Blunder Dome Sighting  
privacy 
 
 
 

Hangout for experimental confirmation and demonstration of software, computing, and networking. The exercises don't always work out. The professor is a bumbler and the laboratory assistant is a skanky dufus.



Click for Blog Feed
Blog Feed

Recent Items
 
How Do You Know Your Discarded Disk Is Unreadable?...
 
Uh, lemme see, I'm gonna hack my router and expose...
 
Flaws in Genuine Software Still Exploitable in Tru...
 
A Secure RFID-Identification Protocol?
 
How Effective Is Your Software QA?
 
An Entirely New Way of Designing Systems?
 
Trust Points and Trust Issues
 
How Do We Safely Orient for Aspects?
 
Conquering the Business-Application Life Cycle
 
FLINT for bug-free, secure, and reliable software....

This page is powered by Blogger. Isn't yours?
  

Locations of visitors to this site
visits to Orcmid's Lair pages

The nfoCentrale Blog Conclave
 
Millennia Antica: The Kiln Sitter's Diary
 
nfoWorks: Pursuing Harmony
 
Numbering Peano
 
Orcmid's Lair
 
Orcmid's Live Hideout
 
Prof. von Clueless in the Blunder Dome
 
Spanner Wingnut's Muddleware Lab (experimental)

nfoCentrale Associated Sites
 
DMA: The Document Management Alliance
 
DMware: Document Management Interoperability Exchange
 
Millennia Antica Pottery
 
The Miser Project
 
nfoCentrale: the Anchor Site
 
nfoWare: Information Processing Technology
 
nfoWorks: Tools for Document Interoperability
 
NuovoDoc: Design for Document System Interoperability
 
ODMA Interoperability Exchange
 
Orcmid's Lair
 
TROST: Open-System Trustworthiness

2005-05-03

 

Are You A Problem Witch or a Solution Witch?

ACM News Service: Security Stalls Mobile Multimedia.  This blurb makes a nice contrast between four-and-counting approaches being employed to accomplish security (including DRM) on mobile multimedia-capable devices.  It is also clear that the tension and multiplicity of approaches is being fought out in the solution space.  The dominant agendas there may have little to do with how we look at it from the problem space where we operate as users of these devices.

Junko Yoshida’s 2005-04-25 EE Times article provides a lenghty and clear navigation of the many layers involved, with emphasis on how much this is in the hands of content providers, service operators, and device manufacturers (and software developers). We get to vote last and, unfortunately, with our feet, thumbs, and eyeballs.  All we’ll know is what our experience with the systems turn out to be.  Nothing new, I guess.

 
Construction Structure (Hard Hat Area) You are navigating Orcmid's Lair.

template created 2004-06-17-20:01 -0700 (pdt) by orcmid
$$Author: Orcmid $
$$Date: 10-04-30 22:33 $
$$Revision: 21 $