<?xml version='1.0' encoding='UTF-8'?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/" xmlns:blogger="http://schemas.google.com/blogger/2008" xmlns:georss="http://www.georss.org/georss" xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr="http://purl.org/syndication/thread/1.0" version="2.0"><channel><atom:id>tag:blogger.com,1999:blog-3320206899382134956</atom:id><lastBuildDate>Fri, 13 Sep 2024 15:22:46 +0000</lastBuildDate><category>google</category><category>google earth</category><category>google maps</category><category>hilarious</category><category>japanese</category><category>weird</category><title>The Armchair Detective</title><description>A Dumping Ground for Cool Geek Things I find on my travels through the interwebs</description><link>http://armchairdectective.blogspot.com/</link><managingEditor>noreply@blogger.com (coma12)</managingEditor><generator>Blogger</generator><openSearch:totalResults>16</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3320206899382134956.post-3261624454963628447</guid><pubDate>Thu, 09 Aug 2007 17:54:00 +0000</pubDate><atom:updated>2007-08-09T14:03:31.832-04:00</atom:updated><title>The Psychology of Subprime Mortgages</title><description>&lt;div xmlns=&quot;http://www.w3.org/1999/xhtml&quot;&gt;&lt;big&gt;&lt;b&gt;&lt;a href=&quot;http://scienceblogs.com/cortex/2007/08/the_psychology_of_subprime_mor.php&quot;&gt;The Psychology of Subprime Mortgages&lt;/a&gt;&lt;/b&gt;&lt;/big&gt;&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://www.boingboing.net/2007/08/09/neuroeconomics_subpr.html&quot;&gt;via Boing Boing&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;Category:&lt;br /&gt;Posted on: August 9, 2007 10:19 AM, by Jonah Lehrer&lt;br /&gt;&lt;br /&gt;The &lt;span style=&quot;font-style: italic;&quot;&gt;poo&lt;/span&gt; is hitting the fan: all those sub-prime mortgages given out so recklessly over the past two years are getting their interest rates re-adjusted. And that, of course, is when the foreclosures begin.&lt;br /&gt;&lt;br /&gt;By most measures, sub-prime loans are a bad idea. Look, for example, at the popular 2/28 loan, which consists of a low, fixed-interest rate for the first two years and a much higher, adjustable rate for the next twenty-eight. Most people taking out a 2/28 loan can&#39;t afford the higher interest rates that will hit later on. It&#39;s not unusual for interest payments on a 2/28 loan to double within four years. (That&#39;s why you&#39;re seeing such high foreclosure rates in the sub-prime market.)&lt;br /&gt;&lt;br /&gt;So why do people take out sub-prime loans? Don&#39;t they realize that they won&#39;t be able to afford the ensuing 28 years of mortgage payments? I think a big part of the reason sub-prime loans remain so seductive, even when the financial terms are so atrocious, is that they take advantage of a dangerous flaw built into our brain. This flaw is rooted in our emotional brain, which tends to overvalue immediate gains (like a new house) at the expense of future costs (high interest rates). Our feelings are thrilled by the prospect of a new home, but can&#39;t really grapple with the long-term fiscal consequences of the decision. Our impulsivity encounters little resistance, and so we sign on the bottom line. We want the house. We&#39;ll figure out how to pay for it later.&lt;br /&gt;&lt;br /&gt;The best evidence for this idea comes from the lab of Jonathan Cohen. Cohen&#39;s clever experiment went like this: he stuck people in an fMRI machine and made them decide between a small Amazon gift certificate that they could have right away, or a larger gift certificate that they&#39;d receive in 2 to 4 weeks. Contrary to rational models of decision-making, the two options activated very different neural systems. When subjects contemplated gift certificates in the distant future, brain areas associated with rational planning (the Promethean circuits of the prefrontal cortex) were more active. These cortical regions urge us to be patient, to wait a few extra weeks for the bigger gift certificate.&lt;br /&gt;&lt;br /&gt;On the other hand, when subjects started thinking about getting a gift certificate right away, brain areas associated with emotion - like the midbrain dopamine system and NAcc - were turned on. These are the cells that tell us to take out a mortgage we can&#39;t afford, or run up credit card debt when we should be saving for retirement. They are our impulsive pleasure seekers, the hedonists inside our head.&lt;br /&gt;&lt;br /&gt;By manipulating the amount of money on offer in each situation, Cohen and his collaborators could watch this neural tug of war unfold. They saw the fierce argument between reason and feeling, as our mind was pulled in contradictory directions. Our ultimate decision--to save for the future or to indulge in the present--was determined by whichever region showed greater activation. More emotions meant more impulsivity.&lt;br /&gt;&lt;br /&gt;This discovery has important implications. (A more recent paper by the Cohen lab extends the theory.) For starters, it locates the neural source for many of our financial errors. When we opt for a 2/28 mortgage, we are acting like experimental subjects choosing the wrong gift certificate. Because the emotional parts of our brain reliably undervalue the future - life is short and they want pleasure now - we end up delaying saving until tomorrow (and tomorrow and tomorrow.) George Loewenstein, a neuroeconomist at Carnegie Mellon University and a collaborator on the Cohen paper, thinks that understanding how we make decisions will help economists develop better public policies: &quot;Our emotions are like programs that evolved to solve important and recurring problems in our distant past,&quot; he says. &quot;They are not always well suited to the decisions we make in modern life. It&#39;s important to know how our emotions lead us astray so that we can design incentives and programs to help compensate for our irrational biases.&quot;&lt;br /&gt;&lt;br /&gt;&lt;p class=&quot;poweredbyperformancing&quot;&gt;Powered by &lt;a href=&quot;http://scribefire.com/&quot;&gt;ScribeFire&lt;/a&gt;.&lt;/p&gt;&lt;/div&gt;</description><link>http://armchairdectective.blogspot.com/2007/08/psychology-of-subprime-mortgages.html</link><author>noreply@blogger.com (coma12)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3320206899382134956.post-8721439375155373297</guid><pubDate>Tue, 07 Aug 2007 22:04:00 +0000</pubDate><atom:updated>2007-08-07T18:16:50.900-04:00</atom:updated><title>Threat Level - Wired Blogs</title><description>&lt;style type=&quot;text/css&quot;&gt;&lt;br /&gt;&lt;!--&lt;br /&gt;.style1 {font-size: medium}&lt;br /&gt;.style2 {&lt;br /&gt; font-size: x-large&lt;br /&gt;}&lt;br /&gt;--&gt;&lt;br /&gt;&lt;/style&gt;&lt;br /&gt;&lt;h3 class=&quot;entry-header style1&quot;&gt;&lt;a href=&quot;http://blog.wired.com/27bstroke6/2007/08/analysis-new-la.html&quot; class=&quot;style2&quot;&gt;Analysis: New Law Gives Government Six Months to Turn Internet and Phone Systems into Permanent Spying Architecture - UPDATED&lt;/a&gt;&lt;/h3&gt;&lt;br /&gt;&lt;div id=&quot;byline&quot;  style=&quot;font-size:medium;&quot;&gt;&lt;span style=&quot;margin-right: 20px;&quot; &gt;By Ryan Singel &lt;a href=&quot;mailto:ryan@ryansingel.net&quot;&gt;&lt;img alt=&quot;Email&quot; src=&quot;http://blog.wired.com/images/icon_email.gif&quot; height=&quot;16&quot; width=&quot;21&quot; /&gt;&lt;/a&gt;August 06, 2007 | 2:11:02 AM&lt;/span&gt;Categories: &lt;a style=&quot;line-height: 19.5px; color: rgb(0, 124, 165);&quot; href=&quot;http://blog.wired.com/27bstroke6/surveillance/index.html&quot; linkindex=&quot;36&quot;&gt;Surveillance&lt;/a&gt; &lt;/div&gt;&lt;br /&gt;&lt;div  class=&quot;entry-content&quot; style=&quot;font-size:medium;&quot;&gt;&lt;br /&gt;  &lt;div  class=&quot;entry-body&quot;&gt;&lt;br /&gt;    &lt;p&gt;&lt;a onClick=&quot;window.open(this.href, &#39;_blank&#39;, &#39;width=500,height=373,scrollbars=no,resizable=no,toolbar=no,directories=no,location=no,menubar=no,status=no,left=0,top=0&#39;); return false&quot; href=&quot;http://blog.wired.com/.shared/image.html?/photos/uncategorized/2007/08/06/641a.jpg&quot; linkindex=&quot;37&quot; set=&quot;yes&quot;&gt;&lt;img style=&quot;margin: 0px 0px 5px 5px; float: right;&quot; src=&quot;http://blog.wired.com/27bstroke6/images/2007/08/06/641a.jpg&quot; title=&quot;641a&quot; alt=&quot;641a&quot; border=&quot;0&quot; height=&quot;223&quot; width=&quot;300&quot; /&gt;&lt;/a&gt;A new law expanding the government&#39;s spying powers gives the Bush Administration a six-month window to install &lt;em&gt;possibly&lt;/em&gt; permanent back doors in the nation&#39;s communication networks.  The legislation was passed hurriedly by Congress over the weekend and &lt;a href=&quot;http://sfgate.com/cgi-bin/article.cgi?f=/n/a/2007/08/05/national/a141537D08.DTL&quot; linkindex=&quot;38&quot;&gt;signed into law&lt;/a&gt; Sunday by President Bush. &lt;/p&gt;&lt;br /&gt;    &lt;p&gt;The bill, known as the &lt;a href=&quot;http://frwebgate.access.gpo.gov/cgi-bin/getdoc.cgi?dbname=110_cong_bills&amp;docid=f:s1927es.txt&quot; linkindex=&quot;39&quot;&gt;Protect America Act&lt;/a&gt;, removes the prohibition on warrantless spying on Americans abroad and gives the government wide powers to order communication service providers such as cell phone companies and ISPs to make their &lt;a href=&quot;http://www.wired.com/science/discoveries/news/2006/05/70910&quot; linkindex=&quot;40&quot; set=&quot;yes&quot;&gt;networks available to government eavesdroppers&lt;/a&gt;.&lt;/p&gt;&lt;br /&gt;    &lt;p&gt;The Administration pushed for passage of the changes to close what it called a &quot;&lt;a href=&quot;http://blog.wired.com/27bstroke6/2007/08/more-known-unkn.html&quot; linkindex=&quot;41&quot;&gt;surveillance gap&lt;/a&gt;,&quot; referring to a long-standing feature of the nation&#39;s surveillance laws that required the government to get court approval to capture communications inside the United States. &lt;/p&gt;&lt;br /&gt;    &lt;p&gt;While the nation&#39;s spy laws have been continually loosened since 9/11, the Administration never pushed for the right to tap the nation&#39;s domestic communication networks until a secret court recently &lt;a href=&quot;http://blog.wired.com/27bstroke6/2007/08/more-known-unkn.html&quot; linkindex=&quot;42&quot;&gt;struck down&lt;/a&gt; a key pillar of the government&#39;s secret spying program.&lt;/p&gt;&lt;br /&gt;    &lt;p&gt;The Administration argues that the world&#39;s communication networks now route many foreign to foreign calls and emails through switches in the United States. &lt;/p&gt;&lt;br /&gt;    &lt;p&gt;Prior to the law&#39;s passage, the nation&#39;s spy agencies, such as the National Security Agency and the Defense Intelligence Agency, didn&#39;t need any court approval to spy on foreigners so long as the wiretaps were outside the United States. &lt;/p&gt;&lt;br /&gt;    &lt;p&gt;Now, those agencies are free to order services like Skype, cell phone companies and arguably even search engines to comply with secret spy orders to create back doors in domestic communication networks for the nation&#39;s spooks.  While it&#39;s unclear whether the wiretapping can be used for domestic purposes, the law only requires that the programs that give rise to  such orders have a &quot;significant purpose&quot; of foreign intelligence gathering.&lt;/p&gt;&lt;br /&gt;    &lt;p&gt;The law:&lt;/p&gt;&lt;br /&gt;    &lt;ul&gt;&lt;br /&gt;      &lt;li&gt;Defines the act of reading and listening into American&#39;s phone calls and internet communications when they are &quot;reasonably believed&quot; to be outside the country as not surveillance.&lt;/li&gt;&lt;br /&gt;      &lt;br /&gt;      &lt;li&gt;Gives the government 6 months of extended powers to issue orders to &quot;communication service providers,&quot; to help with spying that &quot;concerns persons reasonably believed to be outside the United States.&quot;  The language doesn&#39;t require the surveillance to only target people outside the United States, only that some of it does.&lt;/li&gt;&lt;br /&gt;      &lt;br /&gt;      &lt;li&gt;Forces Communication Service providers to comply secretly, though they can challenge the orders to the secret Foreign Intelligence Court.  Individuals or companies given such orders will be paid for their cooperation and can not be sued for complying.&lt;/li&gt;&lt;br /&gt;      &lt;br /&gt;      &lt;li&gt;Makes any program or orders launched in the next six months &lt;del&gt;perpetually renewable after the six month &quot;sunset&quot; of the new powers&lt;/del&gt; last for a year after being authorized &lt;/li&gt;&lt;br /&gt;      &lt;br /&gt;      &lt;li&gt;Grandfathers in the the current secret surveillance program -- sometimes referred to as the Terrorist Surveillance Program -- and any others that have been blessed by the Foreign Intelligence Surveillance Court.&lt;/li&gt;&lt;br /&gt;      &lt;br /&gt;      &lt;li&gt;Requires the Attorney General to submit to the secret surveillance court its reasons why these programs aren&#39;t considered domestic spying programs, but the court can only throw out those reasons if it finds that they are &quot;clearly erroneous.&quot;&lt;/li&gt;&lt;br /&gt;      &lt;br /&gt;      &lt;li&gt;Requires the Attorney General to tell Congress twice a year about any incidents of surveillance abuse and give statistics about how many surveillance programs were started and how many directives were issued.&lt;/li&gt;&lt;br /&gt;      &lt;br /&gt;      &lt;li&gt;Makes no mention of the Inspector General, who uncovered abuses of the Patriot Act by the FBI after being ordered by Congress to audit the use of powerful self-issued subpoenas, is not mentioned in the bill.&lt;/li&gt;&lt;br /&gt;    &lt;/ul&gt;&lt;br /&gt;    &lt;p&gt;In short, the law gives the Administration the power to order the nation&#39;s communication service providers -- which range from Gmail, AOL IM, Twitter, Skype, traditional phone companies, ISPs, internet backbone providers, Federal Express, and social networks -- to create &lt;em&gt;possibly&lt;/em&gt; permanent &lt;a href=&quot;http://www.wired.com/science/discoveries/news/2006/05/70910&quot; linkindex=&quot;43&quot; set=&quot;yes&quot;&gt;spying outposts&lt;/a&gt;  for the federal government. &lt;/p&gt;&lt;br /&gt;    &lt;p&gt;These outposts need only to have a &quot;significant&quot; purpose of spying on foreigners, would be nearly immune to challenge by lawsuit, and have no court supervision over their extent or implementation.&lt;/p&gt;&lt;br /&gt;    &lt;p&gt;Abuses of the outposts will be monitored only by the Justice Department, which has already been found to have underreported abuses of other surveillance powers to Congress.&lt;/p&gt;&lt;br /&gt;    &lt;p&gt;In related international news, Zimbabwe&#39;s repressive dictator Robert Mugabe also won passage of a law allowing the government to &lt;a href=&quot;http://www.boingboing.net/2007/08/05/zimbabwe_mugabe_enac.html&quot; linkindex=&quot;45&quot;&gt;turn&lt;/a&gt; that nation&#39;s communication infrastructure into a gigantic, secret microphone.&lt;/p&gt;&lt;br /&gt;    &lt;p&gt;UPDATE: This analysis originally said that the orders entered under the new rules could be renewed indefinitely.  That is not accurate.  I conflated the ability of the government to continue indefinitely the programs under way under FISA before the law was signed, with the section that says that the programs under the new law go for a full year, despite the 6 month sunset.&lt;/p&gt;&lt;br /&gt;    &lt;p&gt;That said, if a future bill includes the same grandfather clause that this bill has, the spying outposts could easily permanent.&lt;/p&gt;&lt;br /&gt;    &lt;p&gt;Those interested in seeing how I made this mistake, look at Section 6 of the &lt;a href=&quot;http://frwebgate.access.gpo.gov/cgi-bin/getdoc.cgi?dbname=110_cong_bills&amp;docid=f:s1927es.txt&quot; linkindex=&quot;46&quot;&gt;bill&lt;/a&gt;.  I regret the error.&lt;/p&gt;&lt;br /&gt;    &lt;p&gt;UPDATE 2: James Risen, the New York Times reporter who broke the story of the warrantless wiretapping program, has an analysis piece &lt;a href=&quot;http://sfgate.com/cgi-bin/article.cgi?file=/c/a/2007/08/06/MNI6RDFMQ1.DTL&amp;tsp=1&quot; linkindex=&quot;47&quot;&gt;here&lt;/a&gt;.&lt;/p&gt;&lt;br /&gt;    &lt;p&gt;&lt;strong&gt;See Also:&lt;/strong&gt; &lt;/p&gt;&lt;br /&gt;    &lt;ul&gt;&lt;br /&gt;      &lt;li&gt;&lt;a href=&quot;http://blog.wired.com/27bstroke6/2007/08/more-known-unkn.html&quot; linkindex=&quot;48&quot; set=&quot;yes&quot;&gt;More Known Unknowns in NSA Spy Controversy: Secret Appeals Courts, Tea Leaves and the Mineshaft Gap&lt;/a&gt;&lt;/li&gt;&lt;br /&gt;      &lt;br /&gt;      &lt;li&gt;&lt;a href=&quot;http://blog.wired.com/27bstroke6/2007/08/bush-administra.html&quot; linkindex=&quot;49&quot; set=&quot;yes&quot;&gt;Bush Administration Reportedly Rejects NSA Spying Compromise Bill&lt;/a&gt;&lt;/li&gt;&lt;br /&gt;      &lt;br /&gt;      &lt;li&gt;&lt;a href=&quot;http://blog.wired.com/27bstroke6/2007/07/democrats-halt-.html&quot; linkindex=&quot;50&quot;&gt;Democrats Halt Move to Revamp Spying Laws&lt;/a&gt;&lt;/li&gt;&lt;br /&gt;      &lt;br /&gt;      &lt;li&gt;&lt;a href=&quot;http://www.slate.com/id/2171747/nav/tap2/&quot; linkindex=&quot;51&quot;&gt;Patrick Radden Keefe&#39;s &lt;cite&gt;Slate&lt;/cite&gt;&lt;/a&gt; piece Wiretap at Will&lt;/li&gt;&lt;br /&gt;    &lt;/ul&gt;&lt;br /&gt;    &lt;p&gt;Photo: Room 641A at AT&amp;T&#39;s internet switching facility in San Francisco. Former AT&amp;amp;T technician Mark Klein &lt;a href=&quot;http://www.wired.com/science/discoveries/news/2006/05/70910&quot; linkindex=&quot;52&quot;&gt;says&lt;/a&gt; the room is a secret internet spying outpost for the government.&lt;/p&gt;&lt;br /&gt;  &lt;/div&gt;&lt;br /&gt;&lt;/div&gt;</description><link>http://armchairdectective.blogspot.com/2007/08/threat-level-wired-blogs.html</link><author>noreply@blogger.com (coma12)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3320206899382134956.post-1686827337599460132</guid><pubDate>Tue, 07 Aug 2007 04:25:00 +0000</pubDate><atom:updated>2007-08-07T00:25:08.351-04:00</atom:updated><title>ISSUES - Where Presidental Candidates Stand</title><description>&lt;div &gt;  &lt;/div&gt;&lt;table cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; style=&quot;margin: 12px 0px; font-family: arial; color: #333333; background: #ffffff; border: solid 4px #e5e5e5; width: 100%; clear: left;&quot;&gt;&lt;tr&gt;&lt;td valign=&quot;top&quot;&gt;&lt;!-- BEGIN_CLIP_CONTENT ID:0C21F612-BDFC-4EBE-A0F3-91A7A74AD5F1:0 CLIPMARKS.COM --&gt;&lt;div class=&quot;CM_CTB_Content_Wrap&quot; style=&quot;margin: 0px; padding: 0px;background-color: #ffffff;&quot;&gt;&lt;div style=&quot;border-bottom: solid 1px #dcdcdc; white-space: nowrap; margin-bottom: 8px; background-color: #eeeeee ;background-image: url(http://clipmarks.com/images/source-bg.gif); background-repeat: repeat-x; height: 24px; line-height: 24px; vertical-align: middle; padding-bottom: 4px; color: #666666; font-size: 10px;&quot; &gt;&lt;a href=&quot;http://clipmarks.com/clip-to-blog/&quot; title=&quot;clipmarks&#39; clip-to-blog&quot;&gt;&lt;img src=&quot;http://content.clipmarks.com/blog_icon/fcfa6a0a-81f5-4a58-9e3e-6402b2f8a4c4/0C21F612-BDFC-4EBE-A0F3-91A7A74AD5F1/&quot; alt=&quot;&quot; width=&quot;19&quot; height=&quot;19&quot; border=&quot;0&quot; style=&quot;vertical-align: middle; margin: 0px 4px; display: inline; border: none; float:none;&quot; /&gt;&lt;/a&gt;clipped from &lt;a title=&quot;http://flickr.com/photo_zoom.gne?id=868063604&amp;size=o&quot; href=&quot;http://flickr.com/photo_zoom.gne?id=868063604&amp;size=o&quot; style=&quot;font-size: 11px;&quot;&gt;flickr.com&lt;/a&gt;&lt;/div&gt;&lt;blockquote style=&quot;text-align: left; padding: 0px 8px; margin: 4px 0px 8px 0px; background: transparent; border: none;&quot; cite=&quot;http://flickr.com/photo_zoom.gne?id=868063604&amp;size=o&quot;&gt;&lt;div align=&quot;center&quot;&gt;&lt;img src=&quot;http://content1.clipmarks.com/blog_cache/flickr.com/img/205525B0-4F28-4826-A32B-D21CBD45CACF&quot; alt=&quot;&quot; /&gt;&lt;/div&gt;&lt;/blockquote&gt;&lt;/div&gt;&lt;div style=&quot;margin: 0px 6px 6px 4px;&quot;&gt;&lt;table style=&quot;font-size: 11px;border-spacing: 0px;padding: 0px;&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; width=&quot;100%&quot;&gt;&lt;tr&gt;&lt;td style=&quot;background:transparent;border-width:0px;padding:0px;&quot;&gt;&amp;nbsp;&lt;/td&gt;&lt;td align=&quot;right&quot; style=&quot;background:transparent;border-width:0px;padding:0px;width:107px&quot; width=&quot;107&quot;&gt;&lt;a href=&quot;http://clipmarks.com/share/0C21F612-BDFC-4EBE-A0F3-91A7A74AD5F1/blog/&quot; title=&quot;blog or email this clip&quot;&gt;&lt;img src=&quot;http://content2.clipmarks.com/images/c2b-foot.png&quot; border=&quot;0&quot; alt=&quot;blog it&quot; width=&quot;107&quot; height=&quot;17&quot; style=&quot;border-width:0px;padding:0px;margin:0px;&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;&lt;/div&gt;&lt;!-- END_CLIP_CONTENT --&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;  </description><link>http://armchairdectective.blogspot.com/2007/08/issues-where-presidental-candidates.html</link><author>noreply@blogger.com (coma12)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3320206899382134956.post-7729699467793403998</guid><pubDate>Mon, 30 Jul 2007 14:10:00 +0000</pubDate><atom:updated>2007-07-30T10:10:12.696-04:00</atom:updated><title></title><description>&lt;img src=&quot;http://i.cmpnet.com/infoweek/new/informationweek_logo-LD.gif&quot; alt=&quot;InformationWeek&quot; border=&quot;0&quot; height=&quot;58&quot; width=&quot;237&quot; /&gt;&lt;br /&gt;&lt;p&gt;&lt;span style=&quot;font-size:180%;&quot;&gt;At Procter &amp; Gamble, The Good And Bad Of Web 2.0 Tools&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;It once bet its collaboration strategy on Microsoft tools. It&#39;s expanded to consider more Web 2.0 tools, but getting them implemented and used is far from easy.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-family:geneva,arial,helvetica;font-size:85%;&quot;&gt;By&lt;br /&gt;J. Nicholas&lt;br /&gt;Hoover,&lt;br /&gt;&lt;!-- remove http:// substring (if present) from the url --&gt;&lt;a href=&quot;http://www.informationweek.com/;jsessionid=V1WMG5RJWPUN0QSNDLOSKHSCJUNN2JVN&quot; target=&quot;_blank&quot;&gt;InformationWeek&lt;br /&gt;&lt;/a&gt;&lt;br /&gt;June 23, 2007&lt;br /&gt;&lt;br /&gt;URL:&lt;a href=&quot;http://www.blogger.com/story/showArticle.jhtml?articleID=200000229&quot;&gt;http://www.informationweek.com/story/showArticle.jhtml?articleID=200000229&lt;br /&gt;&lt;/a&gt;&lt;br /&gt;&lt;/span&gt;Ever since A.G. Lafley be-came CEO of Procter &amp; Gamble in 2000, he has pushed employees to improve how they collaborate with one another and with partners in order to develop new products faster. With a supportive CEO and today&#39;s myriad Web 2.0 options, what possible problems could face Joe Schueller, who&#39;s driving P&amp;amp;G&#39;s adoption of new collaboration tools?&lt;/p&gt;How about e-mail, which Schueller describes as the biggest barrier to employee use of more interactive and effective tools. &quot;As a sender of an e-mail, I control the agenda of everyone around me,&quot; Schueller says. E-mailers decide who has permission to read a message, and the Reply To All button ensures that &lt;a href=&quot;http://www.techweb.com/encyclopedia/defineterm.jhtml?term=peripheral&amp;amp;x=&amp;y=&quot;&gt;peripheral&lt;/a&gt; participants will be prompted long after they have lost all interest. Blogs, in contrast, beg for comments from those most interested. Schueller also faces the harrumphing of employees who see anything other than &lt;a href=&quot;http://www.techweb.com/encyclopedia/defineterm.jhtml?term=e-mail&amp;amp;amp;x=&amp;y=&quot;&gt;e-mail&lt;/a&gt; as an addition to their workloads. &quot;We consistently hear that information posted to the &lt;a href=&quot;http://www.techweb.com/encyclopedia/defineterm.jhtml?term=intranet&amp;amp;amp;x=&amp;y=&quot;&gt;intranet&lt;/a&gt; is incremental work,&quot; he says.&lt;br /&gt;&lt;br /&gt;&lt;p&gt;&lt;table align=&quot;left&quot; border=&quot;0&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; width=&quot;185&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td width=&quot;175&quot;&gt;&lt;img src=&quot;http://i.cmpnet.com/infoweek/1144/144NAJoe-Schueller1retouch.jpg&quot; alt=&quot;Schueller&#39;s got an e-mail problem -- Photo by Alex Dunne&quot; border=&quot;0&quot; height=&quot;175&quot; hspace=&quot;0&quot; vspace=&quot;0&quot; width=&quot;175&quot; /&gt;&lt;/td&gt;&lt;td rowspan=&quot;3&quot; width=&quot;10&quot;&gt;&lt;img src=&quot;http://i.cmpnet.com/infoweek/spacer.gif&quot; border=&quot;0&quot; height=&quot;5&quot; hspace=&quot;0&quot; vspace=&quot;0&quot; width=&quot;10&quot; /&gt;&lt;br /&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class=&quot;artCaption&quot; align=&quot;center&quot; width=&quot;175&quot;&gt;&lt;img src=&quot;http://i.cmpnet.com/infoweek/spacer.gif&quot; border=&quot;0&quot; height=&quot;4&quot; hspace=&quot;0&quot; vspace=&quot;0&quot; width=&quot;175&quot; /&gt;&lt;br /&gt;Schueller&#39;s got an e-mail problem&lt;br /&gt;&lt;img src=&quot;http://i.cmpnet.com/infoweek/spacer.gif&quot; border=&quot;0&quot; height=&quot;5&quot; hspace=&quot;0&quot; vspace=&quot;0&quot; width=&quot;10&quot; /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:78%;&quot;&gt;Photo by Alex Dunne&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td width=&quot;175&quot;&gt;&lt;img src=&quot;http://i.cmpnet.com/infoweek/spacer.gif&quot; border=&quot;0&quot; height=&quot;7&quot; hspace=&quot;0&quot; vspace=&quot;0&quot; width=&quot;175&quot; /&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;Business technology execs at last week&#39;s Enterprise 2.0 conference in Boston are past the new concept stage; they&#39;re looking to put practical technology in place. &quot;A year ago, I met with a group of Fortune 25 CEOs who didn&#39;t know anything about wikis. Now they ask me how these tools can integrate with their existing content management systems,&quot; says Kim Polese, CEO of &lt;a href=&quot;http://www.techweb.com/encyclopedia/defineterm.jhtml?term=open%20source&amp;amp;x=&amp;y=&quot;&gt;open source&lt;/a&gt; systems integrator SpikeSource, which is selling a suite of Web 2.0 tools that includes Movable Type blogs and Socialtext wikis.&lt;/p&gt;P&amp;amp;G provides a study of how Enterprise 2.0 will take shape given the scope of its project and the way it draws on tools from startups as well as big-name vendors. In 2005, P&amp;G laid plans for a Microsoft-centric collaboration initiative, with instant messaging, unified communications, and presence using Live &lt;a href=&quot;http://www.techweb.com/encyclopedia/defineterm.jhtml?term=Communications&amp;amp;amp;x=&amp;y=&quot;&gt;Communications&lt;/a&gt; Server; Web conferencing with Live Meeting; and content management and collaboration via SharePoint. About 80,000 employees use Microsoft IM, and 20,000 have moved to Outlook. P&amp;G has a few SharePoint sites running, and the major rollout begins in August.&lt;br /&gt;&lt;br /&gt;For the past year, Schueller has been leading an Enterprise 2.0 effort with the backing of CIO Filippo Passerini that aims to bring employees a more diverse toolset. The company has brought on Movable Type &lt;a href=&quot;http://www.techweb.com/encyclopedia/defineterm.jhtml?term=blogging&amp;amp;amp;x=&amp;y=&quot;&gt;blogging&lt;/a&gt; software, which employees have used to create hundreds of blogs, including ones by the VP of design (inspired by a &lt;a href=&quot;http://www.techweb.com/encyclopedia/defineterm.jhtml?term=blog&amp;amp;amp;x=&amp;y=&quot;&gt;blog&lt;/a&gt; by General Motors design guru Bob Lutz); by the public relations department on how to discuss company issues externally; and by Schueller, read mostly by IT folks. In the next few months, P&amp;G will launch social &lt;a href=&quot;http://www.techweb.com/encyclopedia/defineterm.jhtml?term=networking&amp;amp;amp;x=&amp;y=&quot;&gt;networking&lt;/a&gt; intended to make it easier to find people with needed expertise.&lt;br /&gt;&lt;p&gt;Even as Microsoft and IBM keep expanding their Web 2.0-style collaboration capabilities--with social networking tools like Lotus&#39; Connections and Microsoft SharePoint &lt;a href=&quot;http://www.techweb.com/encyclopedia/defineterm.jhtml?term=Server&amp;amp;amp;x=&amp;y=&quot;&gt;Server&lt;/a&gt; 2007&#39;s support for blogs, wikis, and calendar sharing--many companies are concluding that one &lt;a href=&quot;http://www.techweb.com/encyclopedia/defineterm.jhtml?term=platform&amp;amp;amp;x=&amp;y=&quot;&gt;platform&lt;/a&gt; won&#39;t be enough.&lt;/p&gt;&quot;If I do everything in Microsoft, what does that do to your modularity, to flexibility?&quot; says Schueller, whose title is innovation manager in P&amp;amp;G&#39;s Global Business Services. &quot;I wouldn&#39;t generalize that just to Microsoft. It&#39;s all the big vendors.&quot; IT also needs to learn how to incorporate tools employees bring in themselves, he says.&lt;br /&gt;&lt;b&gt;Beyond &lt;a href=&quot;http://www.techweb.com/encyclopedia/defineterm.jhtml?term=Google&amp;amp;x=&amp;y=&quot;&gt;Google&lt;/a&gt; And Microsoft&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;In enterprise search, P&amp;amp;G is looking beyond its main vendor, too. It uses Google&#39;s &lt;a href=&quot;http://www.techweb.com/encyclopedia/defineterm.jhtml?term=search&amp;amp;x=&amp;y=&quot;&gt;search&lt;/a&gt; appliance, but Schueller has found that the concept behind page rank--relevance based on links--doesn&#39;t always work in business, because information inside the company isn&#39;t always linked. Plus, he&#39;s concerned that Google&#39;s reliance on keywords doesn&#39;t leave enough room for fuzzy ideas that aren&#39;t captured well in one or two words.&lt;p&gt;&lt;/p&gt;So the company&#39;s testing a product from Connectbeam that works with Google. Connectbeam lets employees share bookmarks and &lt;a href=&quot;http://www.techweb.com/encyclopedia/defineterm.jhtml?term=tag&amp;amp;amp;x=&amp;y=&quot;&gt;tag&lt;/a&gt; articles, pages, and documents with descriptive words. When an employee searches for something using the Google appliance, Connectbeam results--related tags and bookmarks--are returned alongside the Google results.&lt;br /&gt;&lt;br /&gt;P&amp;amp;G also is revamping its BEA Systems-based Web portal, adding &lt;a href=&quot;http://www.techweb.com/encyclopedia/defineterm.jhtml?term=RSS&amp;amp;x=&amp;y=&quot;&gt;RSS&lt;/a&gt; feeds of news and business information to let people personalize the portal. Over time, the company expects to suggest feeds for employees based on their roles and the Web sites they frequent.&lt;br /&gt;&lt;p&gt;But how does Schueller get anyone to use these tools, if they&#39;re seen as extra work?&lt;/p&gt;One way is to look at how people do something today and offer a tool that fits the same process in a slightly simpler way. He offers an example of a P&amp;amp;G executive who, every time he traveled to meet with one regional manager, would put the takeaways into PowerPoint and e-mail them to the others. Instead, IT created a page in Microsoft SharePoint where the exec could post his presentations, and where they could be saved in a more efficient data store than every person&#39;s in-box.&lt;br /&gt;&lt;p&gt;CIO Passerini&#39;s strategy for assessing whether Web 2.0 tools make sense for P&amp;G has been to &quot;do this to us first,&quot; says Schueller--to let IT teams experiment with technologies and assign a different IT manager to each &lt;a href=&quot;http://www.techweb.com/encyclopedia/defineterm.jhtml?term=Web%202.0&amp;amp;amp;x=&amp;y=&quot;&gt;Web 2.0&lt;/a&gt; product area. The IT team sees this as an opportunity to make a difference in a company where brand managers, not technologists, are the rock stars. &quot;IT, particularly in a &lt;a href=&quot;http://www.techweb.com/encyclopedia/defineterm.jhtml?term=soap&amp;amp;amp;x=&amp;y=&quot;&gt;soap&lt;/a&gt; company, is in the back room pedaling,&quot; says Schueller. &quot;This is our chance to champion something.&quot;&lt;/p&gt;IT departments at other companies also see this Enterprise 2.0 moment as a chance to shine. Among hundreds of organizations represented at last week&#39;s conference were Bank of America, Boeing, the Central Intelligence Agency, FedEx, Morgan Stanley, and Pfizer.&lt;br /&gt;&lt;p&gt;Motorola is one of the biggest adopters of Web collaboration tools, with 4,400 blogs, 4,200 &lt;a href=&quot;http://www.techweb.com/encyclopedia/defineterm.jhtml?term=wiki&amp;amp;amp;x=&amp;y=&quot;&gt;wiki&lt;/a&gt; pages, and 2,600 people actively doing content tagging and social bookmarking using Scuttle software, with more accessing the system. Under an initiative called Intranet 2.0, the tools are used mostly for research and information sharing--so instead of salespeople developing a whole new pitch for every client, they can reuse pieces of pitches posted on a wiki. Motorola employees also can more easily find people with experience in specific areas using &lt;a href=&quot;http://www.techweb.com/encyclopedia/defineterm.jhtml?term=social%20networking&amp;amp;amp;x=&amp;y=&quot;&gt;social networking&lt;/a&gt; &lt;a href=&quot;http://www.techweb.com/encyclopedia/defineterm.jhtml?term=software&amp;amp;amp;x=&amp;amp;y=&quot;&gt;software&lt;/a&gt; from Visible Path or checking author pages on wikis. &quot;It actually lets people see new relationships--to see maps of what smart people and like people have done,&quot; says Toby Redshaw, Motorola&#39;s VP in charge of Enterprise 2.0 technologies. The result is that the company is building knowledge centers around particular problems and products.&lt;/p&gt;That&#39;s the end goal for Schueller--that employees and partners searching for information on the intranet, creating profiles, tagging documents, and sharing bookmarks make the content more valuable. Call it social software or user-generated content, the risk is that if people don&#39;t find the tool useful out of the gate, they won&#39;t contribute the content that builds this virtuous cycle. IT teams have a critical opportunity to make it worth people&#39;s while. As one IT exec at the conference put it, &quot;If they come, they will build it.&quot;</description><link>http://armchairdectective.blogspot.com/2007/07/at-procter-gamble-good-and-bad-of-web-2.html</link><author>noreply@blogger.com (coma12)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3320206899382134956.post-7641932586235740734</guid><pubDate>Sun, 29 Jul 2007 18:04:00 +0000</pubDate><atom:updated>2007-07-29T14:04:59.114-04:00</atom:updated><title>SECURITY - Iron Key Flash Drive</title><description>&lt;div &gt;  &lt;/div&gt;&lt;table cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; style=&quot;margin: 12px 0px; font-family: arial; color: #333333; background: #ffffff; border: solid 4px #e5e5e5; width: 100%; clear: left;&quot;&gt;&lt;tr&gt;&lt;td valign=&quot;top&quot;&gt;&lt;!-- BEGIN_CLIP_CONTENT ID:49D1414A-7780-4C45-8621-0711DD7EA593:0 CLIPMARKS.COM --&gt;&lt;div class=&quot;CM_CTB_Content_Wrap&quot; style=&quot;margin: 0px; padding: 0px;background-color: #ffffff;&quot;&gt;&lt;div style=&quot;border-bottom: solid 1px #dcdcdc; white-space: nowrap; margin-bottom: 8px; background-color: #eeeeee ;background-image: url(http://clipmarks.com/images/source-bg.gif); background-repeat: repeat-x; height: 24px; line-height: 24px; vertical-align: middle; padding-bottom: 4px; color: #666666; font-size: 10px;&quot; &gt;&lt;a href=&quot;http://clipmarks.com/clip-to-blog/&quot; title=&quot;clipmarks&#39; clip-to-blog&quot;&gt;&lt;img src=&quot;http://content.clipmarks.com/blog_icon/12190304-85d9-4566-81f0-1c47f64686dd/49D1414A-7780-4C45-8621-0711DD7EA593/&quot; alt=&quot;&quot; width=&quot;19&quot; height=&quot;19&quot; border=&quot;0&quot; style=&quot;vertical-align: middle; margin: 0px 4px; display: inline; border: none; float:none;&quot; /&gt;&lt;/a&gt;clipped from &lt;a title=&quot;http://gizmodo.com/index.php?refId=283110&quot; href=&quot;http://gizmodo.com/index.php?refId=283110&quot; style=&quot;font-size: 11px;&quot;&gt;gizmodo.com&lt;/a&gt;&lt;/div&gt;&lt;blockquote style=&quot;text-align: left; padding: 0px 8px; margin: 4px 0px 8px 0px; background: transparent; border: none;&quot; cite=&quot;http://gizmodo.com/index.php?refId=283110&quot;&gt;&lt;DIV id=&quot;id_283056_1185498720&quot; class=&quot;post&quot;&gt;&lt;br /&gt;&lt;A href=&quot;http://gizmodo.com/gadgets/safety-in-a-stick/&quot; class=&quot;topTag&quot; linkindex=&quot;160&quot;&gt;safety in a stick&lt;/A&gt;&lt;br /&gt;    	&lt;H2&gt;&lt;A href=&quot;http://gizmodo.com/gadgets/safety-in-a-stick/secure-ironkey-flash-drive-will-self+destruct-in-321-283056.php&quot; linkindex=&quot;161&quot;&gt;Secure IronKey Flash Drive Will Self-Destruct in 3...2...1...&lt;/A&gt;&lt;/H2&gt;&lt;br /&gt;&lt;DIV class=&quot;post-excerpt&quot;&gt;&lt;br /&gt;&lt;A title=&quot;Secure IronKey Flash Drive Will Self-Destruct in 3...2...1...&quot; href=&quot;http://gizmodo.com/gadgets/safety-in-a-stick/secure-ironkey-flash-drive-will-self+destruct-in-321-283056.php&quot; linkindex=&quot;162&quot; set=&quot;yes&quot;&gt;&lt;br /&gt;					&lt;IMG width=&quot;478&quot; height=&quot;251&quot; alt=&quot;ironkey1.jpg&quot; src=&quot;http://cache.gawker.com/assets/images/4/2007/07/medium_ironkey1.jpg&quot; class=&quot;center&quot; /&gt;&lt;br /&gt;				&lt;/A&gt;&lt;br /&gt;Designed to be the world&#39;s most secure &lt;A href=&quot;http://gizmodo.com/gadgets/flash/&quot; title=&quot;Posts tagged as flash&quot; class=&quot;tagautolink&quot; linkindex=&quot;163&quot;&gt;flash&lt;/A&gt; drive, the &lt;A href=&quot;http://gizmodo.com/gadgets/ironkey/&quot; title=&quot;Posts tagged as ironkey&quot; class=&quot;tagautolink&quot; linkindex=&quot;164&quot;&gt;IronKey&lt;/A&gt; employs military-grade AES hardware-based &lt;A href=&quot;http://gizmodo.com/gadgets/encryption/&quot; title=&quot;Posts tagged as encryption&quot; class=&quot;tagautolink&quot; linkindex=&quot;165&quot;&gt;encryption&lt;/A&gt; using its IronKey Cryptochip. The encryption keys are stored on the drive itself and your password is required in conjunction with the keys to access and decrypt files. If you forget your password, you may be in trouble; after ten consecutive failed password attempts, the IronKey self-destructs (internally) and erases everything on the drive using &quot;flash-trash&quot; technology that physically overwrites every byte, making the data completely unrecoverable. &lt;br /&gt;&lt;A class=&quot;Continued&quot; title=&quot;Secure IronKey Flash Drive Will Self-Destruct in 3...2...1...&quot; href=&quot;http://gizmodo.com/gadgets/safety-in-a-stick/secure-ironkey-flash-drive-will-self+destruct-in-321-283056.php&quot; linkindex=&quot;166&quot; set=&quot;yes&quot;&gt;more &lt;SPAN&gt;»&lt;/SPAN&gt;&lt;/A&gt;&lt;br /&gt;				&lt;P&gt;&lt;/p&gt; &lt;/DIV&gt;&lt;br /&gt;&lt;DIV class=&quot;post-tools&quot;&gt;&lt;br /&gt;&lt;P&gt;&lt;A href=&quot;http://gizmodo.com/gadgets/safety-in-a-stick/secure-ironkey-flash-drive-will-self+destruct-in-321-283056.php&quot; linkindex=&quot;167&quot; set=&quot;yes&quot;&gt;9:12 PM&lt;/A&gt; ON THU JUL 26 2007&lt;br /&gt;BY KARSON THOMPSON&lt;br /&gt;9,449 views,		&lt;br /&gt;								 			&lt;A href=&quot;http://gizmodo.com/gadgets/safety-in-a-stick/secure-ironkey-flash-drive-will-self+destruct-in-321-283056.php&quot; linkindex=&quot;168&quot;&gt;19 comments&lt;/A&gt;&lt;br /&gt;&lt;/p&gt; &lt;P&gt;&lt;br /&gt;			Latest by &lt;A href=&quot;http://gizmodo.com/commenter/VLadX&quot; linkindex=&quot;169&quot;&gt;VladX&lt;/A&gt;: &lt;br /&gt;@PRELUDE&lt;br /&gt;No need for thermite really, just equip it with a Sony lithium battery and enjoy the ensuing fireworks.... &lt;A href=&quot;http://gizmodo.com/gadgets/safety-in-a-stick/secure-ironkey-flash-drive-will-self+destruct-in-321-283056.php&quot; linkindex=&quot;170&quot;&gt;more&lt;/A&gt;&lt;br /&gt;		&lt;/p&gt; &lt;/DIV&gt;&lt;br /&gt;&lt;/DIV&gt;&lt;/blockquote&gt;&lt;/div&gt;&lt;div style=&quot;margin: 0px 6px 6px 4px;&quot;&gt;&lt;table style=&quot;font-size: 11px;border-spacing: 0px;padding: 0px;&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; width=&quot;100%&quot;&gt;&lt;tr&gt;&lt;td style=&quot;background:transparent;border-width:0px;padding:0px;&quot;&gt;&amp;nbsp;&lt;/td&gt;&lt;td align=&quot;right&quot; style=&quot;background:transparent;border-width:0px;padding:0px;width:107px&quot; width=&quot;107&quot;&gt;&lt;a href=&quot;http://clipmarks.com/share/49D1414A-7780-4C45-8621-0711DD7EA593/blog/&quot; title=&quot;blog or email this clip&quot;&gt;&lt;img src=&quot;http://content1.clipmarks.com/images/c2b-foot.png&quot; border=&quot;0&quot; alt=&quot;blog it&quot; width=&quot;107&quot; height=&quot;17&quot; style=&quot;border-width:0px;padding:0px;margin:0px;&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;&lt;/div&gt;&lt;!-- END_CLIP_CONTENT --&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;  </description><link>http://armchairdectective.blogspot.com/2007/07/security-iron-key-flash-drive.html</link><author>noreply@blogger.com (coma12)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3320206899382134956.post-4965596007771803967</guid><pubDate>Sat, 28 Jul 2007 07:31:00 +0000</pubDate><atom:updated>2007-07-28T03:31:28.568-04:00</atom:updated><title>HILARIOUS - Michel Gondry Solves a Rubiks Cube with his Nose</title><description>&lt;div xmlns=&#39;http://www.w3.org/1999/xhtml&#39;&gt;&lt;p&gt;&lt;object height=&#39;350&#39; width=&#39;425&#39;&gt;&lt;param value=&#39;http://youtube.com/v/pB8XedMowDU&#39; name=&#39;movie&#39;/&gt;&lt;embed height=&#39;350&#39; width=&#39;425&#39; type=&#39;application/x-shockwave-flash&#39; src=&#39;http://youtube.com/v/pB8XedMowDU&#39;/&gt;&lt;/object&gt;&lt;/p&gt;&lt;/div&gt;</description><link>http://armchairdectective.blogspot.com/2007/07/hilarious-michel-gondry-solves-rubiks.html</link><author>noreply@blogger.com (coma12)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3320206899382134956.post-1477953506100963988</guid><pubDate>Sat, 28 Jul 2007 06:03:00 +0000</pubDate><atom:updated>2007-07-28T02:03:32.547-04:00</atom:updated><title>PANO - Autostitch™ :: a new dimension in automatic image stitching</title><description>&lt;div &gt;  &lt;/div&gt;&lt;table cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; style=&quot;margin: 12px 0px; font-family: arial; color: #333333; background: #ffffff; border: solid 4px #e5e5e5; width: 100%; clear: left;&quot;&gt;&lt;tr&gt;&lt;td valign=&quot;top&quot;&gt;&lt;!-- BEGIN_CLIP_CONTENT ID:C92A39C6-DD96-49B8-B619-5C5EBF47236E:0 CLIPMARKS.COM --&gt;&lt;div class=&quot;CM_CTB_Content_Wrap&quot; style=&quot;margin: 0px; padding: 0px;background-color: #ffffff;&quot;&gt;&lt;div style=&quot;border-bottom: solid 1px #dcdcdc; white-space: nowrap; margin-bottom: 8px; background-color: #eeeeee ;background-image: url(http://clipmarks.com/images/source-bg.gif); background-repeat: repeat-x; height: 24px; line-height: 24px; vertical-align: middle; padding-bottom: 4px; color: #666666; font-size: 10px;&quot; &gt;&lt;a href=&quot;http://clipmarks.com/clip-to-blog/&quot; title=&quot;clipmarks&#39; clip-to-blog&quot;&gt;&lt;img src=&quot;http://content.clipmarks.com/blog_icon/7dc2aef7-91af-4d9e-8eb2-4ad8ecac3e80/C92A39C6-DD96-49B8-B619-5C5EBF47236E/&quot; alt=&quot;&quot; width=&quot;19&quot; height=&quot;19&quot; border=&quot;0&quot; style=&quot;vertical-align: middle; margin: 0px 4px; display: inline; border: none; float:none;&quot; /&gt;&lt;/a&gt;clipped from &lt;a title=&quot;http://www.cs.ubc.ca/~mbrown/autostitch/autostitch.html&quot; href=&quot;http://www.cs.ubc.ca/~mbrown/autostitch/autostitch.html&quot; style=&quot;font-size: 11px;&quot;&gt;www.cs.ubc.ca&lt;/a&gt;&lt;/div&gt;&lt;blockquote style=&quot;text-align: left; padding: 0px 8px; margin: 4px 0px 8px 0px; background: transparent; border: none;&quot; cite=&quot;http://www.cs.ubc.ca/~mbrown/autostitch/autostitch.html&quot;&gt;&lt;div align=&quot;center&quot;&gt;&lt;img src=&quot;http://content3.clipmarks.com/blog_cache/www.cs.ubc.ca/img/673FD99D-0FB2-44B6-B81F-2417D50190E0&quot; alt=&quot;&quot; /&gt;&lt;/div&gt;&lt;/blockquote&gt;&lt;div style=&quot;height: 2px; font-size: 2px; background: #dcdcdc; border-bottom: solid 1px #f5f5f5; margin: 2px 4px;&quot;&gt;&lt;/div&gt;&lt;blockquote style=&quot;text-align: left; padding: 0px 8px; margin: 4px 0px 8px 0px; background: transparent; border: none;&quot; cite=&quot;http://www.cs.ubc.ca/~mbrown/autostitch/autostitch.html&quot;&gt;&lt;table background=&quot;undefined&quot; bgcolor=&quot;&quot;&gt;&lt;tr&gt;&lt;TD width=&quot;36%&quot;&gt;&lt;DIV align=&quot;center&quot;&gt;&lt;IMG align=&quot;bottom&quot; src=&quot;http://www.cs.ubc.ca/~mbrown/autostitch/../all/font/65.gif&quot; /&gt;&lt;IMG align=&quot;bottom&quot; src=&quot;http://www.cs.ubc.ca/~mbrown/autostitch/../all/font/85.gif&quot; /&gt;&lt;IMG align=&quot;bottom&quot; src=&quot;http://www.cs.ubc.ca/~mbrown/autostitch/../all/font/84.gif&quot; /&gt;&lt;IMG align=&quot;bottom&quot; src=&quot;http://www.cs.ubc.ca/~mbrown/autostitch/../all/font/79.gif&quot; /&gt;&lt;IMG align=&quot;bottom&quot; src=&quot;http://www.cs.ubc.ca/~mbrown/autostitch/../all/font/83.gif&quot; /&gt;&lt;IMG align=&quot;bottom&quot; src=&quot;http://www.cs.ubc.ca/~mbrown/autostitch/../all/font/84.gif&quot; /&gt;&lt;IMG align=&quot;bottom&quot; src=&quot;http://www.cs.ubc.ca/~mbrown/autostitch/../all/font/73.gif&quot; /&gt;&lt;IMG align=&quot;bottom&quot; src=&quot;http://www.cs.ubc.ca/~mbrown/autostitch/../all/font/84.gif&quot; /&gt;&lt;IMG align=&quot;bottom&quot; src=&quot;http://www.cs.ubc.ca/~mbrown/autostitch/../all/font/67.gif&quot; /&gt;&lt;IMG align=&quot;bottom&quot; src=&quot;http://www.cs.ubc.ca/~mbrown/autostitch/../all/font/72.gif&quot; /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;/tr&gt;&lt;/table&gt;&lt;/blockquote&gt;&lt;div style=&quot;height: 2px; font-size: 2px; background: #dcdcdc; border-bottom: solid 1px #f5f5f5; margin: 2px 4px;&quot;&gt;&lt;/div&gt;&lt;blockquote style=&quot;text-align: left; padding: 0px 8px; margin: 4px 0px 8px 0px; background: transparent; border: none;&quot; cite=&quot;http://www.cs.ubc.ca/~mbrown/autostitch/autostitch.html&quot;&gt;&lt;DIV align=&quot;justify&quot;&gt;&lt;P&gt;&lt;DIV&gt;&lt;B&gt;Autostitch™&lt;/B&gt; is the world&#39;s first fully automatic 2D image stitcher. Capable of stitching full view panoramas &lt;I&gt;without any user input whatsoever&lt;/I&gt;, Autostitch is a breakthrough technology for panoramic photography, VR and visualisation applications. This is the first solution to stitch &lt;I&gt;any panorama&lt;/I&gt; completely automatically, whether 1D (horizontal) or 2D (horizontal and vertical).&lt;/DIV&gt;&lt;BR /&gt;&lt;/P&gt;&lt;DIV align=&quot;justify&quot;&gt;&lt;P&gt;&lt;DIV&gt;Autostitch is built using cutting edge research from the AI lab at UBC, but it&#39;s incredibly simple to use! Just select a set of photos, and Autostitch does the rest: digital photos in, panoramas out. Try the free demo (for Windows):&lt;/DIV&gt;&lt;BR /&gt;&lt;/P&gt;&lt;DIV align=&quot;justify&quot;&gt;&lt;P&gt;&lt;/P&gt;&lt;DIV align=&quot;center&quot;&gt;&lt;DIV&gt;&lt;B&gt;Download the &lt;A href=&quot;http://www.cs.ubc.ca/~mbrown/autostitch/autostitch.zip&quot; linkindex=&quot;14&quot;&gt;FREE demo version&lt;/A&gt; now!&lt;/B&gt; &lt;/DIV&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/blockquote&gt;&lt;/div&gt;&lt;div style=&quot;margin: 0px 6px 6px 4px;&quot;&gt;&lt;table style=&quot;font-size: 11px;border-spacing: 0px;padding: 0px;&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; width=&quot;100%&quot;&gt;&lt;tr&gt;&lt;td style=&quot;background:transparent;border-width:0px;padding:0px;&quot;&gt;&amp;nbsp;&lt;/td&gt;&lt;td align=&quot;right&quot; style=&quot;background:transparent;border-width:0px;padding:0px;width:107px&quot; width=&quot;107&quot;&gt;&lt;a href=&quot;http://clipmarks.com/share/C92A39C6-DD96-49B8-B619-5C5EBF47236E/blog/&quot; title=&quot;blog or email this clip&quot;&gt;&lt;img src=&quot;http://content4.clipmarks.com/images/c2b-foot.png&quot; border=&quot;0&quot; alt=&quot;blog it&quot; width=&quot;107&quot; height=&quot;17&quot; style=&quot;border-width:0px;padding:0px;margin:0px;&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;&lt;/div&gt;&lt;!-- END_CLIP_CONTENT --&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;  </description><link>http://armchairdectective.blogspot.com/2007/07/pano-autostitch-new-dimension-in.html</link><author>noreply@blogger.com (coma12)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3320206899382134956.post-1421860535531909202</guid><pubDate>Fri, 27 Jul 2007 05:43:00 +0000</pubDate><atom:updated>2007-07-27T01:43:10.949-04:00</atom:updated><title>OPEN SOURCE - hugin - Panorama photo stitcher</title><description>&lt;h1&gt;hugin - Panorama photo stitcher&lt;/h1&gt;&lt;p&gt;With hugin you can assemble a mosaic of photographs into a complete immersive panorama, stitch any series of overlapping pictures and much more.&lt;/p&gt;&lt;p&gt;&lt;img alt=&quot;screenshot&quot; src=&quot;http://hugin.sourceforge.net/screenshot-600.jpg&quot; /&gt;&lt;br /&gt;&lt;/p&gt;</description><link>http://armchairdectective.blogspot.com/2007/07/open-source-hugin-panorama-photo.html</link><author>noreply@blogger.com (coma12)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3320206899382134956.post-7588664940292498226</guid><pubDate>Thu, 26 Jul 2007 20:21:00 +0000</pubDate><atom:updated>2007-07-26T16:21:42.660-04:00</atom:updated><title>CRUCIAL INFO - USB Flash Drives Mobilized</title><description>&lt;span style=&quot;font-size:180%;&quot;&gt;USB Flash Drives Mobilized&lt;/span&gt;&lt;br /&gt;&lt;p&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;Five ways to load up these little devices with data and apps, and take your computing anywhere.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-family:geneva,arial,helvetica;font-size:85%;&quot;&gt;By&lt;br /&gt;Serdar Yegulalp, &lt;a href=&quot;http://www.informationweek.com/;jsessionid=KD3IDA4NDH2LUQSNDLOSKH0CJUNN2JVN&quot; target=&quot;_blank&quot;&gt;&lt;br /&gt;InformationWeek&lt;br /&gt;&lt;/a&gt;&lt;br /&gt;June 23, 2007&lt;br /&gt;&lt;br /&gt;URL:&lt;a href=&quot;http://www.blogger.com/story/showArticle.jhtml?articleID=199906066&quot;&gt;http://www.informationweek.com/story/showArticle.jhtml?articleID=199906066&lt;br /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;Now that &lt;a href=&quot;http://www.techweb.com/encyclopedia/defineterm.jhtml?term=floppy&amp;amp;x=&amp;y=&quot;&gt;floppy&lt;/a&gt; disks have been replaced by &lt;a href=&quot;http://www.techweb.com/encyclopedia/defineterm.jhtml?term=USB&amp;amp;amp;x=&amp;y=&quot;&gt;USB&lt;/a&gt; &lt;a href=&quot;http://www.techweb.com/encyclopedia/defineterm.jhtml?term=flash&amp;amp;amp;x=&amp;y=&quot;&gt;flash&lt;/a&gt; drives, it&#39;s time to think about those drives as more than just big floppies.&lt;/p&gt;For $25, you can pick up a 2-Gbyte USB flash drive, enough data to fill roughly four CD-ROMs. In addition to data, applications have become common on USB drives: Some companies sell &lt;a href=&quot;http://www.techweb.com/encyclopedia/defineterm.jhtml?term=Linux&amp;amp;amp;x=&amp;y=&quot;&gt;Linux&lt;/a&gt; distributions preloaded on them. With all that space and flexibility, it&#39;s possible for people to take both their data and apps with them.&lt;br /&gt;&lt;p&gt;But using them isn&#39;t always intuitive or easy. Here are some ways you can get your USB drive working more effectively.&lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;DON&#39;T INSTALL A THING&lt;/strong&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;Many common free and &lt;a href=&quot;http://www.techweb.com/encyclopedia/defineterm.jhtml?term=open%20source&amp;amp;amp;x=&amp;y=&quot;&gt;open source&lt;/a&gt; productivity applications are available in portable versions. They can be run directly from a USB drive--with both the application and user data stored on the drive--and will never need to be installed anywhere.&lt;br /&gt;&lt;br /&gt;&lt;table align=&quot;right&quot; border=&quot;0&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; width=&quot;185&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td rowspan=&quot;3&quot; width=&quot;10&quot;&gt;&lt;img src=&quot;http://i.cmpnet.com/infoweek/spacer.gif&quot; border=&quot;0&quot; height=&quot;5&quot; hspace=&quot;0&quot; vspace=&quot;0&quot; width=&quot;10&quot; /&gt;&lt;br /&gt;&lt;/td&gt;&lt;td width=&quot;175&quot;&gt;&lt;a href=&quot;http://i.cmpnet.com/infoweek/1144/144TPusb_portableapps_full.jpg&quot; target=&quot;_blank&quot;&gt;&lt;img src=&quot;http://i.cmpnet.com/infoweek/1144/144TPusb_portableapps.jpg&quot; alt=&quot;Apps Suite: A starter kit of apps that fit on a USB drive&quot; border=&quot;0&quot; height=&quot;248&quot; hspace=&quot;0&quot; vspace=&quot;0&quot; width=&quot;175&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class=&quot;artCaption&quot; align=&quot;center&quot; width=&quot;175&quot;&gt;&lt;i&gt;&lt;span class=&quot;covercredit&quot;&gt;(click image for larger view)&lt;/span&gt;&lt;/i&gt;&lt;br /&gt;&lt;img src=&quot;http://i.cmpnet.com/infoweek/spacer.gif&quot; border=&quot;0&quot; height=&quot;5&quot; hspace=&quot;0&quot; vspace=&quot;0&quot; width=&quot;10&quot; /&gt;&lt;br /&gt;&lt;img src=&quot;http://i.cmpnet.com/infoweek/spacer.gif&quot; border=&quot;0&quot; height=&quot;4&quot; hspace=&quot;0&quot; vspace=&quot;0&quot; width=&quot;175&quot; /&gt;&lt;br /&gt;Apps Suite: A starter kit of apps that fit on a USB drive&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td width=&quot;175&quot;&gt;&lt;img src=&quot;http://i.cmpnet.com/infoweek/spacer.gif&quot; border=&quot;0&quot; height=&quot;7&quot; hspace=&quot;0&quot; vspace=&quot;0&quot; width=&quot;175&quot; /&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;PortableApps Suite from PortableApps.com is a preconfigured collection of such programs that&#39;s a snap to run. The &lt;a href=&quot;http://www.techweb.com/encyclopedia/defineterm.jhtml?term=default&amp;amp;amp;x=&amp;y=&quot;&gt;default&lt;/a&gt; package weighs in at about 256 Mbytes once it&#39;s unpacked and is like a free software greatest-hits collection, including mobile versions of OpenOffice, Firefox, Thunderbird, and Sunbird. You can add other apps, including the 7-Zip &lt;a href=&quot;http://www.techweb.com/encyclopedia/defineterm.jhtml?term=archive&amp;amp;amp;x=&amp;y=&quot;&gt;archive&lt;/a&gt; manager, AbiWord (a word processing app), the FileZilla &lt;a href=&quot;http://www.techweb.com/encyclopedia/defineterm.jhtml?term=FTP&amp;amp;amp;x=&amp;y=&quot;&gt;FTP&lt;/a&gt; client, IM clients, and the Sumatra portable PDF reader. You can install as many pieces as you like, and it comes with its own customizable launch menu.&lt;/p&gt;A big reason to go with the suite rather than downloading individual apps is that there&#39;s a fair degree of &lt;a href=&quot;http://www.techweb.com/encyclopedia/defineterm.jhtml?term=integrity&amp;amp;amp;x=&amp;y=&quot;&gt;integrity&lt;/a&gt; within the suite. Everything has been prescreened to work reliably in a standalone fashion and be up to date. Another point in favor of the suite is that it automatically saves user-created data in a directory tree that travels with the suite, so user data is never saved to the PC. It even includes a &lt;a href=&quot;http://www.techweb.com/encyclopedia/defineterm.jhtml?term=backup&amp;amp;amp;x=&amp;y=&quot;&gt;backup&lt;/a&gt; utility that saves and restores user or application data to an archive.&lt;br /&gt;&lt;br /&gt;The PortableApps Suite isn&#39;t the only prepackaged collection of portable programs out there. Consider the far less ambitious but still impressive Floppy Office, which packs an array of tiny little productivity tools into a 1.5-Mbyte archive.&lt;br /&gt;&lt;p&gt;There also are lots of apps with portable versions. For example, there&#39;s a nice version of the Opera browser. And if OpenOffice isn&#39;t to your taste, you could swap it for a portable version of the Scribus word processor and page-designer app. If you&#39;re still not satisfied, Listible.com has a whole subcategory devoted to portable productivity applications.&lt;/p&gt;Finally, there&#39;s Nirsoft, maker of a collection of useful and free utilities, all of which require no installation and will run from a thumb drive or CD. They&#39;re perfect if you want to assemble a Swiss Army knife USB collection of utilities.&lt;br /&gt;&lt;strong&gt;STANDALONE OS&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt;It&#39;s also possible to boot and run a whole standalone &lt;a href=&quot;http://www.techweb.com/encyclopedia/defineterm.jhtml?term=operating%20system&amp;amp;amp;x=&amp;y=&quot;&gt;operating system&lt;/a&gt; from a USB drive. Why do this? Data recovery, for one: If &lt;a href=&quot;http://www.techweb.com/encyclopedia/defineterm.jhtml?term=Windows&amp;amp;amp;x=&amp;y=&quot;&gt;Windows&lt;/a&gt; goes south, just plug in your drive, &lt;a href=&quot;http://www.techweb.com/encyclopedia/defineterm.jhtml?term=boot&amp;amp;amp;x=&amp;y=&quot;&gt;boot&lt;/a&gt; to it, and &lt;a href=&quot;http://www.techweb.com/encyclopedia/defineterm.jhtml?term=copy&amp;amp;x=&amp;y=&quot;&gt;copy&lt;/a&gt; off any data trapped on the dead system. Another is if you&#39;re curious about migrating from one &lt;a href=&quot;http://www.techweb.com/encyclopedia/defineterm.jhtml?term=OS&amp;amp;amp;x=&amp;y=&quot;&gt;OS&lt;/a&gt; to another, and want to try it out without installing anything on a &lt;a href=&quot;http://www.techweb.com/encyclopedia/defineterm.jhtml?term=hard%20drive&amp;amp;amp;x=&amp;y=&quot;&gt;hard drive&lt;/a&gt; or creating a dual-boot scenario or otherwise changing the configuration of the system.&lt;p&gt;&lt;/p&gt;Note that you can typically only run an OS from a USB drive if the system you&#39;re using it on supports booting from a USB device. Not every PC does--in fact, my own late-model Sony Vaio notebook (vintage 2006) doesn&#39;t. You might be able to upgrade the &lt;a href=&quot;http://www.techweb.com/encyclopedia/defineterm.jhtml?term=BIOS&amp;amp;amp;x=&amp;y=&quot;&gt;BIOS&lt;/a&gt; on a machine that doesn&#39;t support it, but that&#39;s entirely up to the manufacturer; check with the maker of your &lt;a href=&quot;http://www.techweb.com/encyclopedia/defineterm.jhtml?term=computer&amp;amp;x=&amp;y=&quot;&gt;computer&lt;/a&gt; or &lt;a href=&quot;http://www.techweb.com/encyclopedia/defineterm.jhtml?term=motherboard&amp;amp;x=&amp;y=&quot;&gt;motherboard&lt;/a&gt; first.&lt;br /&gt;&lt;p&gt;&lt;table align=&quot;left&quot; border=&quot;0&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; width=&quot;185&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td width=&quot;175&quot;&gt;&lt;a href=&quot;http://i.cmpnet.com/infoweek/1144/144TPusb_dslinux_full.jpg&quot; target=&quot;_blank&quot;&gt;&lt;img src=&quot;http://i.cmpnet.com/infoweek/1144/144TPusb_dslinux.jpg&quot; alt=&quot;DSL is a Linux distribution small enough for use on USB drives&quot; border=&quot;0&quot; height=&quot;131&quot; hspace=&quot;0&quot; vspace=&quot;0&quot; width=&quot;175&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;td rowspan=&quot;3&quot; width=&quot;10&quot;&gt;&lt;img src=&quot;http://i.cmpnet.com/infoweek/spacer.gif&quot; border=&quot;0&quot; height=&quot;5&quot; hspace=&quot;0&quot; vspace=&quot;0&quot; width=&quot;10&quot; /&gt;&lt;br /&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class=&quot;artCaption&quot; align=&quot;center&quot; width=&quot;175&quot;&gt;&lt;i&gt;&lt;span class=&quot;covercredit&quot;&gt;(click image for larger view)&lt;/span&gt;&lt;/i&gt;&lt;br /&gt;&lt;img src=&quot;http://i.cmpnet.com/infoweek/spacer.gif&quot; border=&quot;0&quot; height=&quot;5&quot; hspace=&quot;0&quot; vspace=&quot;0&quot; width=&quot;10&quot; /&gt;&lt;br /&gt;&lt;img src=&quot;http://i.cmpnet.com/infoweek/spacer.gif&quot; border=&quot;0&quot; height=&quot;4&quot; hspace=&quot;0&quot; vspace=&quot;0&quot; width=&quot;175&quot; /&gt;&lt;br /&gt;DSL is a Linux distribution small enough for use on USB drives&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td width=&quot;175&quot;&gt;&lt;img src=&quot;http://i.cmpnet.com/infoweek/spacer.gif&quot; border=&quot;0&quot; height=&quot;7&quot; hspace=&quot;0&quot; vspace=&quot;0&quot; width=&quot;175&quot; /&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;The OS that&#39;s most commonly booted from a USB device would have to be some variety of Linux. PenDriveLinux has tutorials on how to get many common Linux distributions running from a USB drive. Another way to do this is to obtain coLinux, a special Linux distribution that&#39;s designed to run on Windows as a Windows executable. &lt;/p&gt;How about running Windows itself from a USB drive? Amazingly, it&#39;s possible--albeit with a &lt;a href=&quot;http://www.techweb.com/encyclopedia/defineterm.jhtml?term=bit&amp;amp;amp;x=&amp;y=&quot;&gt;bit&lt;/a&gt; of hackwork, patience, and some scaled-down expectations.&lt;br /&gt;&lt;p&gt;The most reliable and automated way to do this is to use BartPE, a utility that builds a copy of Windows&#39; Preinstallation Environment from an existing installation of Windows. It&#39;s a mini version of Windows that supports a basic subset of Windows&#39; functions. &lt;/p&gt;Windows&#39; licensing restrictions require that you have a spare copy of Windows to use in the BartPE environment. And while you can&#39;t just take an existing Windows installation and move it to a pen drive, a few foolhardy experimenters have made it possible to create custom installations of Windows that boot from a USB drive.&lt;br /&gt;&lt;p&gt;The folks at Ngine.de document how to do it by modifying the Windows XP installation CD, with additional hints for running Windows from a USB flash drive. One limitation to installing Windows on a USB drive using this technique is that it will only boot and run on the system it was installed on. But it&#39;s still possible to do some clever things, such as use it as an emergency recovery environment if BartPE doesn&#39;t prove to be flexible enough. &lt;/p&gt;&lt;strong&gt;PASSWORD STORE&lt;/strong&gt;&lt;br /&gt;&lt;p&gt;I hate passwords. That said, passwords are going to be around for a long time, and often they&#39;re the easiest way to secure something. Since a USB drive carries your data and goes where you go, it makes sense to use it as a password store, too--one that&#39;s protected against unauthorized use.&lt;/p&gt;One popular commercial program is RoboForm, which has a no-install, USB-key-friendly version called RoboForm2Go. It&#39;s mainly used to fill in Web forms, including passwords, but packs a bundle of other useful features (like only filling in passwords on sites that have the proper domain name, to prevent phishing attacks).&lt;br /&gt;&lt;p&gt;Another password manager that also works from a USB drive, KeePass, is free and open source, and it sports one of the best feature sets of any program I&#39;ve encountered in this market. Passwords can be grouped organizationally, automatically typed into form fields, and cleaned from the clipboard right after being pasted. The entire password database is AES-256 encrypted, and password data is kept encrypted in memory to prevent snooping by other applications.&lt;/p&gt;&lt;strong&gt;SYNC UP&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt;If you&#39;re dealing with more than a few documents at a time, keeping the data on a USB drive synchronized across multiple machines is a hassle. Windows has had a native feature--the Briefcase--to do this since Windows 95. When you copy files from your computer into a Briefcase &lt;a href=&quot;http://www.techweb.com/encyclopedia/defineterm.jhtml?term=folder&amp;amp;amp;x=&amp;y=&quot;&gt;folder&lt;/a&gt; on a USB drive, they can be automatically synchronized with their originals if changes are made to them on another computer. It&#39;s one of the simplest ways to do this, and it&#39;s surprisingly underutilized.&lt;p&gt;&lt;/p&gt;&lt;p&gt;If you want more flexible ways to sync, you&#39;ll need a third-party program. One of the first apps I used to do this was Microsoft&#39;s SyncToy. I used it to synchronize data not only to and from a USB drive, but to and from external removable drives as an impromptu backup application. Unfortunately, SyncToy has to be installed on a specific PC and can&#39;t run as a standalone application from the USB drive.&lt;/p&gt;&lt;p&gt;However, there&#39;s a plethora of programs for syncing data that can be run in a standalone fashion from a USB drive. I&#39;ve grown fond of Allway Sync, which sports a staggering array of synchronization options and tracks all changes made to the files in a local database.&lt;/p&gt;&lt;p&gt;Another good one, with probably the most sophisticated sync options of the bunch, is 2BrightSparks&#39; SyncBack, which includes goodies like being able to sync files still in use, versioning, innate support for FTP directories, and 256-bit encryption. Allway Sync is free; while there is a limited free version of SyncBack, the full version is priced at $30.&lt;/p&gt;&lt;strong&gt;HIDE IT&lt;/strong&gt;&lt;br /&gt;&lt;p&gt;&lt;table align=&quot;right&quot; border=&quot;0&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; width=&quot;185&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td rowspan=&quot;3&quot; width=&quot;10&quot;&gt;&lt;img src=&quot;http://i.cmpnet.com/infoweek/spacer.gif&quot; border=&quot;0&quot; height=&quot;5&quot; hspace=&quot;0&quot; vspace=&quot;0&quot; width=&quot;10&quot; /&gt;&lt;br /&gt;&lt;/td&gt;&lt;td width=&quot;175&quot;&gt;&lt;img src=&quot;http://i.cmpnet.com/infoweek/1144/144TPDTS_angleOpenTop.jpg&quot; alt=&quot;DataTraveler Secure has encryption built in&quot; border=&quot;0&quot; height=&quot;54&quot; hspace=&quot;0&quot; vspace=&quot;0&quot; width=&quot;175&quot; /&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class=&quot;artCaption&quot; align=&quot;center&quot; width=&quot;175&quot;&gt;&lt;img src=&quot;http://i.cmpnet.com/infoweek/spacer.gif&quot; border=&quot;0&quot; height=&quot;4&quot; hspace=&quot;0&quot; vspace=&quot;0&quot; width=&quot;175&quot; /&gt;&lt;br /&gt;DataTraveler Secure has encryption built in&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td width=&quot;175&quot;&gt;&lt;img src=&quot;http://i.cmpnet.com/infoweek/spacer.gif&quot; border=&quot;0&quot; height=&quot;7&quot; hspace=&quot;0&quot; vspace=&quot;0&quot; width=&quot;175&quot; /&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;It&#39;s possible to get robust encryption for your thumb drive without spending much. Consider TrueCrypt, a free and open source &lt;a href=&quot;http://www.techweb.com/encyclopedia/defineterm.jhtml?term=encryption&amp;amp;x=&amp;y=&quot;&gt;encryption&lt;/a&gt; offering. It lets you create a large file and turn it into a virtual encrypted volume; once it&#39;s mounted, you can read and write to it as you would any other drive. Everything stored on the encrypted volume is inaccessible without the proper password. The virtual &lt;a href=&quot;http://www.techweb.com/encyclopedia/defineterm.jhtml?term=disk&amp;amp;x=&amp;y=&quot;&gt;disk&lt;/a&gt; &lt;a href=&quot;http://www.techweb.com/encyclopedia/defineterm.jhtml?term=file&amp;amp;amp;x=&amp;y=&quot;&gt;file&lt;/a&gt; doesn&#39;t have to be any particular &lt;a href=&quot;http://www.techweb.com/encyclopedia/defineterm.jhtml?term=extension&amp;amp;amp;x=&amp;y=&quot;&gt;extension&lt;/a&gt; or type, and there&#39;s no way to analyze an encrypted volume and figure out that it&#39;s encrypted; it looks like random data to the uninitiated.&lt;/p&gt;Some thumb drives come with encryption hardware built in. Kingston&#39;s DataTraveler Secure drives use hardware-based 256-bit &lt;a href=&quot;http://www.techweb.com/encyclopedia/defineterm.jhtml?term=AES&amp;amp;x=&amp;amp;y=&quot;&gt;AES&lt;/a&gt; encryption and come in sizes up to 8 Gbytes. That said, hardware-based encryption on a thumb drive is expensive--a 4-Gbyte DataTraveler costs as much as $120 retail--while software-based encryption can be implemented for free.</description><link>http://armchairdectective.blogspot.com/2007/07/crucial-info-usb-flash-drives-mobilized.html</link><author>noreply@blogger.com (coma12)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3320206899382134956.post-1904153930963264184</guid><pubDate>Thu, 26 Jul 2007 15:54:00 +0000</pubDate><atom:updated>2007-07-26T11:54:32.666-04:00</atom:updated><title>FLV VIDEO CONVERSION - SUPER © .</title><description>&lt;a href=&quot;http://www.erightsoft.com/SUPER.html&quot;&gt;SUPER © .&lt;/a&gt;: &quot;Current version SUPER © v2007.build.23 (July 4, 2007)&lt;br /&gt;changelog&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;   SUPER © Simplified Universal Player Encoder &amp; Renderer.&lt;br /&gt;   A GUI to ffmpeg, MEncoder, mplayer, x264, mppenc,&lt;br /&gt;   ffmpeg2theora &amp;amp; the theora/vorbis RealProducer plugIn.&lt;br /&gt;&lt;br /&gt;   If you need a simple, yet very efficient tool to convert (encode) or play any Multimedia file,&lt;br /&gt;   without reading manuals or spending long hours training, then SUPER © is all you need.&lt;br /&gt;   It is a Multimedia Encoder and a Multimedia Player, easy-to-use with 1 simple click.&quot;</description><link>http://armchairdectective.blogspot.com/2007/07/flv-video-conversion-super.html</link><author>noreply@blogger.com (coma12)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3320206899382134956.post-815598329698049194</guid><pubDate>Thu, 26 Jul 2007 15:53:00 +0000</pubDate><atom:updated>2007-07-26T11:53:12.036-04:00</atom:updated><title>ANONYMOUS EMAIL - sympa.</title><description>&lt;a href=&quot;http://www.erightsoft.com/sympa.html&quot;&gt;sympa.&lt;/a&gt;: &quot;Current version S.Y.M.P.A  v3.276 (July 29, 2005)&lt;br /&gt;&lt;br /&gt;   SYMPA (Send_Your_Mail_Privately_&amp;amp;_Anonymously)&lt;br /&gt;   A multi-function FreeWare to be used ONLY for the following educational / training purposes:&lt;br /&gt;&lt;br /&gt;         o Send totally Anonymous E-Mails. (Through Tunnel Proxy)&lt;br /&gt;         o Send SMS messages via E-Mail. (Depending on your area phone service provider)&lt;br /&gt;         o Chat with friends in private and public mode.&lt;br /&gt;         o Built in web browser for easier and lighter use of PC resources when a quick surf is needed.&lt;br /&gt;         o Check, convert to decimal and resolve IPv4 to addresses or vice versa.&lt;br /&gt;         o Register / UnRegister DirectShow Filters installed on your PC.&lt;br /&gt;&lt;br /&gt;   A New Direct link in the SYMPA browser section will open a PROXY web site for your convenience.&lt;br /&gt;   This web site provides a daily updated PROXY list helping you find a better selection among&lt;br /&gt;   hundreds of proxies.&lt;br /&gt;   The PROXY web site will even open automatically in case the SYMPA&#39;s PROXY entry field was&lt;br /&gt;   left empty.&lt;br /&gt;&lt;br /&gt;   The Re-designed internal Tunnel Proxy engine has been improved for speed and reliability.&lt;br /&gt;   SYMPA has a very user-friendly interface along with 2 intercept buttons allowing a visual&lt;br /&gt;   interpretation of all DATA exchange occurring between your &quot;</description><link>http://armchairdectective.blogspot.com/2007/07/anonymous-email-sympa.html</link><author>noreply@blogger.com (coma12)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3320206899382134956.post-5718235606064952350</guid><pubDate>Thu, 26 Jul 2007 15:51:00 +0000</pubDate><atom:updated>2007-07-26T11:51:52.846-04:00</atom:updated><title>ENCRYPTION - 96CRYPT.</title><description>&lt;a href=&quot;http://www.erightsoft.com/96crypt.html&quot;&gt;96CRYPT.&lt;/a&gt;: &quot;Current version 96Crypt v4.950 (September 8, 2005)&lt;br /&gt;changelog&lt;br /&gt;&lt;br /&gt;   96Crypt is a multi-feature file/FOLDER EnCryption/DeCryption program&lt;br /&gt;   combining several powerful features in one single application.&lt;br /&gt;&lt;br /&gt;         o 96Crypt is a file/FOLDER EnCryption/DeCryption program using highly trusted&lt;br /&gt;           block ciphers together with several collision-resistant HMAC-HASH algorithms.&lt;br /&gt;&lt;br /&gt;                96Crypt features several worldwide trusted block ciphers algorithms such as:&lt;br /&gt;                3DES, Blowfish, MARS, RijnDael-AES, SERPENT or Twofish.&lt;br /&gt;                All our block ciphers operate in CTR or CBC mode with a MAC mechanism&lt;br /&gt;                providing the highest level of confidentiality and integrity to your data.&lt;br /&gt;&lt;br /&gt;                The user-provided secret password is processed with one of the following HASH functions:&lt;br /&gt;                HAVAL, MD5, RMD, SHA-1, SHA256, SHA384, SHA512 or TIGER.&lt;br /&gt;                The key used for EnCryption/DeCryption is calculated based on a user-provided typed&lt;br /&gt;                password or file-password. After several rounds of HASHing / SALTing the entered or&lt;br /&gt;                selected password, relying on casc&quot;</description><link>http://armchairdectective.blogspot.com/2007/07/encryption-96crypt.html</link><author>noreply@blogger.com (coma12)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3320206899382134956.post-4398413259710862788</guid><pubDate>Thu, 26 Jul 2007 15:44:00 +0000</pubDate><atom:updated>2007-07-26T11:46:30.881-04:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">google</category><category domain="http://www.blogger.com/atom/ns#">google earth</category><category domain="http://www.blogger.com/atom/ns#">google maps</category><title>Google Helps Nonprofits Conquer Google Earth -- Google Maps -- InformationWeek</title><description>&lt;h1 style=&quot;margin-left: -2px; padding-left: 1px; letter-spacing: 0px; text-align: left;&quot; class=&quot;storyHeadline&quot;&gt;Google Helps Nonprofits Conquer Google Earth&lt;br /&gt;&lt;/h1&gt;The project also includes online forums to enhance communications and connect interested users of Google Earth with experienced developers.&lt;br /&gt;&lt;span style=&quot;margin-left: 2px;&quot; class=&quot;byLine&quot;&gt;&lt;br /&gt;By&lt;br /&gt;&lt;a href=&quot;mailto:tclaburn@cmp.com&quot;&gt;&lt;u&gt;Thomas&lt;br /&gt;Claburn&lt;/u&gt;&lt;/a&gt;&lt;br /&gt;&lt;span style=&quot;margin-left: 2px;&quot; id=&quot;courtesyOf&quot;&gt;&lt;a target=&quot;_blank&quot; href=&quot;http://www.informationweek.com/;jsessionid=TTSMYSSOCNW5EQSNDLOSKH0CJUNN2JVN&quot; linkindex=&quot;62&quot; set=&quot;yes&quot;&gt;InformationWeek&lt;br /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;margin-left: 2px; line-height: 20px;&quot; class=&quot;storyDate&quot;&gt;&lt;nobr&gt;June 27, 2007 04:00 PM&lt;br /&gt;&lt;/nobr&gt;&lt;br /&gt;&lt;/span&gt;&lt;a class=&quot;iAs&quot; classname=&quot;iAs&quot; style=&quot;border-bottom: medium none; font-weight: bold; text-decoration: none; padding-bottom: 0px; color: darkblue; background-color: transparent; cursor: pointer;&quot; href=&quot;http://www.blogger.com/blog-this.g?source=toolbar-firefox&amp;u=http%3A%2F%2Fwww.informationweek.com%2Fsoftware%2FshowArticle.jhtml%3FarticleID%3D200001150&amp;amp;n=Google%20Helps%20Nonprofits%20Conquer%20Google%20Earth%20--%20Google%20Maps%20--%20InformationWeek&amp;t=#&quot; target=&quot;_blank&quot; itxtdid=&quot;3802442&quot;&gt;&lt;nobr&gt;Google&lt;/nobr&gt;&lt;/a&gt; on Tuesday launched a new initiative to help nonprofit organizations communicate and present data using &lt;a href=&quot;http://earth.google.com/&quot; linkindex=&quot;63&quot;&gt;Google Earth&lt;/a&gt;.&lt;br /&gt;&lt;p&gt;&lt;a href=&quot;http://earth.google.com/outreach/index.html&quot; linkindex=&quot;64&quot;&gt;Google Earth Outreach&lt;/a&gt; aims to provide information including help documents, &lt;a href=&quot;http://www.techweb.com/encyclopedia/defineterm.jhtml?term=video&amp;amp;x=&amp;y=&quot; linkindex=&quot;65&quot; set=&quot;yes&quot;&gt;video&lt;/a&gt; tutorials, and case studies that describe how to create Keyhole Markup Language (KML) layers for Google Earth. The project also includes online forums to enhance &lt;a href=&quot;http://www.techweb.com/encyclopedia/defineterm.jhtml?term=communications&amp;amp;x=&amp;y=&quot; linkindex=&quot;66&quot; set=&quot;yes&quot;&gt;communications&lt;/a&gt; between nonprofit organizations and to put interested users of &lt;a href=&quot;http://www.techweb.com/encyclopedia/defineterm.jhtml?term=Google&amp;amp;x=&amp;y=&quot; linkindex=&quot;67&quot;&gt;Google&lt;/a&gt; Earth in touch with experienced developers.&lt;/p&gt;&lt;p&gt;Examples of how nonprofit organizations can use geospatial data to communicate can be seen in the new layers, assembled by the Global Heritage Fund, EarthWatch, and TransFair USA, that Google added to Google Earth&#39;s Global Awareness folder.&lt;/p&gt;&lt;p&gt;In April, Google added a layer &lt;a href=&quot;http://www.informationweek.com/news/showArticle.jhtml?articleID=198900597&quot; linkindex=&quot;68&quot;&gt;detailing the Darfur crisis&lt;/a&gt; to the Global Awareness folder, along with several other layers. The Darfur layer remains the only one turned on by default.&lt;/p&gt;&lt;p&gt;Other layers in that &lt;a href=&quot;http://www.techweb.com/encyclopedia/defineterm.jhtml?term=folder&amp;amp;x=&amp;y=&quot; linkindex=&quot;69&quot;&gt;folder&lt;/a&gt; -- the United Nations Environment Programme Atlas of Our Changing Environment, the World Wildlife Fund&#39;s Conservation Projects, Appalachian Mountaintop Removal, and Jane Goodall&#39;s Gombe Chimpanzee &lt;a href=&quot;http://www.techweb.com/encyclopedia/defineterm.jhtml?term=Blog&amp;amp;x=&amp;y=&quot; linkindex=&quot;70&quot;&gt;Blog&lt;/a&gt; -- must be manually selected before they&#39;re visible on Google Earth.&lt;/p&gt;&lt;p&gt;Google also is offering nonprofits the opportunity to apply online for &lt;a href=&quot;http://earth.google.com/earth_pro.html&quot; linkindex=&quot;71&quot;&gt;Google Earth Pro&lt;/a&gt; license grants. Google Earth Pro normally costs $400. Organizations awarded a free license also receive additional technical support and the opportunity to have their work featured in the Google Earth Outreach Showcase, an online gallery of new Google Earth layers.&lt;/p&gt;&lt;p&gt;&quot;Google&#39;s mission is all about making information more accessible and useful,&quot; said Elliot Schrage, VP of global communications and public affairs, in a statement. &quot;With programs like Google Earth Outreach, we seek to help create a &#39;marketplace of ideas&#39; in the growing not-for-profit &lt;a href=&quot;http://www.techweb.com/encyclopedia/defineterm.jhtml?term=sector&amp;amp;x=&amp;y=&quot; linkindex=&quot;72&quot; set=&quot;yes&quot;&gt;sector&lt;/a&gt; that rivals and complements what we offer commercial &lt;a class=&quot;iAs&quot; classname=&quot;iAs&quot; style=&quot;border-bottom: medium none; font-weight: bold; text-decoration: none; padding-bottom: 0px; color: darkblue; background-color: transparent; cursor: pointer;&quot; href=&quot;http://www.blogger.com/blog-this.g?source=toolbar-firefox&amp;u=http%3A%2F%2Fwww.informationweek.com%2Fsoftware%2FshowArticle.jhtml%3FarticleID%3D200001150&amp;amp;n=Google%20Helps%20Nonprofits%20Conquer%20Google%20Earth%20--%20Google%20Maps%20--%20InformationWeek&amp;t=#&quot; target=&quot;_blank&quot; itxtdid=&quot;3802464&quot;&gt;&lt;nobr&gt;enterprises&lt;img src=&quot;http://images.intellitxt.com/ast/adTypes/mag-glass_10x10.gif&quot; style=&quot;border: medium none ; float: none;&quot; /&gt;&lt;/nobr&gt;&lt;/a&gt;.&quot;&lt;/p&gt;&lt;p&gt;The power of satellite imagery hasn&#39;t escaped nonprofit organizations. Earlier this month at the International Digital Earth Symposium, Amnesty International USA introduced a project called &lt;a href=&quot;http://www.eyesondarfur.org/&quot; linkindex=&quot;73&quot; set=&quot;yes&quot;&gt;Eyes on Darfur&lt;/a&gt; designed to monitor vulnerable villages in Sudan and to deter violence there.&lt;/p&gt;&lt;p&gt;Last week, Reuters &lt;a href=&quot;http://news.yahoo.com/s/nm/20070621/wr_nm/usa_military_google_dc&quot; linkindex=&quot;74&quot;&gt;reported&lt;/a&gt; that Air Force Lt. Gen. David Deptula, deputy chief of staff for intelligence, surveillance, and reconnaissance, saw online mapping &lt;a href=&quot;http://www.techweb.com/encyclopedia/defineterm.jhtml?term=software&amp;x=&amp;amp;y=&quot; linkindex=&quot;75&quot; set=&quot;yes&quot;&gt;software&lt;/a&gt; like Google Earth as a potential security threat, but acknowledged the technology could not be undone.&lt;/p&gt;&lt;p&gt;Since Google Earth debuted in June, 2005, it has been downloaded more than 200 million times.&lt;br /&gt;&lt;/p&gt;</description><link>http://armchairdectective.blogspot.com/2007/07/google-helps-nonprofits-conquer-google.html</link><author>noreply@blogger.com (coma12)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3320206899382134956.post-5652694973671275523</guid><pubDate>Thu, 26 Jul 2007 15:29:00 +0000</pubDate><atom:updated>2007-07-26T11:46:30.882-04:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">google</category><category domain="http://www.blogger.com/atom/ns#">google earth</category><category domain="http://www.blogger.com/atom/ns#">google maps</category><title>InformationWeek -- Enterprise Software News</title><description>&lt;a href=&quot;http://www.informationweek.com/software/;jsessionid=TTSMYSSOCNW5EQSNDLOSKH0CJUNN2JVN&quot;&gt;InformationWeek -- Enterprise Software News&lt;/a&gt;: &quot;Google Earth Enterprise Gains Web Browser Integration&lt;br /&gt;&lt;br /&gt;The updated software will allow IT administrators to embed a 2D view of Google Earth data into any Web application and to make enterprise mashups.&quot;</description><link>http://armchairdectective.blogspot.com/2007/07/informationweek-enterprise-software.html</link><author>noreply@blogger.com (coma12)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3320206899382134956.post-9015521819010201757</guid><pubDate>Thu, 26 Jul 2007 15:22:00 +0000</pubDate><atom:updated>2007-07-26T11:24:53.395-04:00</atom:updated><title>SCARRY - Storm Worm Erupts Into Worst Virus Attack In 2 Years</title><description>&lt;div class=&quot;storypadfix2&quot;&gt;&lt;h1 class=&quot;storyHeadline&quot;&gt;Storm Worm Erupts Into Worst Virus Attack In 2 Years&lt;/h1&gt;&lt;div class=&quot;storyDek&quot;&gt;Storm worm authors are blasting the Internet with two types of attacks, and both are aimed at building up their botnet.&lt;br /&gt;&lt;/div&gt;&lt;span class=&quot;byLine&quot;&gt;&lt;br /&gt;By&lt;br /&gt;&lt;a href=&quot;http://www.informationweek.com/news/mailto:sgaudin@cmp.com&quot;&gt;&lt;u&gt;Sharon&lt;br /&gt;Gaudin&lt;/u&gt;&lt;/a&gt;&lt;span id=&quot;courtesyOf&quot;&gt;&lt;a linkindex=&quot;56&quot; href=&quot;http://www.informationweek.com/;jsessionid=5NNNDZNIB3AJUQSNDLOSKH0CJUNN2JVN&quot; target=&quot;_blank&quot;&gt;&lt;br /&gt;InformationWeek&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;storyDate&quot;&gt;&lt;br /&gt;&lt;nobr&gt;&lt;br /&gt;July 24, 2007 04:19 PM&lt;/nobr&gt;&lt;/span&gt;&lt;br /&gt;&lt;p&gt;&lt;span id=&quot;articleBody&quot;&gt;&lt;div class=&quot;IntelliTXT&quot;&gt;The Storm &lt;a itxtdid=&quot;3802192&quot; target=&quot;_blank&quot; href=&quot;http://www.blogger.com/blog-this.g?source=toolbar-firefox&amp;u=http%3A%2F%2Fclipmarks.com%2Fprint_clips.aspx%3Fdirect%3Dtrue%26mode%3Dclip%26c%3D54A985F2-0AE3-48BF-96AC-E816C069928A&amp;amp;n=Clipmarks%20%7C%20Printer-Friendly%3A%20Virus%20Wars%20Are%20On&amp;t=Source%3A%20http%3A%2F%2Fwww.informationweek.com%2Fnews%2FshowArticle.jhtml%3FarticleID%3D201200849%0D%0A%C2%BB%20%20E-Mail%0D%0A%C2%BB%20%20Print%0D%0A%C2%BB%20%20Discuss%0D%0A%C2%BB%20%20Write%20To%20Editor%0D%0A%C2%BB%20%20Digg%0D%0A%C2%BB%20%20Slashdot%0D%0A%C2%BB%20%20news%20stories%0D%0AStorm%20Worm%20Erupts%20Into%20Worst%20Virus%20Attack%20In%202%20Years%0D%0A%0D%0AStorm%20worm%20authors%20are%20blasting%20the%20Internet%20with%20two%20types%20of%20attacks%2C%20and%20both%20are%20aimed%20at%20building%20up%20their%20botnet.%0D%0A%0D%0ABy%20Sharon%20Gaudin%0D%0AInformationWeek%0D%0AJuly%2024%2C%202007%2004%3A19%20PM%0D%0A%0D%0AThe%20Storm%20worm%20authors%20are%20waging%20a%20multi-pronged%20attack%20and%20generating%20the%20largest%20virus%20attack%20some%20researchers%20say%20they%27ve%20seen%20in%20two%20years.%0D%0A%0D%0A%22We%20are%20basically%20in%20the%20midst%20of%20an%20incredibly%20large%20attack%2C%22%20said%20Adam%20Swidler%2C%20a%20senior%20manager%20with%20security%20company%20Postini.%20%22It%27s%20the%20most%20sustained%20attack%20that%20we%27ve%20seen.%20There%27s%20been%20nine%20to%2010%20days%20straight%20days%20of%20attack%20at%20this%20level.%22%0D%0A%0D%0ASwidler%20said%20in%20an%20interview%20with%20InformationWeek%20that%20the%20attack%20started%20a%20little%20more%20than%20a%20week%20ago%2C%20and%20Postini%20since%20then%20has%20recorded%20200%20million%20spam%20e-mails%20luring%20users%20to%20malicious%20Web%20sites.%20Before%20this%20attack%2C%20an%20average%20day%20sees%20about%201%20million%20virus-laden%20e-mails%2C%20according%20to%20Postini.%20Last%20Thursday%2C%20however%2C%20the%20company%20tracked%2042%20million%20Storm-related%20messages%20in%20that%20day%20alone.%20As%20of%20Tuesday%20afternoon%2C%20Postini%20researchers%20were#&quot; classname=&quot;iAs&quot; class=&quot;iAs&quot;&gt;&lt;nobr&gt;worm&lt;img src=&quot;http://images.intellitxt.com/ast/adTypes/mag-glass_10x10.gif&quot; /&gt;&lt;/nobr&gt;&lt;/a&gt; authors are waging a multi-pronged attack and generating the largest virus attack some researchers say they&#39;ve seen in two years.&lt;br /&gt;&lt;p&gt;&quot;We are basically in the midst of an incredibly large attack,&quot; said Adam Swidler, a&lt;br /&gt;senior manager with &lt;a itxtdid=&quot;3802297&quot; target=&quot;_blank&quot; href=&quot;http://www.blogger.com/blog-this.g?source=toolbar-firefox&amp;amp;u=http%3A%2F%2Fclipmarks.com%2Fprint_clips.aspx%3Fdirect%3Dtrue%26mode%3Dclip%26c%3D54A985F2-0AE3-48BF-96AC-E816C069928A&amp;n=Clipmarks%20%7C%20Printer-Friendly%3A%20Virus%20Wars%20Are%20On&amp;amp;t=Source%3A%20http%3A%2F%2Fwww.informationweek.com%2Fnews%2FshowArticle.jhtml%3FarticleID%3D201200849%0D%0A%C2%BB%20%20E-Mail%0D%0A%C2%BB%20%20Print%0D%0A%C2%BB%20%20Discuss%0D%0A%C2%BB%20%20Write%20To%20Editor%0D%0A%C2%BB%20%20Digg%0D%0A%C2%BB%20%20Slashdot%0D%0A%C2%BB%20%20news%20stories%0D%0AStorm%20Worm%20Erupts%20Into%20Worst%20Virus%20Attack%20In%202%20Years%0D%0A%0D%0AStorm%20worm%20authors%20are%20blasting%20the%20Internet%20with%20two%20types%20of%20attacks%2C%20and%20both%20are%20aimed%20at%20building%20up%20their%20botnet.%0D%0A%0D%0ABy%20Sharon%20Gaudin%0D%0AInformationWeek%0D%0AJuly%2024%2C%202007%2004%3A19%20PM%0D%0A%0D%0AThe%20Storm%20worm%20authors%20are%20waging%20a%20multi-pronged%20attack%20and%20generating%20the%20largest%20virus%20attack%20some%20researchers%20say%20they%27ve%20seen%20in%20two%20years.%0D%0A%0D%0A%22We%20are%20basically%20in%20the%20midst%20of%20an%20incredibly%20large%20attack%2C%22%20said%20Adam%20Swidler%2C%20a%20senior%20manager%20with%20security%20company%20Postini.%20%22It%27s%20the%20most%20sustained%20attack%20that%20we%27ve%20seen.%20There%27s%20been%20nine%20to%2010%20days%20straight%20days%20of%20attack%20at%20this%20level.%22%0D%0A%0D%0ASwidler%20said%20in%20an%20interview%20with%20InformationWeek%20that%20the%20attack%20started%20a%20little%20more%20than%20a%20week%20ago%2C%20and%20Postini%20since%20then%20has%20recorded%20200%20million%20spam%20e-mails%20luring%20users%20to%20malicious%20Web%20sites.%20Before%20this%20attack%2C%20an%20average%20day%20sees%20about%201%20million%20virus-laden%20e-mails%2C%20according%20to%20Postini.%20Last%20Thursday%2C%20however%2C%20the%20company%20tracked%2042%20million%20Storm-related%20messages%20in%20that%20day%20alone.%20As%20of%20Tuesday%20afternoon%2C%20Postini%20researchers%20were#&quot; classname=&quot;iAs&quot; class=&quot;iAs&quot;&gt;security &lt;nobr&gt;company&lt;img src=&quot;http://images.intellitxt.com/ast/adTypes/mag-glass_10x10.gif&quot; /&gt;&lt;/nobr&gt;&lt;/a&gt; Postini. &quot;It&#39;s the most sustained attack that we&#39;ve seen. There&#39;s been nine to 10 days straight days of attack at this level.&quot;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;Swidler said in an interview with &lt;i&gt;InformationWeek&lt;/i&gt; that the attack started a little more than a week ago, and Postini since then has recorded 200 million spam e-mails luring users to malicious Web sites. Before this attack, an average day sees about 1 million virus-laden e-mails, according to Postini. Last Thursday, however, the company tracked 42 million Storm-related messages in that day alone. As of Tuesday afternoon, Postini researchers were predicting they would see that day between 4 million and 6 million virus e-mails -- 99% of them associated with the Storm worm.&lt;br /&gt;&lt;/p&gt;&lt;p&gt;While the number of spam e-mails has dropped significantly, it&#39;s still far above normal levels, so Swidler isn&#39;t ready to say the attack is over.&lt;br /&gt;&lt;/p&gt;&lt;p&gt;The viruses are not embedded in the e-mails or in attachments. The e-mails, many of them otherwise empty, contain a link to a compromised Web site where machines are infected with a generic downloader. This helps pull the computers into the malware authors&#39; growing botnet, while also leaving them open for further infection at a later date.&lt;br /&gt;&lt;/p&gt;&lt;p&gt;&quot;This is designed to add computers to the botnet,&quot; said Swidler. &quot;That&#39;s first and foremost their goal.&quot;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;But the Storm worm authors aren&#39;t contenting themselves with this one attack vector.&lt;br /&gt;&lt;/p&gt;&lt;p&gt;Paul Henry, VP of technologies with Secure Computing, said in an interview that the electronic greeting card spam scam that the Storm worm authors launched early in July is stronger than ever. He noted that a friend of his has a company with 100 users and they&#39;re being hit with about 300 e-card spams every day.&lt;br /&gt;&lt;/p&gt;&lt;p&gt;&quot;Back in December, we saw a huge &lt;a set=&quot;yes&quot; linkindex=&quot;57&quot; href=&quot;http://www.informationweek.com/software/showArticle.jhtml?articleID=200001991&quot;&gt;spike in e-card spams&lt;/a&gt; because of the holiday,&quot; he added. &quot;We are at the levels we were seeing back in December right now Most security professionals thought it would show up for Independence Day and then fade immediately, but it&#39;s been escalating for the last few weeks. It&#39;s definitely a pain point.&quot;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;Again, the e-card spam message, which install rootkits in the infected computers, are working to build a botnet. Henry could not say if it&#39;s the same botnet as the other messages are building.&lt;br /&gt;&lt;/p&gt;&lt;p&gt;&quot;I have seen thousands of these e-mails since Independence Day. It&#39;s got to be working for them or they wouldn&#39;t keep doing it,&quot; said Henry.&lt;br /&gt;&lt;/p&gt;&lt;p&gt;Just a few weeks ago, the Storm worm authors began trying to trick users with fraudulent e-mails warning unsuspecting users about &lt;a linkindex=&quot;58&quot; href=&quot;http://www.informationweek.com/management/showArticle.jhtml?articleID=201000483&quot;&gt;virus or spyware infections&lt;/a&gt;. Users around the world were receiving spam messages claiming that viruses or spyware had been detected on the users&#39; systems. It was another attempt to lure users to malicious sites where their computers could be infected&lt;/p&gt;&lt;/div&gt;&lt;/span&gt;&lt;br /&gt;&lt;/p&gt;&lt;/div&gt;</description><link>http://armchairdectective.blogspot.com/2007/07/scarry-storm-worm-erupts-into-worst.html</link><author>noreply@blogger.com (coma12)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3320206899382134956.post-8101245689632935188</guid><pubDate>Thu, 26 Jul 2007 06:24:00 +0000</pubDate><atom:updated>2007-07-26T10:54:41.411-04:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">hilarious</category><category domain="http://www.blogger.com/atom/ns#">japanese</category><category domain="http://www.blogger.com/atom/ns#">weird</category><title>HALARIOUSLY WEIRD - Japanese Noodle Commercials</title><description>&lt;div id=&quot;post-305&quot; class=&quot;post&quot;&gt;&lt;br /&gt;   &lt;h2&gt;&lt;a title=&quot;Permanent Link to Hungry (for giant prehistoric beasts)?&quot; rel=&quot;bookmark&quot; href=&quot;http://www.pinktentacle.com/2007/07/hungry-for-giant-prehistoric-beasts/&quot; linkindex=&quot;62&quot; set=&quot;yes&quot;&gt;Hungry (for giant prehistoric beasts)?&lt;/a&gt;&lt;/h2&gt;&lt;div class=&quot;entry&quot;&gt;&lt;p align=&quot;center&quot;&gt;&lt;img alt=&quot;Giant prehistoric beasts -- &quot; src=&quot;http://www.pinktentacle.com/images/giant_beasts.jpg&quot; /&gt;&lt;/p&gt;&lt;p&gt;In early ’90s Japan, mobs of hungry primeval men hunted gigantic prehistoric creatures in a series of fanciful “Cup Noodle” commercials featuring stop-motion animation by &lt;a href=&quot;http://www.imdb.com/name/nm0087170/&quot; linkindex=&quot;63&quot; set=&quot;yes&quot;&gt;Kim Blanchette&lt;/a&gt;.&lt;/p&gt;&lt;br /&gt;&lt;p&gt;&lt;object height=&quot;350&quot; width=&quot;425&quot;&gt;&lt;br /&gt;&lt;param value=&quot;http://www.youtube.com/v/TYcrCdGcOnU&quot; name=&quot;movie&quot;&gt;&lt;br /&gt;&lt;param value=&quot;transparent&quot; name=&quot;wmode&quot;&gt;&lt;embed wmode=&quot;transparent&quot; type=&quot;application/x-shockwave-flash&quot; src=&quot;http://www.youtube.com/v/TYcrCdGcOnU&quot; height=&quot;350&quot; width=&quot;425&quot;&gt;&lt;/embed&gt;&lt;/object&gt;&lt;a href=&quot;http://www.youtube.com/watch?v=TYcrCdGcOnU&quot; linkindex=&quot;64&quot;&gt;Sea creatures&lt;/a&gt;&lt;/p&gt;&lt;br /&gt;&lt;p&gt;&lt;object height=&quot;350&quot; width=&quot;425&quot;&gt;&lt;br /&gt;&lt;param value=&quot;http://www.youtube.com/v/1JHQqDmp8WI&quot; name=&quot;movie&quot;&gt;&lt;br /&gt;&lt;param value=&quot;transparent&quot; name=&quot;wmode&quot;&gt;&lt;embed wmode=&quot;transparent&quot; type=&quot;application/x-shockwave-flash&quot; src=&quot;http://www.youtube.com/v/1JHQqDmp8WI&quot; height=&quot;350&quot; width=&quot;425&quot;&gt;&lt;/embed&gt;&lt;/object&gt;&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://www.youtube.com/watch?v=1JHQqDmp8WI&quot; linkindex=&quot;65&quot;&gt;Uintatherium&lt;/a&gt;&lt;/p&gt;&lt;br /&gt;&lt;p&gt;&lt;object height=&quot;350&quot; width=&quot;425&quot;&gt;&lt;br /&gt;&lt;param value=&quot;http://www.youtube.com/v/ZxtZHOE4ScY&quot; name=&quot;movie&quot;&gt;&lt;br /&gt;&lt;param value=&quot;transparent&quot; name=&quot;wmode&quot;&gt;&lt;embed wmode=&quot;transparent&quot; type=&quot;application/x-shockwave-flash&quot; src=&quot;http://www.youtube.com/v/ZxtZHOE4ScY&quot; height=&quot;350&quot; width=&quot;425&quot;&gt;&lt;/embed&gt;&lt;/object&gt;&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://www.youtube.com/watch?v=ZxtZHOE4ScY&quot; linkindex=&quot;66&quot;&gt;Moa&lt;/a&gt;&lt;/p&gt;&lt;br /&gt;&lt;p&gt;&lt;object height=&quot;350&quot; width=&quot;425&quot;&gt;&lt;br /&gt;&lt;param value=&quot;http://www.youtube.com/v/MBEQIdGTJdE&quot; name=&quot;movie&quot;&gt;&lt;br /&gt;&lt;param value=&quot;transparent&quot; name=&quot;wmode&quot;&gt;&lt;embed wmode=&quot;transparent&quot; type=&quot;application/x-shockwave-flash&quot; src=&quot;http://www.youtube.com/v/MBEQIdGTJdE&quot; height=&quot;350&quot; width=&quot;425&quot;&gt;&lt;/embed&gt;&lt;/object&gt;&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://www.youtube.com/watch?v=MBEQIdGTJdE&quot; linkindex=&quot;67&quot;&gt;Saiga antelope&lt;/a&gt;&lt;/p&gt;&lt;br /&gt;&lt;p&gt;Check &lt;a href=&quot;http://www.youtube.com/profile_videos?user=dannylava&quot; linkindex=&quot;68&quot;&gt;here&lt;/a&gt; for other beasts in the series, including the mammoth, pterodactyl and giant warthog.&lt;/p&gt;    &lt;/div&gt;    &lt;p class=&quot;postmetadata&quot;&gt;&lt;small&gt;2007.07.16 &lt;!-- by Edo --&gt; |  &lt;a title=&quot;Comment on Hungry (for giant prehistoric beasts)?&quot; href=&quot;http://www.pinktentacle.com/2007/07/hungry-for-giant-prehistoric-beasts/#comments&quot; linkindex=&quot;69&quot;&gt;2 Comments&lt;/a&gt; |         &lt;a rel=&quot;tag&quot; href=&quot;http://www.pinktentacle.com/tag/animal&quot; linkindex=&quot;70&quot;&gt;Animal&lt;/a&gt;, &lt;a rel=&quot;tag&quot; href=&quot;http://www.pinktentacle.com/tag/art&quot; linkindex=&quot;71&quot;&gt;Art&lt;/a&gt;, &lt;a rel=&quot;tag&quot; href=&quot;http://www.pinktentacle.com/tag/giant&quot; linkindex=&quot;72&quot;&gt;Giant&lt;/a&gt;, &lt;a rel=&quot;tag&quot; href=&quot;http://www.pinktentacle.com/tag/relic&quot; linkindex=&quot;73&quot;&gt;Relic&lt;/a&gt;, &lt;a rel=&quot;tag&quot; href=&quot;http://www.pinktentacle.com/tag/video&quot; linkindex=&quot;74&quot;&gt;Video&lt;/a&gt;&lt;/small&gt;&lt;/p&gt;&lt;br /&gt;  &lt;/div&gt;</description><link>http://armchairdectective.blogspot.com/2007/07/halariously-weird-japanese-noodle.html</link><author>noreply@blogger.com (coma12)</author><thr:total>0</thr:total></item></channel></rss>