ENTRIES TAGGED "fun"
Video Encoding, Content Identification, Mobile Numbers, and Unicode Fun
- Pirates Adopt H.264 — no more XViD encoded avi files, now it’s x264. I’m impressed by the rigid rules and structure of The Scene.
- YouTube’s ContentID Disputes Are Judged By The Accuser (Andy Baio) — the last couple years have seen a dramatic rise in Content ID abuse, using it for purposes that it was never intended. Scammers are using Content ID to steal ad revenue from YouTube video creators en masse, with some companies claiming content they don’t own, deliberately or not. The inability to understand context and parody regularly leads to “fair use” videos getting blocked, muted or monetized.
- The Month of 50% in Mobile (Luke Wroblewski) — 47.6% of mobile Internet users use native mobile apps and 47.5% use the Web browser on their devices. This is the first time (in ComScore data) native apps have had more use than the browser.
- Fake Unicode Consortium — excellent collection of better names for Unicode characters. My favourite: U+0CA0: MONOCLE OF DISAPPROVAL. (via Tom Christiansen)
Code Bloat, Chinese Startups, Font Fun, and Businesses Embracing Open Source
- Things Turbo Pascal is Smaller Than — next time you’re bragging about your efficient code, spare a thought for the Pascal IDE and compiler that lived in 39,731 bytes. This list of more bloated things is hilarious.
- The China Startup Report (Slideshare) — interesting to see the low salary comes with expectation of bonuses but little interest in equity (as there are few exits other than IPO, for reasons the presentation goes into).
- Shape Method — fun HTML5 challenge that will also expand your appreciation of fonts.
- Open Source All The Things! — SparkFun looking aggressively for things to “open source” from their business. I have a lot of time for companies that contribute to the commons above and beyond their legally-mandated minimum, particularly those who aren’t just dumping their unwanted junk there. Google does this well, Facebook is learning. Good on ya, SparkFun.
AutoUpdater, Extrapolation Apocalypse, C Compilers, and Authentication
- Invisible Autoupdater: An App’s Best Feature — Gina Trapani quotes Ben Goodger on Chrome: The idea was to give people a blank window with an autoupdater. If they installed that, over time the blank window would grow into a browser.
- Crackpot Apocalypse — analyzing various historical pronouncements of the value of pi, paper author concludes “When πt is 1, the circumference of a circle will coincide with its diameter,” Dudley writes, “and thus all circles will collapse, as will all spheres (since they have circular cross-sections), in particular the earth and the sun. It will be, in fact, the end of the world, and … it will occur in 4646 A.D., on August 9, at 4 minutes and 27 seconds before 9 p.m.” Clever commentary and a good example when you need to show people the folly of inappropriate curve-fitting and extrapolation.
- clang — C language family front-ends to LLVM. Development sponsored by Apple, as used in Snow Leopard. (via Nelson Minar)
- OmniAuth — authenticate against Twitter, GitHub, Facebook, Foursquare, and many many more. OmniAuth is built from the ground up on the philosophy that authentication is not the same as identity. (via Tony Stubblebine)
UAV Sniffing, Wicked Problems, Online Classes, and Whisky Science
- DIY UAVs for Cyber-Warface — aerial drone that poses as celltower, sniffs wifi, cracks passwords, and looks badass. The photo should be captioned “IM IN UR SKIES, SNIFFIN UR GMAIL SESSION COOKIEZ.” (via Bryan O’Sullivan)
- Wicked Problems (Karl Schroeder) — a category of problem which, once you read the definition, you recognize everywhere. 5. Every solution to a wicked problem is a “one-shot operation”; because there is no opportunity to learn by trial and error, every attempt counts significantly. I like Karl’s take: our biggest challenges are no longer technological. They are issues of communication, coordination, and cooperation. These are, for the most part, well-studied problems that are not wicked. The methodologies that solve them need to be scaled up from the small-group settings where they currently work well, and injected into the DNA of our society–or, at least, built into our default modes of using the internet. They then can be used to tackle the wicked problems.
- Stanford AI Class — Peter Norvig teaching an AI class at Stanford with online open participation. Joins Archaeology of Ancient Egypt in league of university classes where anyone can join in. The former will let you register with Stanford (presumably for $$$) to join the class. The latter lets you audit for free, as the class will be run in open and transparent fashion. The former will be supported by the for-sale textbook, the latter by freely-downloadable readings.
- Sensory and Chemical Analysis of “Shackleton’s” Mackinlay Scotch Whisky (PDF) — Three cases of Mackinlay’s Rare Highland Malt whisky were excavated from the ice under Sir Ernest Shackleton’s 1907 expedition base camp hut at Cape Royds in Antarctica in January 2010. The majority of the bottles were in a pristine state of preservation and three were returned to Scotland in January 2011 for the first sensory and organoleptic analysis of a Scotch malt whisky distilled in the late 1890s. I love science where figures have captions like: Principal component analysis (PCA) of peat derived congeners in peated whisky and new-make spirit. I hope the finders got to drink at least some of it, but sentences like this make it seem improbable: The three whisky bottles, minus the whisky sampled via the syringe for this work, will be returned to New Zealand and the Antarctic Heritage Trust will subsequently return the artefacts to Antarctica and place them back under the floor of Shackleton’s hut for posterity. (via Chris Heathcote)
God Games, Digitised History, git Database, and App Framework
- Let There Be Smite (Pippin Barr) — simple diversion for the 4th of July. It won’t be easy for God to save America. (via Pippin’s blog)
- Basel Wear — to answer the question I know was burning on your lips: “what *did* the Swiss wear in 1634?” Impressively detailed pictures from a 1634 book that is now online. One of the reasons I’m in favour of digitizing cultural collections is that we’re more likely to encounter them on the net and so ask questions like “how did people dress in 1634?”, “why did everyone carry keys?”, and “what is a Sexton?”
- databranches: Using git as a Database — it’s important to approach your design for using git as a database from the perspective of automated merging. Get the merging right and the rest will follow. I’ve chosen to use the simplest possible merge, the union merge: When merging parent trees A and B, the result will have all files that are in either A or B, and files present in both will have their lines merged (and possibly reordered or uniqed).
- Joshfire — open source (dual-licensed GPLv2 and commercial) multiplatform development framework built on HTML5.
- HackerTyper — finally, a way to type like they do in the movies. (via Mark Jason Dominus)
- Pay As You Go SIM Data Wiki — wiki attempting to list all the prices you can expect to pay around the world for data SIMs. Travellers, take note. (via Nelson Minar)
- Science Shackled by IPR (Guardian) — it is estimated that some 20% of individual human genes have been patented already or have been filed for patenting. As a result, research on certain genes is largely restricted to the companies that hold the patents, and tests involving them are marketed at prohibitive prices. We believe that this poses a very real danger to the development of science for the public good. (via Gabriella Coleman)
ASCII Diagrams, Bayesian Textbook, Telehacks Interview, and Table Resizing in CSS
- ASCII Flow — create ASCII diagrams. Awesome. (via Hacker News)
- Principles of Uncertainty — probability and statistics textbook, for maths students to build up to understanding Bayesian reasoning.
- Playable Archaeology: An Interview with the Telehacks Anonymous Creator (Andy Baio) — The inspiration was my son. I had shown him the old movies Hackers, Wargames, and Colossus: The Forbin Project and he really liked them. After seeing Hackers and Wargames, he really wanted to start hacking stuff on his own. I’d taught him some programming, but I didn’t want him doing any actual hacking, so I decided to make a simulation so he could telnet to hosts, hack them, and get the feel of it, but safely. (Andy was the interviewer, not the creator)
- Responsive Data Tables — CSS ways to reformat data tables if the screen width is inadequate for the default table layout. (via Keith Bolland)
Health Prediction, Fake Ads, Bogus Patents, and Realtime Graphing
- The Heritage Health Competition — Netflix-like contest to analyze insurance-claims data to develop a model that predicts the number of days a patient will spend in hospital in the coming year. $3M prize. (via Aza Raskin)
- Historically Hardcore — fantastic fake Smithsonian ads that manage to make the institution sexy. Naturally they’ve been asked to take them down.
- Another Plato Innovation Ignored — turns out the above-the-fold doodle has a long and glorious history, culminating in a fantastic demonstration of our broken patent system.
- Graphite — Enterprise scalable realtime graphing. Apache 2.0-licensed, written in Python. (via John Nunemaker)
Data Sets, Data-driven Policy, Task Queues, and 8-Bit Browser
- DSPL: DataSet Publishing Language (Google Code) — a representation language for the data and metadata of datasets. Datasets described in this format can be processed by Google and visualized in the Google Public Data Explorer. XML metadata on CSV, geo-enabled, with linkable data. (via Michal Migurski on Delicious)
- Why is Evidence So Hard for Politicians — Ben Goldacre nails how politicians go about “evidence-based policy making”: So the Minister has cherry picked only the good findings, from only one report, while ignoring the peer-reviewed literature. Most crucially, he cherry-picks findings he likes whilst explicitly claiming that he is fairly citing the totality of the evidence from a thorough analysis. I can produce good evidence that I have a magical two-headed coin, if I simply disregard all the throws where it comes out tails.
- Celery: Distributed Task Queue — asynchronous task queue/job queue based on distributed message passing. It is focused on real-time operation, but supports scheduling as well. MIT-style licensed, written in Python, RabbitMQ is the recommended message broker. (via Joshua Schachter on Delicious)
- pixelfari — Safari hacked to look like it’s running on an 8-bit computer. This sense of playfulness with the medium is something I love about the best coders. They think “ha, wouldn’t it be funny if …” and then can make it happen.