ENTRIES TAGGED "peer to peer"
Video Editing, Game Engine, Python Debugger, and P2P VPN
3D Code, Malbuffering, p2p Hardware, and Crypto Challenges
- Meshlab — open source, portable, and extensible system for the processing and editing of unstructured 3D triangular meshes.
- HTML5 Video on iOS (Steve Souders) — While it’s true that Mobile Safari on iOS doesn’t buffer any video data as a result of the PRELOAD attribute, it does make other video requests that aren’t counted as “buffered” video. The number and size of the requests and responses depends on the video. For larger videos the total amount of data for these behind-the-scenes requests can be significant.
- Space Monkey (Kickstarter) — distributed encrypted peer-to-peer cloud service using custom hardware. Not open source, which would make me nervous that I was buying a botnet client with storage capability. (via BERG London)
- Matasano Crypto Challenges — Counting is not a hard problem. But cryptography is. There are just a few things you can screw up to get the size of a buffer wrong. There are tens, probably hundreds, of obscure little things you can do to take a cryptosystem that should be secure even against an adversary with more CPU cores than there are atoms in the solar system, and make it solveable with a Perl script and 15 seconds. Don’t take our word for it: do the challenges and you’ll see. People “know” this already, but they don’t really know it in their gut, and we think the reason for that is that very few people actually know how to implement the best-known attacks. So, mail us, and we’ll give you a tour of them.
MOOCs get the attention, but DIY and peer-to-peer exchange are more fertile grounds for development
The combined efforts of the Locker Project and TeleHash could help people be at the center of their data. Plus: Bloom presents Fizz, a new data app.
Three data efforts — the open source Locker Project, the TeleHash protocol, and commercial support from Singly — look to help people get more value from their personal data.
The DC Circuit didn't tell the FCC to turn back. It has a job to
do–promoting the spread of high-speed networking, and ensuring that
it is affordable by growing numbers of people–and it just has to find
the right tool for the job.
Opponents can shed their rhetoric and reveal new depths to their thought when you bring them together for rapid-fire exchanges, sometimes with their faces literally inches away from each other. That made it worth my while to truck down to the MIT Media Lab for yesterday’s Workshop on Innovation, Investment and the Open Internet, sponsored by the Federal Communications Commission. The event showed that innovation and investment are not always companions on the Internet. An in-depth look at the current state of the debate over competition and network neutrality.
Nobody knows you as well as you do. Or do they? Let's run a test. Do you
know what percentage of your food bill went to processed products? Or
what type of coupons (store coupons, newspaper coupons, etc.) is most
likely to get you to switch brands? I bet someone out there knows.This kind of data mining is the modern companion to Customer Relations Management, which is the science of understanding customers and trying to get repeat business. CRM can offer many valuable benefits, but ultimately the control lies
with the vendor. A Vendor Relationship Management workshop at
Harvard looked at what it would take to leave control with the
is carrying off one of the most audacious experiments in Internet
activism in our day.
A report released by the non-profit project in
reports the data from surveys and an analysis of patents handled
during the first year of the project. The sample is small (23 patents)
but bears some impressive fruit.