background preloader

Technology

Facebook Twitter

Ad-free

Enterprise Output Management from Actuate - Xenos Group. Cooperation. Energy. Free Energy Research Archive. Contest For Google's New Motto.... Amplify.com is shutting down. Senior Bioinformatician – Parasite Informatics - Reference 81102 : Hinxton, United Kingdom : Naturejobs. James Clerk Maxwell: A Treatise on Electricity and Magnetism. RedyWIFI. REST APIs must be hypertext-driven » Untangled. I am getting frustrated by the number of people calling any HTTP-based interface a REST API. Today’s example is the SocialSite REST API. That is RPC. It screams RPC. There is so much coupling on display that it should be given an X rating. What needs to be done to make the REST architectural style clear on the notion that hypertext is a constraint?

In other words, if the engine of application state (and hence the API) is not being driven by hypertext, then it cannot be RESTful and cannot be a REST API. API designers, please note the following rules before calling your creation a REST API: A REST API should not be dependent on any single communication protocol, though its successful mapping to a given protocol may be dependent on the availability of metadata, choice of methods, etc.

There are probably other rules that I am forgetting, but the above are the rules related to the hypertext constraint that are most often violated within so-called REST APIs. MIT's Guru of Low-Tech Engineering Fixes the World on $2 a Day. Amy B. Smith grew up in the Boston suburb of Lexington, Mass., not far from MIT, where her father taught electrical engineering; Smith's mother taught math and Latin in a local school. A childhood year the family spent in India sparked Smith's interest in the developing world. "Seeing that many people living in poverty must have made a lasting impression on me," she says, "because I've known my whole life I'd do this work. " As a child, she set aside half her babysitting earnings for UNICEF; then, after completing her undergraduate degree at MIT, she joined the Peace Corps and spent four years working as a beekeeper and teacher in Botswana's Kalahari Desert.

Smith returned to Cambridge to earn a master's degree in mechanical engineering. She finished her degree in 1996, and went looking for design challenges, turning first to her contacts in Botswana. MIT's Guru of Low-Tech Engineering Fixes the World on $2 a Day. The Peruvian village of Compone lies 11,000 ft. above sea level in El Valle Sagrado de los Incas, the Sacred Valley of the Incas. Flat but ringed by mountains, the tallest capped year-round in snow and ice, the valley is graced with a mild climate and mineral-rich soil that for centuries has produced what the Incas called sara—corn.

The farmers of Compone feed corn to their livestock, grind it into meal, boil it for breakfast, lunch and dinner and stockpile it as insurance against future unknowns. They burn the corncobs, stripped of kernels, in the earthen stoves they use for cooking and to heat their homes. It's the stoves that worry Amy Smith. One morning, the 45-year-old inventor stands on the front lawn of the town's community center, beside a 55-gal. drum packed with corncobs that is billowing smoke, a box of matches in her hand and dressed for comfort in faded jeans, avocado T-shirt and a baseball cap pulled over a thick curtain of dirty-blond hair.

DISCERN Artificial Neural Network - How to Build a Schizophrenic Computer. Schizophrenia is one of the most infamous and mysterious mental disorders. Attempting to get to the root of the problem, scientists recently came up with an extraordinary solution: They built a schizophrenic computer. In a study published in the online version of Biological Psychiatry in March, researchers altered an artificial neural network capable of learning language and stories, to the point where it started "acting" schizophrenic. People who suffer from schizophrenia often have difficulty thinking logically or discerning what is real or not real in their lives. "It is characterized by delusions or disassociation of language, often with hallucinations of spoken speech," says psychiatrist Ralph Hoffman of Yale University, coauthor of the study along with computer scientist Risto Miikkulainen of the University of Texas, Austin.

Because of that language disassociation, struggling to recount stories correctly is one of the early signs of schizophrenia. What is Global Positioning System (GPS)? - Definition from Whatis.com. The GPS (Global Positioning System) is a "constellation" of 24 well-spaced satellites that orbit the Earth and make it possible for people with ground receivers to pinpoint their geographic location. The location accuracy is anywhere from 100 to 10 meters for most equipment. Accuracy can be pinpointed to within one (1) meter with special military-approved equipment.

GPS equipment is widely used in science and has now become sufficiently low-cost so that almost anyone can own a GPS receiver. The GPS is owned and operated by the U.S. 21 GPS satellites and three spare satellites are in orbit at 10,600 miles above the Earth. The GPS is being used in science to provide data that has never been available before in the quantity and degree of accuracy that the GPS makes possible.

GPS receivers are becoming consumer products. Contributor(s): Moshe Peleg This was last updated in May 2007 Email Alerts By submitting you agree to receive email from TechTarget and its partners. More News and Tutorials. Bootstrapping a Startup. A Shiny New Me • HTML5 Native Video Streaming With WebRTC. HTML5 Native Video Streaming With WebRTC I did a tounge-in-cheek video response to Web Bos this week who sumbitted this epic video for FluentConf showcasing his all around HTML5 video awesomeness. In this video he streams directly to his browser and applies effects on the fly from the console.

If this doesn’t impress you, you may be heavily medicated. Uh - yeah. Like A Boss. Or rather like a Bos. Now I saw this and had 2 thoughts… 1. 2. In the name of education and also to increase my own chances of getting picked up for FluentConf, I made an HTML5 video video of my own. My video wasn’t nearly as good, but I really enjoyed working with the new methods for capturing native video with nothing but a browser. WebRTC First lets do a little primer on WebRTC. Apparently, WebRTC has been around for a while and according to the WebRTC site is: "Already integrated with best-of-breed voice and video engines that have been deployed on millions of end points over the last 8+ years.

". Browser Support. Dr. James E. West: Inventor of the Electret Microphone | Famous Black Inventors - May the Words have Power. RootSmart Android Malware May Be Able To Sneak By Google’s New Bouncer (Update) Remember that Bouncer Google put in the Android Market to act as a goalie for all potential malware attacks? It would seem that Google’s Bouncer doesn’t catch everything as Professor Xuxian Jiang, the same guy who discovered dozens of other Android malware attacks, has found yet another exploit called RootSmart. RootSmart works very similarly to a proof-of-concept app built by Jon Oberheide, by “dynamically fetching the GingerBreak root exploit from a remote server and then executing it to escalate its privilege.”

This basically means that a malicious RootSmart app installs itself on the device with virtually no malicious code whatsoever, and the code is then fed to the app/device from remote servers. Since Bouncer works by scanning for known bits of malicious code, it makes RootSmart a very difficult bit of malware to find.

However, RootSmart has not been found within the official Android Market thus far. Thousands Of Webcams Made Publicly Accessible By Software Bug. 26 models of Trendnet webcams have been identified as vulnerable to a bug that lets anyone tap into the video stream with just an IP address. The flaw was noted a month ago and the company has been working to alert people and patch the devices. Unfortunately, the company has no way of contacting non-registered webcam owners, and so the devices may remain accessible if the users never suspect anything.

It’s a bit scary, but certainly not unprecedented. Although it’s not quite the same thing, two years ago a school was accused of spying on its students via the webcams in school-owned laptops (the district later settled). This time, it’s hackers who found their way in, and randoms on the internet who spent long hours watching the feeds. The security flaw was posted by Console Cowboys on January 10th; the susceptible devices were easily found, as they identify themselves in such a way that their IP can simply be scraped for. The company has put up a warning and list of affected models here. Terminator-Style Contact Lens Closer to Reality. Cyborgs of the future beware: Humans are working on computerized contact lenses with display technology. "Some day maybe we'll have full-fledged streaming in your contact lenses," said Babak Amir Parviz, an associate professor of electrical engineering at the University of Washington who co-authored a paper describing the computerized new contact lens in the latest issue of the Journal of Micromechanics and Microengineering.

SCIENCE CHANNEL VIDEO: Robots Become Human Parviz along with an international team of engineers has constructed a contact lens embedded with a tiny LED that can light up when a wireless signal is sent to it. Parviz collaborated on the device with UW ophthalmologist Tueng Shen and researchers from Aalto University in Finland led by optoelectronics professor Markku Sopanen. Parviz's group specializes in incorporating miniaturized devices into unconventional materials and has been working on functional contact lenses for a while, he said. VIDEO: Cyborgs. Independent Engineer Verifications of WITTS Technologies. We have over 500 independent engineers’ verifications at this time. Here are the top 9 independent engineer verifications on video. ENJOY! Independent Engineers Verifications – Reijo Valtonen Verifying Some Surprising Results Using The Battery Quickener Reijo Valtonen reveals results he witnessed when testing the WITTS Battery Quickener, his own battery, and his own test equipment yielding efficiencies well over 120%!

Independent engineers come forward to make public statements or show their own work confirming the legitimacy of WITTS technologies. This clip shows Another Independent Verification of some of WITTS’ Technologies. Another Independent Verification of WITTS Technologies – Riscalla Stephen 2013 Not only did it run for approximately 15 min, but it charged up 2 very large capacitors during this time to the full 927 volts and it lit up two 40W light bulbs the entire time. Independent Engineers Verifications. Independent Engineers Verifications.

Hands on engineer Olin Geiser. Practical Guide to Free-Energy Devices - eBook Download. This is Version 25.5 of a large eBook of some 2,600 pages, with a file size of about 40 Mb. which may take some minutes to download. The eBook has more than 400 Bookmarks so that you can access any topic easily. The most recent updates are listed here. You will need Adobe's Acrobat Reader program Version 7 or later to display this document. If you do not have it already, then it can be downloaded free from the Adobe website. Please be aware that some copies of Acrobat Reader Version 9.1.0 are not able to display all .pdf documents properly. Earlier and later versions work perfectly. Alternatively, you can use this free download service: FileFactory An attempted translation (without the Appendix) into French is ici (26 Mb), in Spanish is aquí (41 Mb), in Italian is qui (23 Mb) and in German is hier (20 Mb).

The English-language web site is here. UNLIMITED FREE ENERGY IDENTIFIED Part 2. UNLIMITED FREE ENERGY IDENTIFIED. Processing.org. i18nm: URL encoding code. Internationalization This page is no longer maintained and may be inaccurate. For more up-to-date information, see the Internationalization Activity home page.

URI encoding programs For worldwide interoperability, URIs have to be encoded uniformly. Convert the character string into a sequence of bytes using the UTF-8 encoding Convert each byte that is not an ASCII letter or digit to %HH, where HH is the hexadecimal value of the byte For example, the string Franois would be encoded as Fran%c3%a7ois (The "" is encoded in UTF-8 as two bytes C3 (hex) and A7 (hex), which are then written as the three characters "%c3" and "%a7" respectively.) This can make a URI rather long (up to 9 ASCII characters for a single Unicode character), but the intention is that browsers only need to display the decoded form, and many protocols can send UTF-8 without the %HH escaping. Program code Here are some examples of program code for encoding and decoding: Jigsaw. RFC 2718 - Guidelines for new URL Schemes - IETF.org. The Wheel: What Is The Foxconn Debate Really About?

Thirty spokes meet at a nave; Because of the hole we may use the wheel. Clay is moulded into a vessel; Because of the hollow we may use the cup. Walls are built around a hearth; Because of the doors we may use the house. Thus tools come from what exists, But use from what does not. - Tao De Ching There’s a carousel in a small Cape Cod town that we visited this summer and the kids rode it a few times. Reading the recent back and forth between Stephen Fry – an Apple apologist – and Mike Daisey – an Apple user/abuser – I’m reminded of that carousel.

The problem is the endless circle of blame and apology. Such moral outrage is common among the opponents of globalization — of the transfer of technology and capital from high-wage to low-wage countries and the resulting growth of labor-intensive Third World exports. We keep going over the same ground here. To be clear, I’m with the crowd that says that Apple is, at best, ignorant of Foxconn’s problems and at worst ignoring them.