"hacking" entries

Four short links: 23 November 2010

Four short links: 23 November 2010

AppEngine Gripes, LIDAR Hacking, Web Stripping, and Map Storytelling

  1. Goodbye App Engine — clear explanation of the reasons why Google AppEngine isn’t the right thing to build your startup on. Don’t read the comments unless you want to lose faith in humanity. (via Michael Koziarski on Twitter)
  2. Neato Robotics XV-11 Tear-down — the start of hackable LIDAR, which would enable cheap and easy 3D mapping, via a Roomba-like robovacuum with a LIDAR module in it. (via Chris Anderson on Twitter)
  3. Boilerpipe — code to remove boilerplate wrappers from a webpage, returning just the text you care about. (via Andy Baio)
  4. Visual Eyes web-based authoring tool developed at the University of Virginia to weave images, maps, charts, video and data into highly interactive and compelling dynamic visualizations. (via Courtney Johnston’s Instapaper feed)
Comments Off
"Hackers" at 25

"Hackers" at 25

It's been 25 years since "Hackers" was published. Author Steven Levy reflects on the book and the movement.

In mid-1980s, Steven Levy wrote a book that introduced the term "hacker" to a wide audience. In the ensuing 25 years, that word and its accompanying community have gone through tremendous change. In this Q&A, Levy discusses the book's genesis, its influence and the role hackers continue to play.

Comments: 4
Four short links: 24 May 2010

Four short links: 24 May 2010

Google Docs APIs, Wikileaks Founder Profile, DNA Hacking, and Abusing the Numbers

  1. Appscale — open source implementation of Google App engine’s APIs built on top of Amazon’s APIs, from UCSB. You can deploy on Amazon or on any Amazon API-compliant cloud such as Eucalyptus.
  2. Information Pioneers — the Chartered Institute for IT has a pile of video clips about famous IT pioneers (Lovelace, Turing, Lamarr, Berners-Lee, etc.).
  3. This Week in Law — podcast from Denise Howell, covering IT law and policy. E.g., this week’s episode covers “Google Books, Elena Kagen, owning virtual land, double-dipping game developers, Facebook tips, forced follow bug and fragile egos, embedding tweets, Star Trek Universe liability, and more.”
  4. <a href="
Comment: 1
Four short links: 3 May 2010

Four short links: 3 May 2010

Science Data Hacking, Obstructive Interfaces, 3G to Wifi, and Australian Gov 2.0

  1. Science Hack Day — Saturday, June 19th and Sunday, June 20th, 2010, in the Guardian offices in London. A meeting place for the designer/coder class and scientists, with datasets as the common language. (via timoreilly on Twitter)
  2. Facebook’s Evil Interface (EFF) — Facebook’s new M.O. is to say “to better help you, we took away your privacy. If you are stupid and wish to attempt to retain your privacy, don’t not avoid to fail to click here. Now click here. Now click here … ha, moved it! Moved it again! Gotcha!”. Attempting to use Facebook to talk to friends without having your friendships and interests pimped to the data mining Johns is as hard as canceling an AOL subscription.
  3. Make Your Own 3G Router — an easter-egg inside the new Chumby model (which O’Reilly AlphaTech Ventures invested in).
  4. Australian Government’s Response to the Web 2.0 Taskforce — it’s all positive: all but one recommendation accepted. Another very positive step from the Aussies.
Comments Off
Four short links: 16 April 2010

Four short links: 16 April 2010

Deep Web Projects, Industrial Design, EEG Hacking, On Writing

  1. Buckets and Vessels (Aaron Straup Cope) — amazing collection of projects and the cultural shifts they illustrate. Michal Migurski’s Walking Papers, software designed to round-trip paper and digital edits to Open Street Map, has recently been used by professors at the University of California’s Berkeley’s School of Information to enable “a sort of psychogeographical dispute resolution between high school students in the town of Richmond marking up maps of their school and neighbourhood with tags like “stoners”, “asian gangsters” or “make-out spot” (http://groups.ischool.berkeley.edu/papermaps/kennedy.html). By allowing participants to manipulate the perception of their environment they are given a sort of bias knob to adjust the psychics and gravity of one space over another and to create a truly personal map of the world. (via auchmill on Twitter)
  2. Jonathan Ive on Industrial Design — fascinating to hear him talk about how he approaches his products; the interplay between materials, manufacturing methods, and function.
  3. Hacking Toy EEGs (MindHacks) — who doesn’t want to do this, just based on the title alone?
  4. Mamet’s Memo to the Writers — forceful, clear, and commanding. A tremendous insight, in a short period of time, into what good writing is. No idea why it’s in all caps. SOMEONE HAS TO MAKE THE SCENE DRAMATIC. IT IS NOT THE ACTORS JOB (THE ACTORS JOB IS TO BE TRUTHFUL). IT IS NOT THE DIRECTORS JOB. HIS OR HER JOB IS TO FILM IT STRAIGHTFORWARDLY AND REMIND THE ACTORS TO TALK FAST. IT IS YOUR JOB. (via Dan Meyer)
Comments Off
We are iPad. Resistance is (not) futile

We are iPad. Resistance is (not) futile

Apple may have closed the iPad, but you don't need permission to open it.

A lot of people are upset about how closed the iPhone, and now the iPad, are. Cory Doctorow wrote a lengthy piece about the evils of the iPad and its awful closed system. I agree that Apple has taken far too much away. I agree that it is infantalizing to require us to send in the iPad to get its battery replaced. But, my gosh, when did developers ever need permission to break things? When did Steve Jobs become not just rule maker, but some sort of deity that actually prevented me from ignoring said rule maker, and doing whatever I could with my device?

Comments: 39
Four short links: 17 February 2010 Four short links: 17 February 2010

Four short links: 17 February 2010

Homebrew Highspeed Video, Werewolf History, Digital Book Rights, Moddable Space Invaders

  1. Off-the-shelf camera hacked to grab high-speed video (New Scientist) — scientists used a chip from a home cinema projector to record 400fps on consumer video hardware. They put the chip, which has tiny moving mirrors, in front of the digital camera and it directs the incoming light sequentially over a grid of pixels in the digital camera, meaning that each of the digital camera’s frames contains 16 samples (frames) of the picture. You lose resolution but gain frames/second. (via viksnewsclippings)
  2. History of Werewolf — excellent history, which digs deeper than “it’s a Foo Camp phenomenon” and into the actual origins of the game.
  3. Digital Books and Your Rights: A Checklist for ReadersThe over-arching question: are digital books as good or better than physical books at protecting you and your rights as a reader? (via BoingBoing)
  4. Space Invaders Enterprise EditionThe magic of Space Invaders Enterprise Edition is actually under the hood. I’ve separated out the game logic from the Java source into a file parsed by a rules engine. This means we can easily view the game design, without it getting muddled with too much implementation code.
Comments Off

The iPad is the iPrius: Your Computer Consumerized

It's been a long time since most of us have used our computers to do anything approaching "computing," but the iPad explicitly leaves the baggage, leaps the conceptual gulf, and becomes something else entirely. Something consumery, media'ish, and not in the least bit intimidating. The automobile went through a similar evolution. From eminently hackable to hood essentially sealed shut.

Comments: 24
Four short links: 6 November 2009 Four short links: 6 November 2009

Four short links: 6 November 2009

Barcode Scanning, Downloadable Community Book, Gov Hack Day, Android Kludges

  1. Red Laser — “impossibly accurate barcode scanning”. Uses Google Product Search to identify products that you scan using the camera on the phone. I remember Rael and I talking to Jeff Bezos about this years ago, before camphones had the resolution to decode barcodes. The future is here and it’s $1.99 on the App Store … (via Ed Corkery on Twitter)
  2. The Art of Community For Free Download — Jono Bacon’s O’Reilly book on community management now available for free download (still available for purchase!).
  3. Gov Hack — Australian government ran a hack day with their open data, this is their writeup.
  4. Android Mythbusters — slides for talk by Matt Porter at Embedded Linux Conference Europe. A (long) catalogue of the kludges in Android.
Comment: 1
Four short links: 3 November 2009 Four short links: 3 November 2009

Four short links: 3 November 2009

Electoral Cryptography, Dataless Airport Security, Visualising Transport Data, Mathematically Insecure Social Asymmetry

  1. First Test for Election Cryptography (MIT Technology Review) — The first government election to use a new cryptographic scheme that lets both voters and auditors check that votes were cast and recorded accurately will be held tomorrow in Takoma Park, MD. Founder of the company behind the technology is David Chaum, who ran the first electronic currency company in the 90s. That was ahead of its time (Internet faced a credibility problem, not a convenience problem), but his timing for this seems spot-on. (via timoreilly on Twitter)
  2. Do I Have The Right To Refuse This Search? — a former police officer questions the efficacy of TSA screenings and is doubly worried by by the lack of data collected. For years in policing, we relied on random patrols to curb crime. We relied upon this “strategy” until someone went out and captured some data, and did a study that demonstrated conclusively that random patrols do not work (Kansas City Study). As police have employed other types of “random” interventions, as in DWI checkpoints, they have had to develop policies, procedures and training to ensure that the “random” nature of these intrusions is truly random. Whether every car gets checked, or every tenth car, police must demonstrate that they have attempted to eliminate the effects of active and passive discrimination when using “random” strategies. No such accountability currently exists at TSA. Trend I see lately is a return to quantitative decision making, reality-based data-directed system interventions. (via BoingBoing)
  3. Visualising Transport DataIt can be hard to make meaningful information from huge amounts of data, a graph and a table doesn’t always communicate all it should do. We have been working hard on technology to visualise big datasets into compelling stories that humans can understand. We were really pleased with what we came up with in just one and a half days. Like many places, the UK data.gov ran a dev camp to jumpstart people using their data. These appear to be successful, but I’m not aware of studies into the longterm effects nor the “value” of different types of developers.
  4. Why Your Friends Have More Friends Than You Do — there’s a numerical optical illusion at work here: count your friends, then ask them to count their friends. If you average the friend counts of your peers, it’ll probably be higher than your friend count. The reason for this is also why (on average!) your sexual partners seem to have had more sexual partners than you, and why previous generations seem more fecund than current generations. It’s because connectors (with large numbers of friends) distort the average, so unless you’re the connector (and if you’re reading this, you might well be!) the average will be bigger than a normal person’s friend count. Left unmentioned is what kind of person would count the number of friends they have, then ask their friends for their counts …. (via Hacker News)
Comments Off