search page 8 - Dave's Blog

Search
My timeline on Mastodon

Hacked Roomba will google your house - Boing Boing

2010 Mar 3, 2:52Roomba hack that runs OCR on all text it can find in the house and then indexes and lets you search. Also it still vacuums.PermalinkCommentsroomba hack google vacuum search ocr

Protecting Browsers from Extension Vulnerabilities

2010 Feb 27, 10:06A web browser add-on security research paper that describes the Google Chrome security model. "We propose a new browser extension system that improves security by using least privilege, privilege separation,
and strong isolation. Our system limits the misdeeds an attacker can perform through an extension vulnerability.
Our design has been adopted as the Google Chrome extension system."PermalinkCommentssecurity design google chrome firefox addon plugin web browser technical research adam-barth system:filetype:pdf system:media:document

Not your father's PageRank

2010 Feb 26, 10:12Interesting stuff about Google determining synonyms based on folks changing their search queries.PermalinkCommentsgoogle search synonym machine-learning english language technical

Adam Barth - adambarth.com

2010 Feb 26, 2:42Adam Barth has tons of papers on web browser security.PermalinkCommentsadam-barth security web browser privacy javascript google chrome research technical

PeteSearch: How to split up the US

2010 Feb 22, 5:52Analysis of Facebook friend connections by US cities to determine partitioning of the US.PermalinkCommentsblog visualization facebook social map geo network graph

Facebook Wants to Be Your One True Login

2010 Feb 22, 3:55Hilarious Internet illiteracy generates tons of confused comments on RWW: '... We've determined by looking at our traffic stats that people are doing Google searches for "facebook login" and coming upon RWW. They see the FB Connect button and assume that RWW is the "new Facebook." Sigh. The Internet Is Hard.'PermalinkCommentsvia:kottke facebook internet identity openid

sitemaps.org - Protocol

2010 Jan 25, 8:31PermalinkCommentssitemap google xml search web html technical reference

Researchers identify command servers behind Google attack

2010 Jan 14, 2:54Wow: "If the report's findings are correct, it suggests that the government of China has been engaged for months in a massive campaign of industrial espionage against US companies."PermalinkCommentsinternet google china security politics privacy

Official Google Blog: A new approach to China

2010 Jan 12, 9:02"We have decided we are no longer willing to continue censoring our results on Google.cn, and so over the next few weeks we will be discussing with the Chinese government the basis on which we could operate an unfiltered search engine within the law, if at all. We recognize that this may well mean having to shut down Google.cn, and potentially our offices in China."PermalinkCommentsgoogle china politics privacy censorship internet web search

Hulu - Labs: Captions Search

2010 Jan 11, 12:26Hulu lets you search through the textual captions of their showsPermalinkCommentsvideo tv hulu search caption accessibility

[1001.0361] Self-Selected or Mandated, Open Access Increases Citation Impact for Higher Quality Research

2010 Jan 6, 2:17Not shocking that papers freely available on the Internet are cited more than those not freely available... "Articles whose authors make them Open Access (OA) by self-archiving them online are cited significantly more than articles accessible only to subscribers. ... not because of a quality bias from authors self-selecting what to make OA, but because of a quality advantage, from users self-selecting what to use and cite, freed by OA from the constraints of selective accessibility to subscribers only."PermalinkCommentsvia:bengoldacre science paper citation internet

Spite Houses, built to piss off the neighbors Boing Boing

2009 Dec 18, 2:36"I somehow ended up reading about spite houses (homes built specifically to piss off a neighbor) this evening, which I had never heard of before. Flickr has several when you search the tags, including the sad story behind this house in Connecticut."PermalinkCommentshumor spite hose flickr image

Let Me Google That For You – Neatorama

2009 Dec 10, 2:31If you want to be a jerk about answering a question on the Internet, 'Let Me Google That For You' is perfect!PermalinkCommentsgoogle humor web internet search

English Shellcode

2009 Nov 27, 6:10"What follows is a brief description of the method we have developed for encoding arbitrary shellcode as English text. This English shellcode is completely self-contained, i.e., it does not require an external loader, and executes as valid IA32 code."PermalinkCommentssecurity polyglot intel paper research programming hack obfuscation english language technical system:filetype:pdf system:media:document

ARMAR

2009 Oct 29, 10:43"Augmented Reality for Maintenance and Repair (ARMAR) explores the use of augmented reality to aid in the execution of procedural tasks in the maintenance and repair domain." Giant goggles hooked up to a G1 give 3D overlays over the mechanics view to point them to and help with the current task.PermalinkCommentsvideo augmented-reality 3d research

Google Research Publication: MapReduce

2009 Oct 6, 3:18PermalinkCommentstodo mapreduce algorithm google paper distributed database technical

Google ASCII Art Easter Egg

2009 Aug 31, 4:12"If you search Google for ascii art, the Google logo itself will turn into... ASCII art."PermalinkCommentsgoogle ascii art humor logo via:waxy

WHEN ZOMBIES ATTACK!: MATHEMATICAL MODELLING OF AN OUTBREAK OF ZOMBIE INFECTION

2009 Aug 25, 7:10Research paper modelling zombie infection. "The key difference between the models presented here and other models of infectious disease is that the dead can come back to life." Also, love the references section with "Snyder, Zack (director), 2004 Dawn of the Dead" next to things like "Bainov, D.D. & Simeonov, P.S. Impulsive Differential Equations: Asymptotic Properties of the Solutions. World Scientific, Singapore (1995)."PermalinkCommentshumor zombie research via:schneier math science health apocalypse system:filetype:pdf system:media:document

Fight Against 1-day Exploits: Diffing Binaries vs Anti-diffing Binaries

2009 Aug 24, 9:52Notes on how bin diff'ing tools work and thoughts on defeating them. "We call the threat "1-day exploits". Just few minutes after the release of patches, binary diffing technique can be used to identify the vulnerabilities that the security patches are remedying."PermalinkCommentsexploit security binary diff tool research technical system:filetype:pdf system:media:document

Schneier on Security: Non-Randomness in Coin Flipping

2009 Aug 24, 3:11"It turns out that flipping a coin has all sorts of non-randomness", includes link to research paper and blog post with gems like: "If the coin is tossed and caught, it has about a 51% chance of landing on the same face it was launched"PermalinkCommentssecurity random coin coin-toss
Older EntriesNewer Entries Creative Commons License Some rights reserved.