riverrun research | beta

from swerve of shore to bend of bay

links for 2009-07-26

  • Ken Miller writes about change: " All transformation, whether personal or organizational, goes through the same three phases: First you "get it," then you "do it," and then you finally "live it." In complaining about not complaining, I sounded like many of the people in my workshops who just can't get accustomed to a new idea or a big change. They don't get it. And if they don't get it they certainly won't do it, much less live it.
    Get it

    Management guru Tom Peters says that all significant change begins with mindset. And Albert Einstein said that the significant problems we face cannot be solved at the same level of thinking that created them. Both men point to the need to elevate our consciousness. That is, before any transformation is possible, we must engage the mind in a new perspective."

  • H.R.3101 Twenty-first Century Communications and Video Accessibility Act of 2009 (Introduced in House)
  • On June 26, 2009, Massachusetts Representative Edward Markey (D) introduced "The Twenty-first Century Communications and Video Accessibility Act of 2009" (H.R. 3101) The proposed bill is also co-sponsored by California Reps. Linda Sanchez (D) and Barbara Lee (D). If (when?) enacted, this comprehensive disabilities communications legislation will amend the United States Communications Act to ensure that new Internet-enabled telephone and television products and services are accessible to and usable by people with disabilities. It will also close existing disability gaps in telecommunications law. The bill in part proposes:
    Requiring caption decoder circuitry or display capability in all video programming devices, including PDAs, computers, iPods, cell phones, DVD players, TiVo devices and battery-operated TVs
  • Darknets are encrypted peer-to-peer networks normally used to communicate files between closed groups of people. Most darknets require a certain level of technological literacy to set up and maintain, including taking care of the necessary servers. However, HP researchers Billy Hoffman and Matt Wood plan next week to demonstrate a browser-based darknet called "Veiled," which they claim requires little proficiency to set up and run.

    "This will really lower the barriers to participation," Wood told ZDNet UK. "If you want to create a darknet, you can send an encrypted e-mail saying, 'Here's the URL.' When (the recipient visits) the Web site, the browser can just get (the darknet application) going."

    Hoffman and Wood are scheduled to demonstrate the technology next week at the Black Hat security conference in Las Vegas.


Filed under: delicious

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s

Post Days

July 2009
« Jun   Aug »

Recent Resources

%d bloggers like this: