龙八8国际

          
          

                    Posts with keyword: data


                    Some Benefits of Decentralized Design and Modeling

                    Some of the problems we face online, like privacy, control, and access to data are solved when we consider decentralized approaches. This blog post discusses several benefits of decentralized design and modeling.
                    Continue reading...


                    A Cosm Module for KRL

                    I've published a new module that allows KRL rulesets to easily update a Cosm datafeed. This blogpost describes how to use it.
                    Continue reading...


                    Unlocking Data Exchange: The Long Tail of Data

                    Much has been made of data lately. And with good reason. Data and the ability to exchange and process it are at the heart of modern society's productivity and prosperity. Data and algorithms are the engines that drive the economy in the 21st century. But data is often onerous to obtain, difficult to trust, and hard to understand. Fixing these problems--making trustworthy, understandable data flow more freely, consistently, and reliably--will provide a wellspring of new ideas and companies to prosecute them.
                    Continue reading...


                    Events, Webhooks, and the Realtime Web: Kynetx Dev Days

                    At Kynetx we're very bullish on the real-time Web. There are several trends that are leading us inexorably toward better use of real-time data including webhooks, Restful APIs, streaming data from sources like Twitter and Facebook, and Internet identity protocols like OAuth. At Kynetx, we use the term "event-driven" to descibe systems and architectures that make use of these ideas. Kynetx is a system for building event-driven applications that make use of webhooks, APIs, stream data, and user-centric identity. As I said in my post on Static Queries, Dynamic Data: Enabling the Real Time Web, In a traditional database,
                    Continue reading...


                    Changes for IIW

                    There are a couple of changes coming to IIW, one pragmatic and one philosophical. First the pragmatic... Due to some scheduling snafus, the Computer History Museum is not available during the time we'd advertised for IIW XI (Nov 9-11). After much thought and discussion we've determined that the best course of action is to move it to another day rather than change the venue. CHM has many things to like and it's become the workshop's home. So, we're moving IIW XI to November 2-4. We realize the 2nd is election day and hope you'll vote early. We also realize
                    Continue reading...


                    The Future of Internet Identity: Data Access and Modeling

                    In my previous blog post, wrapping up IIW X and discussing what wasn't discussed, I talked about what was missing at IIW: discussions about authentication. What was hot at IIW were discussions about authorization and personal data. OAuth, UMA, and PDX talks were happening in every corner this time and these topics (with data access and modeling as their unifying theme) will be a major area of focus as IIW continues. Back in the dark days of the Web, if you wanted access to data in your account in someone's system via an API, you had to pass along
                    Continue reading...


                    Personal Data, Freedom, and Value Creation

                    Image by mkrigsman via Flickr Data is big business. Whether its demographics or FICO score, people know things about you and sell it to people who want know about you. If you're read my blog post on the Power of Pull (or listened to the podcast) then you know that I believe we haven't even scratched the surface of where data exchange is going. As more and more of our life goes online there will be more and more semantic, structured data available about every aspect of our lives. For example, your golf clubs will automatically register your strokes,
                    Continue reading...


                    Come to Digital Death Day

                    The day after IIW (that would be May 20th), Kaliya is running a workshop called Digital Death Day at the Computer History Museum. Death is a part of life but what does death of the physical self mean for the digital self? This is a conference focused on this question and others around "digital death". What does it mean for loved ones of the departed? What does it mean for professionals in end of life care and post mortem services? What does it mean for online tool and service providers? What does it mean for estate
                    Continue reading...


                    The Power of Pull

                    This week on the Technometria podcast, Scott and I talk to David Siegel, the author of The Power of Pull. David talked to me one or two times quite a while back about identity as he was researching this book, but I didn't really know what the book was about or why he cared about identity. In appreciation, he sent me a copy of the book when it came out and I left it sitting on my desk for a number of weeks before I picked it up. When I did, I was blown away. I'm certain that the
                    Continue reading...


                    Beyond Aesthetics

                    This week's Technometria podcast is with designer Thomas Petersen on the topic of data overload and design. Late last year he wrote a blog post called Slaves of the Feed that talked about a problem almost all of us face: too much information. It was the start, rather than the end, of a conversation and so seemed a good jumping off spot for a podcast. Thomas has a designer's take on the problem and we ended up talking about design in a more general sense. I enjoyed it.
                    Continue reading...


                    Looping in KRL

                    One of the design goals of the Kynetx Rule Language (KRL) is to make it easy to use online data sources to augment the user's experience in the browser. Using interesting data implies some kind of iteration. KRL supports both implicit and explicit looping. Ths article discusses looping in KRL and how looping in a rule language like KRL differs from how you might use it in an imperative language. First, recognize that the ruleset itself is a loop. You should imagine the rulset as a big switch statement inside a loop that is executed over and over again
                    Continue reading...


                    Space-Time-Travel Data Changing the World Now

                    Jeff Jonas, who is one of the world's premiere data analysis experts writes: Mobile devices in America are generating something like 600 billion geo-spatially tagged transactions per day. Every call, text message, email and data transfer handled by your mobile device creates a transaction with your space-time coordinate (to roughly 60 meters accuracy if there are three cell towers in range), whether you have GPS or not. Got a Blackberry? Every few minutes, it sends a heartbeat, creating a transaction whether you are using the phone or not. If the device is GPS-enabled and you're using a location-based service
                    Continue reading...


                    Data Leads to Better Parking Decisions

                    The short term lot at Salt Lake City Airport has electronic display boards that tell you how many parking spots are available on each deck. That wasn't always the case. Monday when I was parking to go to RSA, I realized that in the old days my default behavior was to head straight to the top deck because there were always more spots there. The small overhead of driving up to the third deck was far better than driving around the aisle looking for a place to park. Now, with more info, my alrgorithm has changed.
                    Continue reading...


                    Where Oil Comes From

                    One of the reasons I love reading Jon Udell's blog is that he shares the results of his curiousity. Not only is Jon curious in general, but he's especially curious about data and how your can mundge it to produce information. The latest example is Jon's look at where Oil comes from--not from where you think probably. The answer, if you live in the US is Canada and Africa. 33% of US oil comes from North America (with Canada being the largest "foreign" supplier) and 20% comes from Africa. How did Jon find this out? By importing the data
                    Continue reading...


                    Advanced Analytics in the Anonymized Data Space: Jeff Jonas

                    Jeff Jonas gave a great keynote this morning. (Here's a paper from IEEE Security and Privacy that explains some of this.) This afternoon he's adding context. Literally. Contexts allow seemingly unrelated records to become related. The idea is that two records get created in two different data stores, because of some common event, but the common event is unobservable to the organization and the perceptions around that event are not connected. When the organization queries these data sources to make a decision, the fact that these records are related might not be known. He calls this enterprise amnesia. The
                    Continue reading...


                    Free the Data!

                    Free the Data! Panel(click to enlarge) A specially arranged panel session called Freeing the Data was moderated by Kieron O'Hara (Univ. of Southhampton). On the panel were Daniel Weitzner (W3C & MIT), Daniel Harris (Kendra), and Jeremy Frey (Univ. of Southhampton). Jeremy Frey is a chemist and took the position that any scientist doing research should not only make results available, but the data as well. But making the data available isn't enough. We need to make it findable as well. Moreover, we need the context to be available and machine readable. Another issue with data is correctness. Published papers
                    Continue reading...


                    Owning Identity, Not Reputation or Transactions

                    Bob Blakeley, who writes frequently about identity issues has an interesting post entitled On The Absurdity of "Owning One's Identity" in response to Kim Cameron's first law. The first law states: Technical identity systems must only reveal information identifying a user with the user's consent. Bob, rightly, recognizes that this really isn't a law and goes on to give various reasons why it's unenforceable. Drummond Reed points out, that Kim's talking about "technical" systems, not the processes that might be built on top of them. Even so, there are some interesting issues here that point out why identity and
                    Continue reading...


                            
                            

                                      极速3d彩票这样买才中

                                      亚博娱乐首页

                                      幸运彩票登录平台

                                      www.444yl

                                      球探比分即时足球比分

                                      天游|app

                                      惠赢竞彩|app

                                      香格里拉平台注册

                                      龙8国际老虎机真人游戏下载安装