You are viewing a read-only archive of the Blogs.Harvard network. Learn more.
Skip to content

Category Archives: Interesting Tech

Technology

My first thoughts on the iPhone

“iPhone features a rich HTML email client and Safari — the most advanced web browser ever on a portable device — which automatically syncs bookmarks from your PC or Mac. Safari also includes built-in Google and Yahoo! search. iPhone is fully multi-tasking, so you can read a web page while downloading your email in the […]

Analysis of Microsoft’s Suicide Note (part 2)

“Some argue that the consumer gets little or negative ‘benefit’ from this increase, this is false. The consumer gets premium content on their PC” Pete Levinthal Software Engineering ATI Technologies, Inc This is a fair statement. Playing HD content from a Blueray or HD DVD disk is clearly an advantage that end users would appreciate. […]

Analysis of Microsoft’s Suicide Note (part 1)

[editors note: this is becoming far too long a post for a single entry and will be serialized over the coming week] In a controversial technical analysis Peter Gutmann goes into fantastic detail about the recently released Vista operating system and it’s content protection scheme. One thing became clear to me after reading this analysis. […]

XrML for extensible rights management

XrML provides a universal method for specifying a right (for example, “play” or “copy”) or a condition (such as a time limit) that is associated with a particular work. more information on this here <- warning, pdf

Second Life Population

A group of people who only exist in an online simulation. 400k by Frans Charming 400k users on the front page, I’m 13 days off on my prediction that we would reach it on the end of July. But what does such a number say anyway, if it is constantly redefined as it has been […]

Now That’s Security!

Bank of America has made their web services so secure that even I can not login. And I am the account holder! The failure for my login ability stems from the myriad secondary questions that are all very personal in nature. These “passwords” would read like a diary of your life from place of marriage, […]

Missed Event: Data Surveillance and Privacy Protection

“There has been little discussion of methods and technologies for conducting data surveillance while respecting privacy and preserving civil liberties.” Seem ironic to anyone else? To be fair the CRCS is looking to understand the far more pervasive surveillance infrastructure [being] created around us: the routine use of database information for law enforcement, counter-terrorism, and […]

Super Seed!

The super-seed feature in S-5.5 and on is a new seeding algorithm designed to help a torrent initiator with limited bandwidth “pump up” a large torrent, reducing the amount of data it needs to upload in order to spawn new seeds in the torrent. When a seeding client enters “super-seed mode”, it will not act […]

Noisechain ensures “no single person is provably responsible of hosting/distributing a given file.”

This is a really interesting technology that makes it difficult (if not impossible) to determine who is hosting a particular file. After reading the latest changes to the DMCA we may really need something like this. I’ll blog more about those changes next. An anonymous person will use Noisechain, to break the ‘FILE’ into 5 […]