Archive for the 'tech' Category

How I Got My Digital Life Back Again After An Epic Hacking | Gadget Lab | Wired.com

October 20, 2012

http://www.wired.com/gadgetlab/2012/08/mat-honan-data-recovery/all/

The Rebel Code – NY Times (a blast from the past!)

October 20, 2012

http://www.nytimes.com/1999/02/21/magazine/the-rebel-code.html

The New MakerBot Replicator Might Just Change Your World | Wired Design | Wired.com

October 14, 2012

http://www.wired.com/design/2012/09/how-makerbots-replicator2-will-launch-era-of-desktop-manufacturing

Can Etsy Go Pro Without Losing Its Soul? | Wired Design | Wired.com

October 14, 2012

http://www.wired.com/design/2012/09/etsy-goes-pro

It’s All In Your Head – Forbes – Nice description of Metcalfe’s Law by its inventor

October 13, 2012

http://www.forbes.com/forbes/2007/0507/052.html

QT:”

Using a 35mm slide (see chart below), I argued that my customers needed their Ethernets to grow above a certain critical mass if they were to reap the benefits of the network effect. …. The cost of installing the cards at, say, a corporation would be proportional to the number of cards installed. The value of the network, though, would be proportional to the square of the number of users…..
Why should that be so? The network effect says that the value of that Ethernet card to the person on whose desk it sits is proportional to the number, N, of other computer users he can connect to. Now multiply this value by the number of users, and you have a value for the whole operation that is roughly proportional to N^2.

In 1993 George Gilder, seeking to quantify the network effect, uncovered a slide from my 1980s Ethernet sales presentation and the formula saying that value is proportional to N 2. He christened it Metcalfe’s Law….
Recall that there is a critical mass beyond which the value of the network exceeds its cost. Where is this crossover point? You can find it by solving CxN=BxN 2, where C is the constant of proportionality of cost and B is the constant of proportionality of value. The critical mass threshold can be expressed as N=C÷B. Not surprisingly, the lower the cost per connection, the lower the critical mass. The higher the value per connection, the lower the critical mass.

Internet Infringement: Right-Click Conflicts | Shutterbug

October 12, 2012

http://www.shutterbug.com/content/internet-infringement-right-click-conflicts
practical guide to getting ripped off on the internet

A Dragon That Takes Dictation and Controls a Mac by Voice – WSJ.com

October 12, 2012

http://online.wsj.com/article/SB10000872396390443982904578046583290174540.html

Nuance Dragon Dictate 3 Voice Recognition Software for Mac Review – Walter S. Mossberg – Personal Technology – AllThingsD

October 12, 2012

http://allthingsd.com/20121009/a-dragon-that-takes-dictation-and-controls-a-mac-by-voice

Frankenstein virus creates malware by pilfering code – 20 August 2012 – New Scientist

October 9, 2012

http://www.newscientist.com/article/mg21528785.600-frankenstein-virus-creates-malware-by-pilfering-code.html
virus stitches itself together from code on your computer

How do I send encrypted email?

October 7, 2012

http://ask-leo.com/how_do_i_send_encrypted_email.html
Nice discussion of using gpg