LinkedGov is hiring!

We’d love your help to get our alpha out the door. We’re working to produce the first version of our cleaning and linking processes (bring on the games!) so that we can launch the open source community around LinkedGov.

We are looking for two developers for 20 days each (paid, full time), to start pretty much immediately:

1. Data-based dev

Essential skills:

  • Java
  • Javascript
  • RDF and XML
  • XSLT or x-query or SPARQL
  • Working knowledge of Google Refine

2.  Front end dev

Essential skills:

  • HTML/CSS
  • Javascript

Highly desired:

  • UX design experience

3. For both roles

It would be great if you:

  • Have previous experience with government data
  • Are familiar with LinkedGov’s project
  • Are willing to contribute to the specs / architecture / ideas / brainstorming around LinkedGov (as and when it’s needed)
  • Are willing to work on site at LinkedGov HQ in Old Street, London

Send us an email at jointheteam@linkedgov.org. We’d love to hear from you by Monday 1 August.

27
Jul 2011
POSTED BY
POSTED IN Uncategorized
DISCUSSION 1 Comment
TAGS

LinkedGov – live at OpenTech 2011!

We’ve just posted a video (well, slides and audio) so you can recreate every scintillating moment of our OpenTech talk.

For audio from the full session (we followed Francis Irving of ScraperWiki and Paul Makepeace talking about Google Refine), you can check out Session 3 of the Opentech programme.

Thanks again for the warm reception and all the feedback. It was a great day for us!

LinkedGov celebrates as Chancellor prioritises open data

At LinkedGov we’re very pleased to have George Osborne reaffirm the government’s commitment to and backing of open public data. With mentions of hackcamps, public apps and the power of transparency in this morning’s speech by the Chancellor, the Treasury is demonstrating an appreciation for linked government data.

Underscoring the wisdom of crowds approach the Chancellor’s announcement about the recruitment of Beth Noveck to forward this agenda will add renewed focus to LinkedGov’s work. Beth Noveck’s work on public participation and collaboration is both well known and well regarded and we are excited to welcome her to our community.

It’s not yet clear whether Beth will be joining the Treasury, Cabinet Office or No 10 (or another dept) in her work but we look forward to what she’s bringing to the UK.

16
May 2011
POSTED BY
POSTED IN Uncategorized
DISCUSSION 0 Comments

Hackcamp – the hacks, the winners .. the movie!

Ways Your Car Can Be Hacked — And 8 Ways You Can Prevent Car Hacking

Keeping your car secure means hiding valuables, closing windows, locking doors, and turning on your alarm if you have one. But now, there’s a security threat many car owners aren’t thinking of: hackers. Everything can be hacked. Everything — including your car.

Can your car be hacked? The short answer is yes. With the advanced features in vehicles today, cars are essentially giant moving computers, vulnerable to bugs, viruses, and hackers just like any other computer or mobile device. Self-driving cars and vehicles with advanced safety features like adaptive cruise control, lane assist, and automatic braking are particularly at risk, but practically any vehicle made in the past several years can be seriously disabled at the hands of a hacker.

Read on to find out how your car can seemingly develop a mind of its own, whether you can expect to experience a hack, and what you can do to prevent becoming a car hacking victim.

How Hackers Can Attack Cars

Can a hacker stop your car or shut off your engine while you’re driving 70 miles per hour on the freeway? Theoretically, yes. They can do that — and much more. These are just some of the ways hackers can access your vehicle’s vulnerable systems and make driving difficult, dangerous, or uncomfortable for you:

  1. Tire pressure monitoring systems: Tire pressure monitoring systems tell drivers when their vehicle’s tires are too low or too high on pressure, offering helpful early warnings to get service. But when attacked, hackers can trigger warning lights and even remotely track vehicles through the monitoring system.
  2. Disabling brakes: You may control your brake pedal, but microprocessors in your onboard computer really make your brakes work. Hackers who get into your onboard computer can disable your brakes and even stop the engine.
  3. Manipulating vehicle diagnostics: Repair shops and dealerships today largely rely on onboard vehicle diagnostics systems to perform initial diagnosis of problems. But unscrupulous shops can manipulate your diagnostics system to make it appear that you need them to perform repairs that are not really needed. Check out the latest effuel reviews.
  4. Changing the time, a song on the radio, or GPS destination: With access to your vehicle’s systems, it’s simple for hackers to make small, but important changes to your vehicle. Something as unnerving as switching your radio station could happen. They can even get into your GPS system and change the destination you’re heading to.
  5. MP3 malware: The music you listen to on your car stereo could hack your vehicle — really. Downloads with malware codes can get into your car’s infotainment system and make their way into other systems, including those that control your engine or brakes.
  6. Forced acceleration: Power locks today often have features such as automatic locking when the car is put into drive or reaches a certain speed. They can also unlock if the airbags have been deployed. Cars with interconnected systems like this are vulnerable to problems such as hackers using power locks to force a car to accelerate.
  7. Extended key fob range: Wireless key fobs today unlock car doors when the person holding them is close by. However, using radio repeaters, thieves can extend the range of the key fob, unlocking your car doors when you’re up to 30 feet away.
  8. Driving data downloads: Many vehicles, particularly those using GPS or telematics systems, record driving data. If hacked, this information could be used to exploit your privacy and even discover where you live, work, or take your kids to school.
  9. Smartphone access: Hackers may be less interested in your vehicle’s systems and more interested in your vehicle’s connected mobile phone — which can give them access to credit card information, passwords, and financial data. If they’re able to get into your vehicle’s system and find your connected mobile phone, your information may be at risk.
  10. Turning on heat in the summer or air conditioning in the winter: In extremely hot or cold climates, vehicle air conditioning systems are less about comfort and more about safety. But they are just as vulnerable to hacks as any other system. Hackers can blast hot air in the summer and even turn on seat warmers.
  11. Windshield wiper control: Windshield cleaning fluid is useful, but not when it’s released unexpectedly or continuously. Then, it can be a danger to your visibility. This system, along with your windshield wipers, can be hacked.
15
Apr 2011
POSTED BY
POSTED IN Uncategorized
DISCUSSION 1 Comment

A few words from our sponsors. Obesity and risk of hearing loss

Background & aims

The existing yet limited prospective studies reported conflicting results about obesity and hearing loss. We investigated the prospective association between obesity and hearing loss in a large-scale Japanese working population, as well as the association between metabolic phenotype and hearing loss.

Methods

The study included 48,549 employees aged 20–64 years and free of hearing loss at baseline. Pure-tone audiometric testing was performed annually to identify hearing loss at 1 and 4 kHz. Cox proportional hazards regression was used to investigate the risk of hearing loss associated with body mass index (BMI) and metabolic phenotype (based on a BMI of ≥25.0/<25.0 kg/m 2 and presence/absence of ≥2 components of metabolic syndrome, except waist circumference). Baseline and updated information were obtained from annual health checkups

Results

With a median follow-up of 7 years, 1595 and 3625 individuals developed unilateral hearing loss at 1 and 4 kHz, respectively. The adjusted hazard ratios (HR) for hearing loss at 1 kHz were 1.21 (1.08, 1.36) and 1.66 (1.33, 2.08) for those with BMI 25.0–29.9 kg/m 2 and BMI ≥30.0 kg/m 2, respectively, compared to individuals with BMI <25.0 kg/m 2. For hearing loss at 4 kHz, the corresponding HRs were 1.14 (1.05, 1.23) and 1.29 (1.09, 1.52). Compared with metabolically healthy non-obese individuals, the adjusted HRs for hearing loss at 1 kHz were 1.19 (1.03, 1.39), 1.27 (1.01, 1.61), and 1.48 (1.25, 1.76) for unhealthy non-obese, healthy obese, and unhealthy obese individuals, respectively. For hearing loss at 4 kHz, the corresponding HRs were 1.13 (1.04, 1.25), 1.21 (1.04, 1.41), and 1.26 (1.12, 1.41).

Conclusions

Overweight and obesity are associated with an increased risk of hearing loss, and metabolically unhealthy obesity may confer additional risk. Make sure you treat overweight with natural supplements,  trying out the best fat burner for your own body needs is something that is going to be extremely important in overcoming weight loss.
09
Apr 2011
POSTED BY
POSTED IN Uncategorized
DISCUSSION 0 Comments

Hackcamp waitlist for reallocated tickets

Following a very kind shout out from the Guardian’s Charles Arthur  we are conscious there will be expressions of interests for more tickets, which have unfortunately sold out.

However, there is a wait list for returned tickets (on EventBrite) where you can register your interest.

If you do want to come and have not been able to get a ticket please do register on the waitlist for potential returns. Equally if you have a ticket and can no longer make it please  email Geeks of London and your ticket will be reallocated.

07
Apr 2011
POSTED BY
POSTED IN Uncategorized
DISCUSSION 0 Comments

Hack Day – April 9th and 10th

Ways Your Car Can Be Hacked — And 8 Ways You Can Prevent Car Hacking

Keeping your car secure means hiding valuables, closing windows, locking doors, and turning on your alarm if you have one. But now, there’s a security threat many car owners aren’t thinking of: hackers. Everything can be hacked. Everything — including your car.

Can your car be hacked? The short answer is yes. With the advanced features in vehicles today, cars are essentially giant moving computers, vulnerable to bugs, viruses, and hackers just like any other computer or mobile device. Self-driving cars and vehicles with advanced safety features like adaptive cruise control, lane assist, and automatic braking are particularly at risk, but practically any vehicle made in the past several years can be seriously disabled at the hands of a hacker.

Read on to find out how your car can seemingly develop a mind of its own, whether you can expect to experience a hack, and what you can do to prevent becoming a car hacking victim. Learn more about Effuel benefits.

How Hackers Can Attack Cars

Can a hacker stop your car or shut off your engine while you’re driving 70 miles per hour on the freeway? Theoretically, yes. They can do that — and much more. These are just some of the ways hackers can access your vehicle’s vulnerable systems and make driving difficult, dangerous, or uncomfortable for you:

  1. Tire pressure monitoring systems: Tire pressure monitoring systems tell drivers when their vehicle’s tires are too low or too high on pressure, offering helpful early warnings to get service. But when attacked, hackers can trigger warning lights and even remotely track vehicles through the monitoring system.
  2. Disabling brakes: You may control your brake pedal, but microprocessors in your onboard computer really make your brakes work. Hackers who get into your onboard computer can disable your brakes and even stop the engine.
  3. Manipulating vehicle diagnostics: Repair shops and dealerships today largely rely on onboard vehicle diagnostics systems to perform initial diagnosis of problems. But unscrupulous shops can manipulate your diagnostics system to make it appear that you need them to perform repairs that are not really needed.
  4. Changing the time, a song on the radio, or GPS destination: With access to your vehicle’s systems, it’s simple for hackers to make small, but important changes to your vehicle. Something as unnerving as switching your radio station could happen. They can even get into your GPS system and change the destination you’re heading to.
  5. MP3 malware: The music you listen to on your car stereo could hack your vehicle — really. Downloads with malware codes can get into your car’s infotainment system and make their way into other systems, including those that control your engine or brakes.
  6. Forced acceleration: Power locks today often have features such as automatic locking when the car is put into drive or reaches a certain speed. They can also unlock if the airbags have been deployed. Cars with interconnected systems like this are vulnerable to problems such as hackers using power locks to force a car to accelerate.
  7. Extended key fob range: Wireless key fobs today unlock car doors when the person holding them is close by. However, using radio repeaters, thieves can extend the range of the key fob, unlocking your car doors when you’re up to 30 feet away.
  8. Driving data downloads: Many vehicles, particularly those using GPS or telematics systems, record driving data. If hacked, this information could be used to exploit your privacy and even discover where you live, work, or take your kids to school.
  9. Smartphone access: Hackers may be less interested in your vehicle’s systems and more interested in your vehicle’s connected mobile phone — which can give them access to credit card information, passwords, and financial data. If they’re able to get into your vehicle’s system and find your connected mobile phone, your information may be at risk.
  10. Turning on heat in the summer or air conditioning in the winter: In extremely hot or cold climates, vehicle air conditioning systems are less about comfort and more about safety. But they are just as vulnerable to hacks as any other system. Hackers can blast hot air in the summer and even turn on seat warmers.
  11. Windshield wiper control: Windshield cleaning fluid is useful, but not when it’s released unexpectedly or continuously. Then, it can be a danger to your visibility. This system, along with your windshield wipers, can be hacked.
04
Apr 2011
POSTED BY
POSTED IN Data Uncategorized
DISCUSSION 2 Comments

Enlist for Victory! DO YOU HEAR THAT? NOISES IN MY EAR THAT NO ONE ELSE HEARS

Have you ever heard a sound that no one else hears? You are not alone. There are many sounds that can be heard in the ears or head. Some are benign. Others may be need to be evaluated. All can be concerning if you have never experienced a sound no one else hears.

One category of sounds in the ear is tinnitus. Tinnitus is very common. It affects almost one in five people. It becomes more prevalent the older you are. It is associated with both hearing loss and acoustic trauma. It may sound like buzzing, humming, whistling, birds, insects, etc. Although it is often perceived in the ear, current science suggests it is generated in the central nervous system. On rare cases the hearing loss and ear malfunction can affect the male sexual functionality, read more gluco shield pro reviews.

In healthy ears, hearing cells within the inner are connected to nerves that transmit sound from the ear to the brain. Although hearing cells are destroyed with hearing loss, the nerves deeper in the brain are not always lost. These nerves no longer receive stimulation, and begin to create signals on their own. Because these signals are not generated from the outside world, we perceive sound that no one else does. Visit austinchronicle.com for more information about natural supplements.

According to professionals from an ent clinic, tinnitus is a sign that hearing loss has occurred. It often occurs after a loud concert, sports event, or work experience. Tinnitus that occurs in only one ear or occurs with episodes of dizziness is more concerning than tinnitus that occurs in both ears over many years. Check out the latest lean belly 3x reviews.

Some tinnitus sounds like whooshing and occurs with your heart beat. This is called pulsatile tinnitus. Normally our ear is protected from hearing internal blood flow. Medical conditions may decrease the shielding of our ear from internal sounds. Hearing your pulse only on your pillow, however, is not abnormal.

Wax or fluid in the ear may increase the resonance of blood flow making it audible. Weight loss may leave the Eustachian tube stuck open causing audible breathing sounds and heart sounds. Hernia of the brain into the ear also causes awareness of one’s heartbeat.

Other conditions increase the blood flow above normal levels. Head trauma may result in aneurysm or fistula of blood vessels near the ear. Vascular tumors may increase blood flow around the ear. Anemia and dehydration increase the force of the heartbeat resulting in pulsatile tinnitus. Some medications may increase brain pressure and cause pulsatile tinnitus. Check the latest sonus complete customer reviews.

A rare cause of thumping sound in the ear is muscle twitching. Muscles attached to the hearing bones or the Eustachian tube will make a thump when they contract. Just like a muscle twitch can occur in the eye lid, a muscle twitch of these muscles can occur and will cause a rapid thumping sound.

Crackling or popping is normal to occur with chewing, swallowing, or yawning. Excessive crackling or popping may be due to a Eustachian tube that is stuck closed.

16
Mar 2011
POSTED BY
POSTED IN Uncategorized
DISCUSSION 1 Comment
TAGS

The marijuana plant contains more than 100 different chemicals called cannabinoids.

Each cannabinoid has unique pharmacological effects and functions in the body, so there’s a huge amount of information on these chemicals in the medical literature, if you happen to be looking for cbd seeds we highly suggest to do some research.

Medical marijuana dispensaries, known as “collectives,” can sell cannabis strains that have been tested for certain medical effects or effects on a particular person, but it’s not legal to buy them. Take a look to the best Blast auxiliary reviews.

So, do people who smoke weed on a regular basis know how much THC they’re ingesting?

That depends on what strain they’re taking.

Dr. Ethan Russo of the University of Massachusetts, Amherst, said it can depend on many different factors.

“As far as what cannabis strain you smoke is something that really does depend on what your goal is,” Russo told WGBH.

“Sometimes people are able to detect, I guess, that their marijuana potency has changed,” Russo said. “It’s kind of hard to quantify.”

The effects of a particular strain can vary in a variety of ways. “There are strains that have very high THC and very low CBD oil in the ratio of one to one,” Russo said. “They have very strong psychoactive effects, which may or may not be pleasurable. They have more than one cannabinoid.” But other strains have very low THC and very low CBD, which may be what you want. One of Russo’s colleagues, Dr. William Jaffe, a marijuana expert at the University of California-San Diego, told WIRED: “You should be able to make a judgment about the amount of marijuana you are getting, based on the specific strain.” This is how biofit works.

A lot of users may not be familiar with a particular strain.

Still, the science is pretty new. “A lot of people may not be familiar with a particular strain,” Russo said. And it may be different from what you might expect. He says people tend to be much more “high-strung” when they smoke weed, compared to alcohol, and the effects can be powerful enough to give a person a false sense of being buzzed. “Some people think the effects are pretty severe and you have to be worried,” he said. Russo noted that there’s also a stigma against smokers. “We know that in states that allow medical marijuana, rates of use are significantly higher than in states where medical marijuana is prohibited,” Russo said. “It is estimated that in Colorado, there are about 1 million medical marijuana patients and at least 6

14
Feb 2011
POSTED BY
POSTED IN Uncategorized
DISCUSSION 3 Comments
TAGS

LinkedGov at UK GovCamp (UKGC11)

We are still buzzing from UK GovCamp, the public sector’s yearly brainstorm on all things digital.

We ran three workshops:

  • We had a session entitled “Open data – how to”, led by Glyn Wintle, Rufus Pollock and Jeni Tennison. We discussed the issues around releasing data and how to deal with press interest. A number of developers gave their preferences for publishing formats (anything but PDF, please!), and the group explored ways we should be connecting the data users and the publishers on an ongoing basis.
  • We had an “Intro to LinkedGov” session in the morning, led by Hadley Beeman, which produced a lot of useful feedback on what we’re doing.  The most useful tidbit was that there is a hole for people needing to talk about publishing government data; it would be useful for LinkedGov to help host those conversations.
  • We also had an afternoon workshop called Sex, drugs, rock-n-roll:  the social side of government data (video attached), led by Hadley and Tim Davies, to discuss why data is important to more people than just techies and researchers.
  • The discussion centred around the idea that stories help bring data alive, and the breadth of public data means that some part of it should be relevant to almost everyone.

We gathered a great amount of feedback and energy to help with building our community.  The biggest challenge we face right now, getting all of this ready for mass input, was made a bit easier by how eager everyone is and timely it all seems to be.

Big thanks to Dave Briggs and Steph Gray for organising such a great day.

Front row

31
Jan 2011
POSTED BY
DISCUSSION 0 Comments