

Similar tools: SiftLinks and Tlink.



Good law, bad math?

http://yro.slashdot.org/story/10/07/09/204212/RIAAs-Tenenbaum-Verdict-Cut-From-675k-To-675k?from=rss&utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+Slashdot%2Fslashdot+%28Slashdot%29

IAA's Tenenbaum Verdict Cut From $675k To $67.5k

Posted by Soulskill on Friday July 09, @05:01PM

"In SONY BMG Music Entertainment v. Tenenbaum, the Court has reduced the jury's award from $675,000, or $22,500 per infringed work, to $67,500, or $2,250 per infringed work, on due process grounds, holding that the jury's award was unconstitutionally excessive. In a 64-page decision (PDF), District Judge Nancy Gertner ruled that the Gore, Campbell, and Williams line of cases was applicable to determining the constitutionality of statutory damages awards, that statutory damages must bear a reasonable relationship to the actual damages, and that the usual statutory damages award in even more egregious commercial cases is from 2 to 6 times the actual damages. However, after concluding that the actual damages in this case were ~ $1 per infringed work, she entered a judgment for 2,250 times that amount. Go figure." That $2,250 per infringed work figure should look familiar from Jammie Thomas-Rassett's reduced damages judgment — $54,000 for 24 songs.



The article bemoans the difficulties of using even tiny exerpts of copyrighted material, but offers a great illustration and an interesting suggestion...

http://online.wsj.com/article/SB10001424052748704608104575220551906611796.html

Curse of the Greedy Copyright Holders

Still, I can't help but wonder if major publishers might want to let economists, rather than copyright attorneys, govern their decisions in this area. If you agree, perhaps you might quote this essay to them. I'm sure we can work out a reasonable fee.



An interesting infographic. There are several blogs (sadly, not mine) in the top ten.

http://www.flowtown.com/blog/which-news-sites-are-the-most-shared

Which News Sites Are the Most Shared?

According to Backtype (who kindly provided the data), the following ten sites are the ‘most shared’ news sites online. The graphic illustrates how the sites are shared, who their biggest influencers are (via twitter), and what stories are being shared the most.

http://www.flowtown.com/blog/which-news-sites-are-the-most-shared?display=wide



Open source Cloud Computing

http://www.networkworld.com/community/node/63414

IBM, EU partner on open source projects

IBM and the European Union are partnering on two projects that, in the end, aim to make government run more smoothly and businesses able to collaborate on web-based services.

Both will take advantage of and contribute to the open source community.

PINCETTE (which means "tweezers" in French) aims to be a new technology that will be able to hone in on even the smallest of software bugs in large networks that control the likes of electrical grids, water pipes and nuclear power plants.

… The other project, the Artifact-Centric Service Interoperation (ACSI) consortium, is meant to "help businesses more easily take advantage of Internet-based services - or 'e-services' - to create collaborative business operations and achieve shared business goals."

Basically, it will enable smaller businesses to make use of various technologies without having have the technological expertise in-house. Much of it will be done using open-source software, to enable easier blending and mixing of technologies that previously would have had to be custom-built for a company's needs.



For my Computer Security geeks.

http://linux.slashdot.org/story/10/07/09/1835250/REMnux-the-Malware-Analysis-Linux-OS?from=rss&utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+Slashdot%2Fslashdot+%28Slashdot%29

REMnux, the Malware Analysis Linux OS

Posted by Soulskill on Friday July 09, @03:35PM

"A security expert has released a stripped-down Ubuntu distribution designed specifically for reverse-engineering malware. The OS, called REMnux, includes a slew of popular malware-analysis, network monitoring and memory forensics tools that comprise a very powerful environment for taking apart malicious code. REMnux is the creation of Lenny Zeltser, an expert on malware reverse engineering who teaches a popular course on the topic at SANS conferences. He put the operating system together after years of having students ask him which tools to use and what works best. He originally used Red Hat Linux, but recently decided that Ubuntu was a better fit. REMnux has three separate tools for analyzing Flash-specific malware, including SWFtools, Flasm and Flare, as well as several applications for analyzing malicious PDFs, including Didier Stevens' analysis tools. REMnux also has a number of tools for de-obfuscating JavaScript, including Rhino debugger, a version of Firefox with NoScript, JavaScript Deobfuscator and Firebug installed, and Windows Script Decoder."



Experiment with Cloud Computing!

http://www.killerstartups.com/Web-App-Tools/standingcloud-com-deploying-your-apps-in-the-cloud

StandingCloud.com - Deploying Your Apps In The Cloud

http://www.standingcloud.com/

By now, everybody is aware of the direct and indirect advantages that cloud computing has got, and nobody would think it strange if you (as a developer) wanted to deploy your applications there.

… The site provides a service for deploying and managing open source applications in the cloud.

… The main selling point of this service is that it brings cloud management into the hands of everybody, and that includes people with limited IT knowledge. [A scary thought. Bob] As a matter of fact, you can know nothing about IT and still use this service. And (in the end) that is the one aspect that gives Standing Cloud a true edge.



Even great universities can be home to truly lousy lecturers (and vice versa) The trick is to find the lecture that works best for you.

http://www.makeuseof.com/dir/freevideolectures-free-online-video-courses-from-leading-universities/

FreeVideoLectures: 700+ Free Online Video Courses From Leading Universities

The internet has made a big leap in providing people access to educational materials. People who cannot afford to go to Harvard or Oxford can now view podcasts, videos, and course materials without ever having to enroll.

This website has a great motto: “to organize the world’s educational videos and make them universally accessible and down-loadable”. They offer 700 + free online video courses from more than 25+ top universities on 30+ subjects.

www.freevideolectures.com



Why? My Website students learn to read the underlying HTML of their favorite sites so they can see how they were built and emulate them.

http://www.makeuseof.com/tag/download-entire-sections-internet-winwsd/

Download Entire Sections Of The Internet To Read Offline With WinWSD

The most common use for applications like WinWSD is to download a “mirror” of an entire website. This will basically let you browse every single page on an entire website even though you’re offline. Obviously many external links or images won’t work properly, but all of the local files, scripts, images and videos will all work without an Internet connection.

WinWSD

This application is similar to the apps Tina covered in her mini series about offline browsing, where she covered Scrapbook and HTTrack.



This is an interesting variation on Amazon's “Associate” program. I could see “suggesting” books to my students. (It's in the UK. Perhaps we could develop a similar US service.)

http://www.killerstartups.com/eCommerce/eclector-com-have-your-very-own-bookstore

Eclector.com - Have Your Very Own Bookstore

eclector

Eclector is a service that will let you have your very own online bookstore and keep 50 % of the actual profits that are made through it.

http://www.eclector.com/index.asp?m=1&t=Home

[The “How it works” video:

http://www.eclector.com/index.asp?m=28&t=How+We+Do+What+We+Do

No comments: