Thursday, November 15, 2007

Storm worm first appeared at the beginning of the year

Another fiendish code!
http://www.wired.com/politics/security/commentary/securitymatters/2007/10/securitymatters_1004

Random numbers are critical for cryptography

Big Brother, anyone?


http://www.wired.com/politics/security/commentary/securitymatters/2007/11/securitymatters_1115

He who controls the present, controls the past. He who controls the past, controls the future.

He who controls the present, controls the past. He who controls the past, controls the future. George Orwell

Who is controlling our media? Who controlled the "message" delivered in our history books? Who will be controlling the "data" in our future?
Will vendors tell is what data we want and how it will be stored?
http://information-literacy.blogspot.com/

How do people think?

Tonight's discussion of Information Literacy generated ideas about how humans learn and how to human seek information.
http://www.ccmr.cornell.edu/education/ask/index.html?quid=151