-
Recent Posts
Recent Comments
Mr WordPress on Hello world! Archives
- April 2011
- October 2007
- September 2007
- August 2007
- July 2007
- June 2007
- May 2007
- April 2007
- March 2007
- February 2007
- January 2007
- December 2006
- November 2006
- October 2006
- September 2006
- August 2006
- July 2006
- June 2006
- May 2006
- April 2006
- March 2006
- February 2006
- January 2006
- December 2005
- November 2005
- October 2005
- September 2005
- August 2005
- July 2005
- June 2005
- May 2005
- April 2005
- March 2005
- February 2005
- January 2005
- December 2004
- November 2004
Categories
- 2007 predictions 2006 web application security
- 3-D web
- 3d graphs keynote osx pie charts line bar charts
- accelerating change
- accountability
- action
- Activism
- addiction
- affinity capital
- affinity ratings
- agency
- aggregation
- aggression
- AGI
- AI
- aid
- ajax security web application xhr attack surface xss jeremiah grossman article javascript
- alcor
- ALM
- alternative intelligence
- amazon
- American Idol
- anders sandberg
- Anonymous Blogs
- API
- APIs
- argument
- arthur c clarke
- artificial intelligence
- associate blogs
- astronomy
- attention economy
- attribute pricing
- aubrey de grey
- Authority
- avatar
- avatars
- awards
- Barbra Streisand
- barcamp
- barcampusa 2007
- Barrera
- baseball
- basketball
- BC Legislation
- BCCLS
- belief
- benkler
- Best of Overtones. Top Referrals
- Best Practices
- Beyonce Knowles
- biology futures
- biotechnology
- black holes
- blink
- blocking meta refresh with link tags javascript port scanning web application security
- blog cemeteries
- Blogger Etiquette
- Blogger Outreach
- Blogger Relations
- blogging
- Blogging Benefits
- blogging pr
- blogging voice
- Book Shelf
- boomer
- boomeritis
- bottom of the pyramid
- boundaries
- boxing
- Branding
- broadband
- Browser
- browser port scanning without javascript malware
- busines models
- business in China
- business logic flaw abuse functionality yahoo games chess ladder
- business model
- bypassing firefox mozilla port blocking restrictions javascript scanning malware
- cable
- Calzaghe
- canadian law blogs
- CANLII
- cap-and-trade
- capitalism
- carbon dioxide emission
- carbon emission
- carbon-based
- Carrie Underwood
- cartoons
- Case Study
- catster
- causality
- CBA National Magazine
- Celine Dion
- change
- Charlotte Church
- Chavez
- China
- choice
- Christina Aguilera
- ClientWork
- cognition
- collaborative intelligence
- collective intelligence
- communications
- communications skills
- Community
- compact fluorescent lighting
- compersion
- competitiveness
- computation
- concept
- Conferences
- construct of self
- consumer control
- consumer spending
- consumer-generated content
- consumerism
- content
- Content Analysis
- content marketing
- content portability
- continuum
- contribution
- Cool Tools
- cosmos
- creativity
- Crisis Blog
- Crisis Communication
- cross site request forgery CSRF XSRF cgisecurity
- crowdsourcing
- cryonics
- cryopreservation
- css history browser history hack without javascript
- culture
- dark matter
- data
- dating ideas
- dave winer
- David Whelan
- De La Hoya
- decision
- default risk
- democratization of capital
- designer hormones
- detail
- dewar
- digg
- digital consciousness
- digital economies
- digital humans
- digital intelligence
- digital worlds
- disclosure web application security vulnerability
- Distributed Content
- diversity of approaches
- dns pinning anti google desktop
- dogster
- dont trust server side security superbowl XLI internet explorer IE exploit defacement
- doug rushkoff
- dynamisn
- economics
- ectogenesis
- edit end user license agreements EULA bookmarklet
- EEA
- effectiveness
- elderboom
- elearning
- elections
- electric sheep company
- employee blogs
- empowerment
- encephalization
- energy
- enhancement
- entropy
- Ethics
- ethics diversity
- Event
- exchange links
- Excited Utterances
- experience autonomy
- experiences
- exponential
- extrospection
- Facdebook
- fantasy league
- feedback loop
- fertility bust
- finishing moves
- FireFox
- Firememe
- firstFlickr
- flickr
- freakonomics
- Free
- free local dial
- freeman dyson
- friendster
- Fun
- Fun Friday
- future
- future economics
- future living
- future of physics
- future of science
- future of sexuality
- future of software
- future of technology
- future of the Internet
- future web application vulnerability assessment scale
- Gadget
- gaming
- gapminder
- GDP
- geek
- Geeky Goodness
- gen x
- gender
- Ghostwriting
- GLAST
- gmail contact list hack json javascript CSRF
- Google street views
- greenhouse gasses
- greying of America
- groupthink
- hack
- hate-tagging
- health care reform
- health issues
- Higgs boson
- historical simulations
- Holyfield
- homogeneity
- Hopkins
- hormone management
- How To
- Howard Stern
- human knowledge database
- human obsolescence
- human rejection of technology
- human software file
- Humor
- idea marketplaces
- ideagoras
- ideas for web application security projects
- ideation
- identity
- imagination
- immortality
- impeachment
- individuality
- Info Ponsel
- information
- information as a substrate
- information hierarchy
- information processing
- innocentive
- innovation
- input validation output filtering XSS
- Instant Communications Platform
- insurance
- intelligence
- intelligence gains
- internet
- Internet archive
- Internet Explorer
- internet penetration
- Interview
- interview picking brains jungsonn
- interview podcast stillsecure alan shimell mitchell ashely
- IP video
- IPTV
- ITRadio Podcast Patrick Gray
- its funny
- jaiku
- javascript history hack theft security console error CSS
- javascript image type console error message suppression
- javascript nat ip address java
- Jay-Z
- jd supra
- jeremy siegel
- Joseph Estrada
- Josh Hallett
- Journalism
- Joy London
- jupiter brains
- justice system
- kardashev
- Kelly Clarkson
- Ken Dychtwald
- ken wilber
- kyoto protocol
- language
- large hadron collider
- laugh
- law blogs
- law firm blogging
- Law Firm RSS
- law firm websites
- law librarian blogs
- lawyers
- learning
- Legal
- Legal KM
- legal web 2.0
- leibniz
- lending
- Lewis
- LHC
- librarian blogs
- librarian km
- librarians
- life
- life 2.0
- lifeblogging
- lifecamming
- lifelogging
- Linux
- Live Blogging
- LLRX
- logarithmic
- long now
- long view
- low hanging fruit automated scanners technical vulnerabilities business logic flaws
- LSUC
- ltaig bcla rob golbeck
- managed experience
- managed reality
- managed reproduction
- market mechanisms
- market-centrism
- Marketing
- markets 2.0
- Marquez
- marsh mcluhan
- mashup
- Maslow
- material freedom
- material wealth
- math
- matrioshka brains
- maui vacation 2006 hawaii twin falls
- Mayweather
- meaning
- meaningful work
- Measurement
- Measurement Tools
- media
- memes
- memory tool
- Mentoring
- meritocracy
- metaverse
- michelle golden
- micro-content
- microcredit
- microsoft
- mind file
- mindfile
- MMORPG
- mobile
- mobile apps
- mobile as a platform
- modulated information
- monickers
- Morales
- More Partner Income
- movies
- MRT
- multi-currency economy
- multidisciplinarity
- multiplayer gaming
- multiverse
- music
- My PR Pro
- mythbusting ajax slashdot followup javascript malware
- names
- nanotechnology
- natural language processing
- neologisms
- nerd
- networking
- newspapers
- newtech
- nina platt
- non-biological substrate
- Norah Jones
- Notebook
- occasion
- octospiders
- Odds and Ends
- Online Communication
- ontology
- open source
- openbasicresearch
- p2p finance
- P2P lending
- Pacquiao
- participation
- particle physics
- passively multiplayer gaming
- paul saffo
- pda/smartphone
- people-tagging
- Personal
- personal content
- personality interface
- personalized medicine
- philanthropy 2.0
- Philosophy
- physics
- Pics
- planck length
- Planning
- Podcast
- politics
- politics 2.0
- polyamory
- Ponsel
- poptech
- Popular Culture
- population growth
- post-scarcity
- post-scarcity economy
- poverty
- PowerWomen
- PR
- PR Brainstorm
- PR Philosophy
- PRCampaign
- prediction
- prediction markets
- premature aperturation
- Preventing CSRF vulnerable XSS
- privacy
- processing power
- propser
- prosper
- PRSA
- Public Legal Education
- Public Relations
- publishing
- pullution
- Quickscribe
- radical life extension
- rama
- Randy Jackson
- Ranking
- ratings
- reality show
- reanimation
- Recommended
- relationships
- relevance of technology
- religion
- reputation
- Research
- resource distribution
- reviews
- richard florida
- roadmapping
- ROI
- RSA 2007
- rsa 2007 jordan wiens security innovations interactive testing challenge
- ruling elites
- ryan barnett apache blogger modsecurity breach security waf
- Sabrina Pacifici
- samy pleads guilty
- Sanjaya Malakar
- scale
- scarcity
- science
- Search
- second life
- Second Thursday in Second Life
- secure code frameworks robert auger security pdp gnucitizen
- security assessments penetration tests difference
- self
- self-actualization
- self-aware autonomous intelligent agents
- self-copy
- self-modification
- self-replication
- self-representation
- semiconductors
- senior citizens
- SENS
- SEO
- serios
- seriosity
- serious gaming
- sex
- sex drive
- Shania Twain
- shared meme-base
- shortcomings of humans
- Shout Out
- Simon Cowell
- sims
- sims online
- simulation
- singers
- singularity
- singularityster
- Situation Room
- skype
- smolin
- SOA
- social capital
- social change
- social finance
- Social Media
- social networking
- Social Networks
- social pressure
- Software
- software components
- space colonization
- space travel
- Speaking Engagements
- spellchecker
- sports
- sql dump
- stem
- stem friends
- stock
- strategic futurism
- Strategy
- stratified information
- string theory
- submission manuever
- subverting ajax xss prototype hijacking splitting stephano giorgio cross site scripting
- super heroes
- super-intelligence
- surveillance
- sxsw
- Tactics
- tagging
- taxonomies
- taxonomy
- tech change
- techno-luddite
- technocelebrity
- technology sharing
- Technorati
- Teillard de Chardin
- telcos
- telecommunications
- text-indexing
- third culture
- three wishes 3 web browser security javascript malware history intranet hacking
- time
- Tips
- Tips Komputer
- Tips Ponsel
- Tivo
- Tom Collins
- tools
- Top 10
- top 10 ten web hacks 2006 bode for 2007
- top 10 web hacks 2006
- transformation
- transparency
- Trends
- trial blogs
- Trinidad
- trust systems
- trusting client side security web application same-origin policy cookie vulnerability javascript malware browser ssl tls
- Twitter Moment
- Tyson
- Ubuntu
- UGC
- Uncategorized
- understanding
- universal cross site scripting UXSS adobe rsnake pdf plugin browser DOM based
- upload
- upload world
- uploading
- user education
- user-generated applications
- user-generated content
- Valetine's Day
- value systems
- values translator
- vc financing
- Veoh
- video
- video search
- Viral
- Viral Campaigns
- Virginia Tech
- virtual currency
- virtual economies
- virtual office
- virtual reality
- virtual tourism
- virtual worlds
- virtual worlds 2007
- voice
- voice service
- voluntouring
- Von Neumann
- vulnerability disclosure web applications
- waf web application firewall
- wasc meetup RSA 2007 san francisco web application security
- wasc rsa meetup 2007
- web 2.0
- web 3.D
- web application security formula motivation economist fight club jack
- web application security network coverage vulnerability measuring assessment scanning scan methodology
- web application security professionals survey statistics
- web application security professionals survey statistics january 2007
- web application security professionals survey statistics jeremiah grossman whitehat
- web application security scanner appscan webinspect anurag agarwal review comparison
- web application security scanner vulnerability statistics assessment methodology
- web application vulnerability assessment va low hanging fruite LHF neopets
- web application vulnerability scanning assessment owasp top ten 10 automated white paper
- web appplication security defense in depth SDLC
- web services
- webstock
- whitehat security jobs Application Security Specialist hiring
- whitehat security tradeup promotion scanner service
- whitehat web application security risk report statistics severity technical logical
- Whitney Houston
- widgets
- wikinomics
- windows
- Windows Mobile
- women
- Workshops
- world is flat
- World Series
- wrestling
- Wright
- WWE
- xenocism
- yahoo
- Your Turn
- YouTube
- zopa
Meta
Category Archives: future of the Internet
>Content Smorgasbord
>What a wonderful time to be alive! There is more content than ever now available in a variety of formats. News. Of course the content smorgasbord trend started with the Internet, although really the library was the predecessor, in fact … Continue reading
>The Internet is Getting Bigger Faster
>In the future, we will have multiple networks with much greater profundity than we do today. Some refer to the 2005 Internet as the baby of what is to come and this may be understating it. Some key things are … Continue reading