background preloader

The thin gray line

The thin gray line

This article has shared light into how new laws Network effect Diagram showing the network effect in a few simple phone networks. The lines represent potential calls between phones. The classic example is the telephone. The more people who own telephones, the more valuable the telephone is to each owner. This creates a positive externality because a user may purchase a telephone without intending to create value for other users, but does so in any case. Online social networks work in the same way, with sites like Twitter, Facebook, and Google+ becoming more useful as more users join. The expression "network effect" is applied most commonly to positive network externalities as in the case of the telephone. Over time, positive network effects can create a bandwagon effect as the network becomes more valuable and more people join, in a positive feedback loop. Origins[edit] Network effects were a central theme in the arguments of Theodore Vail, the first post patent president of Bell Telephone, in gaining a monopoly on US telephone services. Lock-in[edit]

Technology - Pogue's Posts Blog What is Intel Sandy Bridge, and What it Means for Consumers | Notebooks.com This week at the Intel Developer Forum Paul Otellini, CEO of Intel announced the next generation of processors that many consumers will see in their laptops, tablets and desktops in 2011. The new processors, called Sandy Bridge, are aimed at meeting the media demands of many consumers who want to use their laptops to edit and share high quality photos, HD video and even play games while delivering a better overall user experience. While the events at IDF are geared for developers and “geeks” we wanted to break down what the new Sandy Bridge processor platform means for you, the average consumer, so that you can make a smart shopping decision now and in the future. What is Sandy Bridge, and why should I care? Sandy Bridge processors are the next version of the Intel Core i processors that you’ll find inside many notebooks at Best Buy and other retailers. Credit: Laptop Mag How will Sandy Bridge Affect the Price of my next notebook? Yes! What about battery life on Sandy Bridge processors?

This article refers to the White Hat Hackers as Small-world network Small-world network exampleHubs are bigger than other nodes Average vertex degree = 1,917 Average shortest path length = 1.803. Clusterization coefficient = 0.522 Random graph Average vertex degree = 1,417 Average shortest path length = 2.109. Clusterization coefficient = 0.167 In the context of a social network, this results in the small world phenomenon of strangers being linked by a mutual acquaintance. Properties of small-world networks[edit] This property is often analyzed by considering the fraction of nodes in the network that have a particular number of connections going into them (the degree distribution of the network). ) is defined as R. Examples of small-world networks[edit] Small-world properties are found in many real-world phenomena, including road maps, food chains, electric power grids, metabolite processing networks, networks of brain neurons, voter networks, telephone call graphs, and social influence networks. Examples of non-small-world networks[edit] See also[edit]

TechCrunch IT-techBlog: Home of MobileTech This article is based on a jail term for a Scale-free network A scale-free network is a network whose degree distribution follows a power law, at least asymptotically. That is, the fraction P(k) of nodes in the network having k connections to other nodes goes for large values of k as where is a parameter whose value is typically in the range 2 < < 3, although occasionally it may lie outside these bounds.[1][2] History[edit] In studies of the networks of citations between scientific papers, Derek de Solla Price showed in 1965 that the number of links to papers—i.e., the number of citations they receive—had a heavy-tailed distribution following a Pareto distribution or power law, and thus that the citation network is scale-free. Barabási and Albert proposed a generative mechanism to explain the appearance of power-law distributions, which they called "preferential attachment" and which is essentially the same as that proposed by Price. (that is, the number of edges incident to ) by . Characteristics[edit] Random network (a) and scale-free network (b).

VentureBeat | News About Tech, Money and Innovation Razer and Sixense bring precise motion control to PC gaming | CES 2010 LAS VEGAS--With all three home consoles supporting motion control in one way or another it's certainly odd that PC gaming has yet to adopt the technology. Traditionally, PC gaming is the platform others look to emulate but in the current generation of Wii remotes, Sixaxis controllers, and Project Natal , gesture-based gaming on the PC remains untouched. At CES 2010 we've found that this is about to change. High-end PC gaming accessory manufacturer Razer, in conjunction with Sixense, have teamed up to make precise motion control on the PC a reality. Better yet, the companies are doing it with the help of videogame developer Valve. Using an electromagnetic field sent out from a single transmitter, the two-controller setup is able to create an exact one-to-one duplication of movements onscreen. During our demo of the unit, we watched Sixense's CTO and Chief Architect Jeff Bellinghausen conduct an impressive illustration of just how accurate the device performs.

This article describes a ‘White hat Hackers’

Related: