- Why The Unicorn Financing Market Just Became Dangerous to Everyone — read with Fortune’s take on the Tech IPO Market. “They profess to take a long-term view, but the data shows post-IPO stocks are very volatile in the case of tech IPOs, and that is not a problem the underwriters try to address.” Damning breakdown of the current state. As Bryce said, Single-horned, majestic, Weapons of Mass Extraction.
- Brainprints (Kurzweil) — 50 subjects, 500 images, EEG headset, 100% accuracy identifying person from their brain’s response to the images. We’ll need much larger studies, but this is promising.
- Generating News Headlines with Recurrent Neural Networks — We find that the model is quite effective at concisely paraphrasing news articles.
- Anthropic Capitalism And The New Gimmick Economy — market capitalism struggles with “public goods” (those which are inexhaustible and non-excludable, like infinitely copyable bits that any number of people can have copies of at once), yet much of the world is being recast as an activity where software manipulates information, thus becoming a public good. Capitalism and Communism, which briefly resembled victor and vanquished, increasingly look more like Thelma and Louise; a tragic couple sent over the edge by forces beyond their control. What comes next is anyone’s guess and the world hangs in the balance.
Microsoft, Google and pushing business models too far.
I realized yesterday, though, that:
- Microsoft ruined their brand for me by holding too tightly to things that they considered theirs. (Software.)
- Google is ruining their brand for me by holding too tightly to things that I consider mine. (Identity, everything they can possibly learn about me.)
It’s a weird difference, but the Google version makes me much sadder about the world. As I’d tell a mugger, “You can have my wallet, just don’t take me.”
- Salesforce Architecture — Our search tier runs on commodity Linux hosts, each of which is augmented with a 640 GiB PCI-E flash drive which serves as a caching layer for search requests. These hosts get their data from a shared SAN array via an NFS file system. Search indexes are stored on the flash drive to enable greater performance for search throughput. Architecture porn.
- Gerrit Code Review (Github) — tool for doing code reviews on Github codebases. (via Chris Aniszczyk)
- Users vs Apps (Tim Bray) — the wrong thing being shared with the wrong people, even once, can ruin a trust relationship forever. Personally, I’m pretty hard-line about this one. I’m currently refusing to update the Android app from my bank, CIBC, because it wants access to my contacts. You know what the right amount of “social” content is in my relationship with my bank? Zero, that’s what.
Autocomplete, Tor Security, News Glitches, Moz Persona
- Tor Users Get Routed (PDF) — research into the security of Tor, with some of its creators as authors. Our results show that Tor users are far more susceptible to compromise than indicated by prior work.
- Glitch News — screencaps from glitches in video news.
- FC4: Persona (Tim Bray) — Mozilla Persona, reminds us just because you’re using a protocol that allows tracking avoidance, that doesn’t mean you’ll get it.
Aural Viz, SPOF ID, Information Asymmetry, and Support IA
- choir.io explained (Alex Dong) — Sound is the perfect medium for wearable computers to talk back to us. Sound has a dozen of properties that we can tune to convey different level of emotions and intrusivenesses. Different sound packs would fit into various contexts.
- Identity Single Point of Failure (Tim Bray) — continuing his excellent series on federated identity. There’s this guy here at Google, Eric Sachs, who’s been doing Identity stuff in the white-hot center of the Internet universe for a lot of years. One of his mantras is “If you’re typing a password into something, unless they have 100+ full-time engineers working on security and abuse and fraud, you should be nervous.” I think he’s right.
- What Does It Really Matter If Companies Are Tracking Us Online? (The Atlantic) — Rather, the failures will come in the form of consumers being systematically charged more than they would have been had less information about that particular consumer. Sometimes, that will mean exploiting people who are not of a particular class, say upcharging men for flowers if a computer recognizes that that he’s looking for flowers the day after his anniversary. A summary of Ryan Calo’s paper. (via Slashdot)
- Life Inside Brewster’s Magnificent Contraption (Jason Scott) — I’ve been really busy. Checking my upload statistics, here’s what I’ve added to the Internet Archive: Over 169,000 individual objects, totaling 245 terabytes. You should subscribe and keep them in business. I did.
Retro Hackery, Etsy Ops, Distributed Identity, and lolcoders
- How Things Work: Summer Games Edition — admire the real craftsmanship in those early games. This has a great description of using raster interrupts to extend the number of sprites, and how and why double-buffering was expensive in terms of memory.
- IAMA: Etsy Ops Team (Reddit) — the Etsy ops team does an IAMA on Reddit. Everything from uptime to this sage advice about fluid data: A nice 18 year old Glenfiddich scales extremely well, especially if used in an active active configuration with a glass in each hand. The part of Scotland where Glenfiddich is located also benefits from near-permanent exposure to the Cloud (several clouds in fact). (via Nelson Minar)
- Who Learns What When You Log Into Facebook (Tim Bray) — nice breakdown of who learns what and how, part of Tim’s work raising the qualify of conversation about online federated identity.
- lolcommits — takes a photo of the programmer on each git commit. (via Nelson Minar)
The Contract, Fixing Signin, Pi Gaming, and Glitchy Marketing Constructs
- The Unengageables (Dan Meyer) — They signed their “didactic contract” years and years ago. They signed it. Their math teachers signed it. The agreement says that the teacher comes into class, tells them what they’re going to learn, and shows them three examples of it. In return, the students take what their teacher showed them and reproduce it twenty times before leaving class. Then they go home with an assignment to reproduce it twenty more times. Then here you come, Ms. I-Just-Got-Back-From-A-Workshop, and you want to change the agreement? Yeah, you’ll hear from their attorney. Applies to management as much as to teaching.
- Fixing Signin — The general principle can be stated simply, in two parts: first, give users a trust-worthy way to identify themselves. Second, do so with as little information as possible, because users don’t want to (and simply can’t) remember things like passwords in a secure way. (via Tim Bray)
- Retro Gaming with Raspberry Pi (Adafruit) — finally, a clear incentive for kids to work through the frustration of setting up their own Linux box.
- Mieko Haire — Apple’s fictious demo lady. Or is she fictitious? This is a new aesthetic-esque glitch, but while most glitches are glitches because you see something that doesn’t exist, this is glitchy because the fictions are actual people. Ok, maybe I need to lay off the peyote.
Mozilla Single Sign-On, Designed Technology, Identifying Crackpots, and Web Page Design
- Mozilla Persona — single sign-on for the web.
- Interview with Alan Kay (Dr Dobbs Journal) — The Internet was done so well that most people think of it as a natural resource like the Pacific Ocean, rather than something that was man-made. When was the last time a technology with a scale like that was so error-free? The Web, in comparison, is a joke. The Web was done by amateurs. (via Daniel Bachhuber)
- Crackpots, Geniuses, and How to Tell The Difference (BoingBoing) — think critically, all the time. If you’re told you can’t trust any other sources of information (especially because of Big Conspiracy, or because so-and-so expert is a bad person in other areas of his or her life), be cautious. Replication is a powerful tool. It helps us get past accidental and intentional biases to see something closer to the truth. Suppressing replication is also powerful, because it leaves you with no way to check against bias.
- Properties of Intuitive Web Pages (Luke Wroblewski) — Intuitive design is how we give our users super powers. This enables them to do new things.
How businesses can confront the ethical issues tied to massive aggregation and data analysis.
"Ethics of Big Data" authors Kord Davis and Doug Patterson explore ownership, anonymization, privacy, and ways to evaluate and establish ethical data practices within an organization.