Are you hip to Really Simple Syndication? If you’re still behind on the adoption curve, May 1st is RSS Awareness Day.
For more information, check out:
- Dan Bricklin’s article, What is RSS?
- our RSS glossary
- our podcast explaining what you can do with RSS
- our definition for RSS reader
- Google Reader
- WhatIs.com’s RSS feeds, including the Word of the Day, the feed for this blog, the enterprise IT tips feed and the enterprise IT newsfeed
- The video embedded below from Common Cause, RSS in plain English
[kml_flashembed movie="http://www.youtube.com/v/0klgLsSxGsU" width="425" height="350" wmode="transparent" /]
UPDATE II: Marshall Kirkpatrick blogged up a storm over at ReadWriteWeb, writing an epic Ode to RSS to honor the day and the technology itself. It’s the best blog post on the subject that I’ve read and will, I suspect, a canonical post about RSS for some time to come. As Marshall points out, blogging and podcasting as we know it simply wouldn’t be possible without RSS.
A hearty thanks to the pioneers and early adopters whose dedication, hard work and dogged advocacy have brought the technology to its present state!
This video features Shreeraj Shah, one of the founders of NetSquare, speaking about defending Web applications and kernel keyloggers at the HackInTheBox Conference in 2003. Fast forward to 2:40 to skip the introduction.
[kml_flashembed movie="http://video.google.com/googleplayer.swf?docid=3945649297295454257" width="400" height="326" wmode="transparent" /]
From the show notes on Google Video:
This presentation discusses some of the more advanced techniques in writing kernel based keyloggers and presents the newest release of THC-vlogger 2.1 with new keystroke logging techniques and more features such as centralized logging. THC-vlogger, first presented in Phrack Magazine #59, enables the capability to log keystrokes of all administrator/user’s sessions via console, serial port and Telnet/SSH remote sessions, switching logging modes by using magic passwords, stealthily sending logged data to centralized remote server. Its smart mode can automatically detect password prompts to log only sensitive user and password information. This talk also discusses the recently published tool in PHC’s ‘fake’ phrack #62 dealing in the detection and disabling of Sebek, a host based honeypot monitoring tool of the Honeynet project. The presentation also discusses the advantages of THC-vlogger 2.1 over Sebek and other similar keylogger tools.
In looking for videos related to typeprint analysis and keyloggers, I came across many, many tutorials that can easily equip a high school student with the tools to embed keyloggers on Web pages and viral emails. Scary stuff.
This video from GoCosmos.org demonstrates how to install the Cosmos User Kit.
[kml_flashembed movie="http://gocosmos.org/Docs/Videos/UserKitInstallNew/Video.swf" width="450" height="380" wmode="transparent" /]
Cosmos is an open source microkernel .Net-based operating system written entirely in C#. The folks over at SharpOS.org, who have also created a microkernel OS written in C#, have reasonably objected to claims that Cosmos is the first OS of this type. Both operating systems can be installed and run from a USB jump drive, which only adds to their geeky cred.
[kml_flashembed movie="http://youtube.com/v/ybSLt4ZxR7g" width="425" height="350" wmode="transparent" /]
InPhase is the company that has spent 8 years developing a practical holographic storage system.
We define a holographic disk drive, the practical implementation of the technology, as “a holographic storage device that uses a laser to store data to optical media in three dimensions, maximizing storage capacity by using the media’s depth. Most optical media, such as CD, DVD, HD-DVD and Blu-ray only offer bit-at-a-time surface or dual-layer writing capacity. A holographic versatile disk is just slightly larger than a DVD and can store 30 times as much data.”
If you want a blast from the past, watch the video below to see Liz Murphy in June of 2007 explaining how HD holographic storage (will) work. She’s interviewed by Scott Jacobs for Futurepeak. (Click ahead to :30 to avoid some shaky handheld camera work.) There’s a good explanation for how the technology works and some historical perspective on its development later in the video.
[kml_flashembed movie="http://video.google.com/googleplayer.swf?docid=-3118534526266498162" width="400" height="326" wmode="transparent" /]
Google’s distributed search model is at the foundation of the Internet giant’s current dominance in search. In the video below, one of Google’s founders, Sergey Brin, speaks at length about his company. You’ll need to turn the volume up on this one.
[kml_flashembed movie="http://www.youtube.com/v/Ka9IwHNvkfU" width="425" height="350" wmode="transparent" /]
It should come as no surprise, therefore, that Google is rejecting claims of patent infringement made in a lawsuit brought by the Jarg Corporation, a Massachusetts-based technology company.
Heather Johnson is guest blogging at WhatIs.com this week. Heather is a freelance writer, as well as a monthly contributor for OEDb, a site that helps students select among accredited online schools. She invites comments and freelancing job inquiries at firstname.lastname@example.org.
There has been a lot of talk about open source hardware lately and its potential effects on research and education. ETech 2008 showcased many examples of open hardware and offered an insightful presentation [PDF] to those who are new to the emerging technology. Likewise, popular sites like Slashdot and bloggers like Scobleizer have been discussing the growing movement.
The increasing popularity of open source software has already had a tremendous influence on education and the world as a whole. Not only are many schools now making the switch to open source programs, leading universities like UC Berkeley and Carnegie Mellon are involved with developing large open source software projects.
However, we have yet to see open hardware really take off. Ryan Singel of Wired feels that 2008 could be the year and I second that opinion. Leading the pack seems to be open source robotics, which has been embraced by several major universities.
Just last month, Willow Garage’s Steve Cousins gave a keynote speech at ETech 2008 about open source personal robots, which has brought more attention to the subject. Willow Garage is a privately funded lab that experiments with various robotics platforms.
This open source robotics movement can be felt on many college campuses as well. Carnegie Mellon, which I previously stated is involved with open source software, is also building OS personal robots. The university has recently formed a joint project called the Institute for Personal Robots in Education (IPRE).
The IPRE is a joint project between Georgia Tech and Bryn Mawr College, with sponsorship provided by Microsoft Research. Its purpose is to help advance robotics research and computer science education. The IPRE is currently selling open source robot kits, which are geared toward educators and can be integrated with computer education curricula.
Instructions can be found RobotEducation.org if you are interested in building your own educational robot.
[Image credit: RobotEducation.org]
Often the title of a video alone raises an eyebrow. Today’s video selection certainly does — it’s a presentation from two tele-immersion labs, one at UC Berkeley’s Center for Information Technology Research in the Interest of Society (CITRIS) and the other within the University of Urbana-Champaign Computer Science Department. According to the IEEE Computer Society, tele-immersion is when “collaborators at remote sites share the details of a virtual world that can autonomously control computation, query databases, and gather results.” It might be a stretch but I see tele-immersion used in that was as an advanced version of presence technology, in which an application make it possible to locate and identify a computing device wherever it might be, as soon as the user connects to the network.
As it’s a dance performance, both labs worked in close collaboration with the Department of Theater, Dance, and Performance Studies at UC Berkeley, and the Dance Department and Intermedia Program at Mills College. The video quality admittedly isn’t great — and you may want to skip ahead to 11:30, when the actual performance begins, or to 20:00, when the dancing starts — but the concept itself is noteworthy for its aspiration to bridge the gap between real and virtual environments.
[kml_flashembed movie="http://www.youtube.com/v/C2HqMAtQMsY" width="425" height="350" wmode="transparent" /]
From the show notes on YouTube:
The Resonance Project Dance Group performed for a very large crowd in the Hearst Memorial Mining Building at UC Berkeley. The performance was a blend of live, modern dance with live tele-immersed dancers from University of Illinois in Urbana-Champaign, Illinois. Using a large network of cameras and computers the dancers were able to span the geographic distance and mingle in cyberspace. The computers merged three-dimensional video images of the dancers onto a single projection, which was broadcast alongside live dancers.
The Resonance Project is a team of choreographers, dancers, computer engineers, and visual and sound artists who are investigating concepts of presence/remote presence and corporeal and code interactivity within live and media based performance. Unique to the project is the use of a “performance as research” model, within which scientists and artists collaborate to explore a re-visioning of cyber culture and corporeal presence.
The nature of the performance has a close conceptual relationship with CAVE, a tele-immersive environment used for learning in a wide variety of disciplines, and the CAVEman, the first 4-D human atlas.
Sun has uploaded a number of helpful tutorials and lectures to YouTube, including this three-part series that features Dr. Doug Locke explaining the Real-Time Specification for Java (JSR-001). The Sun Java Real-Time System (Java RTS) is Sun’s commercial implementation of the JSR-001. Application developers interested in using Java for real-time applications (RTA) should find this series useful.
[kml_flashembed movie="http://youtube.com/v/99UMlG5U8Oc" width="425" height="350" wmode="transparent" /]
[kml_flashembed movie="http://youtube.com/v/TJiWlqbWggM" width="425" height="350" wmode="transparent" /]
[kml_flashembed movie="http://youtube.com/v/OWtWu_DCL-0" width="425" height="350" wmode="transparent" /]
In this video, Brad Fallon of FreeInlineReport.com reports on ICANN’s decision to remove the five trial period of owning a domain name. Brad notes that the decision followed Google’s move to block AdSense from websites less than five days old.
[kml_flashembed movie="http://www.youtube.com/v/S5KDonVBd24" width="425" height="350" wmode="transparent" /]
From the video notes on YouTube:
Following Google’s decision last week to block AdSense from web sites less than five days old, it looks like ICANN is removing the five day trial period for owning a domain name. This would stop the practice that was abused by “Domain Tasters” — people who take out a name for four days, put up Google ads, collect the money from the ads, and then cancel the name before they have to pay for it.
Download Squad to the rescue! The popular and useful downloads blog from Weblogs Inc. posted about a utility that can help you monitor your own network.
Wireshark is a free network protocol analyzer that’s available for Windows, Mac OS X, Linux, Solaris, FreeBSD and many others. Download Wireshark here.
Wireshark is long since well-known to networking professionals, perhaps under its previous name, “Ethereal.”
Sue says that Vint Cerf wowed ‘em at SHARKFEST. No shock there — the “father of the Internet” is well-known for that sort of thing.
In his post on Download Squad, Ian Dumych also links to a white paper posted by the Electronic Frontier Foundation, Detecting packet injection: a guide to observing packet spoofing by ISPs. Check in there if you want to learn more about the practice and how monitoring your own connection can help others.