- A Taxonomy of Social Networking Data (Bruce Schneier) — he divides information by who gave it, why, and who controls it. Useful to remember that not all social data are equal.
- Five Ways to Revolutionise Computer Memory (New Scientist) — the physics and economics of new memory technology.
- News at Seven — project to automatically generate news report, complete with Flash-animated news readers and text-to-speech voices. A project from the Intelligent Information Lab at Northwestern University.
- Bacteria-Powered Micro-Machines — A few hundred bacteria are working together in order to turn the gear. When multiple gears are placed in the solution with the spokes connected like in a clock, the bacteria will begin turning both gears in opposite directions and it will cause the gears to rotate in synchrony for a long time. Video embedded below (via BoingBoing)
ENTRIES TAGGED "social networks"
As a computing device, the iPad has some obvious limitations that have puzzled many tech-savvy Apple devotees, provoking a variety of critical articles explaining where Steve Jobs has gone wrong. After reading one such blog post saying that the iPad was antisocial, because it didn’t have SMS or the ability to run IM in the background, it struck me this was a restricted view of what it means to be social. The iPad is real-life social in a way that a phone and a laptop just aren’t. It will find fans not only in a family setting, but in a creative setting where collaboration and comment is in person.
Identity online is created by combining many discrete items into a
coherent picture. This concluding section of the article suggests that
Social networking gives individuals more control over the picture.
Groups take on their own identities online, and social networks
threaten to subsume individual identities into groups. This section
of the identity article explores grouping in all its online facets.
Creating a fake identity used to be more popular than it is now, but
some people have still hidden who they are when going online. This
section of the identity article covers some ways they do it.
Sociological research about online participation says more about the
fringes of identity than everyday activity. This section of the
identity article explores how we present unified or fragmented selves.
Advertisers collect information on us for two reasons: to target us as
individuals and to place us in collective categories of consumers.
This section of the identity article coves a few of their techniques.
Social Networking Data, Memory Tech, Sim News, Microbe Jalopy Breakthrough
What men daily do, not knowing what they do!
The Internet provides minimal information about us when we go online,
but compensates by providing immediate, dynamic exploitation of that
information. This post in the identity article series shows what we tell
others just by connecting to the Internet. Previous posts in this series explored the various identifies that track you in real life. Now we can look at the traits that constitute your identity online. A little case study may show how fluid these are.
Professional investigators can find out more than most people realize
about individuals. This section of the identity article introduces how
investigators do their work, on and off the Internet.
To be or not to be: that is the question.
Hamlet’s famous utterance plays a trick on theater-goers, a mind game of the same type he inflicted constantly on his family and his court. While diverting his audience’s attention with a seemingly simple choice between being and non-being, Hamlet of all people would know very well how these extremes bracket infinite gradations. Our fascination with Hamlet is precisely his instinct for presenting a different self to almost everyone he met. Social networking gives us an impetus to review how we appear online. When people ask who we are, questions multiply far beyond the capacity of a binary “to be” digit.