1. Represents your personal profileA website can be your virtual portrait, showing off your personal self to the world on a 24/7 basis. Among the most popular ways of presenting your personality online is keeping a webblog (otherwise known as online diary) or aphoto gallery, where your friends can stay up-to-date with your daily living.
2. Spreads your voice across the worldA website can be your global “tribune” where you are able to share your knowledge, experience and enthusiasm with people who have common interests, but with whom you might not otherwise have crossed paths. A very popular idea-voicing tool is the discussion board, better known as “forum”. You can also have a guestbook on your site, where people can discuss your postings.
3. Lets you be in touch with people at a distanceA website can be a meeting place for making new acquaintances with people of different religion, nationality and age, as well as for keeping in touch with friends who may be on the other side of the world. Thanks to the almost unlimited online communication possibilities you can conduct one-to-one conversations with many different people directly from your website.
4. Broadens disabled people’s interaction with the worldA website empowers people with limited access, due to handicap or illness, to broaden their communication with others. A website can be a physically disabled person’s door to the dynamic world, allowing him/her to bridge over the difficulties of having a “different” everyday life. It can even be their office, where they can present and deliver certain home-made products/services directly from their living room.
5. Creates a web skill development environmentA website can introduce you to the secrets of www. The contemporary web design technologies have brought the art of creating a website just a few clicks away from the inexperienced user. Thanks to the popular WYSWYG(what you see is what you get) web design tools, absolutely everyone (irrespective of age or education degree) can build their own web page without any previous experience.
6. Makes extra profit for you with minimum investment on your partA website can make residual profit for you, while you are sleeping or enjoying your free time. Thanks to the up-to-date techniques for bringing traffic to your website, you can earn easy money by simply having visitors click on certain product/service promos or links that are relevant to your site content pages (e.g. Google Adsense/Adwords ad solutions) without any initial investment.
7. Makes you a member of the biggest community of the worldA website is a must-have personal attribute nowadays, just like mobile phones and computers are. The fast developing technologies have converted having a website from a whim into a modern necessity. As of today, almost everyone has a web site, whereas twice as many people are expected to be having their own personal space in the global World Wide Web cosmos in the near future. Be forward-thinking, join this trend now.
28 December 2013
25 December 2013
17 December 2013
07 December 2013
The European Union-funded enabling innovation in the Internet architecture through flexible flow-processing extensions (CHANGE) project is working to accelerate the introduction of core technologies across the network, and also to enable completely new developments, which should result in a better, more efficient Internet. CHANGE researchers want to develop a novel, flow-processing network architecture, making it possible to perform specific processing for some flows but not for others, which would enable developers to overcome the major barriers to the Internet's evolution. A key facet of CHANGE is that the platforms under development can be assembled from standard hardware that is scalable, powerful, and flexible. Open-standard technology will direct traffic flows that need special processing through a set of specific platforms, allowing faster innovation and the deployment of new network technologies. The researchers' overall goal is to develop a broad Internet architecture that combines multiple communicating flow-processing platforms, on which application-specific virtual networks can be built. The researchers say this will accelerate development of innovative products and services on the Internet and lower reduce network costs. They plan to validate the new architecture by testing it with novel applications and services.
03 December 2013
The Internet Engineering Task Force (IETF) has asked the architects of Tor networking software, which is designed to ensure privacy of Internet browsing, to convert the technology into an Internet standard. The wide adoption of such a standard would facilitate easy inclusion of Tor in a broad range of consumer and business products, and consequently allow far more people to browse the Web without being identified by eavesdroppers. "I think there are benefits that might flow in both directions," says Trinity College's Stephen Farrell. "I think other IETF participants could learn useful things about protocol design from the Tor people, who've faced interesting challenges that aren't often seen in practice. And the Tor people might well get interest and involvement from IETF folks who've got a lot of experience with large-scale systems." When someone installs Tor on their computer and takes other precautions, it provides that system with a directory of relays, or network points, whose owners have volunteered to manage Tor traffic. Tor then guarantees that the user's traffic takes additional steps through the Web. The previous computer address and routing information get encrypted at each stop, so the final destination only sees the address of the most recent relay, and none of the previous ones.
23 November 2013
Posted via Blogaway
20 November 2013
Europe has made mobile broadband expansion a top priority, as users seek access to the Internet, email, and workplaces from any location. The European Union's Beyond Next Generation Mobile Broadband (BUNGEE) project, completed in June 2012, came close to achieving its ambitious goal of increasing the capacity of the mobile network from the current 100 Mbps to 1 Gbps, or 1000 Mbps per square kilometer. Emerging technologies LTE and WiMAX only support 100 Mbps per square kilometer for regular cellular deployment, which is especially inadequate in dense urban areas with the greatest demand for wireless broadband access. BUNGEE researchers created a heterogeneous broadband architecture that merges licensed and open radio spectra. The effort produced a mobile radio system architecture, a high-capacity antenna system, and a deployment strategy based on below-rooftop access base stations. The BUNGEE researchers say the approach greatly reduces the cost per bit of data transmitted. The system was tested in a real-life mobile environment, and project partners say the resulting technologies have been promulgated as the new standard for high-capacity, radio-access broadband networks.
17 November 2013
Speakers at Transatlantic Science Week, sponsored by the Norwegian Ministry of Education and Research, note that massive open online courses (MOOCs) might democratize higher education globally, but significant progress would be required to reach such a point. Norway's minister of education and research Torbjorn Roe Isaksen says MOOCs could "give people all over the world access to education," but he is not aware of MOOCs focusing on developing countries in South America and Africa. In addition, Isaksen says MOOC provider data show that most students already have degrees and are looking to further their learning, indicating that the courses might not draw people who have not had access to higher education. "If MOOCs are going to contribute to the democratization of society, they need to reach new learners," says University of Bergen professor Dag Rune Olsen. Even China, where college overcrowding forces students to go abroad, is not fully embracing MOOCs, says Institute of International Education president Allan Goodman. Students at a recent education exposition in China told Goodman they were aware of MOOCs, but still wanted the on-campus college experience. MOOCs need to understand what students are seeking with on-campus learning if they are to flourish, says Harvard University professor Chris Dede.
14 November 2013
Google is developing an electronic skin tattoo for the throat that can act as a microphone for a smartphone, tablet, or other device. The tattoo would communicate over near-field communication, Bluetooth, Infrared, or another short-range wireless technology to a nearby mobile device. The tattoo could include an embedded microphone in addition to a transceiver for enabling wireless communications with a nearby smartphone. The tattoo also could have a power supply to receive energy from another place on the user's body. In addition, Google says the system could help reduce street noise and other nearby sounds that often enter microphones and distort communications. The skin tattoo could even include a galvanic skin response detector to act as a lie detector. "It is contemplated that a user that may be nervous or engaging in speaking falsehoods may exhibit different galvanic skin response than a more confident, truth-telling individual," according to a patent application for the device. The application also suggests the wearable device could be used as a user interface to a display, in which specific throat movements cause the display to light up.
13 November 2013
10 November 2013
Dotcms is the next generation of Enterprise CMS. Quick to deploy, open source, Java-based, open APIs, extensible and massively scalable, dotcms can rapidly deliver personalized, engaging multi-channel sites, web apps, campaigns, one-pagers, intranets - all types of content driven experiences - without calling in your developers.
09 November 2013
One man is currently trying to get his damaging content out of Google, and not just removed, but filtered as it's created. A French court has sided with him, and ordered Google to comply.
Do you think Google should be forced to filter results?
24 September 2013
Massachusetts Institute of Technology (MIT) researchers have developed a system that can quickly verify if a program running on the cloud is executing properly, and that no malicious code is interfering with the program. The system also protects the data used by applications running in the cloud, cryptographically ensuring that the user will not learn anything other than the immediate results of the requested computation. The system currently only works with programs written in the C programming language, but the researchers say adapting it to other languages should be straight forward. MIT's Alessandro Chiesa notes that since the system protects both the integrity of programs running in the cloud and the data they use, it is a good complement to the cryptographic technique known as homomorphic encryption, which protects the data transmitted by the users of cloud applications. The system implements a variation of a zero-knowledge proof, a type of mathematical game that enables one of the game's players to prove to the other that he or she knows a secret key without actually divulging it.
13 September 2013
07 September 2013
05 September 2013
> Dear DuckDuckGo friends,
> Two new search records last month: breaking 4 million a day and 115 million for the month! https://duckduckgo.com/traffic/
> We've continued to roll out changes to our community platform at http://dukgo.com/ and have a bunch more in store over the next few months. We're trying to consolidate all of our secondary sites onto this open-source platform. From this past month check out:
> -- new help pages: https://dukgo.com/help/en_US
> -- new feedback system: https://duckduckgo.com/feedback
> -- new blog posts highlighting some of our search partners: https://dukgo.com/blog
> Thank you for your continued support!
> The DuckDuckGo Team
11 August 2013
11 July 2013
Flinders University researchers have developed Serval, an app that creates a mesh network, enabling nearby phones to link up using their Wi-Fi connections, as long as they have been modified to disable the usual security restrictions. Serval enables voice calls, text messages, file transfers, and more to take place between devices, even if they are not in range of one another to communicate normally. "We're trying to dramatically increase the usability and take this out of the geekosphere," says Commotion Wireless project leader Sascha Meinrath. The project is developing several software packages that enable people to create mesh networks using low-cost Internet and networking hardware. The networks offer free Internet access by extending the reach of free connections offered by community centers, as well as Web services and apps that function only within the local mesh. The Commotion Wireless project also is developing mesh software for people that cannot use conventional connectivity because it is not safe, such as political dissidents. The researchers are adapting an encrypted chat program called Cryptocat so it can be used to communicate securely across a local mesh network.
10 July 2013
Massachusetts Institute of Technology (MIT) researchers have developed Ascend, a type of secure hardware component that can disguise a server's memory-access patterns, making it impossible for an attacker to infer anything about the data being stored. Ascend also stops timing attacks, which attempt to infer information from the amount of time that computations take. "This is the first time that any hardware design has been proposed--it hasn’t been built yet--that would give you this level of security while only having about a factor of three or four overhead in performance," says MIT professor Srini Devadas. The system involves arranging memory addresses in a data structure known as a tree. Every node in the tree lies along some path that starts at the top and passes from node to node, without backtracking, until arriving at a node with no further connections. Ascend prevents attackers from inferring anything from sequences of memory access by randomly swapping that address with one stored somewhere else in the tree. Therefore, accessing a single address multiple times will very rarely require traversing the same path.
Information Week, June 24
Click Here to View Full Article
07 July 2013
06 July 2013
05 July 2013
04 July 2013
03 July 2013
02 July 2013