Month: April 2016

Nice Chinese Dragons Photos

l Chinese Dragons Images:

chinese china town liverpool dragon
Chinese Dragons
Image by alexanderdrachmann

Chinese Dragon – Oriental City – Colindale, London
Chinese Dragons
Image by jo_sal77

Chinese dragon
Chinese Dragons
Image by antonwhoa
Wihan Sian Chinese Temple

Dragon Facts Images

Dragon Facts Images I found:

Oldfield, Barney in Golden-Submarine
Dragon Facts
Image by clamshack
Notes from John Glenn Printz: ") On 4 Oct. 1946 Berner "Barney" Eli Oldfield (1877-1946) was found dead in his bed, by his wife Bessie, at their home in Beverly Hills, CA. Barney Oldfield was a very famous and early American "Speed King" in his racing heyday, 1902 to 1918, and even thereafter. Oldfield was enlisted by Henry Ford (1863-1947) to pilot his new "999" race car at Grosse Point, MI on 2 Oct. 1902. Oldfield had been a mid-western bicycle racer before that. Soon Oldfield quit the Henry Ford "999" and raced Alexander Winton’s "Bullets" and a bit later, the Louis P. Mooers’ Peerless "Green Dragons". During the period 1902-1907 Barney drove in only low mileage, sprint events or short dashes. Oldfield barnstormed across the entire U.S. in 1903-1904 and became nationally famous, but much of it was probably staged and fakeroo, however there was money to be made in such activity; as the automobile was still a great novelty, particularly in the remote rural areas. Barney was as much a showman or entertainer, as he was a driver. Oldfield entered no important or major automobile races until 1908; although he did win an AAA sponsored National Championship sprint title in 1905. Oldfield’s non-appearance in the 1904, 1905, and 1906 Vanderbilt Cup contests was conspicuously noticed.

In fact Barney’s first Vanderbilt Cup try was its ninth running, staged in 1914. His first major racing venture was the 24 April 1908 Briarcliff, NY road race where he drove a 30 horsepower Stearns. Briarcliff also witnessed the automobile racing debut of Ralph DePalma. Ralph had previously raced bicycles and motorbikes. DePalma here replaced the driver Arthur Campbell who had been injured in a practice accident. Ralph previously had been the riding mechanic for Campbell on the Briarcliff, Allen-Kingston entry. After the Briarcliff race Oldfield entered many major U. S. races. Barney’s best results were a 4th in the American Grand Prize (5 Oct. 1912) using a huge Fiat, and a 2nd in the Vanderbilt Cup (26 Feb. 1914) with a Mercer. Barney also made two starts at Indianapolis, in 1914 for Stutz, and 1916 using a 1914 Grand Prix type Delage, and placed 5th in both contests. For the 1914 "500" Oldfield had some relief from Gil Anderson (1880-1935) who was also on the Stutz team that year. Oldfield’s Stutz was the first American built car to cross the line in 1914. The French took the first four places, i.e. 1. Rene Thomas, 2. Arthur Duray, 3. Albert Guyot, and 4. Jules Goux, piloting their "high-tech" Delages and Peugeots.

Oldfield certainly knew how to keep his name before the public and in the press. On 3 March 1910 he set a new world land speed record, at Daytona Beach, FL, in a 200 horsepower "Blitzen Benz". Barney’s new mark was 131.267 mph. Later in the year (25 Oct. 1910), Oldfield ran match races with the then black heavyweight World Boxing Champion, Jack Johnson (1878-1946), who was a fancier of fast cars and fast women. The site chosen was Sheepshead Bay, then a dirt horse track, and Barney had no trouble thoroughly defeating the great boxer, who used a 40 horsepower Chalmers. For this stunt Oldfield was suspended by the AAA and Barney soon went off barnstorming again.

In 1917 Barney purchased the first complete car constructed by Harry A. Miller. It sported a fully enclosed body at first and was soon dubbed the "Golden Submarine" because of its shape and paint color. The car, in actual AAA competition, was not particularly successful and some began instead, calling it the "Golden Egg". In 1917 Oldfield and DePalma engaged in a series of match races at Milwaukee, Providence, St. Louis, Detroit, and Atlanta, which some contemporary observers thought might be partly staged, and I have to concur with their suspicions. In any case, it was DePalma’s V12 Packard vs. Oldfield’s Golden Submarine. By January 1918 the enclosed body on the Miller was cut off and the machine then just became another normal race car. After the 1918 season Oldfield retired from competitive driving, but retained possession of this 1917 Miller for two more years. In 1919 it was raced by Roscoe Sarles (1892-1922), and then later, in late 1919 and early 1920, by Waldo Stein (1889-1965). The Oldfield Miller was entered in the 1920 Indianapolis 500 with the idea of replacing its original 289 cubic inch motor with a new 179 cu. in. Miller, but the new Miller 4 was not yet ready for actual use, in fact, it never would be.

In late 1920 Barney sold the ex-Golden Sub to J. Alex Sloan, the IMCA impresario. Under the IMCA in 1921-1922, the car was raced by the supposed Frenchman, Leon Duray (1894-1956), who didn’t know a word of French. Duray was not French and his real name was George Stewart. Sloan, who invented the name "Leon Duray", evidently was hoping the public would confuse Stewart for a genuine French pilot named Arthur Duray (1882-1954), who was the 2nd place finisher at Indianapolis in 1914 in a three litre Peugeot. After the 1920 season Oldfield ceased to have any direct connection with the AAA, either as a driver or car owner, although he did drive the pace car at Indianapolis in both 1920 and 1922. Oldfield could claim, probably correctly, to have been the first professional racing driver, in the U.S."

n508_w1150
Dragon Facts
Image by BioDivLibrary
The reptiles of British India
London :Pub. for the Ray society by R. Hardwicke,1864.
biodiversitylibrary.org/page/4020751

Look closely, this Chinese Water Dragon, or Physignatus cocincinus, has a "3rd eye" biodiversitylibrary.org/page/4020751 #pod > C why: nationalzoo.si.edu/Animals/ReptilesAmphibians/Facts/FactS…

Dragon Age: Inquisition – PS3 [Digital Code]

Dragon Age: Inquisition – PS3 [Digital Code]

Dragon Age: Inquisition - PS3 [Digital Code]

  • Become the Inquisitor: Wield the power of the Inquisition over the course of an epic character-driven story, and lead a perilous journey of discovery through the Dragon Age.
  • Bond with Legends: A cast of unique, memorable characters will develop dynamic relationships both with you and with each other.
  • Discover the Dragon Age: Freely explore a diverse, visually stunning, and immersive living world.
  • Change the WorldYour actions and choices will shape a multitude of story outcomes along with the tangible, physical aspects of the world itself.
  • Play Your WayCompletely control the appearance and abilities of your Inquisitor, party of followers, outposts, and strongholds. Decide the makeup of your Inquisition forces and your own style of combat.

Electronic Arts Inc. Dragon Age: Inquisition 72935 1130

System Requirements: Supported Platforms: PlayStation 3         
PlayStation account required for game activation and installation

List Price: $ 19.99

Price:

Find More Dragon Age 3 Products

Sony ICD-ST10 Digital Voice Recorder with Voice-To-Print Compatibility

Sony ICD-ST10 Digital Voice Recorder with Voice-To-Print Compatibility

Sony ICD-ST10 Digital Voice Recorder with Voice-To-Print Compatibility

  • Voice To Print capable
  • Up to 5 hrs.34 min. record time
  • Stereo or mon record modes
  • High quality sound “LPEC” codec
  • Directional mic function; 5 message files for dictation

Sony’s ICD-ST10 slim, portable digital voice recorder offers a wealth of features and the kind of flexibility only possible in the realm of digital audio. The recorder offers up to 5.5 hours of recording time and a choice of either mono or stereo recording. USB compatibility ensures a fast transfer rate, and you’ll enjoy the convenience of five separate message files for dictation. The system is compatible with Microsoft Windows 98 to XP as well as with the Dragon Naturally Speaking preferred

List Price: $ 199.99

Price:

Find More Voice To Text Software Products

fashionable

l Asian Dragon Images:

fashionable
Asian Dragon
Image by AK Rockefeller
By zzzeroX
artinsect.org/images/its-fashionable/

Asian Inspiration
Asian Dragon
Image by caribb
I’m not sure what these colourful patterns were. The are located in the Bay on the water and each section had very rich colours and patters like above. This one definitely had a Japanese or Chinese feel about it… like a delicate Chinese painting of a dragon or tree with many branches… kind of ironic since San Francisco has such a strong Asian overlay to it society. This is almost art but probably chemicals of some sort..

_DSC4331
Asian Dragon
Image by Sri Lanka Rugby

Dragon Alliance Domo Sunglasses (Palm Springs, Grey) Reviews

Dragon Alliance Domo Sunglasses (Palm Springs, Grey)

Dragon Alliance Domo Sunglasses (Palm Springs, Grey)

  • Large size fit with 100-Percent UV protection
  • Grilamid Frame Material
  • Multi-Base Polycarbonate Shield Lens
  • 5 Barrel Stainless Steel Spring Hinges

Dragon Alliance Domo Palm Springs Pool Sunglasses with Grey Lenses

List Price: $ 140.00

Price:

PON Solution from CommScope

Voice to Text Software Images I found:

PON Solution from CommScope
Voice to Text Software
Image by CommScope
CommScope’s new PON solution is flexible to accommodate both EPON and GPON technologies. CommScope’s new PON family of active and passive optical devices (optical line terminals, optical network units, system-management software and installation components) provide rural communities, electric cooperatives, multiple system operators, municipalities and governments the ability to deliver advanced voice, video, and data services to their subscribers using fiber optic cables.

Vloggercon 2006 is sold out!
Voice to Text Software
Image by mmeiser2
I’m posting this here because blogger.com has gone to pot.

24 hours till vloggercon!

Hopping on the plane tomorrow morning.

I wanted to share my thoughts on meeting over 400 vloggers and vlog fans for the first time.

In a word.

Vlogebrity!

Vlogebrity is the term.

We have a little saying amongst vloggers, "We are the media".

And so by proxy we are also our own celebrities.

What does vlogerbrity mean?

It’s the long tail of celebrity.

It is more niche than blogebrity, and yet far more powerful a celebrity.

It’s about strong bonds.

Imagine if you will.

Tomorrow and Saturday I will meet for the first time 150 or 250+ people I’ve never met in person, but whom I’ve gotten to know intimately through video blogging over the last 2 years.

They are from all over the world, Norway to Australia, and pretty much every continent.

I know their names like I know the names of old friends.

I know their faces, their personalities, their mannerisms, their humor, their interests and passions.

When we meet we will recognize each other. We may shake hands, but like old friends our introductions will be very brief and we’ll dive into specific topics and detailed subjects based on our shared interests.

There won’t be silly icebreaking questions. No, "So what do you do?" or "Where are you from"… No idle "get to know you" chat. Just diving into the common subjects we share.

Vlogebrities have known backgrounds.

Vlogebrities have shared history.

The shock of meeting all my vlogebrity friends at once face to face. This is the thing I’m most looking forward to at vloggercon at this moment.

This is on the surface what I want to capture and understand. Because in studying vloebrity it will tell us something about the future.

A future where we’re all the media, where we’re all celebrities to someone, mentor’s, peers, and friends of people the world over.

Regardless of geography.

Another step in the progression of the global village.

I relish this idea.

Vloggercon is going to be a completely unique, great and erie sort of culture shock that is probably completely unique to video blogging. I’m expecting a powerful sort of deja vu.

With Introductions a side (almost unnecessary) vloggercon will be about getting right down to business.

It may sound like a preposterous thing to say, but I ask you to consider, that never before has such a large group of people whom know each other so well met for the very first time.

Actors may meet and they know each others faces and characters, but they don’t know each other for who they really are.

Intellectuals, writers, scientists and infinite professional groups may know each other by reputation, by exchanges of writing, even by photos, but again they don’t know each other as intimately as vloggers. They don’t know each others voices, facial expressions.

Vlogebrity is powerful voodoo.

Unlike hollywood celebrity, which gives a powerful false sense of knowing people, vlogebrity gives a true and powerful sense of knowing. But how true is this celebrity? How much do we really know each other? We shall see.

Needless to say vlogebrity is a very unique type of celebrity. An intensely personal sort of celebrity.

Vlogebrity creates powerful bonds and friendships.

…and I expect since we all know each other so well while never having met, that the conversation will be so furious at vloggercon I seriously hope I don’t loose my voice. 😉

So soak up and take note of the power of vlogebrity. Breath it in, think about it. What is the truth of it, what is false. As McLuhan famously said the medium is the message. If we are the media, then what does it say about the future, what does vlogebrity say about the future of a truly global culture of closely bonded niche communities.

To me this says one thing. This new world that is evolving that is bonded by a democratic, open, participatory media system, a property fundamental to the internet. It is fundamentally going to make the world a much more human/humane place then a world shaped by cars, and TV, radio and newspaper. The world is becoming more human.

We are truly living in the future in many respects.

And yet we’re living very far in the future.

7000 video blogs is nothing.

The massive popularity of a Youtube, (which I’ve never seen anything like in all my .com years) is impressive, but really it is nothing in the big picture

This is not about a 2.0 .boom. We’ve barely entered an era that’s going to play out over the course of generations, perhaps this whole century.

What happens in the first 7000 video blogs is fun and very interesting, (not to discount the very much related and very important blogging, podcasting and photocasting)… but in order to understand the true power of open acess media / new media, it’s impact on the world, we have to listen carefully and study carefully, because the majority of it’s power, of the possibilities for change lie below the surface. They have yet to be discovered.

The question we must ask, is what happens when the other 99.99% of the world has access to not just rich media, not just blogs, videos, photo, and VOIP communications… but the tools and applications, the project management tools, the wiki-collaborative writing tools, the processing power, the connectivity?

The reason I like vlogging, is not because I’m a videographer, it’s because I’m a student of media. It’s not because vlogging IS the future. Who knows where we’ll be in 5 years. Who knows if vlogging as we know it will even exist. The reason why I am fascinated by this thing is because it is an opportunity to look into a window of a *possible future*, to understand something about how media shapes our culture and our identities now and how it will like the inventions of the printing press, the radio and the television before it.

If mass media nationalized and mobilized the world, what will internet mediated media do?

And therefore the reason why I’m going to vloggercon is two-fold. Both to understand, study and interpret this fundamental change in the way the world is connected and how it will change the world.

And secondly and just as important to collaborate and discuss with others to distributing this future. TO make it available to as many people as possible.

This initial success, this web 2.0 boom is a a misnomer, a distraction to what is truly significant to what is going on here. Myspace and Youtube the current media darlings of this space are but short sited mischaracterizations of this era, false gods at best. Who is going to bring this evolution to the other 99.99% of the planet? The majority of the planet that doesn’t speak english, or one of the five more popular languages. Proprietary, walled garden systems fundamentally lack this capacity. I suspect it will evolve as has open access media out of open source software as it is the only model flexible enough to bring these technologies to the rest of the world.

And don’t even talk to me about "big media"… they lack the vision to see beyond delivering plastic disks and DRM laden content to .0001% of the world. That’s some sever myopia.

Oh, and here’s a random but very cool vloggercon promo from the vlog, The Memeing of Life.

Watch it: Vloggercon Promo from Mark Raheja, The Memeing of Life (Quicktime, .mov)

So! I’ll see you all at vloggercon!

🙂

-Mike

Keywords: vloggercon, vloggercon2006, vlogebrity

Photo From: laughingsquid.com/2006/06/03/vloggercon-2006/

laughingsquid.com/wp-content/uploads/vloggercon_flyer.gif

Hm…

Dragonslayer Images I found:

Hm…
Dragonslayer
Image by Falashad
Those don’t look like period weapons.

Dragonslayer
Dragonslayer
Image by ILoveVerdi
from the grtweetup!

Dragons Images

20150505-DM-LSC-0114

Check out these Speech Recognition Images:

20150505-DM-LSC-0114
Speech Recognition
Image by USDAgov
U.S. Department of Agriculture (USDA) Assistant Secretary for Administration Dr. Gregory Parham presents the keynote speech and presents the awards during the USDA 31st Annual Unsung Heroes Award Ceremony recognizing outstanding public service, in Washington, D.C., May 4, 2015. In celebration of Public Service Recognition Week, USDA recognizes 12 outstanding USDA employees and teams who have demonstrated extraordinary effort in the workplace and leadership in the community. Employees will also be acknowledged for their contributions to USDA’s Cultural Transformation efforts. USDA Photo by Lance Cheung.

Image from page 811 of “The Southern states of North America: a record of journeys in Louisiana, Texas, the Indian territory, Missouri, Arkansas, Mississippi, Alabama, Georgia, Florida, South Carolina, North Carolina, Kentucky, Tennessee, Virginia, West V
Speech Recognition
Image by Internet Archive Book Images
Identifier: southernstatesof00kingrich
Title: The Southern states of North America: a record of journeys in Louisiana, Texas, the Indian territory, Missouri, Arkansas, Mississippi, Alabama, Georgia, Florida, South Carolina, North Carolina, Kentucky, Tennessee, Virginia, West Virginia and Maryland
Year: 1875 (1870s)
Authors: King, Edward, 1848-1896
Subjects: Southern States — Description and travel
Publisher: London : Blackie & son
Contributing Library: University of California Libraries
Digitizing Sponsor: MSN

View Book Page: Book Viewer
About This Book: Catalog Entry
View All Images: All Images From Book

Click here to view book online to see this illustration in context in a browseable online version of this book.

Text Appearing Before Image:
wever,even where their civil rights are practically gained, been difficult to manage inthis delicate matter. They avoid a collision with white prejudices as much aspossible ; as great numbers of them are ragged and engaged in menial occupa-tions, their presence in a car where elegantly-dressed ladies and gentlemen areseated would certainly be far from agreeable, and they recognize this fact quiteas readily as they could be expected to do. Until they have gained muchmore property than they at present possess as a class, they will not be likely tosecure the recognition of their equality, which they certainly desire, howeverlittle they may assert it. LXXXVIII. DIALECT—FORMS OF EXPRESSION — DIET. TME noticeable differences in dialect and mode of expression between theNorth and South have been noted, caricatured, and exemplified hundredsof times. The lower class of Southern whites have undoubtedly caught somemethods of speech, and certain fatal defects of pronunciation, from the negro.

Text Appearing After Image:
Southern Types —The Wolf and the Lamb in Politics. Sometimes, as we have seen in South Carolina, the rude and coarse dialect of theplantation hand, who never in his long life had an instants education, is reflectedin the speech of the haughty and high-bred gentlemans son. But this will nolonger be so. The intimate communion which was possible in the days ofslavery between the white and the black is now, for a dozen obvious reasons,impossible. The intermixture of dialects is as sure to be stopped as the com-mingling of bloods. Competent observers say that miscegenation was nearly SEPARATION BETWEEN THE RACES. 785 ended by the war and the emancipation of the slave; that the social equalitywhich certain of the whites in the South now seem to fear has been renderedimpossible by the very event which established the independence of the negro.The two races are steadily drifting apart, so far as all intimate association isconcerned. No one can doubt that the negro who was born a slave still

Note About Images
Please note that these images are extracted from scanned page images that may have been digitally enhanced for readability – coloration and appearance of these illustrations may not perfectly resemble the original work.

A Bitcoin You Can Flip

Speech to Text Software Images I found:

A Bitcoin You Can Flip
Speech to Text Software
Image by jurvetson
My son has become fascinated with bitcoins, and so I had to get him a tangible one for Xmas (thanks Sim1!). The public key is imprinted visibly on the tamper-evident holographic film, and the private key lies underneath.

I too was fascinated by digital cash back in college, and more specifically by the asymmetric mathematical transforms underlying public-key crypto and digital blind signatures.

I remembered a technical paper I wrote, but could not find it. A desktop search revealed an essay that I completely forgot, something that I had recovered from my archives of floppy discs (while I still could).

It is an article I wrote for the school newspaper in 1994. Ironically, Microsoft Word could not open this ancient Microsoft Word file format, but the free text editors could.

What a fun time capsule, below, with some choice naivetés…

I am trying to reconstruct what I was thinking, and wondering if it makes any sense. I think I was arguing that a bulletproof framework for digital cash (and what better testing ground) could be used to secure a digital container for executable code on a rental basis. So the expression of an idea — the specific code, or runtime service — is locked in a secure container. The idea would be to prevent copying instead of punishing after the fact. Micro-currency and micro-code seem like similar exercises in regulating the single use of an issued number.

Now that the Bitcoin experiment is underway, do you know of anyone writing about it as an alternative framework for intellectual property?

IP and Digital Cash
@NORMAL:
Digital Cash and the “Intellectual Property” Oxymoron
By Steve Jurvetson

Many of us will soon be working in the information services or technology industries which are currently tangled in a bramble patch of intellectual property law. As the law struggles to find coherency and an internally-consistent logic for intellectual property (IP) protection, digital encryption technologies may provide a better solution — from the perspective of reducing litigation, exploiting the inherent benefits of an information-based business model, and preserving a free economy of ideas.
Bullet-proof digital cash technology, which is now emerging, can provide a protected “cryptographic container” for intellectual expressions, thereby preserving traditional notions of intellectual property that protect specific instantiations of an idea rather than the idea itself. For example, it seems reasonable that Intuit should be able to protect against the widespread duplication of their Quicken software (the expression of an idea), but they should not be able to patent the underlying idea of single-entry bookkeeping. There are strong economic incentives for digital cash to develop and for those techniques to be adapted for IP protection — to create a protected container or expression of an idea. The rapid march of information technology has strained the evolution of IP law, but rather than patching the law, information technology itself may provide a more coherent solution.

Information Wants To Be Free
Currently, IP law is enigmatic because it is expanding to a domain for which it was not initially intended. In developing the U.S. Constitution, Thomas Jefferson argued that ideas should freely transverse the globe, and that ideas were fundamentally different from material goods. He concluded that “Inventions then cannot, in nature, be a subject of property.” The issues surrounding IP come into sharp focus as we shift to being more of an information-based economy.
The use of e-mail and local TV footage helps disseminate information around the globe and can be a force for democracy — as seen in the TV footage from Chechen, the use of modems in Prague during the Velvet Revolution, and the e-mail and TV from Tianammen Square. Even Gorbachev used a video camera to show what was happening after he was kidnapped. What appears to be an inherent force for democracy runs into problems when it becomes the subject of property.
As higher-level programming languages become more like natural languages, it will become increasingly difficult to distinguish the idea from the code. Language precedes thought, as Jean-Louis Gassée is fond of saying, and our language is the framework for the formulation and expression of our ideas. Restricting software will increasingly be indistinguishable from restricting freedom of speech.
An economy of ideas and human attention depends on the continuous and free exchange of ideas. Because of the associative nature of memory processes, no idea is detached from others. This begs the question, is intellectual property an oxymoron?

Intellectual Property Law is a Patch
John Perry Barlow, former Grateful Dead lyricist and co-founder (with Mitch Kapor) of the Electronic Frontier Foundation, argues that “Intellectual property law cannot be patched, retrofitted or expanded to contain digitized expression… Faith in law will not be an effective strategy for high-tech companies. Law adapts by continuous increments and at a pace second only to geology. Technology advances in lunging jerks. Real-world conditions will continue to change at a blinding pace, and the law will lag further behind, more profoundly confused. This mismatch may prove impossible to overcome.”
From its origins in the Industrial Revolution where the invention of tools took on a new importance, patent and copyright law has protected the physical conveyance of an idea, and not the idea itself. The physical expression is like a container for an idea. But with the emerging information superhighway, the “container” is becoming more ethereal, and it is disappearing altogether. Whether it’s e-mail today, or the future goods of the Information Age, the “expressions” of ideas will be voltage conditions darting around the net, very much like thoughts. The fleeting copy of an image in RAM is not very different that the fleeting image on the retina.
The digitization of all forms of information — from books to songs to images to multimedia — detaches information from the physical plane where IP law has always found definition and precedent. Patents cannot be granted for abstract ideas or algorithms, yet courts have recently upheld the patentability of software as long as it is operating a physical machine or causing a physical result. Copyright law is even more of a patch. The U.S. Copyright Act of 1976 requires that works be fixed in a durable medium, and where an idea and its expression are inseparable, the merger doctrine dictates that the expression cannot be copyrighted. E-mail is not currently copyrightable because it is not a reduction to tangible form. So of course, there is a proposal to amend these copyright provisions. In recent rulings, Lotus won its case that Borland’s Quattro Pro spreadsheet copied elements of Lotus 123’s look and feel, yet Apple lost a similar case versus Microsoft and HP. As Professor Bagley points out in her new text, “It is difficult to reconcile under the total concept and feel test the results in the Apple and Lotus cases.” Given the inconsistencies and economic significance of these issues, it is no surprise that swarms of lawyers are studying to practice in the IP arena.
Back in the early days of Microsoft, Bill Gates wrote an inflammatory “Open Letter to Hobbyists” in which he alleged that “most of you steal your software … and should be kicked out of any club meeting you show up at.” He presented the economic argument that piracy prevents proper profit streams and “prevents good software from being written.” Now we have Windows.
But seriously, if we continue to believe that the value of information is based on scarcity, as it is with physical objects, we will continue to patch laws that are contrary to the nature of information, which in many cases increases in value with distribution. Small, fast moving companies (like Netscape and Id) protect their ideas by getting to the marketplace quicker than their larger competitors who base their protection on fear and litigation.
The patent office is woefully understaffed and unable to judge the nuances of software. Comptons was initially granted a patent that covered virtually all multimedia technology. When they tried to collect royalties, Microsoft pushed the Patent Office to overturn the patent. In 1992, Software Advertising Corp received a patent for “displaying and integrating commercial advertisements with computer software.” That’s like patenting the concept of a radio commercial. In 1993, a DEC engineer received a patent on just two lines of machine code commonly used in object-oriented programming. CompuServe announced this month that they plan to collect royalties on the widely used GIF file format for images.
The Patent Office has issued well over 12,000 software patents, and a programmer can unknowingly be in violation of any them. Microsoft had to pay 0MM to STAC in February 1994 for violating their patent on data compression. The penalties can be costly, but so can a patent search. Many of the software patents don’t have the words “computer,” “software,” “program,” or “algorithm” in their abstracts. “Software patents turn every decision you make while writing a program into a legal risk,” says Richard Stallman, founder of the League for Programming Freedom. “They make writing a large program like crossing a minefield. Each step has a small chance of stepping on a patent and blowing you up.” The very notion of seventeen years of patent protection in the fast moving software industry seems absurd. MS-DOS did not exist seventeen years ago.
IP law faces the additional wrinkle of jurisdictional issues. Where has an Internet crime taken place? In the country or state in which the computer server resides? Many nations do not have the same intellectual property laws as the U.S. Even within the U.S., the law can be tough to enforce; for example, a group of music publishers sued CompuServe for the digital distribution of copyrighted music. A complication is that CompuServe has no knowledge of the activity since it occurs in the flood of bits transferring between its subscribers
The tension seen in making digital copies revolves around the issue of property. But unlike the theft of material goods, copying does not deprive the owner of their possessions. With digital piracy, it is less a clear ethical issue of theft, and more an abstract notion that you are undermining the business model of an artist or software developer. The distinction between ethics and laws often revolves around their enforceability. Before copy machines, it was hard to make a book, and so it was obvious and visible if someone was copying your work. In the digital age, copying is lightning fast and difficult to detect. Given ethical ambiguity, convenience, and anonymity, it is no wonder we see a cultural shift with regard to digital ethics.

Piracy, Plagiarism and Pilfering
We copy music. We are seldom diligent with our footnotes. We wonder where we’ve seen Strat-man’s PIE and the four slices before. We forward e-mail that may contain text from a copyrighted news publication. The SCBA estimates that 51% of satellite dishes have illegal descramblers. John Perry Barlow estimates that 90% of personal hard drives have some pirated software on them.
Or as last month’s Red Herring editorial points out, “this atmosphere of electronic piracy seems to have in turn spawned a freer attitude than ever toward good old-fashioned plagiarism.” Articles from major publications and WSJ columns appear and circulate widely on the Internet. Computer Pictures magazine replicated a complete article on multimedia databases from New Media magazine, and then publicly apologized.
Music and voice samples are an increasingly common art form, from 2 Live Crew to Negativland to local bands like Voice Farm and Consolidated. Peter Gabriel embraces the shift to repositioned content; “Traditionally, the artist has been the final arbiter of his work. He delivered it and it stood on its own. In the interactive world, artists will also be the suppliers of information and collage material, which people can either accept as is, or manipulate to create their own art. It’s part of the shift from skill-based work to decision-making and editing work.”
But many traditionalists resist the change. Museums are hesitant to embrace digital art because it is impossible to distinguish the original from a copy; according to a curator at the New Museum of Contemporary Art, “The art world is scared to death of this stuff.” The Digital Audio Tape debate also illustrated the paranoia; the music industry first insisted that these DAT recorders had to purposely introduce static into the digital copies they made, and then they settled for an embedded code that limited the number of successive copies that could be made from the a master source.
For a healthier reaction, look at the phenomenally successful business models of Mosaic/Netscape and Id Software, the twisted creator of Doom. Just as McAfee built a business on shareware, Netscape and Id encourage widespread free distribution of their product. But once you want support from Netscape, or the higher levels of the Doom game, then you have to pay. For industries with strong demand-side economies of scale, such as Netscape web browsers or Safe-TCL intelligent agents, the creators have exploited the economies of information distribution. Software products are especially susceptible to increasing returns with scale, as are networking products and most of the information technology industries.
Yet, the Software Publishers Association reports that 1993 worldwide losses to piracy of business application software totaled .45 billion. They also estimated that 89% of software units in Korea were counterfeit. And China has 29 factories, some state-owned, that press 75 million pirated CDs per year, largely for export. GATT will impose the U.S. notions of intellectual property on a world that sees the issue very differently.
Clearly there are strong economic incentives to protect intellectual property, and reasonable arguments can be made for software patents and digital copyright, but the complexities of legal enforcement will be outrun and potentially obviated by the relatively rapid developments of another technology, digital cash and cryptography.

Digital Cash and the IP Lock
Digital cash is in some ways an extreme example of digital “property” — since it cannot be copied, it is possessed by one entity at a time, and it is static and non-perishable. If the techniques for protecting against pilferage and piracy work in the domain of cash, then they can be used to “protect” other properties by being embedded in them. If I wanted to copy-protect an “original” work of digital art, digital cash techniques be used as the “container” to protect intellectual property in the old style. A bullet-proof digital cash scheme would inevitably be adapted by those who stand to gain from the current system. Such as Bill Gates.
Several companies are developing technologies for electronic commerce. On January 12, several High-Tech Club members attended the Cybermania conference on electronic commerce with the CEOs of Intuit, CyberCash, Enter TV and The Lightspan Partnership. According to Scott Cook, CEO of Intuit, the motivations for digital cash are anonymity and efficient small-transaction Internet commerce. Anonymity preserves our privacy in the age of increasingly intrusive “database marketing” based on credit card purchase patterns and other personal information. Of course, it also has tax-evasion implications. For Internet commerce, cash is more efficient and easier to use than a credit card for small transactions.
“A lot of people will spend nickels on the Internet,” says Dan Lynch of CyberCash. Banks will soon exchange your current cash for cyber-tokens, or a “bag of bits” which you can spend freely on the Internet. A competitor based in the Netherlands called DigiCash has a Web page with numerous articles on electronic money and fully functional demo of their technology. You can get some free cash from them and spend it at some of their allied vendors.
Digital cash is a compelling technology. Wired magazine calls it the “killer application for electronic networks which will change the global economy.” Handling and fraud costs for the paper money system are growing as digital color copiers and ATMs proliferate. Donald Gleason, President of the Smart Card Enterprise unit of Electronic Payment Services argues that “Cash is a nightmare. It costs money handlers in the U.S. alone approximately billion a year to move the stuff… Bills and coinage will increasingly be replaced by some sort of electronic equivalent.” Even a Citibank VP, Sholom Rosen, agrees that “There are going to be winners and losers, but everybody is going to play.”
The digital cash schemes use a blind digital signature and a central repository to protect against piracy and privacy violations. On the privacy issue, the techniques used have been mathematically proven to be protected against privacy violations. The bank cannot trace how the cash is being used or who is using it. Embedded in these schemes are powerful digital cryptography techniques which have recently been spread in the commercial domain (RSA Data Security is a leader in this field and will be speaking to the High Tech Club on January 19).
To protect against piracy requires some extra work. As soon as I have a digital bill on my Mac hard drive, I will want to make a copy, and I can. (Many companies have busted their picks trying to copy protect files from hackers. It will never work.). The difference is that I can only spend the bill once. The copy is worthless. This is possible because every bill has a unique encrypted identifier. In spending the bill, my computer checks with the centralized repository which verifies that my particular bill is still unspent. Once I spend it, it cannot be spent again. As with many electronic transactions today, the safety of the system depends on the integrity of a centralized computer, or what Dan Lynch calls “the big database in the sky.”
One of the most important limitations of the digital cash techniques is that they are tethered to a transaction between at least three parties — a buyer, seller and central repository. So, to use such a scheme to protect intellectual property, would require networked computers and “live” files that have to dial up and check in with the repository to be operational. There are many compelling applications for this, including voter registration, voting tabulation, and the registration of digital artwork originals.
When I asked Dan Lynch about the use of his technology for intellectual property protection, he agreed that the bits that now represent a bill could be used for any number of things, from medical records to photographs. A digital photograph could hide a digital signature in its low-order bits, and it would be imperceptible to the user. But those bits could be used with a registry of proper image owners, and could be used to prove misappropriation or sampling of the image by others.
Technology author Steven Levy has been researching cryptography for Wired magazine, and he responded to my e-mail questions with the reply “You are on the right track in thinking that crypto can preserve IP. I know of several attempts to forward plans to do so.” Digital cash may provide a “crypto-container” to preserve traditional notions of intellectual property.
The transaction tether limits the short-term applicability of these schemes for software copy protection. They won’t work on an isolated computer. This certainly would slow its adoption for mobile computers since the wireless networking infrastructure is so nascent. But with Windows ’95 bundling network connectivity, soon most computers will be network-ready — at least for the Microsoft network. And now that Bill Gates is acquiring Intuit, instead of dollar bills, we will have Bill dollars.
The transaction tether is also a logistical headache with current slow networks, which may hinder its adoption for mass-market applications. For example, if someone forwards a copyrighted e-mail, the recipient may have to have their computer do the repository check before they could see the text of the e-mail. E-mail is slow enough today, but in the near future, these techniques of verifying IP permissions and paying appropriate royalties in digital cash could be background processes on a preemptive multitasking computer (Windows ’95 or Mac OS System 8). The digital cash schemes are consistent with other trends in software distribution and development — specifically software rental and object-oriented “applets” with nested royalty payments. They are also consistent with the document-centric vision of Open Doc and OLE.
The user of the future would start working on their stationary. When it’s clear they are doing some text entry, the word processor would be downloaded and rented for its current usage. Digital pennies would trickle back to the people who wrote or inspired the various portions of the core program. As you use other software applets, such as a spell-checker, it would be downloaded as needed. By renting applets, or potentially finer-grained software objects, the licensing royalties would be automatically tabulated and exchanged, and software piracy would require heroic efforts. Intellectual property would become precisely that — property in a market economy, under lock by its “creator,” and Bill Gates’ 1975 lament over software piracy may now be addressed 20 years later.

——–end of paper———–

On further reflection, I must have been thinking of executable code (where the runtime requires a cloud connect to authenticate) and not passive media. Verification has been a pain, but perhaps it’s seamless in a web-services future. Cloud apps and digital cash depend on it, so why not the code itself.

I don’t see it as particularly useful for still images (but it could verify the official owner of any unique bundle of pixels, in the sense that you can "own" a sufficiently large number, but not the essence of a work of art or derivative works). Frankly, I’m not sure about non-interactive content in general, like pure video playback. "Fixing" software IP alone would be a big enough accomplishment.

The Semantic Genesis
Speech to Text Software
Image by kevin dooley
The Semantic Genesis

My company, Crawdad Technologies, sells software which does text analysis. Here is a picture of the semantic network that represents Genesis, Chapters 1-3–basically from the beginning of the universe until Adam and Eve got thrown out of paradise, and before all the "begating" began… The technology uses natural language processing to identify words and the parts of speech (remember diagramming sentences in grade school?) and then renders a network visualization. The most "important" words are shown as a network (red=most most important, yellow=2nd, plain=3rd) and the connections represent semantic connections by the author.

The network represents the "mental map" that the average reader gets after reading the text.

If you happen to be a qualitative data researcher (either as an academic, student, or market researcher), I do have to put in a mini-pitch and say we have the best computerized text analysis software available… and you can try for 30 days free! Go to http:://www.crawdadtech.com .

If you want to see our text analysis engine in a more practical setting, visit wonkosphere.com, which is using the technology to track over 1200 political blogs as they buzz on the U.S. presidential elections.

Gifts & Decor Majestic Red Dragon Sword in Stone Figurine Display

Gifts & Decor Majestic Red Dragon Sword in Stone Figurine Display

Gifts & Decor Majestic Red Dragon Sword in Stone Figurine Display

  • Stunning polyresin dragon figurine
  • Sure to be a focal point in any room
  • Perfect for display atop any shelf, mantle or table
  • Measures 7 inches x 4 inches x 9 3/4 inches high
  • Sure to thrill any medieval theme collector

In this enchanting display, a magnificent dragon spreads his gilded wings in victory as he claims the mystic sword and vast treasure for which he’s long quested. For decorative purposes only. Polyresin. 7-inch by 4-inch by 9 3/4-inch high.

List Price: $ 24.95

Price:

Nuance Communications Dragon 13.0 USB Headset

Nuance Communications Dragon 13.0 USB Headset

Nuance Communications Dragon 13.0 USB Headset

  • Incredibly fast and easy to setup – headset and dongle pre-paired out-of-the-box
  • Separate power slide switch and volume button, with single multifunction/call/mic button for easy, intuitive use
  • Universal and highly comfortable design, adjustable to left or right ear
  • Up to 33 feet (10 m) range
  • Up to 10 hours talk time

The Dragon USB headset delivers superior audio input for use with Dragon NaturallySpeaking. A noise-cancelling microphone enhances speech accuracy while the USB-enhanced digital sound ensures consistent audio quality every time. The adjustable single earphone design fits left- or right-side and lets you tune in to your PC while remaining in touch with your surroundings.

List Price: $ 34.99

Price:

Related Dragon Speech Products

Car Assist

Car Assist

Car Assist

  • Automatic call attend.
  • Customisable auto attend delay.
  • Auto loud speaker.
  • Auto read out messages.
  • Customisable command to call someone
  • Customisable command to message someone.
  • Just speak the message and Car assist will type it and send it for you.

List Price: $ 0.00

Price:

Related Type To Speak Products

Dragon Fly Images

l Dragon Fly Images:

Four Spot Chaser Dragon Fly
Dragon Fly
Image by Smudge 9000
Minsmere RSPB Reserve

P8071573.jpg
Dragon Fly
Image by Steve Sawyer
Olympus digital camera

Red Dragon…fly
Dragon Fly
Image by Garb627

The Best Dragon Dictate 3.0 (MAC)-S601A-G00-3.0 – Dragon Dictate 3.0 speech recognition software lets you use your voice to do more on your Mac than you ever thought possible. More than just speech-to-text, Dragon Dictate lets you use your voice to command your Mac. Create and edit documents, manage e-mail, surf the web, update your Facebook or Twitter status, and more all by voice. You can even open, close, and navigate between applications, or create your own custom voice Reviews

The Best Dragon Dictate 3.0 (MAC)-S601A-G00-3.0 – Dragon Dictate 3.0 speech recognition software lets you use your voice to do more on your Mac than you ever thought possible. More than just speech-to-text, Dragon Dictate lets you use your voice to command your Mac. Create and edit documents, manage e-mail, surf the web, update your Facebook or Twitter status, and more all by voice. You can even open, close, and navigate between applications, or create your own custom voice

The Best Dragon Dictate 3.0 (MAC)-S601A-G00-3.0 - Dragon Dictate 3.0 speech recognition software lets you use your voice to do more on your Mac than you ever thought possible. More than just speech-to-text, Dragon Dictate lets you use your voice to command your Mac. Create and edit documents, manage e-mail, surf the web, update your Facebook or Twitter status, and more all by voice. You can even open, close, and navigate between applications, or create your own custom voice

  • More for the money with this high quality Product
  • Offers premium quality at outstanding saving
  • Excellent product
  • 100% satisfaction

Control your digital world using the power of your voice
Product Information
Dragon Dictate 3.0 speech recognition software lets you use your voice to do more on your Mac than you ever thought possible. More than just speech-to-text, Dragon Dictate lets you use your voice to command your Mac. Create and edit documents, manage e-mail, surf the web, update your Facebook or Twitter status, and more all by voice. You can even open, close, and navigate between applications, or create your ow

List Price: $ 67.29

Price:

Voices of Nature

Nice Computer Voice Photos

l Computer Voice Images:

BREAKDOWN [a/v interactive dance performance]
Computer Voice
Image by visiophone
Breakdown is an interactive audiovisual dance performance presented at the Ears Eyes and Feet event in the B. Iden Payne Theater, May 2014, UT Austin Texas.

Breakdown explores a 2 dimensional simulated world in which its physical rules are constantly being changed and manipulated by an external entity. An inhabitant of this world is in constant motion to adapt to its characteristics. He interacts with the physical rules and develops a dialogue with the entity who controls the forces. Eventually the inhabitant ends up breaking the world’s rules and release himself into a new world, a new dimension.

The dancers’s movements and gestures are captured by two Kinect cameras on stage, creating an interactive dialog with the music and visuals.

Rodrigo Carvalho: Interactive Visuals (www.visiophone-lab.com)
Yago de Quay: Dance, Voice, and Music Composition (www.yagodequay.com)
Sunny Shen: Dance and Choreography
Po-Yang Sung: Lighting

Meg Seidel: Videographer (vimeo.com/kegmeg)

Video here: vimeo.com/94490437

007 MAKES A MAJOR DECISION …
Computer Voice
Image by mrbill78636
… which he feels will give him the thread to unravel the entire case.

007 continues his surveillance of the thin man, but now he is helped my several members of the RAF Intelligence Agency. He has more time to sleep and think and continues to search for the single thread which will unravel the mystery of what this massive clandestine operation is all about.

Having just followed the thin man into a mixed neighborhood of small businesses and downscale apartments, 007 picked the locks on one vacant building, ran through the dark hallway and climbed out a window to pick up the thin man’s trail once again, following him to his destination, a small apartment on the second floor of an obscure converted office building.

Once he had the address, he texted it into his cell phone, making contact with his computer at the apartment and discovered the thin man was making a visit to one of the secretaries he had interviewed about a week ago. 007’s brain kicked into fast forward and he began to think maybe he was scratching the surface of a weak point in the enemy’s program.

After the thin man had rung a bell at the doorway to the apartment building and a light went on on the second floor, the door clicked and the thin man made entry. While trying to get a remote voice fix on the apartment, which he was unable to do, 007 thought furiously about what he knew.

He heard a voice inside his brain say, “Look for the anomaly!” 007 knew the nature of the warehouses, processing plants and brokerage firms. The data on these was monumental. Far too much information and if the unraveling thread could be found here it would already have been found.

He then considered the data gathered by M6 and the CIA on the organization the thin man worked so diligently for and knew he would not find the thread there. If the thread could be found there, it would be found by others, not himself.

He reasoned, there remain two areas in which the thread can be found to unravel the mystery and take its entire operation down. It could be in the bulk of the letters, envelopes, square CD covers and packages passed on to the thin man from those people he had called upon earlier. 007 knew the information here was forever forbidden to him once it fell into the hands of the diligent thin man, so that left only one area of search for that magic thread……the girls and women themselves.

At that moment 007 vowed to contact Control and turn the entire job of surveillance over to the RAF Intelligence Agency and begin an investigation of the bookkeepers and secretaries known to have had contact with the thin man. The anomaly would be found within the ranks of these women.

On Earth As It Is In Hell – ASCII zip comment made from ANSI login screen
Computer Voice
Image by Rev. Xanatos Satanicos Bombasticos (ClintJCL)
I used to run a BBS called On Earth As It Is In Hell (click to view old messages and oneliners and such).

Anwyay, yesterday (1/30/2007) I was going over some recovered files from a harddrive crash I had around 1996. In looking at the zip files, I found two different automated zip comments I had created. This was one of them.

It was the ANSI login graphic from my BBS, shrunken from 80×25 to a smaller size, with the color removed.

Ahh, the old days. 1992-1994.

This BBS is also listed on BBSMates.com:
www.bbsmates.com/XQ/ASP/id.146542/QX/viewbbs.htm

CO 1069-435-22

Dragon Software Images I found:

CO 1069-435-22
Dragon Software
Image by The National Archives UK
Description: Views at the Dragon’s Cave.

Location: China

Date: 1906

——————————————————

Our Catalogue Reference: Part of CO 1069/435.

This image is part of the Colonial Office photographic collection held at The National Archives. Feel free to share it within the spirit of the Commons.

Please use the comments section below the pictures to share any information you have about the people, places or events shown. We have attempted to provide place information for the images automatically but our software may not have found the correct location.

For high quality reproductions of any item from our collection please contact our image library

Dragon App Images

How To Train A Dragon Images

l How to Train a Dragon Images:

How To Train Your Dragon
How to Train a Dragon
Image by Crysco Photography
Astrid & Hiccup from “How to Train your Dragon”

Models and Costumes: spiceycosplay

Insta: @cryscophotography, @spiceycosplay

FB: www.facebook.com/crysco.nabisco

ECCC 2014 – How To Train Your Dragon – Toothless
How to Train a Dragon
Image by heath_bar
Emerald City ComiCon 2014 in Seattle, WA.

* See me on twitter or on tumblr.

Speech To Text Free Images

Check out these Speech to Text Free Images:

censorship
Speech to Text Free
Image by Wonderlane
"Many websites today are engaging in an awareness campaign about two pieces of pending U.S. anti-piracy legislation — SOPA (The Stop Online Piracy Act) and PIPA (The Protect IP Act).

If you would like to join Internet users around the world in this campaign, you may choose to symbolically darken Flickr photos (yours or others), depleting the web of rich content and letting others know about the potentially harmful impact of these bills. For more information see blog.flickr.net/.

I do not wish to participate. Do not darken my photos. Darken this photo."

Free Soil Party
Speech to Text Free
Image by TradingCardsNPS
Founded: 1848 in New York
Dissolved: 1854

The Free Soil Party formed in reaction to conflicts over territory captured during the Mexican War (1846 – 1848). The party opposed the expansion of slavery to the new territory and used the motto “Free soil, free speech, free labor, and free men.” Martin Van Buren ran as the presidential candidate for this party in 1848.

www.nps.gov/mava/index.htm

DRAGON SLAYER Reviews

DRAGON SLAYER

DRAGON SLAYER

  • BATTLE MOUNTAINOUS DRAGONS
  • Challenge massive dragons, wyverns, and reptiles as you traverse the map of the fantasy realm.
  • UNLEASH POWERFUL MAGIC
  • Cast deadly spells and avoid the flaming breath, bite, tail-whip and talons of the Dragon Bosses.
  • UPGRADE MAGICAL EQUIPMENT
  • Equip magical gauntlets, cloak armor and pets to slay more dragons.
  • STUNNING AAA GRAPHICS
  • Cutting-edge graphics optimized for the latest devices
  • MOTION COMIC STORY
  • Journey through the Realm on the hunt to vanquish menacing Dragons.

List Price: $ 0.00

Price:

Related Dragonslayer Products

Computer Voice Images

Computer Voice Images I found:

What happens when AV nerds grow up…
Computer Voice
Image by DSmous
Busy master control room at the former WSBT Broadcast Center in South Bend…

This master control room began operations in 1954, and was retired late 2008. The facility is currently being renovated for their new tenant, WNIT Television (PBS).

Playing on 22.1 is a ‘Walk Fit Orthotics’ infomerical
Playing on 22.2 is the second tape of ‘Silence of the Lambs’

If you view the full size image and look at the clock, you can see the second hand motion – this was a 2 second exposure, if I recall. That’s why all of the monitors are over-exposed

Unique trivia concerning this WSBT broadcast center, and this room in specific… This facility was designed by the same architects as CBS Studio City in Burbank, CA.

If you’ve ever seen ‘Good Night and Good Luck’, this control room and studio configuration is, or at least when built in 1954, was nearly identical to the one in the movie. The racks of equipment on the left are in front of the 40′ long set of windows looking down in to the studio from this control room, currently Master Control, but it built as the studio control room.

Not seen in the photo are the rest of the equipment racks in the room behind the camera – the ‘rack room’. At a rough guess I’d say 50+ racks filled with routers, switchers, frame syncs, distribution amps, not to mention the satellite equipment, audio routers, studio transmitter links and such for 4 radio stations. And there’s the telecine room in the basement, with the DirecTV uplink and the 120KVA UPS, and the ProFile video servers….

Dragon Age: Origins Awakening [Mac Download]