Entries (RSS)  |  Comments (RSS)

Archive for August, 2008

random media mention…

Posted by on August 19th, 2008

My discoveries with the Wall of Sheep at Defcon 16 and it’s application to Twitter security were mentioned on the August 12, 2008 Data Security Podcast. They called me one of the “good guys”. Heh! You can listen to it here: http://datasecurityblog.wordpress.com/2008/08/11/data-security-podcast-episode-13-aug-11-2008/

Read Full Post  |  No Comments »

Automated Face Replacement

Posted by on August 18th, 2008

As someone who takes many photographs of random people in nightclubs and at events, I’m intrigued by the efforts of Columbia University’s team to write software that performs automated face replacement in digital photographs. The software is able to replace faces within images from a database of candidate images drawn from the Internet and other […]

Read Full Post  |  2 Comments »

Tag Galaxy

Posted by on August 14th, 2008

Tag Galaxy is a 2008 thesis project from Steven Wood at the University of Applied Sciences in Nuremberg. It allows you to explore flickr tags while looking at solar systems that represent photos and related tags. Check it out at http://www.taggalaxy.de

Read Full Post  |  1 Comment »

What’s Twitter?

Posted by on August 4th, 2008

People keep saying to me, “I don’t get Twitter, what is it that you do anyway?” We just put out a pretty slick video showing people in San Francisco and New York using it, so maybe this’ll help ! How Do You Use Twitter? from biz stone on Vimeo.

Read Full Post  |  2 Comments »

Defcon 16 Schedule in iCal Format

Posted by on August 4th, 2008

I’m heading to Defcon 16 on Thursday to talk to some fellow hackers, meet colleagues, and to hopefully, not lose my shirt in Vegas. I think I’ll be much too busy to gamble, really. For a conference that is so technically minded, they didn’t post the conference schedule in a useful format (HTML only! ew!), […]

Read Full Post  |  No Comments »