The book of inspiration

November 8, 2014

NXP PN66T

Filed under: tech — zproxy @ 2:27 pm

The PN66T module is designed for mobile devices like smartphones and wearables and enables converged deployment of a broad set of transaction related applications such as mobile payment, access control, transit, and authentication.

The module combines a highly secure Smart MX2 element (P61), Near Field Communications (NFC) radio, operating system and trust provisioning. To accelerate the deployment and meet the increased demands around mobile transactions, PN66T features a loader service, which enables service providers to easily deliver new applications by significantly simplifying the value chain of deploying credentials to devices.

See also:

August 26, 2014

Microsoft Windows Version 6.3

Filed under: tech — zproxy @ 11:13 pm
  • I like Windows 98, Windows XP, Windows Vista, Windows 7
  • I dislike Windows 8

Yikes!

  • I like my accounts local. Microsoft acounts, please fk off.
  • I like my blurry aero glass. Where the fk is it?
  • I like my START menu. Where is it?
  • Metro, are you lost? Can I disable it?
  • Task Manager. What the fk?
  • Nagware. Your PC has been unprotected. I cannot close the damn window. I can interact with apps but cannot click?
    Kill process ‘Consent UI for administrative applications’
    Uninstall McAffe nagware.
  • WTF. At the next reboot McAfee LiveSafe is still phishing me?
    Program Files/Common Files/mcafee/platform/McUICnt.exe
    Right Click on Start Menu
    Programs and Features
    uninstall McAfee
    unistaller scares with Your PC is at risk!

 

See also:

August 19, 2014

Sounds of Street View

Filed under: tech — zproxy @ 6:35 pm

 

Can we log into a drone Eagle with our Oclus Rift to fly and explore the earth yet?

CropperCapture-2014-08-19-17-09-59-9934789

See also:

July 15, 2014

WebCL

Filed under: tech — zproxy @ 3:28 am

I wonder, now that we have async/await available for Web Workers, how would it compare to WebCL. The performance gain running your physics on GPU needs to overweigh the pain of writing and debugging WebCL kernel code. This will likely not happen before 2018 as it has already taken 4 years for WebGL to reach this far. Cant find it in blink source either.

The future for GPU compute in Firefox is ARB_compute_shader, which is now part of ES 3.1.

See also:

May 31, 2014

Improbable.io

Filed under: tech — zproxy @ 11:25 am

… a distributed system that can move seamlessly between servers, borrowing techniques from other industries where latency is key the way that mobile phones stay connected even when users move between cell towers.

…  “You don’t have to worry about scaling if someone tweets a link to your game and 30,000 people pile in,” says Narula.

Now, the difference is, the server will be your phone running on a 3G data connection.

… to allow for live development, so the system world is always on and developers can continually push content and improvements to it

See also:

April 19, 2014

RTMFP

Filed under: tech — zproxy @ 10:57 am

This memo describes how to use Adobe’s Secure Real-Time Media Flow
Protocol (RTMFP) to transport the video, audio, and data messages of
Adobe Flash platform communications. Aspects of this application
profile include cryptographic methods and data formats, flow metadata
formats, and protocol details for client-server and peer-to-peer
communication.

See also:

December 31, 2013

To Protect and Infect: The militarization of the internet

Filed under: tech — zproxy @ 9:58 am

WebGLSVGAnonymous

[…] your metadata, chained contacts and content will be stored for 15 years

  • Here’s a PDF file containing images Appelbaum showed in the talk

chuck-norris-eavesdrops-the-nsa-thumb

See also:

September 18, 2013

The Doom Piano by David Hayward

Filed under: tech — zproxy @ 12:06 pm

CropperCapture-2013-09-18-14-47-58-6140203

See also:

September 1, 2013

WebGL Doom

Filed under: tech — zproxy @ 11:07 am

logoby int13h.com

See also:

August 19, 2013

Sentiment Analysis / Opinion Mining

Filed under: tech — zproxy @ 9:18 am

Telephone Traffic

  • Opinion target: entities and their aspects (features) – a fingerprint with a query
  • Sentiment: positive or negative
  • Direct/indirect opinion holder: persons (source with agenda) who hold the opinions
  • Time: when opinions are expressed

Now what if I told you, your devices can do real time analysis of your opinions. What if the system was able to monitor global opinion and has the means to come up with events to change the required opinions . Whose side is your device on?

example3

Whenever you need to make a decision, you will need to consult the perception of reality of yourself and other people.

Opinion collection is no longer limited by your circle of friends. It is global.

See also:

June 11, 2013

PRISM

Filed under: tech — zproxy @ 2:10 am

[…] It’s about controlling any damning information from reaching epidemic proportions. It’s damage control to the extreme. It’s about the upcoming censorship of the internet in the name of national security. The plans are already in place.

“There’s no way to rule innocent men. The only power any government has is the power to crack down on criminals. Well, when there aren’t enough criminals, one makes them. One declares so many things to be a crime that it becomes impossible for men to live without breaking laws.” – Ayn Rand

NSAunchained

[…] But that’s the funny thing about how data is used by our current government. It’s used to createsuspicion, not to confirm innocence.

[…] he Navy has almost finished outfitting the nuclear-powered submarine USS Jimmy Carter with state-of-the-art technology for undersea fiber-optic taps, according to people knowledgeable about it.

[…] The free market is compromised, privacy is gone, the money is gone

[…] Yet no one is saying their own comments are gone, which means everyone who is posting can see their own comments in full, and are probably wondering why they are not getting any response from other people on the forum.This is accomplished by having the forum replicated many many times on a supercomputer somewhere, with a separate reality for everyone posting to it. 

http://www.youtube.com/watch?v=5kHftBPWVIY

Would you be surprised, if Mr. Eric was one of the morphed virtual persons produced by the holonet, as documented 911 victims, yet this time still alive? The ultimate turing test? What if this virtual person was powered by a powerful AI to enable two way video conference? When holonet skynet is known widely, noone can trust the anonymous internet as history will be rewritten and your memories replaced.

http://www.youtube.com/watch?v=rmrsep-fMs8

See also:

May 19, 2013

The Beginning Of The End Of CIA Google

Filed under: tech — zproxy @ 4:11 pm

… a lot of google people will go to prison, and they do not even know it

front company

A subsidiary or shell company used to shield another company from liability or scrutiny. A front company can be used to protect a parent corporation or brand from negative publicity in the event of a mishap, and may also be used to conceal illegal activities.

Facebook was indirectly funded by the CIA with the goal of learning and storing everything there is to know about you. Why? To monitor and ultimately control.

Up to now, the CIA has been organizing color revolutions using Twitter, Facebook, Youtube, and so forth as vehicles. … This is an operation which must be exposed.

I-always-feel-like-somebodies-watchin-me-red

[…] I see a future where you own your devices. And those devices work for you. They do not share any information with others.

[…] The question I have is: why the F**K should I share my network of contacts with these commercial entities.

[…] They’ve burned too many bridges at this point, to such a degree that at this point, I assume that if Google was behind it, it’s only a matter of time before they drop support.

 

[…] What is intuition? The body is always scanning for future events!

See also:

May 12, 2013

Keep the movies fresh

Filed under: tech — zproxy @ 10:31 pm

… There was an exchange program in place to “keep the movies fresh”, so old film reels were returned to America, along with the disguised rolls, where they were then loaded onto GIANT magnetic tape recorders and played back. The bandwidth was up to 3 mhz per channel, up to 256 channels, which allowed one tape to store every signal of significance originating within a nation for the length of time the tape ran.

.. Total data storage on one of these tapes was equal to many petabytes.

… NSA does not like signals stored digitally, because they look for such small subtleties in the signal for source identification, and nyquist noise is a major hindrance.

See also:

May 9, 2013

Time Lines

Filed under: tech — zproxy @ 3:13 pm

People living in fear will be stuck in 3rd density.

To a person going with the process, all they see is growth and improvement. To those left behind, they
see chaos and destruction.

get back in touch with the planet, as a living, intelligent entity.

Consciousness doesn’t grow from being told facts—it grows from the search for them

hurricanes are the product of “co-magnetic thredules” in the Earth’s core

See also:

May 8, 2013

Intel Perceptual Computing Challenge

Filed under: tech — zproxy @ 1:47 pm

This software development competition is seeking innovative ideas for a
software application (“App”) using Intel’s new programming Software Development Kit
(“SDK”) which can be used with a web camera that is able to perceive gestures, voice and
touch (on screen). The idea must fit one (1) of the following categories:
Category 1: Gaming,
Category 2: Productivity,
Category 3: Creative User Interface,
Category 4: Open Innovation.

We’ll select up to 750 finalist proposals. Users can have more than one idea proposal selected as a finalist.

First Place Prize of $75,000 + $12,500 in Marketing and Development Consultations

It’s been a while since there has been any disruption in the way we interface with traditional PCs. The Intel® Perceptual Computing Challenge wants your apps to change that.

We’re looking for the best of the best. Check your semicolons twice and really think about how you can change the world of computing. You can register and submit your ideas until June 17, 2013

See also:

May 7, 2013

Predictive Programming – The Guillotine Simulator

Filed under: tech — zproxy @ 3:51 pm

[…] REAL WORLD OR EXERCISE? FACT OR FICTION?

How long does it take for you to realize the email sent by a family member to you was faked? At what point will you be unable to differentiate history, real world events from media, movies and staged fake flag events? What if history was to be rewritten in real time? Time is running up. HOLONET

zombie (1)

… The reality is that most people don’t have the patience, time,resources or inclination to find out what is really going on out there.

… The greatest trick the Devil ever pulled was convincing the world he didn’t exist.

Willing Suspension of Disbelief

You can ask an audience to believe the impossible, but not the improbable.

Suspension of disbelief can be broken even in science fiction when a show breaks its own established laws or places said laws outside of fiction.

[…] You see suspending your disbelief is a stress on the mind, you’re asking your brain to ignore what it knows to be true. You’re saying “Hey brain, you know how people can’t fly? Well screw you, this guy can.” And your brain grumbles a bit but then does as you ask and accepts the fact that people can now fly. And then you say “Hey grey matter, vampires exist.” More grumbling, but Mr Brain plays the game. And then in the last chapter of the book when the protagonist is struggling to disarm a bomb, his faithful dog sidles up to him and says “Oi, Jeff, just cut the bloody blue wire already.”

“No,” replies Brian the Brain, “just no! Flying, yes. Vampires, yes. But dogs do not just randomly start talking because it’s bloody convenient.

gaslight

to manipulate someone into questioning their own sanity; to subtly drive someone crazy

[…]  there must be a few seconds or more after your head is chopped off until you lose consciousness. Its not like being shot through the brain. They say Hearing is the last to go, so you can hear the reaction of the crowd as you die

… a precise shot of paralytic to the top of the spinal cord, followed by a photorealistic rendering (through the goggles) of the goggles being removed… to reveal the severed-head’s view of the “real world” simulation room. Dim lights to black; leave them there to contemplate.

… They’re not laughing because anything is particularly funny. It’s the sort of laughter that is created by an inappropriate joke or a stressful situation that is avoided.

This speaks to the quality and efficacy of the simulation – it elevates stress enough that it causes participants to need to ‘laugh it off’.

… Would a “little” damage to the limbic system, for instance, make it difficult for people to remember things that happened in the past?

Would constant reminders be helpful in shaping memory, allowing some events to remain important while others faded away? Would this help keep people easy to control?

Well we have news. Science is already censored. Lots of secret science is conducted, and has been conducted. Secret science and technology has been kept hidden to create a huge technology gap, and this huge technology gap allows evil people to play God with you and your loved ones.

See also:

April 30, 2013

Organized Bloggers vs psy-op

Filed under: tech — zproxy @ 1:53 pm
  1. clearly define the mission so that it aligns with national objectives
  2. need a PSYOP estimate of the situation
  3. prepare the plan
  4. media selection
  5. product development
  6. pretesting – determines the probable impact of the PSYOP on the target audience
  7. production and dissemination of PSYOP material
  8. implementation
  9. posttesting – evaluates audience responses
  10. feedback

This isn’t the first time music has been used to influence the masses. One just has to look at history. Music is constantly being used to brainwash us, influencing our behaviors and our perception of reality, as well as changing and creating cultures! Remember how hip-hop used to be about spirituality and humanity?

16gbh

If the programmed subject is told to walk into an armed camp and assassinate an enemy leader, the subject will carry out his program with no regard to his personal welfare, whether he lives or dies, or how he is supposed to escape.

… Even under the ‘truth serum” drugs, the subject cannot reveal the truth because his conscious mind has no access to it.

… Waco was a “Open Eyes” operation.

… Whenever a government covert operative breaks his cover and begins to tell the truth, he/she is either jailed or killed.

… You can always judge the authenticity of serious reporters or investigative journals by paying attention to the things they have said about Project/Operation Monarch.

… Programmed terrorists are used by the NWO governments around the world to cause the citizens to give up their freedom and demand a police state to keep them safe. Once the police state is in place, the lessons learned from experiments like Jonestown can be used to program and re-educate the population in concentration camps

See also:

April 16, 2013

Google Glass API

Filed under: tech — zproxy @ 1:27 pm

Google has released documentation to the Mirror APIs, the API to program against Google Glass.

The second guide was slightly more technical, so when he returned a little later I asked him about the Debug Mode option. The reaction was interesting: he kind of looked at me, somewhat confused, and asked “wait, what version of the software does it report in Settings”? When I told him “XE4″ he clarified “XE4, not XE3″, which I verified. He had thought this feature had been removed from the production units.

… the Debug Mode option is the equivalent of the typical Android “Enable USB Debugging” option: it allows you to connect to the device over USB via adb.

… It knows all your passwords, for example, as it can watch you type them. It even manages to monitor your usage of otherwise safe, old-fashioned technology: it watches you enter door codes, it takes pictures of your keys, and it records what you write using a pen and paper. Nothing is safe once your Glass has been hacked.

See also:

April 9, 2013

HAARP vs PROJECT WOODPECKER

Filed under: tech — zproxy @ 5:19 am

 

 

A 24 hour day will seem to about 16 hours or less

geoengineering

sbx006_hires_lrg

[…] By the year 2025 the United States will own the weather

HAARP: THE HIGH FREQUENCY ACTIVE AURORAL RESEARCH PROGRAM (listen to it)

[…] could also be used to DISRUPT COMMUNICATIONS ALL OVER THE WORLD

Woodpecker: transmitter only a few kilometers southwest of Chernobyl and the receiver about 50 km northeast of Chernobyl… 31-bit pseudo-random binary sequence

Why does HAARP remind me Zak McKracken? Mind Control at 20m 22s.

Thee are atleast 17 HAARP stations around world.

7.83 Hz earths pulse rate – makes person feel good

10 Hz is used to put people into a hypnotic state.
10.80 Hz causes riotous behaviour
6.6 Hz causes depression.

See also:

March 26, 2013

leadercommunciator platform

Filed under: tech — zproxy @ 9:25 pm

A strategy is only a strategy until someone acts on it.

See also:

March 18, 2013

How to do this in WebGL?

Filed under: tech — zproxy @ 9:03 pm

tumblr_mjuzan58WY1r6j7rho1_r1_500

See also:

 

March 14, 2013

Another one bites the dust

Filed under: tech — zproxy @ 11:50 am

Remember the old days, when Google sincerely thought that Google+ was the future of Google? That future is no more. As of this month, Google no longer automatically creates a Google+ account for new users to Gmail.

The moment has passed.

[…] RSS is my window to the world. - Slashdot

Today I learned another very highly used service bites the dust.

WARNING: Total media blackout 

From your 2,916 subscriptions, over the last 30 days you read 6,392 items, clicked 423 items, starred 0 items, and emailed 41 items.
Since December 25, 2010 you have read a total of 300,000+ items.

TimeOfDay

  • It is bad enough that the links stop working, images disappear and the videos at YouTube get pulled.
  • It is bad enough that blogs stop publishing valuable content or change their address.
  • It is hard enough to get someone blogging.
  • It is hard enough to get someone to read blogs.

I used to aske people I met did they have a blog. Now, without google reader, I am not sure how to follow them…

Google Reader is optimized to help you sift through many news items quickly. … and that’s something these newspaper-like apps cannot accomplish.

The Intenet.

I feel there is a need for a new service. A personal internet service. A service which will keep tabs on all the content for you. Works on your devices. Can not be discontinued. And keeps a copy of everything. Like a personal internet archive. And integrates with Google Glass, of course.

By phone I meant it will serve as a personal internet cache, your agent, always with you wherever you travel. You can connect to it from any laptop and it will synchronize feeds for you.

See also:

December 15, 2012

Windows NT Terminal Service RemoteApp

Filed under: tech — zproxy @ 3:12 pm

How many distinct C: drives can you explore at the same time?

Remote desktop connection icon.PNG

Did you know that you can run your remote application within your local desktop seamessly?

On your client modify your .rdp file:

remoteapplicationmode:i:1
remoteapplicationprogram:s:cmd.exe

On your server do:

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Terminal Server\TSAppAllowList]
fDisabledAllowList“=dword:00000001

To list remote drives:

wmic logicaldisk get caption

To open the task manager:

taskmgr

To open Control Panel, one could choose Windows Classic layout:

control

While Visual Studio 2012 actually works in this mode.

Since some web applications already allow one to map network drives via WebDAV then how long, until one can actually connect to a virtual web application via Remote Desktop Client RemoteApp? What if that virtual web application would be hosted by your android device or your chrome web application?

What if the application was running on EC2 yet as a RemoteApp?

See also:

September 15, 2012

Web Browser

Filed under: tech — zproxy @ 10:57 am

The primary purpose of a web browser is to bring information resources to the user (“retrieval” or “fetching”), allow them to view the information (“display”, “rendering”), and then access other information (“navigation”, “following links”).

I like the way StatCounter is using the client only URL hash to query the web service. In chrome I like best the way it enables to synchronize bookmarks between all devices.

Normalised smartphone platforms to 3Q 2012

See also:

May 25, 2012

Key Frame Animation and 3D Drawing

Filed under: tech — zproxy @ 7:33 am

To unpack old packages:

msiexec /a Setup.msi TARGETDIR=”Y:\opensource\unmonitored\3DJournal_363\source” /qb

See also:

March 31, 2012

GDC 2012: The Bleeding Edge of Open Web Tech

Filed under: tech — zproxy @ 6:25 pm
  1. Detect and fetch bugs in he wild
  2. Detect and respond to user focus loss
  3. Track as much user data as possible
  4. Choose monetization metric that fits your game
  5. Focus on Consumable and durable goods

See also:

August 2, 2011

Unlimited Detail

Filed under: tech, video — Tags: , — zproxy @ 4:05 pm
  1. Fictional items designed by artists
  2. Scanned Real world items

via Geeks3D and also covered by slashdot, rockpapershotgun.

[…] more correctly, get excited about voxelsNotch

See also:

July 28, 2011

Hard to copy, easy to pay

Filed under: tech — Tags: , , , — zproxy @ 7:34 am
  • Hard to copy
    • Authenticity
    • Findability
    • Embodiment
    • Interpretation
    • Attention
  • Easy to pay
    • Immediacy
    • Personalization
    • Understanding how it works
[…] It’s fun to do impossible projects because then you don’t have to worry about what happens if you succeed – Seth
[…] “To get something you never had, you have to do something you’ve never done.”
[…] Things are only impossible until they’re not.
See also:

July 1, 2011

Write a proposal – What’s your sales message?

Filed under: tech — Tags: , , , , — zproxy @ 2:36 pm

cohesive: strong, unyielding

New business will be won only to the extent that the client believes that
the professional is interested, cares, and is trying to help.
—DAVID H. MAISTER1

So you have received a request for proposal? Do you know how to write a proposal? Do you know how to present your sales message?

The project proposal is a tool — not a goal. It should be followed as closely as possible, and deviations should occur only when necessary.

A Request for Proposal (RFP) is a formal statement of requirements and technical specifications that constitute a company’s needs for the evaluation, recommendation and bid proposal of systems, services or products from vendors.

[…] If you have the tools you still need wood to build anything.

‎[…] A hammer does not build a house for a carpenter.

In order to ask for comments provide a section by section overview to indicate where you are most uncertain.

  • The proposal as a cohesive document
  • The proposal as a persuasive document
[…] Persuasion – A successful intentional effort at influencing another’s mental state through communication in a circumstance in which the reader has some measure of freedom. – Daniel J. Okeefe
Why would we persuade?
  • To narrate
  • To inform
  • To convince
  • To explore
  • To make decisions
  • To define
  • To establish credibility

All proposals share in common the following basic parts:

  1. The metaphor of a body
  2. The idea of narration
  3. The idea of persuasion, we really are arguing for our idea
  4. The idea of audience
The checklist for effective persuasion:
  • Have the aims of persuasion been identified and addressed?
  • Is the central persuasive statement controlled?
  • Have logical fallacies been avoided?
  • Have the audience’s knowledge, beliefs, and attitudes been considered?
  • Has a formal persuasive system been followed?
[…] Anything only has a value depending on what we compare it to – Rory Sutherland
[…] The first rule of Persuasion Design is that every design is persuasive in some ways. There is no neutral way of designing something. – Arjan Haring 2010
Trick:
  • In your sales video, talk about the value you will be providing
  • Send customers to buy
  • Invite them –  “See you on the other side”
[…] Don’t tell me about your grass seed, tell me about my lawn

See also:

April 29, 2011

You do have a backup, right?

Filed under: tech — Tags: , — zproxy @ 9:32 am

Note to self: Have external drives sync up on each other bi-weekly.

Today I found out that my 1TB external hard drive has stopped working. Only the bright white LED was still shining. The operating system itself was unable to detect the drive via the USB connection.

You do have a backup, right?

Well, no. It was the backup. I had a collection of documents I wanted to read later. Most of them were related to my Ph.D studies and downloaded from the internet. The source code on the disk was either disposable or synced to a repository like svn or git. And then there was media like movies and images.

Should an external hard drive be considered as a temporary means to transport data?

A coffee spill on your Asus Ultrabook UX31E may take up to 2 + 8 weeks in your local repair shop!

(more…)

Older Posts »

The Shocking Blue Green Theme. Blog at WordPress.com.

Follow

Get every new post delivered to your Inbox.

Join 85 other followers