- Icon Fonts are Awesome — yes, yes they are. (via Fog Creek)
- What the Rails Security Issue Means for Your Startup — excellent, clear, emphatic advice on how and why security matters and what it looks like when you take it seriously.
- The Indiepocalypse (Andy Baio) — We’re at the beginning of an indiepocalypse — a global shift in how culture is made, from a traditional publisher model to independently produced and distributed works.
- China, GitHub, and MITM — No browser would prevent the authorities from using their ultimate tool though: certificates signed by the China Internet Network Information Center. CNNIC is controlled by the government through the Ministry of Industry and Information Technology. They are recognized by all major browsers as a trusted Certificate Authority. If they sign a fake certificate used in a man-in-the-middle attack, no browser will warn of any usual activity. The discussion of how GitHub (or any site) could be MITM’d is fascinating, as is the pros and cons for a national security agency to coopt the certificate-signing NIC.
Icon Font Fun, Rails Security, Indie Economics, and GitHub MITMed in China
Cheap Attack Drones, Truth Filters, Where Musicians Make Money, and Dynamic Pricing From Digitized Analogue Signals
- Chinese Attack UAV (Alibaba) — Small attack UAV is characterized with small size, light weight, convenient carrying, rapid outfield expansion procedure, easy operation and maintenance; the system only needs 2-3 operators to operate, can be carried by surveillance personnel to complete the attack mission. (via BoingBoing)
- TruthTeller Prototype (Washington Post) — speech-to-text, then matches statements against known facts to identify truth/falsehoods. Still a prototype but I love that, in addition to the Real Time Coupon Specials From Hot Singles Near You mobile advertising lens, there might be a truth lens that technology helps us apply to the world around us.
- Money from Music: Survey Evidence on Musicians’ Revenue and Lessons About Copyright Incentives — 5,000 American musicians surveyed, For most musicians, copyright does not provide much of a direct financial reward for what they are producing currently. The survey findings are instead consistent with a winner-take-all or superstar model in which copyright motivates musicians through the promise of large rewards in the future in the rare event of wide popularity. This conclusion is not unfamiliar, but this article is the first to support it with empirical evidence on musicians’ revenue. (via TechDirt)
- Max Levchin’s DLD13 Keynote — I believe the next big wave of opportunities exists in centralized processing of data gathered from primarily analog systems. […] There is also a neat symmetry to this analog-to-digtail transformation — enabling centralization of unique analog capacities. As soon as the general public is ready for it, many things handled by a human at the edge of consumption will be controlled by the best currently available human at the center of the system, real time sensors bringing the necessary data to them in real time.
Comms 101, RoboTurking, Geek Tourism, and Implementing Papers
- How to Redesign Your App Without Pissing Everybody Off (Anil Dash) — the basic straightforward stuff that gets your users on-side. Anil’s making a career out of being an adult.
- Clockwork Raven (Twitter) — open source project to send data analysis tasks to Mechanical Turkers.
- Updates from the Tour in China (Bunnie Huang) — my dream geek tourism trip: going around Chinese factories and bazaars with MIT geeks.
- How to Implement an Algorithm from a Scientific Paper — I have implemented many complex algorithms from books and scientific publications, and this article sums up what I have learned while searching, reading, coding and debugging. (via Siah)
Building DroneNet, Manufacturing Help, Native Mobile Look, and Libre 3D Printing
- DroneNet: How to Build It (John Robb) — It’s possible to break the FAA’s “line of sight” rules regarding drones right now and get away with it to enable fast decentralized growth. This strategy works. e.g. PayPal flagrantly broke banking laws and regulations in order to out-compete a field of competitors that decided to follow the law. (via Daniel Bachhuber)
- How to Make a BOM (Bunnie Huang) — yet more very useful howto information for people looking into Chinese (or other) manufacturing.
- Junior — A front-end framework for building HTML5 mobile apps with a native look and feel.
- LulzBot — robust 3D printer, with full specs for making your own. (via BoingBoing)
Tweet Cred, C64 History, Performance Articles, Return of Manufacturing
- Credibility Ranking of Tweets During High Impact Events (PDF) — interesting research. Situational awareness information is information that leads to gain in the knowledge or update about details of the event, like the location, people affected, causes, etc. We found that on average, 30% content about an event, provides situational awareness information about the event, while 14% was spam. (via BoingBoing)
- The Commodore 64 — interesting that Chuck Peddle (who designed the 6502) and Bob Yannes (who designed the SID chip) are still alive. This article safely qualifies as Far More Than You Ever Thought You Wanted To Know About The C64 but it is fascinating. The BASIC housed in its ROM (“BASIC 2.0″) was painfully antiquated. It was actually the same BASIC that Tramiel had bought from Microsoft for the original PET back in 1977. Bill Gates, in a rare display of naivete, sold him the software outright for a flat fee of $10,000, figuring Commodore would have to come back soon for another, better version. He obviously didn’t know Jack Tramiel very well. Ironically, Commodore did have on hand a better BASIC 4.0 they had used in some of the later PET models, but Tramiel nixed using it in the Commodore 64 because it would require a more expensive 16 K rather than 8 K of ROM chips to house.
- The Performance Calendar — an article each day about speed. (via Steve Souders)
- Mr China Comes to America (The Atlantic) — long piece on the return of manufacturing to America, featuring Foo camper Liam Casey.
Distributing Content, Effective Project Dictatorship, Ubiquitous Hardware, Wheelcasts
- The Shape of the Internet Has Changed — 98 percent of internet traffic now consists of content that can be stored on servers. 45% of Internet traffic today is from CDNs, and a handful of them at that, which makes CDNs like Artur Bergman’s fastly super-important. (via Donald Clark)
- Be a Good Dictator (Rowan Simpson) — There is no shortage of advice online about how to be a good designer or a good software developer. But what about advice for those who aspire to be good product dictators? Guidance seems pretty thin on the ground. […] Being a deep expert in just one area is not enough for good dictators. You need to be a polymath living at an intersection.
- Hardware is Dead — 7-inch tablet, Wi-Fi only with all the attributes of a good tablet. Capacitive touchscreen. Snappy processor. Front facing camera. 4GB of internal memory and an expandable memory slot. for USD75. At these levels there is almost no profit margin left in the hardware business. A $45 tablet is cheap enough to be an impulse purchase at the check-out line in Best Buy. A $45 price puts tablets within reach of a whole host of other activities not traditionally associated with computers. (via Steve Bowbrick)
- Car Transmissions and Syncromesh (YouTube) — cheesy old Chevy educational movie that does a great job of explaining how manual transmissions work. Such videos were the screencasts for the auto DIY folks. (via Nat Friedman)
Chinese Hackers, Edible Sensors, Quantum Physics
- China Hackers Hit EU Point Man and DC (Bloomberg) — wow. The extent to which EU and US government and business computer systems have been penetrated is astonishing. Stolen information is flowing out of the networks of law firms, investment banks, oil companies, drug makers, and high technology manufacturers in such significant quantities that intelligence officials now say it could cause long-term harm to U.S. and European economies. (via Gady Epstein)
- Digestible Microchips (Nature) — The sand-particle sized sensor consists of a minute silicon chip containing trace amounts of magnesium and copper. When swallowed, it generates a slight voltage in response to digestive juices, which conveys a signal to the surface of a person’s skin where a patch then relays the information to a mobile phone belonging to a healthcare-provider. (via Sara Winge)
- Quantum Mechanics Make Simple(r) — clever way to avoid the brain pain of quantum mechanics and leap straight to the “oh!”. [N]ature is described not by probabilities (which are always nonnegative), but by numbers called amplitudes that can be positive, negative, or even complex. […] In the usual “hierarchy of sciences”—with biology at the top, then chemistry, then physics, then math—quantum mechanics sits at a level between math and physics that I don’t know a good name for. Basically, quantum mechanics is the operating system that other physical theories run on as application software (with the exception of general relativity, which hasn’t yet been successfully ported to this particular OS). (via Hacker News)
- Selectively De-Animating Video — SIGGRAPH talk showing how to keep some things still in a video. Check out the teaser video with samples: ZOMG. I note that Maneesh Agrawala was involved: I’m a fan of his from Line Drive maps and 3D exploded views, but his entire paper list is worth reading. Wow. (via Greg Borenstein)
Tricorder, Microsoft and Open Source, Crime is Freedom's Contra, and Government Cybercrime
- Tricorder Project — open sourced designs for a tricorder, released as part of the Qualcomm Tricorder X Prize. (via Slashdot)
- Microsoft’s New Open Sourced Stacks (Miguel de Icaza) — not just open sourced (some of the code had been under MS Permissive License before, now it’s Apache) but developed in public with git: ASP.NET MVC, ASP.NET Web API, ASP.NET Web Pages v2. The Azure SDK is also on github.
- In An Internet Age, Crime is Essential to Freedom (Donald Clark) — when a criminal asks: “How do I secure payment and store my ill-gotten gains”, somewhere else, a refugee asks: “How can I send funds back to a relative such that they can’t be traced to me”.
- NSA: China Behind RSA Attacks (Information Week) — I can argue both sides about whether government cloud services are a boon or a curse for remote information thieves. Looking forward to seeing how it plays out.