-
Recent Posts
Recent Comments
Mr WordPress on Hello world! Archives
- April 2011
- October 2007
- September 2007
- August 2007
- July 2007
- June 2007
- May 2007
- April 2007
- March 2007
- February 2007
- January 2007
- December 2006
- November 2006
- October 2006
- September 2006
- August 2006
- July 2006
- June 2006
- May 2006
- April 2006
- March 2006
- February 2006
- January 2006
- December 2005
- November 2005
- October 2005
- September 2005
- August 2005
- July 2005
- June 2005
- May 2005
- April 2005
- March 2005
- February 2005
- January 2005
- December 2004
- November 2004
Categories
- 2007 predictions 2006 web application security
- 3-D web
- 3d graphs keynote osx pie charts line bar charts
- accelerating change
- accountability
- action
- Activism
- addiction
- affinity capital
- affinity ratings
- agency
- aggregation
- aggression
- AGI
- AI
- aid
- ajax security web application xhr attack surface xss jeremiah grossman article javascript
- alcor
- ALM
- alternative intelligence
- amazon
- American Idol
- anders sandberg
- Anonymous Blogs
- API
- APIs
- argument
- arthur c clarke
- artificial intelligence
- associate blogs
- astronomy
- attention economy
- attribute pricing
- aubrey de grey
- Authority
- avatar
- avatars
- awards
- Barbra Streisand
- barcamp
- barcampusa 2007
- Barrera
- baseball
- basketball
- BC Legislation
- BCCLS
- belief
- benkler
- Best of Overtones. Top Referrals
- Best Practices
- Beyonce Knowles
- biology futures
- biotechnology
- black holes
- blink
- blocking meta refresh with link tags javascript port scanning web application security
- blog cemeteries
- Blogger Etiquette
- Blogger Outreach
- Blogger Relations
- blogging
- Blogging Benefits
- blogging pr
- blogging voice
- Book Shelf
- boomer
- boomeritis
- bottom of the pyramid
- boundaries
- boxing
- Branding
- broadband
- Browser
- browser port scanning without javascript malware
- busines models
- business in China
- business logic flaw abuse functionality yahoo games chess ladder
- business model
- bypassing firefox mozilla port blocking restrictions javascript scanning malware
- cable
- Calzaghe
- canadian law blogs
- CANLII
- cap-and-trade
- capitalism
- carbon dioxide emission
- carbon emission
- carbon-based
- Carrie Underwood
- cartoons
- Case Study
- catster
- causality
- CBA National Magazine
- Celine Dion
- change
- Charlotte Church
- Chavez
- China
- choice
- Christina Aguilera
- ClientWork
- cognition
- collaborative intelligence
- collective intelligence
- communications
- communications skills
- Community
- compact fluorescent lighting
- compersion
- competitiveness
- computation
- concept
- Conferences
- construct of self
- consumer control
- consumer spending
- consumer-generated content
- consumerism
- content
- Content Analysis
- content marketing
- content portability
- continuum
- contribution
- Cool Tools
- cosmos
- creativity
- Crisis Blog
- Crisis Communication
- cross site request forgery CSRF XSRF cgisecurity
- crowdsourcing
- cryonics
- cryopreservation
- css history browser history hack without javascript
- culture
- dark matter
- data
- dating ideas
- dave winer
- David Whelan
- De La Hoya
- decision
- default risk
- democratization of capital
- designer hormones
- detail
- dewar
- digg
- digital consciousness
- digital economies
- digital humans
- digital intelligence
- digital worlds
- disclosure web application security vulnerability
- Distributed Content
- diversity of approaches
- dns pinning anti google desktop
- dogster
- dont trust server side security superbowl XLI internet explorer IE exploit defacement
- doug rushkoff
- dynamisn
- economics
- ectogenesis
- edit end user license agreements EULA bookmarklet
- EEA
- effectiveness
- elderboom
- elearning
- elections
- electric sheep company
- employee blogs
- empowerment
- encephalization
- energy
- enhancement
- entropy
- Ethics
- ethics diversity
- Event
- exchange links
- Excited Utterances
- experience autonomy
- experiences
- exponential
- extrospection
- Facdebook
- fantasy league
- feedback loop
- fertility bust
- finishing moves
- FireFox
- Firememe
- firstFlickr
- flickr
- freakonomics
- Free
- free local dial
- freeman dyson
- friendster
- Fun
- Fun Friday
- future
- future economics
- future living
- future of physics
- future of science
- future of sexuality
- future of software
- future of technology
- future of the Internet
- future web application vulnerability assessment scale
- Gadget
- gaming
- gapminder
- GDP
- geek
- Geeky Goodness
- gen x
- gender
- Ghostwriting
- GLAST
- gmail contact list hack json javascript CSRF
- Google street views
- greenhouse gasses
- greying of America
- groupthink
- hack
- hate-tagging
- health care reform
- health issues
- Higgs boson
- historical simulations
- Holyfield
- homogeneity
- Hopkins
- hormone management
- How To
- Howard Stern
- human knowledge database
- human obsolescence
- human rejection of technology
- human software file
- Humor
- idea marketplaces
- ideagoras
- ideas for web application security projects
- ideation
- identity
- imagination
- immortality
- impeachment
- individuality
- Info Ponsel
- information
- information as a substrate
- information hierarchy
- information processing
- innocentive
- innovation
- input validation output filtering XSS
- Instant Communications Platform
- insurance
- intelligence
- intelligence gains
- internet
- Internet archive
- Internet Explorer
- internet penetration
- Interview
- interview picking brains jungsonn
- interview podcast stillsecure alan shimell mitchell ashely
- IP video
- IPTV
- ITRadio Podcast Patrick Gray
- its funny
- jaiku
- javascript history hack theft security console error CSS
- javascript image type console error message suppression
- javascript nat ip address java
- Jay-Z
- jd supra
- jeremy siegel
- Joseph Estrada
- Josh Hallett
- Journalism
- Joy London
- jupiter brains
- justice system
- kardashev
- Kelly Clarkson
- Ken Dychtwald
- ken wilber
- kyoto protocol
- language
- large hadron collider
- laugh
- law blogs
- law firm blogging
- Law Firm RSS
- law firm websites
- law librarian blogs
- lawyers
- learning
- Legal
- Legal KM
- legal web 2.0
- leibniz
- lending
- Lewis
- LHC
- librarian blogs
- librarian km
- librarians
- life
- life 2.0
- lifeblogging
- lifecamming
- lifelogging
- Linux
- Live Blogging
- LLRX
- logarithmic
- long now
- long view
- low hanging fruit automated scanners technical vulnerabilities business logic flaws
- LSUC
- ltaig bcla rob golbeck
- managed experience
- managed reality
- managed reproduction
- market mechanisms
- market-centrism
- Marketing
- markets 2.0
- Marquez
- marsh mcluhan
- mashup
- Maslow
- material freedom
- material wealth
- math
- matrioshka brains
- maui vacation 2006 hawaii twin falls
- Mayweather
- meaning
- meaningful work
- Measurement
- Measurement Tools
- media
- memes
- memory tool
- Mentoring
- meritocracy
- metaverse
- michelle golden
- micro-content
- microcredit
- microsoft
- mind file
- mindfile
- MMORPG
- mobile
- mobile apps
- mobile as a platform
- modulated information
- monickers
- Morales
- More Partner Income
- movies
- MRT
- multi-currency economy
- multidisciplinarity
- multiplayer gaming
- multiverse
- music
- My PR Pro
- mythbusting ajax slashdot followup javascript malware
- names
- nanotechnology
- natural language processing
- neologisms
- nerd
- networking
- newspapers
- newtech
- nina platt
- non-biological substrate
- Norah Jones
- Notebook
- occasion
- octospiders
- Odds and Ends
- Online Communication
- ontology
- open source
- openbasicresearch
- p2p finance
- P2P lending
- Pacquiao
- participation
- particle physics
- passively multiplayer gaming
- paul saffo
- pda/smartphone
- people-tagging
- Personal
- personal content
- personality interface
- personalized medicine
- philanthropy 2.0
- Philosophy
- physics
- Pics
- planck length
- Planning
- Podcast
- politics
- politics 2.0
- polyamory
- Ponsel
- poptech
- Popular Culture
- population growth
- post-scarcity
- post-scarcity economy
- poverty
- PowerWomen
- PR
- PR Brainstorm
- PR Philosophy
- PRCampaign
- prediction
- prediction markets
- premature aperturation
- Preventing CSRF vulnerable XSS
- privacy
- processing power
- propser
- prosper
- PRSA
- Public Legal Education
- Public Relations
- publishing
- pullution
- Quickscribe
- radical life extension
- rama
- Randy Jackson
- Ranking
- ratings
- reality show
- reanimation
- Recommended
- relationships
- relevance of technology
- religion
- reputation
- Research
- resource distribution
- reviews
- richard florida
- roadmapping
- ROI
- RSA 2007
- rsa 2007 jordan wiens security innovations interactive testing challenge
- ruling elites
- ryan barnett apache blogger modsecurity breach security waf
- Sabrina Pacifici
- samy pleads guilty
- Sanjaya Malakar
- scale
- scarcity
- science
- Search
- second life
- Second Thursday in Second Life
- secure code frameworks robert auger security pdp gnucitizen
- security assessments penetration tests difference
- self
- self-actualization
- self-aware autonomous intelligent agents
- self-copy
- self-modification
- self-replication
- self-representation
- semiconductors
- senior citizens
- SENS
- SEO
- serios
- seriosity
- serious gaming
- sex
- sex drive
- Shania Twain
- shared meme-base
- shortcomings of humans
- Shout Out
- Simon Cowell
- sims
- sims online
- simulation
- singers
- singularity
- singularityster
- Situation Room
- skype
- smolin
- SOA
- social capital
- social change
- social finance
- Social Media
- social networking
- Social Networks
- social pressure
- Software
- software components
- space colonization
- space travel
- Speaking Engagements
- spellchecker
- sports
- sql dump
- stem
- stem friends
- stock
- strategic futurism
- Strategy
- stratified information
- string theory
- submission manuever
- subverting ajax xss prototype hijacking splitting stephano giorgio cross site scripting
- super heroes
- super-intelligence
- surveillance
- sxsw
- Tactics
- tagging
- taxonomies
- taxonomy
- tech change
- techno-luddite
- technocelebrity
- technology sharing
- Technorati
- Teillard de Chardin
- telcos
- telecommunications
- text-indexing
- third culture
- three wishes 3 web browser security javascript malware history intranet hacking
- time
- Tips
- Tips Komputer
- Tips Ponsel
- Tivo
- Tom Collins
- tools
- Top 10
- top 10 ten web hacks 2006 bode for 2007
- top 10 web hacks 2006
- transformation
- transparency
- Trends
- trial blogs
- Trinidad
- trust systems
- trusting client side security web application same-origin policy cookie vulnerability javascript malware browser ssl tls
- Twitter Moment
- Tyson
- Ubuntu
- UGC
- Uncategorized
- understanding
- universal cross site scripting UXSS adobe rsnake pdf plugin browser DOM based
- upload
- upload world
- uploading
- user education
- user-generated applications
- user-generated content
- Valetine's Day
- value systems
- values translator
- vc financing
- Veoh
- video
- video search
- Viral
- Viral Campaigns
- Virginia Tech
- virtual currency
- virtual economies
- virtual office
- virtual reality
- virtual tourism
- virtual worlds
- virtual worlds 2007
- voice
- voice service
- voluntouring
- Von Neumann
- vulnerability disclosure web applications
- waf web application firewall
- wasc meetup RSA 2007 san francisco web application security
- wasc rsa meetup 2007
- web 2.0
- web 3.D
- web application security formula motivation economist fight club jack
- web application security network coverage vulnerability measuring assessment scanning scan methodology
- web application security professionals survey statistics
- web application security professionals survey statistics january 2007
- web application security professionals survey statistics jeremiah grossman whitehat
- web application security scanner appscan webinspect anurag agarwal review comparison
- web application security scanner vulnerability statistics assessment methodology
- web application vulnerability assessment va low hanging fruite LHF neopets
- web application vulnerability scanning assessment owasp top ten 10 automated white paper
- web appplication security defense in depth SDLC
- web services
- webstock
- whitehat security jobs Application Security Specialist hiring
- whitehat security tradeup promotion scanner service
- whitehat web application security risk report statistics severity technical logical
- Whitney Houston
- widgets
- wikinomics
- windows
- Windows Mobile
- women
- Workshops
- world is flat
- World Series
- wrestling
- Wright
- WWE
- xenocism
- yahoo
- Your Turn
- YouTube
- zopa
Meta
Category Archives: Instant Communications Platform
>Virginia Tech: The Challenge of Instant Communication in a Crisis
>.flickr-photo { }.flickr-frame { float: right; text-align: center; margin-left: 15px; margin-bottom: 15px; }.flickr-caption { font-size: 0.8em; margin-top: 0px; } ambulances,originally uploaded by bizcardexplosion. I have been percolating some ideas about how to better integrate technology into a crisis plan I … Continue reading