Updated: 5/16/2006; 11:52:20 AM.

Ken Novak's Weblog
Purpose of this blog: to retain annotated bookmarks for my future reference, and to offer others my filter technology and other news. Note that this blog is categorized. Use the category links to find items that match your interests.
Subscribe to get this blog by e-mail.
New: Read what I'm reading on Bloglines.



daily link  Tuesday, August 03, 2004


The Niger forgeries: British newspapers report that an Italian fraudster claims to be the source.  Very interesting account of how the political demand for evidence about Iraq (in this case, ironically, from French intelligence) resulted in the supply of  fictitious information.  11:52:28 PM  permalink  

newsmap: A visual rendering of google news, with cool options for filtering categories or countries and reaching back in time.  11:04:21 PM  permalink  

Dialogue with the Grassroots: A collaborative project between Mountain Forum and Radio Sagarmatha in Nepal.  Interesting model of collaboration between an international NGO and community broadcasters to develop and deliver audio content in local languages.  The Mountain Forum is an interesting collection of people and institutions with many moderated email distribution lists.  1:14:26 PM  permalink  

Heading for trouble:  Prescient criticisms of Iraq invasion from Nov 2002 by a Reagan Secy of the Navy: "The connotations of "a MacArthurian regency in Baghdad" show how inapt the comparison is. Our occupation forces never set foot inside Japan until the emperor had formally surrendered and prepared Japanese citizens for our arrival. Nor did MacArthur destroy the Japanese government  .. The Iraqis are a multiethnic people filled with competing factions who in many cases would view a U.S. occupation as infidels invading the cradle of Islam. Indeed, this very bitterness provided Osama bin Laden the grist for his recruitment efforts in Saudi Arabia when the United States kept bases on Saudi soil after the Gulf War.

In Japan, American occupation forces quickly became 50,000 friends. In Iraq, they would quickly become 50,000 terrorist targets.

Nations such as China can only view the prospect of an American military consumed for the next generation by the turmoil of the Middle East as a glorious windfall. Indeed, .. it lends credence to their insistent cultivation of the Muslim world. One should not take lightly the fact that China previously supported Libya, that Pakistan developed its nuclear capability with China's unrelenting assistance and that the Chinese sponsored a coup attempt in Indonesia in 1965. An "American war" with the Muslims, occupying the very seat of their civilization, would allow the Chinese to isolate the United States diplomatically as they furthered their own ambitions in South and Southeast Asia."  12:54:33 PM  permalink  

Sustainable Resources:  "An International Forum Connecting People with Hands-on Solutions to World Poverty."  Boulder CO, Sept 30 - Oct 2, 2004 (plus pre- and post-conference workshops).  Keynotes by John Todd, A.T. Ariyaratne, William McDonough.

Unfortunately, it overlaps with Engineers for a Sustainable World - 2004 National Conference, Stanford CA, Sept 30-October 2, 2004.  Keynotes by William McDonough (busy guy!), and Jeffrey Sachs.

  12:27:22 PM  permalink  

RSA Security - The Blocker Tag: Selective Blocking of RFID Tags for Consumer Privacy: Clever scheme for allowing consumers to block scanning of tags on items that they have purchased (eg, while in public places), and allowing scanning of those same items when desired (eg, in a medicine cabinet or refrigerator at home). 

"One may think of a the RSA® Blocker Tag as "spamming" any reader that attempts to scan tags without the right authorization. (The RSA® Blocker Tag manipulates the reading protocol with the aim of making the reader think that RFID tags representing all possible serial numbers are present.) When a Blocker is in proximity to ordinary RFID tags, they benefit from its shielding behavior; when the Blocker tag is removed, the ordinary RFID tags may be used normally.

Thanks to their selective nature, RSA® Blocker Tags are designed not to interfere with the normal operation of RFID systems in retail environments. They help prevent unwanted scanning of purchased items, but do not affect the scanning of shop inventories. Thus RSA® Blocker Tags are designed not to be usable, for example, to circumvent theft-control systems or mount denial-of-service attacks -- only to protect the privacy of law-abiding consumers."

  9:53:04 AM  permalink  

 

August 2004
Sun Mon Tue Wed Thu Fri Sat
1 2 3 4 5 6 7
8 9 10 11 12 13 14
15 16 17 18 19 20 21
22 23 24 25 26 27 28
29 30 31        
Jul   Sep


Links to related pages:
-
Subscribe to "Ken Novak's Weblog" in Radio UserLand.

Click to see the XML version of this web page.
Click here to send an email to the editor of this weblog. E-mail me
Click here to visit the Radio UserLand website.

jenett.radio.simplicity.1.3R


Copyright 2006 © Ken Novak.
Last update: 5/16/2006; 11:52:20 AM.