- Funders Punish Open Access Dodgers (Nature) — US’s NIH and UK’s Wellcome Trust are withholding funding from academics who haven’t released their data despite it being a condition of past funding. It’s open access’s grab twist and pull move.
- Digitize Books with Mindstorms and Raspberry Pi — Lego to turn the page, Pi to take photo.
- Humans Steal Jobs from Robots at Toyota (Bloomberg) — Toyota’s next step forward is counter-intuitive in an age of automation: Humans are taking the place of machines in plants across Japan so workers can develop new skills and figure out ways to improve production lines and the car-building process.
- Implementer’s Guide to Security for Internet of Things, Devices and Beyond (PDF) — This white paper outlines a set of practical and pragmatic security considerations for organisations designing, developing and, testing Internet of Things (IoT) devices and solutions. The purpose of this white paper is to provide practical advice for consideration as part of the product development lifecycle.
The IoT requires thinking about how humans and things cooperate differently when things get smarter.
Rod Smith of IBM and I had a call the other day to prepare for our onstage conversation at O’Reilly’s upcoming Solid Conference, and I was surprised to find how much we were in agreement about one idea: so many of the most interesting applications of the Internet of Things involve new ways of thinking about how humans and things cooperate differently when the things get smarter. It really ought to be called the Internet of Things and Humans — #IoTH, not just #IoT!
Let’s start by understanding the Internet of Things as the combination of sensors, a network, and actuators. The “wow” factor — the magic that makes us call it an Internet of Things application — can come from creatively amping up the power of any of the three elements.
For example, a traditional “dumb” thermostat consists of only a sensor and an actuator — when the temperature goes out of the desired range, the heat or air conditioning goes on. The addition of a network, the ability to control your thermostat from your smartphone, say, turns it into a simple #IoT device. But that’s the bare-base case. Consider the Nest thermostat: where it stands out from the crowd of connected thermostats is that it uses a complex of sensors (temperature, moisture, light, and motion) as well as both onboard and cloud software to provide a rich and beautiful UI with a great deal more intelligence. Read more…
Advances in biology and biotechnology are driving us in exciting new directions — be part of the revolution!
We’re excited about the third issue of BioCoder, O’Reilly’s newsletter about the revolution in biology and biotechnology. In the first article of our new issue, Ryan Bethencourt asks the question “What does Biotechnology Want?” Playing with Kevin Kelly’s ideas about how technological development drives human development, Bethencourt asks about the directions in which biotechnology is driving us. We’re looking for a new future with significant advances in agriculture, food, health, environmental protection, and more.
That future will be ours — if we choose to make it. Bethencourt’s argument (and Kelly’s) is that we can’t not choose to make it. Yes, there are plenty of obstacles: the limits to our understanding of biology and genetics, the inadequate tools we have for doing research, the research institutions themselves, and even fear of the future. We’ll overcome these obstacles; indeed, if Bethencourt is right, and biology is our destiny, we have no choice but to overcome these obstacles. The only question is whether you’re part of the revolution or not.
Open Access, Lego Scanner, Humans Return, and Designing Security into IoT
dategrep, Agile Signoff, Feedback Speed, and Modern Dev
- dategrep — print lines matching ranges of dates. Genius!
- Business Case Guidance in Agile Projects (gov.uk) — how the UK govt signs off on Agile projects, which normally governments have no clue over how to handle properly.
- Hyper Growth Done Right — “While I was at Oracle, it took a month before a new engineer would get any code in,” Agarwal says. “It sent this implicit message that it’s okay to take a month to write some code.” First time I’d heard this wise point articulated: slow feedback loops send the message that progress can be slow.
- Docker + Github + Jenkins — clever integration of the three tools to get repeatable continuous integration. The modern dev environment has workflow built on git, VMs, and glue.
In the future, we will solve biological problems by running experiments in parallel.
Perhaps the most ambitious project right now is Synbiota’s #ScienceHack. They are organizing a large number of volunteer groups to experiment with techniques to produce the compound Violacein. Violacein is potentially useful as an anti-cancer and anti-dysentery drug, but currently costs $356,000 per gram to produce. This price makes research (to say nothing of therapeutic use) impossible. However, it’s possible that bacteria can be genetically engineered to produce Violacein much more efficiently and cheaply. That’s what the #ScienceHack experiment is about: the groups will be trying to design DNA that can be inserted into E. coli bacteria to make it produce Violacein at a fraction of the cost. Read more…
The IoT isn't just a new attack surface to get into your enterprise — it's giving the Internet eyes and arms.
Your computer is important. It has access to your Amazon account, probably your bank, your tax returns, and maybe even your medical records. It’s scary when it gets pwnd, and it gets pwned regularly because it’s essentially impossible to fully secure a general purpose computing device. But the good news is that, at least for now, your computer can’t climb up the stairs and bludgeon you to death in your sleep. The things it manipulates are important to you, but they are (mostly) contained in the abstract virtual realm of money and likes.
The Internet of Things is different. We are embarking on an era where the things we own will be as vulnerable as our PCs, but now they interact with the real world via sensors and actuators. They have eyes and arms, and some of them in the not-too-distant future really will be able to climb the stairs and punch you in the face.
This piece from the New York Times has been getting some attention because it highlights how smart things represent an increased attack surface for infiltration. It views smart devices as springboards into an enterprise rather than the object of the attack, and that will certainly be true in many cases. Read more…