ENTRIES TAGGED "debugging"
Machine Learning Demos, iOS Debugging, Industrial Internet, and Deanonymity
- MLDemos — an open-source visualization tool for machine learning algorithms created to help studying and understanding how several algorithms function and how their parameters affect and modify the results in problems of classification, regression, clustering, dimensionality reduction, dynamical systems and reward maximization. (via Mark Alen)
- kiln (GitHub) — open source extensible on-device debugging framework for iOS apps.
- Industrial Internet — the O’Reilly report on the industrial Internet of things is out. Prasad suggests an illustration: for every car with a rain sensor today, there are more than 10 that don’t have one. Instead of an optical sensor that turns on windshield wipers when it sees water, imagine the human in the car as a sensor — probably somewhat more discerning than the optical sensor in knowing what wiper setting is appropriate. A car could broadcast its wiper setting, along with its location, to the cloud. “Now you’ve got what you might call a rain API — two machines talking, mediated by a human being,” says Prasad. It could alert other cars to the presence of rain, perhaps switching on headlights automatically or changing the assumptions that nearby cars make about road traction.
- Unique in the Crowd: The Privacy Bounds of Human Mobility (PDF, Nature) — We study fifteen months of human mobility data for one and a half million individuals and find that human mobility traces are highly unique. In fact, in a dataset where the location of an individual is specified hourly, and with a spatial resolution equal to that given by the carrier’s antennas, four spatio-temporal points are enough to uniquely identify 95% of the individuals. We coarsen the data spatially and temporally to find a formula for the uniqueness of human mobility traces given their resolution and the available outside information. This formula shows that the uniqueness of mobility traces decays approximately as the 1/10 power of their resolution. Hence, even coarse datasets provide little anonymity. These findings represent fundamental constraints to an individual’s privacy and have important implications for the design of frameworks and institutions dedicated to protect the privacy of individuals. As Edd observed, “You are a unique snowflake, after all.” (via Alasdair Allan)
On Anonymous, Graph Database, Leap Second, and Debugging Creativity
- In Flawed, Epic Anonymous Book, the Abyss Gazes Back (Wired) — Quinn Norton’s review of a book about Anonymous is an excellent introduction to Anonymous. Anonymous made us, its mediafags, masters of hedging language. The bombastic claims and hyperbolic declarations must be reported from their mouths, not from our publications. And yet still we make mistakes and publish lies and assumptions that slip through. There is some of this in all of journalism, but in a world where nothing is true and everything is permitted, it’s a constant existential slog. It’s why there’s not many of us on this beat.
- Titan (GitHub) — Apache2-licensed distributed graph database optimized for storing and processing large-scale graphs within a multi-machine cluster. Cassandra and HBase backends, implements the Blueprints graph API. (via Hacker News)
- Extra Second This June — we’re getting a leap second this year: there’ll be 2012 June 30, 23h 59m 60s. Calendars are fun.
- On Creativity (Beta Knowledge) — I wanted to create a game where even the developers couldn’t see what was coming. Of course I wasn’t thinking about debugging at this point. The people who did the debugging asked me what was a bug. I could not answer that. — Keita Takahashi, game designer (Katamari Damacy, Noby Noby Boy). Awesome quote.
Digital Natives, Supersexy C64 Debugger, a Google Tripwire, and a Patient Botnet
- Digital Natives (Ze Frank) — digital natives have grown up in a landscape where access to information and influence has been flattened. they have watched media distribution bottlenecks in the form of networks and studios lose influence to youtube and independent production houses. They have watched companies bow down to viral video critiques, and watched political systems get hacked by social networks. this is a generation that doesn’t understand restrictions on access to media if those restrictions are inefficient or obviously detrimental to the system as a whole. this is a generation that has been at war with DRM and copyright right from the start. it is a generation awash with free tutorials and download-able source code. When is a conversation with a precocious 17 year old a glimpse into an inter-generational gulf with implications for the role and status of formal education, and when is it just an encounter with a brat? Ze’s piece is worth reading, whichever way it comes out.
- ICU64 — an open source Commodore 64 emulator (Frodo) hacked to visually and textually display memory. Watch the video embedded below, it’s hypnotic and seductive. It immediately made me want one for my programs (without having to port my code back to 6502 assembler). (via waxy whose return from pneumonia is greatly welcomed)
- Me and Belle du Jour — interesting story from a UK blog master who guessed her identity but kept it secret, creating a googlewhacked page as a tripwire to let him know when someone else guessed. He tipped her off that her cover was blown. (via waxy again)
- The Hail Mary Cloud — the world’s slowest yet effective brute force attack. If you publish your user name and password, somebody who is not you will use it, sooner or later. A botnet is brute-force trying every known username and password combination against every known ssh server. Each attempt in theory has monumental odds against succeeding, but occasionally the guess will be right and they have scored a login. As far as we know, this is at least the third round of password guessing from the Hail Mary Cloud (see the archives for earlier postings about slow bruteforcers), but there could have been earlier rounds that escaped our attention.