http://www.wired.com/gadgetlab/2012/08/mat-honan-data-recovery/all/
Archive for the 'tech' Category
How I Got My Digital Life Back Again After An Epic Hacking | Gadget Lab | Wired.com
October 20, 2012The Rebel Code – NY Times (a blast from the past!)
October 20, 2012The New MakerBot Replicator Might Just Change Your World | Wired Design | Wired.com
October 14, 2012Can Etsy Go Pro Without Losing Its Soul? | Wired Design | Wired.com
October 14, 2012It’s All In Your Head – Forbes – Nice description of Metcalfe’s Law by its inventor
October 13, 2012http://www.forbes.com/forbes/2007/0507/052.html
QT:”
Using a 35mm slide (see chart below), I argued that my customers needed their Ethernets to grow above a certain critical mass if they were to reap the benefits of the network effect. …. The cost of installing the cards at, say, a corporation would be proportional to the number of cards installed. The value of the network, though, would be proportional to the square of the number of users…..
Why should that be so? The network effect says that the value of that Ethernet card to the person on whose desk it sits is proportional to the number, N, of other computer users he can connect to. Now multiply this value by the number of users, and you have a value for the whole operation that is roughly proportional to N^2.
…
In 1993 George Gilder, seeking to quantify the network effect, uncovered a slide from my 1980s Ethernet sales presentation and the formula saying that value is proportional to N 2. He christened it Metcalfe’s Law….
Recall that there is a critical mass beyond which the value of the network exceeds its cost. Where is this crossover point? You can find it by solving CxN=BxN 2, where C is the constant of proportionality of cost and B is the constant of proportionality of value. The critical mass threshold can be expressed as N=C÷B. Not surprisingly, the lower the cost per connection, the lower the critical mass. The higher the value per connection, the lower the critical mass.
“
Internet Infringement: Right-Click Conflicts | Shutterbug
October 12, 2012http://www.shutterbug.com/content/internet-infringement-right-click-conflicts
practical guide to getting ripped off on the internet
A Dragon That Takes Dictation and Controls a Mac by Voice – WSJ.com
October 12, 2012Nuance Dragon Dictate 3 Voice Recognition Software for Mac Review – Walter S. Mossberg – Personal Technology – AllThingsD
October 12, 2012Frankenstein virus creates malware by pilfering code – 20 August 2012 – New Scientist
October 9, 2012http://www.newscientist.com/article/mg21528785.600-frankenstein-virus-creates-malware-by-pilfering-code.html
virus stitches itself together from code on your computer
How do I send encrypted email?
October 7, 2012http://ask-leo.com/how_do_i_send_encrypted_email.html
Nice discussion of using gpg