No one wants to die..don’t waste it living someone…

“No one wants to die. Even people who want to go to heaven don’t want to die to get there. And yet death is the destination we all share. No one has ever escaped it. And that is as it should be, because Death is very likely the single best invention of Life. It is Life’s change agent. It clears out the old to make way for the new. Right now the new is you, but someday not too long from now, you will gradually become the old and be cleared away. Sorry to be so dramatic, but it is quite true.

Your time is limited, so don’t waste it living someone else’s life. Don’t be trapped by dogma — which is living with the results of other people’s thinking. Don’t let the noise of others’ opinions drown out your own inner voice. And most important, have the courage to follow your heart and intuition. They somehow already know what you truly want to become. Everything else is secondary.”

– Steve Jobs at the Stanford University commencement address in 2005

Posted in Quotes | Tagged | 1 Comment

Government releases ‘unprecedented amount of data’ for National Day of Civic Hacking

Thousands of people are coming together this weekend to improve the American government.

Tomorrow is the National Day of Civic Hacking. A consortium of government agencies, businesses, and nonprofits are teaming up to hold 96 events in 83 cities around the country. The goal of the initiative is to build solutions that address issues in neighborhoods, cities, states, and the country using publicly-released data

A civic hacker is described as someone who can use technology to creatively tackle problems, without much time or resources. 22 government agencies are posing challenges to participating software developers and entrepreneurs. Government partners include the White House, NASA, Census Bureau, Departments of Agriculture, Energy, Labor, and Transportation, as well as the States of Maryland, Nevada, and New York.

“This is the largest communion of civic hackers ever,” said Nick Skytland, the lead of NASA’s Open Innovation Program. “Ultimately, its about revolutionizing our government and bringing it up to date. We want to engage our citizens in government and have them participate in useful and meaningful ways. We are at a tipping point where people’s participation in their government is being redefined. Now there are opportunities for people to directly improve our country and have an impact.”

Skytland said that developments in technology, infrastructure, and policy have made initiatives like this possible. Earlier this month, the White House released the official Open Data Policy of the United States on developer community GitHub. The document instructs government agencies to “manage their data and information more generally” and make it available to the public in a way that is “open, discoverable, and usable.” The organizations participating in NDCH are sharing an ‘unprecedented’ amount of data to help the civic hackers solve specific challenges.

NASA’s challenge is called We Love Data: “The idea is to leverage NASA’s vast open data resources and to help us think differently about how citizens can engage and use spaceflight data. This is an open ideation challenge to develop software, hardware, or visualizations of space data in order to encourage people to interact with the data in new and meaningful ways.”

The civic hackers will build tools, apps, and platforms that make this information more accessible to the general public and apply it intelligently to civic operations. Projects are intended to find new solutions to old challenges. For example, a microsite that uses NASA’s satellite images, photos, maps and visualization to “tell the story of current human conditions around the world.” Possible projects in other sectors could include an app that allows rural communities to monitor private water wells and prevent contamination, hospital price tracking, or natural disaster prediction.

The National Day of Civic Hacking is sponsored by Intel, with support from Rally Software, CodeForGood, Edelman, Socrata, and Elance. SecondMuse is taking the strategic and operational lead, and organizing partners are Code for America, Random Hacks of Kindness, and Innovation Endeavors.

Photo Credit: National Day of Civic Hacking

As published on http://venturebeat.com/2013/05/31/government-releases-unprecedented-amount-of-data-for-national-day-of-civic-hacking/

Posted in Technology | Tagged , | Leave a comment

Kiss

Posted in cats, Photography | Tagged , , | Leave a comment

White Plumeria

Check out my new picture of White Plumeria

Plumeria (common name Frangipani) is a genus of flowering plants in the dogbane family, Apocynaceae. It contains seven or eight species of mainly deciduous shrubs and small trees. They are native to Central America, Mexico, the Caribbean, and South America as far south as Brazil but have been spread throughout the world’s tropics

White Plumeria by Shailendra Nair (ShailendraNair)) on 500px.com
White Plumeria by Shailendra Nair

Posted in Photography | Tagged , , | Leave a comment

Facebookers, beware: That silly update can cost you a job

Study shows that companies have rejected 1 in 10 people between ages 16 and 34 because of something the person shared on social media.

(Credit: On Device Research)
Little did Ashley Payne know that the festive photo of her holding both a pint of beer and a glass of red wine would lead to her losing her high school teaching job.

The 24-year-old educator posted the image to her Facebook profile, and after a parent complained, school officials told Payne she’d have to choose between resigning and suspension, according to IOL News. She resigned.

If those same school officials were hiring and found a candidate with a similar photo shared on the social Web, it’s most likely that person wouldn’t even get an interview.

According to a new report, turning down young job candidates because of what they post on social media has become commonplace. The report, by On Device Research, states that 1 in 10 people between ages 16 and 34 have been turned down for a new job because of photos or comments on Facebook, Twitter, Pinterest, and other social networking sites.

“If getting a job wasn’t hard enough in this tough economic climate, young people are getting rejected from employment because of their social media profiles and they are not concerned about it,” On Device Research’s marketing manager Sarah Quinn said in a statement.

Ten percent of young people said they knew they were rejected from a job because of their social media profiles, yet 66 percent of young people still don’t seem to care that these profiles may affect their career prospects. The majority of young people cater their social media presence to friends rather than potential employers, according to On Device Research.

Quinn says that better education on how social media can affect employment is needed to ensure young people aren’t making it even harder to excel in their careers.

Several U.S. states have created laws to protect employees from being fired because of what they post on social media. In January, six states officially made it illegal for employers to ask their workers for passwords to their social media accounts.

It’s unclear how many employers have demanded access to workers’ online accounts, but some cases have surfaced publicly and inspired lively debate over the past year. In one instance last year, a teacher’s aide in Michigan was suspended after refusing to provide access to her Facebook account following complaints over a picture she posted.

As for Payne, even though she ultimately resigned, she since has sued the school to get her job back or receive monetary damages, according to IOL News.

On Device Research surveyed 17,657 people, ages 16 to 34, in China, India, Nigeria, Brazil, the U.S., and U.K.

As published on http://news.cnet.com/8301-1023_3-57586767-93/facebookers-beware-that-silly-update-can-cost-you-a-job/

Posted in Social | Tagged , , | Leave a comment

It’s impossible to make the same “mistake” twice. The second time, it’s called …

It’s impossible to make the same “mistake” twice. The second time, it’s called a decision.”

Posted in Quotes | Tagged | Leave a comment

Google said to deploy Wi-Fi blimps in Africa and Asia

The Web giant is reportedly creating airborne wireless networks to bring Internet access to some of the world’s hard-to-reach regions.


Drawing for a patent Google filed in 2000 called the “High altitude platform control system.” (Credit: Google)

How can the Internet be brought to areas that have no infrastructure for high-speed wireless? Beam the Wi-Fi networks down from flying objects, of course.

Google is reportedly working on creating wireless networks for more remote parts of the world, such as countries in sub-Saharan Africa and Southeast Asia, with sky-bound balloons and blimps, according to Wired.

Dubbed “high-altitude platforms,” these mechanisms will reportedly be able to connect roughly a billion more people to the Internet worldwide, according to Wired. The blimps signals are said to be able to reach people in areas that are hundreds of square miles.

Last week, the Wall Street Journal reported that Google is going into the cellular business in Africa and Asia in an effort to connect more people to the Internet. Citing anonymous sources, the news source reported that the networks would be available outside of big cities, where service is spotty or not available.

Besides the Wi-Fi blimps, Google is reportedly also considering a satellite-based wireless system, along with testing other kinds of wireless frequencies, according to the Wall Street Journal. “There’s not going to be one technology that will be the silver bullet,” an anonymous source told the Journal.

It appears that Google has been working on high-altitude platforms for quite some time. In 2000, the company filed a patent application for a “High altitude platform control system,” which involved creating an “aerospace vehicle” that could “improve the reliability of a communications system.”

Also, Google isn’t the only company that has been working on creating communication networks via blimps and balloons. Lockheed Martin and GlobeTel Communications have also been working on such inventions. And, the company Space Data already operates a network of high-altitude, balloon-borne transceivers known as SkySite Platforms, which serve as wireless towers.

When contacted by CNET, Google declined to comment.

As published on http://news.cnet.com/8301-1023_3-57586348-93/google-said-to-deploy-wi-fi-blimps-in-africa-and-asia/

Posted in Technology | Tagged , | Leave a comment

US entertainment industry group wants to unleash malware on file sharers

The US entertainment industry is pushing to introduce regulations that would allow content owners to legally send out malware to individuals that are believed to involved with copying digital content.

That’s according to the the Commission on the Theft of American Intellectual Property which presented a new 84-page report – spotted by Boing Boing – to the US government. In that respect, it is a serious proposal.

The theory is that software pre-installed on computers would identify whether an Internet user was illegally copying, housing or consuming copyrighted content, and then subsequently lock up their files, and/or computer, until the guilty party turned themselves in and deals with the consequences — perhaps paying up for the offending content or removing it.

Minding aside the illegalities for a second, it’s not clear exactly how the scheme would work. Already the proposal has attracted criticism from rights groups and we don’t expect Congress to be following up on any of the ‘proposals’ any time soon.

For your sheer amazement, here are two excerpts Boing Boing pulls up. You’ll note that the concepts are certainly off the wall:

Software can be written that will allow only authorized users to open files containing valuable information. If an unauthorized person accesses the information, a range of actions might then occur. For example, the file could be rendered inaccessible and the unauthorized user’s computer could be locked down, with instructions on how to contact law enforcement to get the password needed to unlock the account. Such measures do not violate existing laws on the use of the Internet, yet they serve to blunt attacks and stabilize a cyber incident to provide both time and evidence for law enforcement to become involved.

While not currently permitted under U.S. law, there are increasing calls for creating a more permissive environment for active network defense that allows companies not only to stabilize a situation but to take further steps, including actively retrieving stolen information, altering it within the intruder’s networks, or even destroying the information within an unauthorized network. Additional measures go further, including photographing the hacker using his own system’s camera, implanting malware in the hacker’s network, or even physically disabling or destroying the hacker’s own computer or network.

Past research has suggested that torrents may actually be a positive thing for movie producers, as researchers found that the closure of Megaupload may have hurt box offices revenues. Likewise, it’s been suggested that even movie studios themselves are complicit in file sharing activities. Clearly it is still a grey area and, while content houses are unlikely to ever accept Internet piracy, this is clearly not the answer in any way, shape or form.

The proposed plans of the commission are pretty ludicrous. Even Japan, a country well-known for adopting a tough stance on digital piracy hasn’t sunk to such shady and downright illegal proposals.

File sharing has been outlawed in Japan since 2012, but, back in January 2012, authorities unveiled plans to release a honey trap of files which, though made to look like popular drama show content, contained an alert reminding them that uploading and downloading copyrighted content is illegal.

Later last year, the government passed legislation that made the breaching of copyright laws a jailable offence. Those caught could be sentenced to up to 10 years in prison, or handed a fine of up to 10 million yen ($125,000).

For those that are curious, yes, the Commission on the Theft of American Intellectual Property does actually exist. Here are its three main purposes, as stated on its website:

Document and assess the causes, scale, and other major dimensions of international intellectual property theft as they affect the United States
Document and assess the role of China in international intellectual property theft
Propose appropriate U.S. policy responses that would mitigate ongoing and future damage and obtain greater enforcement of intellectual property rights by China and other infringers

You may already be familiar with its proposal to ‘get tough’ on China by imposing banking and financial sanctions, as well as withholding funding from the WHO. It goes without saying that the organization supports CISPA.

As published on http://thenextweb.com/media/2013/05/27/us-entertainment-industry-group-wants-to-unleash-malware-on-file-sharers/

Posted in Technology | Tagged , | Leave a comment

Path

Do not go where the path may lead, go instead where there is no path and leave a trail. -Ralph Waldo Emerson

Posted in Quotes | Tagged | Leave a comment

Infinite… Albert Einstein

“Two things are infinite: the universe and human stupidity; and I’m not sure about the universe.”
― Albert Einstein

Posted in Quotes | Tagged , , | Leave a comment