Monthly Archives: August 2007

Fangasm: dragons vs. helicopters in D-War!

I love dragons. But more than dragons, I love dragons fighting helicopters! Ever since Reign of Fire, where the dragons never quite fought the helicopters, I have dreamed of a movie that would give me giant, angry dragons fighting huge, …

And the real anonymous trolls online are . . .

Like many geeks, I’ve spend the last couple of weeks happily playing with mad scientist Virgil Griffith’s new creation, WikiScanner. It’s a web application that reveals who has been making anonymous edits on Wikipedia. Surprise: it’s not a bunch of …

“User Revolts” panel at SXSW

I’ve proposed a panel for the 2008 South by Southwest (SXSW) Interactive Conference called “Social Network Coups: The Users are Revolting!” It will be a user’s guide to organizing revolts on social networks, such as the AACS key protest on …

She’s Such a Geek reading at Google

The video of our She’s Such a Geek reading at Google is now online, part of the Authors @ Google series. Co-editor Charlie Anders and I were joined by contributors (and Googlers) Ellen Spertus and Jenn Shreve. We had a …

The case for paper archives

One of the things I have to do in my new role volunteering as president of Computer Professionals for Social Responsibility is clean out the 25-year-old organization’s archives. Our little office in San Francisco’s awesome Nonprofit Tech Center can’t hold …

Why I hate The Simpsons

With The Simpsons movie in theaters, and every fucking 7-11 converted into a massive walk-in advertisement for the show, I have finally decided to speak out about why I have hated this overrated, overquoted TV show for 17 years. When …

Scary movies and sexy internets

Sure, I think a lot about movies — probably more than I should, given that movies are rapidly dying as a media form. Hell, even TV is pretty old hat. I should really be spending all my time watching YouTube …

Participate in “Technology in Wartime” conference this January

Are you interested in what happens to computer technology during wartime? How can we weaponize beta versions of software and hardware safely so that soldiers and civilians are protected? What are the ethical implications of using technology to spy on …