My Photo

Your email address:

Powered by FeedBlitz

January 2015

Sun Mon Tue Wed Thu Fri Sat
        1 2 3
4 5 6 7 8 9 10
11 12 13 14 15 16 17
18 19 20 21 22 23 24
25 26 27 28 29 30 31
Blog powered by Typepad

Become a Fan

« Thinking about Jet Lag at 32,000 feet | Main | Ubiquitous Sensors? You Have Seen Nothing Yet »

May 07, 2006


Feed You can follow this conversation by subscribing to the comment feed for this post.

Michael Hampton

Even if you could possibly have every bit of human knowledge at your fingertips, we don't yet have the computing power to do much useful with it.

Most of us really don't even have the computing power to analyze vast amounts of Internet traffic in real time, as certain government agencies do.

But as you said, to pull useful information out of the network, you really don't need to know everything, and knowing too much gets in the way.

I'm looking forward to see what else you have to say, as I've been thinking about how to adapt data mining techniques to the problem of blog spam prevention. From the view of one weblog, only limited information is available, but by making more effective use of more information than others use, I've made a pretty good dent in the blog spam problem. And since I have to analyze in real time, I can't use a lot of information anyway.

Valdis Krebs

Jeff blogged...
"What matters is the entrance point into the network. For example, starting with a known bad guy or a communication from an Al Qaeda safe house? Observing the network from such a vantage point is useful."

Right on, Jeff! We are in total agreement.

I wrote the original of this white paper in 2002 when I also was asked "how do you predict this from patterns?"

Mike dan

Right on, Jeff! We are in total agreement.

Good theme, simple but pleasant, lke all the themes shoud be to create a good atmosphere.

Verify your Comment

Previewing your Comment

This is only a preview. Your comment has not yet been posted.

Your comment could not be posted. Error type:
Your comment has been saved. Comments are moderated and will not appear until approved by the author. Post another comment

The letters and numbers you entered did not match the image. Please try again.

As a final step before posting your comment, enter the letters and numbers you see in the image below. This prevents automated programs from posting comments.

Having trouble reading this image? View an alternate.


Post a comment

Comments are moderated, and will not appear until the author has approved them.

Your Information

(Name and email address are required. Email address will not be displayed with the comment.)