"hardware" entries

Four short links: 19 December 2014

Four short links: 19 December 2014

Statistical Causality, Clustering Bitcoin, Hardware Security, and A Language for Scripts

  1. Distinguishing Cause and Effect using Observational Data — research paper evaluating effectiveness of the “additive noise” test, a nifty statistical trick to identify causal relationships from observational data. (via Slashdot)
  2. Clustering Bitcoin Accounts Using Heuristics (O’Reilly Radar) — In theory, a user can go by many different pseudonyms. If that user is careful and keeps the activity of those different pseudonyms separate, completely distinct from one another, then they can really maintain a level of, maybe not anonymity, but again, cryptographically it’s called pseudo-anonymity. […] It turns out in reality, though, the way most users and services are using bitcoin, was really not following any of the guidelines that you would need to follow in order to achieve this notion of pseudo-anonymity. So, basically, what we were able to do is develop certain heuristics for clustering together different public keys, or different pseudonyms.
  3. A Primer on Hardware Security: Models, Methods, and Metrics (PDF) — Camouflaging: This is a layout-level technique to hamper image-processing-based extraction of gate-level netlist. In one embodiment of camouflaging, the layouts of standard cells are designed to look alike, resulting in incorrect extraction of the netlist. The layout of nand cell and the layout of nor cell look different and hence their functionality can be extracted. However, the layout of a camouflaged nand cell and the layout of camouflaged nor cell can be made to look identical and hence an attacker cannot unambiguously extract their functionality.
  4. Prompter: A Domain-Specific Language for Versu (PDF) — literally a scripting language (you write theatrical-style scripts, characters, dialogues, and events) for an inference engine that lets you talk to characters and have a different story play out each time.
Comment
Four short links: 17 December 2014

Four short links: 17 December 2014

Security Stick, Spyware Toy, Bezos Time, and Popular JavaScript

  1. USB Armory — another Linux-on-a-stick, but this one has some nifty dimensions and security applications in mind.
  2. Who’s the Boss?The Elf on the Shelf essentially teaches the child to accept an external form of non-familial surveillance in the home when the elf becomes the source of power and judgment, based on a set of rules attributable to Santa Claus. Excellent deconstruction of ludic malware. (via Washington Post)
  3. Bezos on Time (Business Insider) — Where you are going to spend your time and your energy is one of the most important decisions you get to make in life. We all have a limited amount of time, and where you spend it and how you spend it is just an incredibly levered way to think about the world. This (he says at 9 p.m. in the office, in a different city from his family!).
  4. libscore — popularity of JavaScript scripts and libraries in the top million sites. But remember, just because all the cool kids do it doesn’t make right for you. (via Medium)
Comment
Four short links: 5 December 2014

Four short links: 5 December 2014

Gaming Cancer, Touch Interface, Petal Lampshade, and Biology HLL

  1. Nanodocan online game that allows bioengineers and the general public to design new nanoparticle strategies toward the treatment of cancer. (via The Economist)
  2. Rendering Haptic Volumetric Shapes in Mid-Air Using Ultrasound (PDF) — SIGGRAPH paper on using ultrasound to fool your senses into feeling a 3D shape in the air. (via Slashdot)
  3. Open Up Lamp — genius lampshade that opens with the heat of the lightbulb, like petals opening. (via Matt Webb)
  4. Anthaa high-level language for biology, making it easy to rapidly compose reproducible work flows using individually testable and reusable Antha Elements. (via Mike Loukides)
Comment
Four short links: 2 December 2014

Four short links: 2 December 2014

e-Paper Watch, Probabilistic Go, Z-Machine in Hardware, and Glorious Underlines

  1. FES Watch — e-paper watch, including strap. Beautiful, crowdfunded, made by a Sony subsidiary that’s looking at e-ink for wearables and more. (via The Verge)
  2. Probabilistic Data Structures for Go — introduction to the go-probably library for when you can’t store every single value, so will trade off memory usage against accuracy.
  3. Z3 — implementation of the Infocom Z-Machine in hardware. Check out the easter eggs. I look upon my works and despair.
  4. Towards a More Perfect Link Underline — glorious typography on the web. A phrase you don’t often hear together without “would be a nice thing” at the end of the sentence.
Comment
Four short links: 27 November 2014

Four short links: 27 November 2014

Scalable Infrastructure, Lens Tech, Javascript Frameworks, and Morality Valley

  1. Stumbleupon’s Big Data Architecture Using Open Source Software (PDF) — not just the list of tools but the functions they implement. Useful!
  2. Innovega — making a contact lens with a tiny bump that acts as a microscope for content shown in glasses. That description, and this link via MIT Technology Review)
  3. How to Pick a Front-End Framework — not unreasonable opinions, largely useful.
  4. [Silicon Valley] Bedevilled by Moral Issues (NYT, registerwall) — given that Silicon Valley tends to copy and paste the mantra, “we’re making the world a better place,” it seem reasonable to expect that tech companies would hold themselves to a higher ethical standard.
Comment
Four short links: 25 November 2014

Four short links: 25 November 2014

NSA Playset, Open Access, XSS Framework, and Security Test Cases

  1. Michael Ossman and the NSA Playset — the guy who read the leaked descriptions of the NSA’s toolchest, built them, and open sourced the designs. One device, dubbed TWILIGHTVEGETABLE, is a knock off of an NSA-built GSM cell phone that’s designed to sniff and monitor Internet traffic. The ANT catalog lists it for $15,000; the NSA Playset researchers built one using a USB flash drive, a cheap SDR, and an antenna, for about $50. The most expensive device, a drone that spies on WiFi traffic called PORCUPINEMASQUERADE, costs about $600 to assemble. At Defcon, a complete NSA Playset toolkit was auctioned by the EFF for $2,250.
  2. Gates Foundation Announces World’s Strongest Policy on Open Access Research (Nature) — Once made open, papers must be published under a license that legally allows unrestricted re-use — including for commercial purposes. This might include ‘mining’ the text with computer software to draw conclusions and mix it with other work, distributing translations of the text, or selling republished versions. CC-BY! We believe that published research resulting from our funding should be promptly and broadly disseminated.
  3. Xenotixan advanced Cross Site Scripting (XSS) vulnerability detection and exploitation framework. It provides Zero False Positive scan results with its unique Triple Browser Engine (Trident, WebKit, and Gecko) embedded scanner. It is claimed to have the world’s 2nd largest XSS Payloads of about 4700+ distinctive XSS Payloads for effective XSS vulnerability detection and WAF Bypass. Xenotix Scripting Engine allows you to create custom test cases and addons over the Xenotix API. It is incorporated with a feature-rich Information Gathering module for target Reconnaissance. The Exploit Framework includes offensive XSS exploitation modules for Penetration Testing and Proof of Concept creation.
  4. Firing Range — Google’s open source set of web security test cases for scanners.
Comment
Four short links: 20 November 2014

Four short links: 20 November 2014

Postmortems, Cloud Triggers, IoT Desires, and Barbie Can Code

  1. The Infinite Hows (John Allspaw) — when finding ways to improve systems to prevent errors, the process of diagnosis should be focused on the systems and less on the people. (aka “human error” is the result of a preceding systems error.) (aka “design for failure.”)
  2. Amazon Lambda — triggers in the cloud.
  3. Enchanted Objects (PNG) — organizing the Internet of Thing by human desires. (via Designing the Enchanted Future)
  4. Barbie Remixed (PDF) — brilliant remix of a book that missed the mark into one that hits the bullseye.
Comment
Four short links: 18 November 2014

Four short links: 18 November 2014

A Worm Mind Forever LEGO Voyaging, Automatic Caption Generator, ELK Stack, and Amazonian Deployment

  1. A Worm’s Mind in a Lego Body — the c. elegans worm’s 302 neurons has been sequenced, modelled in open source code, and now hooked up to a Lego robot. It is claimed that the robot behaved in ways that are similar to observed C. elegans. Stimulation of the nose stopped forward motion. Touching the anterior and posterior touch sensors made the robot move forward and back accordingly. Stimulating the food sensor made the robot move forward. There is video.
  2. Show and Tell: A Neural Image Caption Generator — Google Research paper on generating captions like “Two pizzas sitting on top of a stove top oven” from a photo. Wow.
  3. Big Data with the ELK Stack — ElasticSearch, logstash, and Kibana. Interesting and powerful combination of tools!
  4. Apollo: Amazon’s Deployment EngineApollo will stripe the rolling update to simultaneously deploy to an equivalent number of hosts in each location. This keeps the fleet balanced and maximizes redundancy in the case of any unexpected events. When the fleet scales up to handle higher load, Apollo automatically installs the latest version of the software on the newly added hosts. Lust.
Comment
Four short links: 10 November 2014

Four short links: 10 November 2014

Metascience, Bio Fab, Real-time Emoji, and Phone Library

  1. Metascience Could Rescue the Replication Crisis (Nature) — Metascience, the science of science, uses rigorous methods to examine how scientific practices influence the validity of scientific conclusions. (via Ed Yong)
  2. OpenTrons (Kickstarter) — 3d-printer style frame for micropipetting, magnetic micro-bead washes, and photography. Open source and kickstarterated. (via Evil Mad Scientist)
  3. Emoji Tracker — real-time emoji use across Twitter. (via Chris Aniszczyk)
  4. libphonenumber — open source Google’s common Java, C++ and Javascript library for parsing, formatting, storing and validating international phone numbers. The Java version is optimized for running on smartphones, and is used by the Android framework since 4.0 (Ice Cream Sandwich).
Comment
Four short links: 5 November 2014

Four short links: 5 November 2014

Robotic Microscallops, Fluid Touch, Brackets 1.0, and Robot Bodies

  1. Swimming Robotic Microscallops (Nature) — blood, and indeed most of the internal fluids, is non-Newtonian, which works nicely with the simple reciprocating motion that basic robot actuators generate. Best headline and readable coverage in IEEE, and the best headline: Robotic Microscallops Can Swim Through Your Eyeballs.
  2. Eliminating Taps with Fluid Touch Gestures (Luke Wroblewski) — every tap powers Hitler’s war machine! Swipe and hold for Victory today!
  3. Adobe Brackets Reaches 1.0 — Brackets is Adobe’s open source code editor for the web, written in JavaScript, HTML, and CSS.
  4. Poppy — open source 3D-printed robot, built to encourage experimentation with robot morphologies (“bodies”). (via Robohub)
Comment