Social Networking September 28, 2006

Social networking on the web isn’t new, but it isn’t just for pimply basement dwellers any more.

Subscribe [?] to the feed using your podcatcher of choice; see the links in the sidebar.

GigaVox and Two New Channels! August 1, 2006

Finally, the big news has arrived from the Conversations Network (where I’m Senior Editor).

The channels have now been split to fall under two separate umbrella groups: the Conversations Network and GigaVox Media. As of today, IT Conversations, plus two new channels - Open Source Conversations and the Podcast Academy - are part of GigaVox Media. Social Innovation Conversations continues to be the flagship of the Conversations Network.

Very cool.

Tags: , ,

Net Neutrality 2 July 11, 2006

In last week’s Tech Watch, I talked about net neutrality - particularly the fear that some internet service providers might charge content providers extra to “guarantee” that their content is accessible. I didn’t mention the other boogeyman with respect to net neutrality - throttling.

Alternative Licenses - the Opposite of DRM May 26, 2006

If DRM is doomed, what’s an artist to do? Try licensing your work.

Check out the Creative Commons licensing scheme or wikipedia’s definition of “copyleft“.

The Golden Hammer: Tech Watch is a proud member of - if it’s tech, it’s here.

Subscribe [?] to the feed using your podcatcher of choice; see the links in the sidebar.

Podcast Academy 3 April 22, 2006

On June 15 & 16, 2006, I’ll be at Yahoo! in Santa Clara, CA at the third Podcast Academy. I’ll be meeting face to face with my co-consipirators at the Conversations Network, and giving a talk about how to make your podcast better by offering your audience more than just audio or video.

Come say hi if you’re there.

Digital Media Revolution February 24, 2006

Anyone can be an author, videographer, photographer or audio star. So what?

Social networks:

Creator tools:

The Golden Hammer: Tech Watch is a proud member of - if it’s tech, it’s here.

Subscribe to the feed using your podcatcher of choice; see the links in the sidebar.

New X Prizes January 30, 2006

Via Slashdot, I learned that the X Prize Foundation is working on new challenges. Personally, I’m particularly thrilled & delighted about new ideas in automotives. X Prize foundner Peter Diamandis gets it right when he asks, “why do we still drive cars that use an internal combustion engine and only get 30 miles per gallon?”

For more info about Diamandis’ vision, check out his talk from Pop!Tech 2005 via IT Conversations.

Tech for 2006 (them) January 15, 2006

Slashdot pointed me to a Popular Mechanics article on 15 Tech concepts we all should be aware of for 2006. The highlights for me are IPTV, micro fuel cells and mobile VoIP. I wonder about AJAX, satellite video and SPIT.

AJAX, a web programming tool that makes web applications work more smoothly, is really very 2005. I have even started to hear some people say that they think its day in the sun is over.

C74, the Modernization of Investigative Techniques act November 18, 2005

Do police need additional powers to combat crime on the internet? If so, does Canada’s proposed legislation, bill C74, the Modernization of Investigative Techniques Act, meet those needs. This week’s techwatch critically analyses bill c74 and the expansion of police powers to address internet crime.

Guest Podcast by Steven Ensslen

The Golden Hammer: Tech Watch is a proud member of - if it’s tech, it’s here.

Click here to listen or download, or subscribe to the feed by using one of the links in the sidebar →

The storage performance Council has reports of manufacturers who are proud to have million dollar storage networks that handle less than half a gigabit per second in the lab. My cable modem is 1/2 megabit, so a state of the art system publisized at the Storage Performance Council would handle fewer than 1,000 customers. That is if it performs as well in the field as it did in the lab. The net is full of stories of people who paid millions for these Storage networks but who see only 10% of the theoretical throughput. My ISP would need ten or twenty times the theoretical throughput, or hundreds of times what people see in the field in order to log all traffic. is a massively distributed brute force attempt to break encryption keys. A 64 bit key took 331,252 computers 1,754 days to break. A 128 bit key is not twice as strong, but 2^64 or 1.8 * 10^19 times stronger. Commonly available 4096 bit encryption is 2^4032 times stronger than a 64 bit key. Those numbers are absurdly large. An simple explanation is if computer power continues to double every two years, it will take over eight thousand years before a 4096 bit key can be broken by 1/3 of a million computers working for 4 years.

Other articles on C74:

The Globe and Mail

Pages: 1 2 3 4