link

My Patent: Task-oriented management is provided for managing server configuration settings. (2005)

Task-oriented management is provided for managing server configuration settings. The server configuration settings are logically grouped into a set of tasks. User interface elements are mapped to each task in the set of tasks. The task represented by a user interface element is also mapped to one…

Inventors: Nikhil Kothari, Andrew Cheng-Min Lin, Joe Coulombe, Angela M. Baxley, Susan K. Todd

Assignee: Microsoft Corporation

Link: My Patent: Task-oriented management is provided for managing server configuration settings. (2005)

 

Standard
link

What Happened To Courtship and Pillow Talk? The Loss of Romantic Sexuality | Psychology Today

Today’s mass media sanctions and supports lust-driven sex oriented towards fantasy, arousal, and orgasm. My single daters constantly ask me on which date they should expect sex to happen, relying on their physical responses for successful sexual contact. Their goal is to make that single physical focus work first, and then worry about what kind of relationship may or may not evolve. Most know intuitively that adding love to the mix can only make it better in the long run, but they fear rejection if they try to commit too early.

The beauty of romantic intimacy can only happen when lovemaking includes all the ways in which partners experience each other. The multiple dimensions of spiritual connection, emotional bonding, intellectual fusion, and physical affection must all be present before the sexual experience is at its best.

Romantic sexuality asks its potential lovers to be in the process of continuous discovery of all the significant dimensions of a great relationship. If the magnetic intensity of physical attraction focus lovers into that single dimension too quickly, the others may be temporarily lost, or never realized. Couples who want to know sexual connection at its deepest level of fulfillment work together to make certain that they prolong each dimension until all are present…

https://www.psychologytoday.com/blog/rediscovering-love/201106/what-happened-courtship-and-pillow-talk-the-loss-romantic-sexuality

Standard
link

Upending Anonymity, These Days the Web Unmasks Everyone – NYTimes.com

Not too long ago, theorists fretted that the Internet was a place where anonymity thrived.

FROM OUR ADVERTISERS

Now, it seems, it is the place where anonymity dies.

A commuter in the New York area who verbally tangled with a conductor last Tuesday — and defended herself by asking “Do you know what schools I’ve been to and how well-educated I am?” — was publicly identified after a fellow rider posted a cellphone video of the encounter on YouTube. The woman, who had gone to N.Y.U., was ridiculed by a cadre of bloggers, one of whom termed it the latest episode of “Name and Shame on the Web.”

Women who were online pen pals of former Representative Anthony D. Weiner similarly learned how quickly Internet users can sniff out all the details of a person’s online life. So did the men who set fire to cars and looted stores in the wake of Vancouver’s Stanley Cup defeat last week when they were identified, tagged by acquaintances online.

Continue reading the main story
RELATED COVERAGE

An image of Tom MacMaster posted on Facebook.The Lede Blog: Gay Girl in Damascus Blogger Admits to Writing Fiction Disguised as FactJUNE 13, 2011
The Lede Blog: Identifying Lovers in Vancouver’s RiotJUNE 17, 2011
The collective intelligence of the Internet’s two billion users, and the digital fingerprints that so many users leave on Web sites, combine to make it more and more likely that every embarrassing video, every intimate photo, and every indelicate e-mail is attributed to its source, whether that source wants it to be or not. This intelligence makes the public sphere more public than ever before and sometimes forces personal lives into public view.

Photo

A blogger who claimed to be a Syrian-American calling herself “Gay Girl in Damascus” was revealed as Tom MacMaster, 40. Credit Agence France-Presse — Getty Images
To some, this could conjure up comparisons to the agents of repressive governments in the Middle East who monitor online protests and exact retribution offline. But the positive effects can be numerous: criminality can be ferreted out, falsehoods can be disproved and individuals can become Internet icons.

When a freelance photographer, Rich Lam, digested his pictures of the riots in Vancouver, he spotted several shots of a man and a woman, surrounded by police officers in riot gear, in the middle of a like-nobody’s-watching kiss. When the photos were published, a worldwide dragnet of sorts ensued to identify the “kissing couple.” Within a day, the couple’s relatives had tipped off news Web sites to their identities, and there they were, Monday, on the “Today” show: Scott Jones and Alex Thomas, the latest proof that thanks to the Internet, every day could be a day that will be remembered around the world.

“It’s kind of amazing that there was someone there to take a photo,” Ms. Thomas said on “Today.”

The “kissing couple” will most likely enjoy just a tweet’s worth of fame, but it is noteworthy that they were tracked down at all.

This erosion of anonymity is a product of pervasive social media services, cheap cellphone cameras, free photo and video Web hosts, and perhaps most important of all, a change in people’s views about what ought to be public and what ought to be private. Experts say that Web sites like Facebook, which require real identities and encourage the sharing of photographs and videos, have hastened this change.

“Humans want nothing more than to connect, and the companies that are connecting us electronically want to know who’s saying what, where,” said Susan Crawford, a professor at the Benjamin N. Cardozo School of Law. “As a result, we’re more known than ever before.”

Advertisement

Continue reading the main story
Advertisement

Continue reading the main story

This growing “publicness,” as it is sometimes called, comes with significant consequences for commerce, for political speech and for ordinary people’s right to privacy. There are efforts by governments and corporations to set up online identity systems. Technology will play an even greater role in the identification of once-anonymous individuals: Facebook, for instance, is already using facial recognition technology in ways that are alarming to European regulators.

After the riots in Vancouver, locals needed no such facial recognition technology — they simply combed through social media sites to try to identify some of the people involved, like Nathan Kotylak, 17, a star on Canada’s junior water polo team.

On Facebook, Mr. Kotylak apologized for the damage he had caused. The finger-pointing affected not only him, it affected his family: local news media reported that his father, a doctor, had seen his ranking on a medical practice review site, RateMDs.com, drop after people posted comments about his son’s involvement in the riots. Other people subsequently went to the Web site to defend the doctor and improve his ranking.

Continue reading the main story
RECENT COMMENTS

castilda8 June 23, 2011
I recently participated in an online discussion group for an upper-level college literature class. (I am considerably older than most…
Grossness54 June 23, 2011
Many comments were of the “do no wrong, you’ll have naught to fear” persuasion. The only problem with that is that what’s considered “wrong”…
Zubin Wadia June 23, 2011
Brian,The internet CAN be made to forget… we’re doing it here at http://secretsocial.comPrivate and genuine conversations with other…
SEE ALL COMMENTS
Predictably, there was a backlash to the Internet-assisted identification of the people involved in the alcohol-fueled riot. Camille Cacnio, a student in Vancouver who was photographed during the riot and who admitted to theft, wrote on her blog that the “21st-century witch hunt” on the Internet was “another form of mobbing.”

In the New York area, the commuter who was the subject of online scorn last week shut down both her Twitter and LinkedIn accounts once her name bubbled up on blogs. Though the person who originally posted the cellphone video took it down, other people quickly reposted it, giving the story new life. The original video poster remains anonymous because his or her YouTube account has been shut down.

Half a world away, in Middle Eastern countries like Iran and Syria, activists have sometimes succeeded in identifying victims of dictatorial violence through anonymously uploaded YouTube videos.

They have also succeeded in identifying fakes: In a widely publicized case this month, a blogger who claimed to be a Syrian-American lesbian and called herself “A Gay Girl in Damascus” was revealed to be an American man, Tom MacMaster.

The sleuthing was led by Andy Carvin, a strategist for NPR who has exhaustively covered the Middle Eastern protests on Twitter. When sources of his said they were skeptical of the blogger’s identity, “I just started asking questions on Twitter and Facebook,” Mr. Carvin recalled on CNN. “Have any of you met her in person? Do you know her at all? The more I asked, the less I learned, because no one had met her, not even the reporters who had supposedly interviewed her in person.”

Mr. Carvin, his online followers and others used photos and server log data to connect the blog to Mr. MacMaster’s wife.

“Publicity” — something normally associated with celebrities — “is no longer scarce,” Dave Morgan, the chief executive of Simulmedia, wrote in an essay this month.

He posited that because the Internet “can’t be made to forget” images and moments from the past, like an outburst on a train or a kiss during a riot, “the reality of an inescapable public world is an issue we are all going to hear a lot more about.”

A version of this article appears in print on June 21, 2011, on page A1 of the New York edition with the headline: Upending Anonymity, These Days the Web Unmasks Everyone. Order Reprints| Today’s Paper|Subscribe

Standard
link

Convergence

Lin< >:

>f=”h< >< >p:< >< >< >h< >r< >n< >h.< >< >m20110617w< >-wi< >< >-figh< >-in-< >h< >-shad< >”>C< >nv< >rg< >n< >< >< a>

    I s< </blockquote>>< </blockquote>> < </blockquote>>< </blockquote>>nv< </blockquote>>rg< </blockquote>>n< </blockquote>>< </blockquote>>, a< </blockquote>>r< </blockquote>>ss n< </blockquote>>< </blockquote>>w< </blockquote>>r< </blockquote>>s, app< </blockquote>>i< </blockquote>>a< </blockquote>>i< </blockquote>>ns, si< </blockquote>>< </blockquote>>s, f< </blockquote>>a< </blockquote>>< </blockquote>>r< </blockquote>>, s< </blockquote>>rvi< </blockquote>>< </blockquote>>s, < </blockquote>>< </blockquote>>mpani< </blockquote>>s&#8230;< </blockquote>p>

I < >< >v< > wa< >< >hing < >< >sin< >ss a< > p< >ay.< p>

B< >sin< >ss is < >h< > s< >m < >f many p< >< >p< >< > in< >< >ra< >< >ing wi< >h a < >< >mm< >n p< >rs< >i< > < >f s< >< >< >< >ss.< p>

P<

>rs<

>na<

><

>y, wh<

>n MG’s p<

>s<

>s <

>am<

> <

><

><

> <

><

>a<

>ing Fa<

><

><

><

><

><

>’s n<

>w f<

>a<

><

>r<

>s, I <

>h<

><

>gh<

> i<

> was <

>i<

><

><

>y a ni<

><

> p<

><

>y <

><

> dis<

>ra<

><

> <

>s fr<

>m Fa<

><

><

><

><

><

>’s PR snaf<

> r<

>garding G<

><

>g<

><

>. Razz<

><

> dazz<

><

> ‘<

>m! <

p>

Standard