[ECP] Educational CyberPlayGround NetHappenings Headlines and Resources

  • From: Educational CyberPlayGround <admin@xxxxxxxxxxxxxxx>
  • To: nethappenings@xxxxxxxxxxxxx
  • Date: Tue, 15 May 2007 04:00:00 -0400

Greetings All,

Happy Reading for today.

best,
<Karen>


-------- It's an A D thanks sp0ns0rs! ---------

TEACHBITS.COM
The Teacher-To-Teacher Marketplace
where teachers can buy, sell, and create their own learning
materials and earn supplemental income.
Powerpoint presentations, lesson plans, Word and Excel files,
slide shows, and anything digital is welcome.  All levels, all subjects.
<http://www.Teachbits.com>http://www.Teachbits.com

*********************************************************************
1)
Wetpaint
http://www.wetpaint.com/
A free program from Wetpaint.com Inc. has room for improvement. Nothing created on its site can be kept private from random viewers. Compared with blogs or normal Web sites, a Wetpaint wiki felt much more alive and exciting. Helps regular users create wikis, which encourage interaction because they're constantly changed by contributors. Your site can easily be adjusted and enhanced by anyone who views it.

2)
Technology News and Headlines
http://www.edu-cyberpg.com/News/

see Mossberg All Things Digital
http://www.edu-cyberpg.com/News/mossberg.htm

3)
In Florida, Utah, and soon in Rhode Island and Wisconsin, selling your used CDs to the local record joint will be more scrutinized than then getting a driver's license in those states.
http://arstechnica.com/news.ars/post/20070507-record-shops-used-cds-ihre-papieren-bitte.html
New "pawn shop" laws are springing up across the United States that will make selling your used CDs at the local record shop something akin to getting arrested. No, you won't spend any time in jail, but you'll certainly feel like a criminal once the local record shop makes copies of all of your identifying information and even collects your fingerprints. Such is the state of affairs in Florida, which now has the dubious distinction of being so anal about the sale of used music CDs that record shops there are starting to get out of the business of dealing with used content because they don't want to pay a $10,000 bond for the "right" to treat their customers like criminals.


4)
Joost gets $45 million in financing
http://www.joost.com/
Online video network Joost has received $45 million in funding from a group led by Index Ventures and Sequoia Capital. Also investing were: Li Ka-shing, chairman of Hutchison Whampoa and Cheung Kong Holdings; Viacom; and CBS. The two media companies also are providing content to the site. The money will be used to "accelerate product development, global expansion, localization and service offerings," according to a statement from Joost. The company was launched by Janus Friis and Niklas Zennstrom, the founders of Skype and Kazaa.

5)
Protect Harvard from the RIAA
http://www.thecrimson.com/article.aspx?ref=518638
Harvard University. Wendy M. Seltzer, a fellow at the Berkman Center for Internet & Society, and Charles R. Nesson, co-director of the center, write in The Harvard Crimson that the recording industry's campaign of sending out pre-litigation notices and its endorsement of Internet-filtering software "distort the University's educational mission:" [W]e should be assisting our students both by explaining the law and by resisting the subpoenas that the RIAA serves upon us. We should be deploying our clinical legal student training programs to defend our targeted students. We should be lobbying Congress for a roll back of the draconian copyright law that the copyright industry has forced upon us. Intellectual property can be efficient when its boundaries are relatively self-evident.

6)
"The university is the last remaining platform for national dissent." ~ Dr. Leon Eisenberg
http://www.edu-cyberpg.com/IEC/pioneers.html
Physician - 2003 Lifetime Achievement Award for Psychiatric Research
Maude and Lillian Presley Professor Department of Social Medicine and Professor of Psychiatry, Emeritus Harvard Medical School Dept. of Social Medicine, Ruane Prize for Child and Adolescent Psychiatry Research - A leader for over 40 years, spanning pharmacological trials, neurological and psychological theories of autism and social medicine - from research to teaching and social policy.

7)
'Swarmcasting' software developed at U. of Texas-Austin lets anyone run an Internet TV station
http://chronicle.com/free/2005/06/2005062401t.htm
A team of students at the University of Texas at Austin is set to release a software tool designed to turn any Internet-connected computer into a TV station. The software, called Alluvium, uses peer-to-peer technology to let people stream video to multiple users nonstop -- even without high-speed Internet connections.
http://tristero.sourceforge.net/alluvium/downloads.html
It's not just for tech enthusiasts and struggling artists, says Joseph T. Lopez, a graduate student who co-founded the software project. Alluvium, he says, could serve plenty of prosaic purposes -- like letting parents broadcast their childrens' soccer games for family members, or helping community groups find a high-tech alternative to public-access TV. They plan, for example, to post their program online as open-source software. And they are preparing a pair of how-to guides to accompany the program. One will discuss the technological requirements for an online TV channel, and the other will offer tips on using a station to build a community of filmmakers and artists.
http://www.theregister.co.uk/2003/02/24/swarm_radio_a_cheaper_faster/

8)
Artists Fair Market Value
National Endowment for the Arts Barry Bergey bergeyb@xxxxxxxx
Congress is currently considering legislation that would change the way the value of artistic work is assessed when it comes to taking tax deductions for donations to museums and not-for-profits. As the law is written today, artists are not able to deduct the market value of a work. Artists are allowed to deduct only the cost of materials. We've already heard from some Native American craft artists who have donated quite valuable pieces to museums, but were unable to write off the market value. We are currently collecting statements from artists about their experiences in this regard and although we have many examples from the Visual Arts and Museums world, we need more from folk & traditional artists. I would appreciate any statements from artists or stories about experiences that artists may have had that would speak to this issue. This proposed legislation would apply only to items created by the artist. In the case of musicians, only archival materials such as scores, annotated transcriptions, or master recordings of their own work would apply,

9)
16th-20th Century Maps of Africa
http://www.edu-cyberpg.com/Linguistics/irish5.html
In 1948, Melville J. Herskovits established the First African Studies program at Northwestern University. This particular online collection contains 113 antique maps of Africa dating from the middle of the sixteenth century to the early twentieth century. Visitors can utilize a search engine to look through the maps, or they may also browse by title, cartographer, or date. There are a number of real finds here, including Frederik de Wits 1708 map of North Africa (titled Barbaria) and an early map of Zanzibar from 1740.

10)
Six Tips to Protect Your Online Search Privacy
http://www.edu-cyberpg.com/Technology/SECURITYprivacy.html
Google, MSN Search, Yahoo!, AOL, and most other search engines collect and store records of your search queries. If these records are revealed to others, they can be embarrassing or even cause great harm. Would you want strangers to see searches that reference your online reading habits, medical history, finances, sexual orientation, or political affiliation? Recent events highlight the danger that search logs pose. In August 2006, AOL published 650,000 users' search histories on its website.1 Though each user's logs were only associated with a random ID number, several users' identities were readily discovered based on their search queries. For instance, the New York Times connected the logs of user No. 4417749 with 62 year-old Thelma Arnold. These records exposed, as she put it, her "whole personal life."

11)
THE NET GENERATION AKA MILLENIAL STUDENTS
http://www.edu-cyberpg.com/Technology/HowToIntegrateTech.html
How do you integrate technology into the classoom?
Find all the Web 2.0 information a classrom teacher needs to understand and be able to use.

12)
Spying on the Home Front May 15, 2007 at 9pm (check local listings)
http://www.pbs.org/wgbh/pages/frontline/homefront/
(60 minutes) FRONTLINE addresses an issue of major consequence for all
Americans: Is the Bush administration's domestic war on terrorism
jeopardizing our civil liberties? Reporter Hedrick Smith presents new
material on how the National Security Agency's domestic surveillance
program works and examines clashing viewpoints on whether the president has
violated the Foreign Intelligence Surveillance Act (FISA) and infringed on
constitutional protections. In another dramatic story, the program
shows how the FBI vacuumed up records on 250,000 ordinary Americans who chose Las
Vegas as the destination for their Christmas-New Year's holiday, and the
subsequent revelation that the FBI has misused National Security
Letters to gather information. Probing such projects as Total Information
Awareness, and its little known successors, Smith discloses that even former
government intelligence officials now worry that the combination of new security
threats, advances in communications technologies, and radical
interpretations of presidential authority may be threatening the
privacy of Americans.

13)
Ira Flatow's Science Friday interviews
Michael S. Hart Founder Project Gutenberg the original ebook person
and discusses projects that create digital archives.
http://media.libsyn.com/media/sciencefriday/scifri-2007051112.mp3

14)
The Ultimate Insider: FBI Analyst Steals National Secrets
http://www.informationweek.com/news/showArticle.jhtml?articleID=199500751
On the morning of Aug. 5, 2005, an FBI intelligence analyst sat at his
desk and accessed the agency's main database. He downloaded a classified
document, copied it onto a disc and dropped it into a bag beside his
desk.
Leandro Aragoncillo -- a career Marine who had served under two vice
presidents in the White House -- was stealing information in an attempt
to foster a political coup in the Philippines, his home country. He knew
he had no authorization to take or pass along the information, but, so
far, it had been so easy.

15)
One-at-a-time hacker grabs 22,000 IDs from Univ. of Missouri
<http://www.computerworld.com/action/article.do?command=viewArticleBasic&taxonomyName=security&articleId=9018982>
A hacker grabbed the Social Security numbers of more than 22,300 current
and former students at the University of Missouri, the school said
yesterday. It was the institution's second data break-in of the year.
According to university officials, the attack was launched from IP
addresses in China and Australia and used a Web form for tracking the
status of queries to the school's IT help desk. The hacker accessed the
names and Social Security numbers of school employees during 2004 who
were also current or onetime students; those records had been compiled
for a report, but were overlooked rather than deleted.

16)
Cybercrime update: Is organized crime moving into cybersphere?
http://www.networkworld.com/news/2007/050907-fbi-organized-crime-cybercrime.html
As if FBI special agent Tim OBrien and his cybercrime fighting comrades
dont already have their hands full with bot herders, virus writers and
other loosely-aligned crooks, now people are wondering when more
traditional organized crime will grab a piece of the action.
Following his presentation at CIO Forum, OBrien was asked by one
technology pro about whether the real-life Tony Sopranos of the
organized crime world have caught the cybercrime bug.

17)
San Jose State University's School of Library and Information
Science will put on a big show for the May 16 opening of its
campus in Second Life, an online virtual world.
http://www.edu-cyberpg.com/Technology/Second_Life.html

18)
Hotbots '07 Workshop
http://www.usenix.org/events/hotbots07/tech/full_papers/grizzard/grizzard_html/
Like cells in a terrorist network, the researchers say, peer-to-peer botnets are a series of independent nodes; if one of them is taken out, the others move to fill in the gap. "There has been a recent trend in increased development of peer-to-peer botnets, and we expect the level of sophistication to increase," the scientists warn.

19)
Wireline Competition Bureau Statistical Reports
http://www.fcc.gov/wcb/iatd/stats.html/
from 2001
www.fcc.gov/Bureaus/Common_Carrier/Reports/FCC-State_Link/Monitor/mrs01-0.pdf

20)

Seamless Roaming Nears Reality - Fixing Roaming Woes
<http://www.networkcomputing.com/channels/wireless/showArticle.jhtml?articleID=199204313&pgno=1>
The 3GPP's voice-call-continuity standard aims to plug holes between
cellular and Wi-Fi networks and drive availability of SIP-based dual- mode handsets. But VCC, at least in its first iteration, falls short in addressing key enterprise features.
Be careful what you ask for. Enterprises have long wanted dual-mode
Wi-Fi cellular phones to cut phone bills with the convenience of a
single device. Carriers have had nothing to gain from that; in fact,
North American wireless carriers have discouraged handset makers from
developing Wi-Fi-enabled handsets and have gone out of their way to
offer customized versions without Wi-Fi.
Now enterprises are going to get what they've asked for--sort of. A
new plan will let enterprise users continue with a single device, but
carriers won't lose those precious minutes. The VCC (voice-call
continuity) initiative promises to provide seamless roaming between
cellular and Wi-Fi networks, letting mobile phone users access the
office network for mobile services  .

Other related posts: