28 December 2013

Top 7 Reasons Why You Need a Personal Website for personal websites

Top 7 Reasons Why You Need a Personal Website

Having a website of your own equals entering into an invaluable communication environment. There are at least 7 reasons why it is highly advisable for you to be present online:

1. Represents your personal profile
A website can be your virtual portrait, showing off your personal self to the world on a 24/7 basis.  Among the most popular ways of presenting your personality online is keeping a webblog (otherwise known as online diary) or aphoto gallery, where your friends can stay up-to-date with your daily living.
2. Spreads your voice across the world
A website can be your global “tribune” where you are able to share your knowledge, experience and enthusiasm with people who have common interests, but with whom you might not otherwise have crossed paths. A very popular idea-voicing tool is the discussion board, better known as “forum”. You can also have a guestbook on your site, where people can discuss your postings.
3. Lets you be in touch with people at a distance
A website can be a meeting place for making new acquaintances with people of different religion, nationality and age, as well as for keeping in touch with friends who may be on the other side of the world. Thanks to the almost unlimited online communication possibilities you can conduct one-to-one conversations with many different people directly from your website.
4. Broadens disabled people’s interaction with the world
A website empowers people with limited access, due to handicap or illness, to broaden their communication with others. A website can be a physically disabled person’s door to the dynamic world, allowing him/her to bridge over the difficulties of having a “different” everyday life. It can even be their office, where they can present and deliver certain home-made products/services directly from their living room.
5. Creates a web skill development environment
A website can introduce you to the secrets of www. The contemporary web design technologies have brought the art of creating a website just a few clicks away from the inexperienced user. Thanks to the popular WYSWYG(what you see is what you get) web design tools, absolutely everyone (irrespective of age or education degree) can build their own web page without any previous experience.
6. Makes extra profit for you with minimum investment on your part
A website can make residual profit for you, while you are sleeping or enjoying your free time. Thanks to the up-to-date techniques for bringing traffic to your website, you can earn easy money by simply having visitors click on certain product/service promos or links that are relevant to your site content pages (e.g. Google Adsense/Adwords ad solutions) without any initial investment.
7. Makes you a member of the biggest community of the world
A website is a must-have personal attribute nowadays, just like mobile phones and computers are. The fast developing technologies have converted having a website from a whim into a modern necessity. As of today, almost everyone has a web site, whereas twice as many people are expected to be having their own personal space in the global World Wide Web cosmos in the near future. Be forward-thinking, join this trend now.

25 December 2013

Add Your Directory - Enter Directory Details - Directory Critic

Add Your Directory - Enter Directory Details - Directory Critic

17 December 2013

A new social networking digg clone ...

Publish your stories for free and get your site noticed, tell friends to vote for you and get best rank. Visit the new eurabiahosting web hosting and cloud site for social networking : pligg is not dig!

07 December 2013

Fostering Internet Innovation

CORDIS News (12/02/13)
The European Union-funded enabling innovation in the Internet architecture through flexible flow-processing extensions (CHANGE) project is working to accelerate the introduction of core technologies across the network, and also to enable completely new developments, which should result in a better, more efficient Internet. CHANGE researchers want to develop a novel, flow-processing network architecture, making it possible to perform specific processing for some flows but not for others, which would enable developers to overcome the major barriers to the Internet's evolution. A key facet of CHANGE is that the platforms under development can be assembled from standard hardware that is scalable, powerful, and flexible. Open-standard technology will direct traffic flows that need special processing through a set of specific platforms, allowing faster innovation and the deployment of new network technologies. The researchers' overall goal is to develop a broad Internet architecture that combines multiple communicating flow-processing platforms, on which application-specific virtual networks can be built. The researchers say this will accelerate development of innovative products and services on the Internet and lower reduce network costs. They plan to validate the new architecture by testing it with novel applications and services.
http://cordis.europa.eu/fetch?CALLER=EN_NEWS&ACTION=D&RCN=36297

03 December 2013

Group Thinks Anonymity Should Be Baked Into the Internet Itself

Technology Review (11/26/13) David Talbot 

The Internet Engineering Task Force (IETF) has asked the architects of Tor networking software, which is designed to ensure privacy of Internet browsing, to convert the technology into an Internet standard. The wide adoption of such a standard would facilitate easy inclusion of Tor in a broad range of consumer and business products, and consequently allow far more people to browse the Web without being identified by eavesdroppers. "I think there are benefits that might flow in both directions," says Trinity College's Stephen Farrell. "I think other IETF participants could learn useful things about protocol design from the Tor people, who've faced interesting challenges that aren't often seen in practice. And the Tor people might well get interest and involvement from IETF folks who've got a lot of experience with large-scale systems." When someone installs Tor on their computer and takes other precautions, it provides that system with a directory of relays, or network points, whose owners have volunteered to manage Tor traffic. Tor then guarantees that the user's traffic takes additional steps through the Web. The previous computer address and routing information get encrypted at each stop, so the final destination only sees the address of the most recent relay, and none of the previous ones.

23 November 2013

20 November 2013

Building a High-Capacity, Faster Mobile Internet for Everyone

CORDIS News (11/14/13)

Europe has made mobile broadband expansion a top priority, as users seek access to the Internet, email, and workplaces from any location.  The European Union's Beyond Next Generation Mobile Broadband (BUNGEE) project, completed in June 2012, came close to achieving its ambitious goal of increasing the capacity of the mobile network from the current 100 Mbps to 1 Gbps, or 1000 Mbps per square kilometer.  Emerging technologies LTE and WiMAX only support 100 Mbps per square kilometer for regular cellular deployment, which is especially inadequate in dense urban areas with the greatest demand for wireless broadband access.  BUNGEE researchers created a heterogeneous broadband architecture that merges licensed and open radio spectra.  The effort produced a mobile radio system architecture, a high-capacity antenna system, and a deployment strategy based on below-rooftop access base stations.  The BUNGEE researchers say the approach greatly reduces the cost per bit of data transmitted.  The system was tested in a real-life mobile environment, and project partners say the resulting technologies have been promulgated as the new standard for high-capacity, radio-access broadband networks.
http://cordis.europa.eu/fetch?CALLER=EN_NEWS&ACTION=D&SESSION=&RCN=36248

17 November 2013

International Reach of MOOCs Is Limited by Users' Preferences

Chronicle of Higher Education (11/13/13) Hannah Winston 

Speakers at Transatlantic Science Week, sponsored by the Norwegian Ministry of Education and Research, note that massive open online courses (MOOCs) might democratize higher education globally, but significant progress would be required to reach such a point. Norway's minister of education and research Torbjorn Roe Isaksen says MOOCs could "give people all over the world access to education," but he is not aware of MOOCs focusing on developing countries in South America and Africa. In addition, Isaksen says MOOC provider data show that most students already have degrees and are looking to further their learning, indicating that the courses might not draw people who have not had access to higher education. "If MOOCs are going to contribute to the democratization of society, they need to reach new learners," says University of Bergen professor Dag Rune Olsen. Even China, where college overcrowding forces students to go abroad, is not fully embracing MOOCs, says Institute of International Education president Allan Goodman. Students at a recent education exposition in China told Goodman they were aware of MOOCs, but still wanted the on-campus college experience. MOOCs need to understand what students are seeking with on-campus learning if they are to flourish, says Harvard University professor Chris Dede.

14 November 2013

Google Wants Tattoo to Act as Smartphone Microphone

Computerworld (11/11/13) Matt Hamblen

Google is developing an electronic skin tattoo for the throat that can act as a microphone for a smartphone, tablet, or other device.  The tattoo would communicate over near-field communication, Bluetooth, Infrared, or another short-range wireless technology to a nearby mobile device.  The tattoo could include an embedded microphone in addition to a transceiver for enabling wireless communications with a nearby smartphone.  The tattoo also could have a power supply to receive energy from another place on the user's body.  In addition, Google says the system could help reduce street noise and other nearby sounds that often enter microphones and distort communications.  The skin tattoo could even include a galvanic skin response detector to act as a lie detector.  "It is contemplated that a user that may be nervous or engaging in speaking falsehoods may exhibit different galvanic skin response than a more confident, truth-telling individual," according to a patent application for the device.  The application also suggests the wearable device could be used as a user interface to a display, in which specific throat movements cause the display to light up.
http://www.computerworld.com/s/article/9243946/Google_wants_tattoo_to_act_as_smartphone_microphone

13 November 2013

As part of a Russian campaign to make citizens healthier

 
As part of a Russian campaign to make citizens healthier, Moscow subway riders have the option of paying for their tickets in 30 squats: http://cnet.co/1gEmSik

10 November 2013

dotcms Open Source CMS - Open Source Java CMS

Dotcms is the next generation of Enterprise CMS. Quick to deploy, open source, Java-based, open APIs, extensible and massively scalable, dotcms can rapidly deliver personalized, engaging multi-channel sites, web apps, campaigns, one-pagers, intranets - all types of content driven experiences - without calling in your developers.

http://dotcms.com/

Léa Fares

09 November 2013

Should Google Be Forced To Filter Search Results?

There are a lot of people out there with things in their past that they're not proud of. Sometimes those things make there way to the Internet and do a great deal of damage to their reputation. This stuff comes up when people search on Google, and Google traditionally has not removed such content unless required to do so by law.

One man is currently trying to get his damaging content out of Google, and not just removed, but filtered as it's created. A French court has sided with him, and ordered Google to comply.

Do you think Google should be forced to filter results? 

24 September 2013

Detecting Program-Tampering in the Cloud

MIT News (09/11/13) Larry Hardesty 

Massachusetts Institute of Technology (MIT) researchers have developed a system that can quickly verify if a program running on the cloud is executing properly, and that no malicious code is interfering with the program. The system also protects the data used by applications running in the cloud, cryptographically ensuring that the user will not learn anything other than the immediate results of the requested computation. The system currently only works with programs written in the C programming language, but the researchers say adapting it to other languages should be straight forward. MIT's Alessandro Chiesa notes that since the system protects both the integrity of programs running in the cloud and the data they use, it is a good complement to the cryptographic technique known as homomorphic encryption, which protects the data transmitted by the users of cloud applications. The system implements a variation of a zero-knowledge proof, a type of mathematical game that enables one of the game's players to prove to the other that he or she knows a secret key without actually divulging it.

13 September 2013

05 September 2013

DuckDuckGo Friends Newsletter #42


> Dear DuckDuckGo friends,
>
> Two new search records last month: breaking 4 million a day and 115 million for the month! https://duckduckgo.com/traffic/
>
> We've continued to roll out changes to our community platform at http://dukgo.com/ and have a bunch more in store over the next few months. We're trying to consolidate all of our secondary sites onto this open-source platform. From this past month check out:
> -- new help pages: https://dukgo.com/help/en_US
> -- new feedback system: https://duckduckgo.com/feedback
> -- new blog posts highlighting some of our search partners: https://dukgo.com/blog
>
> Thank you for your continued support!
>
> The DuckDuckGo Team

11 August 2013

Acer Microsoft google

http://www.appy-geek.com/Web/ArticleWeb.aspx?regionid=2&articleid=11862345

11 July 2013

Build Your Own Internet With Mobile Mesh Networking

Technology Review (07/09/13) Tom Simonite 

Flinders University researchers have developed Serval, an app that creates a mesh network, enabling nearby phones to link up using their Wi-Fi connections, as long as they have been modified to disable the usual security restrictions. Serval enables voice calls, text messages, file transfers, and more to take place between devices, even if they are not in range of one another to communicate normally. "We're trying to dramatically increase the usability and take this out of the geekosphere," says Commotion Wireless project leader Sascha Meinrath. The project is developing several software packages that enable people to create mesh networks using low-cost Internet and networking hardware. The networks offer free Internet access by extending the reach of free connections offered by community centers, as well as Web services and apps that function only within the local mesh. The Commotion Wireless project also is developing mesh software for people that cannot use conventional connectivity because it is not safe, such as political dissidents. The researchers are adapting an encrypted chat program called Cryptocat so it can be used to communicate securely across a local mesh network.

10 July 2013

Protecting Data in the Cloud

MIT News (07/02/13) Larry Hardesty

Massachusetts Institute of Technology (MIT) researchers have developed Ascend, a type of secure hardware component that can disguise a server's memory-access patterns, making it impossible for an attacker to infer anything about the data being stored. Ascend also stops timing attacks, which attempt to infer information from the amount of time that computations take. "This is the first time that any hardware design has been proposed--it hasn’t been built yet--that would give you this level of security while only having about a factor of three or four overhead in performance," says MIT professor Srini Devadas. The system involves arranging memory addresses in a data structure known as a tree. Every node in the tree lies along some path that starts at the top and passes from node to node, without backtracking, until arriving at a node with no further connections. Ascend prevents attackers from inferring anything from sequences of memory access by randomly swapping that address with one stored somewhere else in the tree. Therefore, accessing a single address multiple times will very rarely require traversing the same path.

Big Data Needs Creative Types, Too


Information Week, June 24
While today's data scientists must have knowledge of multiple technical and business disciplines -- including analytics, computer science, math, modeling and statistics -- it's also becoming a prerequisite to be able to showcase creative approaches to data analysis. Not surprisingly, it's often a challenge to find individuals with such a wide range of abilities, a reality that might soon transform the position of data scientist into three distinct job categories. There will be technologists to write algorithms and code; statisticians and quantitative analysts to crunch numbers; and creative thinkers who will find insights in data that their more technically inclined colleagues might miss. For companies, the challenge will be to combine these different personality types into one cohesive Big Data team.
In the Big Data world, the technologists are the people who build the systems, get data loaded and transferred and maintain the critical infrastructure of a company. The creative analysts, in turn, will mine massive volumes of data for actionable insights. Not surprisingly, these so-called "artist explorers" probably won't manage computer systems; instead, they will be completely operationally focused and a little more creative and strategic in the way they think. As a result of this transformation of the data scientist role, universities and technology companies must work together to address the "data skills gap" by giving students the tools and training to compete in a data-driven economy.
As Big Data tools grow increasingly sophisticated and automated, demand for highly trained technologists will remain high. The good news is that this projected division of labor -- technologists, quantitative analysts, and "artist explorers" -- will not reduce the need for data scientists. The six-figure salary of a career in data science will continue to attract talented people -- especially younger workers starting out on their career who are looking for something where they're going to be gainfully employed and be able to make some money. Besides, the job is fun: you can't get bored when you're doing data exploration and business intelligence because every day there's a new competitor and a new marketplace, as well as new data, algorithms, and relationships.

Click Here to View Full Article