Archive for the ‘Uncategorized’ Category

Radio Frequency Identification Reading By Using Error Correcting Codes On Sets Of Tags

Wednesday, March 17th, 2010

In 2008 i worked on a 3 day Think Tank at SAP Research. The result of our postprocessing was an US and China patent named “RADIO FREQUENCY IDENTIFICATION READING BY USING ERROR CORRECTING CODES ON SETS OF TAGS” which i want to indroduce here shortly:

A method and a system are described for improved reading of Radio Frequency Identification (RFID) tags using correcting codes on sets of electronic tags. In one embodiment, information is requested from each of a set of electronic tags. The information includes an identification code and a portion of a codeword, the codeword contains a coded message with identification codes of all tags in the set. The information is received from a subset of the set of tags. Portions of the codeword from the received tag information of the subset of tags are assembled. The coded message is constructed from the assembled portions of the codeword. Finally, individually receiving information from a remaining set of the tags in the set of tags. In one embodiment, the system includes a set of electronic tags and a reading device to request and receive information from each of the set of electronic tags. The information includes an identification code and a portion of a codeword, the codeword contains a coded message with identification codes of all tags in the set. In addition, the system includes a decoding component to decode a number of assembled portions of the codeword and construct the coded message with the identification codes of all tags in the set. An enterprise system processes the received information from all tags in the set.

The entire patent could be found here. An entire PDF with illustrations can be found here.

United States Patent Application: 20100045444

If you have any further questions or feedback feel free to comment.

Google Insight Search – Cloud, Grid, DC, Virt

Tuesday, August 18th, 2009

Today I tested and played around with Google “Insight for Search” and the following terms:

  • Cloud Computing
  • Grid Computing
  • Distributed Computing
  • Virtualization

The next screenshot shows my query configuration:
google insight search query

I selected all categories because google will list those for you automaticly (in my case, the categories were: Computers & Electronics, Reference, Local, Entertainment, Society, Internet)

The interest over time is displayed in following graph:

A nice feature at this point is the “Forecast”-function. You can select it and the baseline in the graph will end in the future.

(more…)

If Twitter Consisted of 100 People [Gorgeous Graphics]

Monday, August 17th, 2009

If Twitter Consisted of 100 People [Gorgeous Graphics]

Posted using ShareThis

List of VC Twitter Accounts: Are You Following the Funds?

Wednesday, August 5th, 2009

Found a nice article on O’reilly’s Under The Radar blog.

Want an inside look into what VCs are doing and thinking? Wish you could get into their heads to know what they’re actually looking for so you can tailor your pitch “just so?”

Here’s your chance. Twitter provides a way to follow and communicate with many of the startup world’s top funders – and the social warmth it provides in being able to hear their insights and ask questions is terrific.

List of VC Twitter Accounts: Are You Following the Funds?

From now i am following some of those VC’s (e.g. Guy Kawasaki) – looking forward to get some cool and interesting informations about venture strategies and ventured startups via Twitter.

The Anatomy Of The Twitter Attack

Monday, August 3rd, 2009

Found another quite interesting article on TechCrunch about “The Anatomy Of The Twitter Attack”
The Anatomy Of The Twitter Attack

A short quote of author’s conclusion:

What’s the takeaway from all this? Cloud services are convenient and cheap, and can help a company grow more quickly. But security infrastructure is still nascent. And while any single service can be fairly secure, the important thing is that the ecosystem most certainly is not. Combine the fact that so much personal information about individuals is so easily findable on the web with the reality that most people have merged their work and personal identities and you’ve got the seed of a problem. A single Gmail account falls, and soon the security integrity of an entire startup crumbles. So for a start, reset those passwords and don’t use the same passwords for different services. Don’t use password recovery questions that can easily be answered with a simple web search (an easy solution is to answer those questions falsely). And just in general be paranoid about data security. You may be happy you were.

I totally agree with that point of view. From my experience most users (private and business) use weak same passwords for different services.

For choosing and creating good and strong passwords follow this guide.

Use APIs to do market research – O’Reilly Broadcast

Sunday, August 2nd, 2009

Found an interesting article on O’Reilly Broadcast about doing market research using APIs: Use APIs to do market research – O’Reilly Broadcast

Posted using ShareThis

Heaven

Sunday, July 26th, 2009

A friend of mine linked me to that awesome video… There is no sfx, everything was build up by these guys (he told me, he knows one of these guys).

Check out this awesome video !

Welcome to my new weblog

Sunday, July 26th, 2009

Hi everybody, welcome to my new weblog. From now i will post here my random thoughts and experience on my work and projects. Stay tuned !