Why Should I Trust You?: Explaining the Predictions of Any Classifier (PDF) — LIME, a novel explanation technique that explains the predictions of any classifier in an interpretable and faithful manner, by learning an interpretable model locally around the prediction. Torkington’s Second Law: there’s no problem with machine learning that more machine learning can’t fix.
Magic Leap in Wired — massive story by Kevin Kelly on the glories of Magic Leap, which The Verge noted still left a lot of open questions, such as “what the hell IS Magic Leap’s technology” and “why does everyone who works for Magic Leap sound like they’re on acid when they talk about the technology?” Everyone who wants their pixel-free glorious VR to be true is crossing fingers hoping it’s not another Theranos. The bit that stuck from the Wired piece was People remember VR experiences not as a memory of something they saw but as something that happened to them.
Curing Our Slack Addiction — an interesting counterpoint to the “in the future everyone will be on 15,000 Slacks” Slack-maximalist view. For AgileBits, it distracted, facilitated, and rewarded distracting behaviour, ultimately becoming a drain rather than an accelerant.
We Robot Conference Roundup — videos of talks on How to Engage the Public on the Ethics and Governance of Lethal Autonomous Weapons and other subjects. (You had my attention at “lethal autonomous weapons.”)
The Reality of AR/VR Business Models (TechCrunch) — list of potential revenue streams and superficial analysis of what they might look like in practice: hardware, e-commerce, advertising, mobile data/voice, in-app purchases, subscriptions, enterprise/b2b, and premium apps.
Curriculum For the Future (iTunes) — in game form, you get to figure out how to sell your preferred curriculum (“maker!”) to the parents and politicians who care about different things. Similar game mechanic to Win the White House from Sandra Day O’Connor’s iCivics.
Neutral Nets on Encrypted Data (Paper a Day) — By using a technique known as homohorphic encryption, it’s possible to perform operations on encrypted data, producing an encrypted result, and then decrypt the result to give back the desired answer. By combining homohorphic encryption with a specially designed neural network that can operate within the constraints of the operations supported, the authors of CryptoNet are able to build an end-to-end system whereby a client can encrypt their data, send it to a cloud service that makes a prediction based on that data – all the while having no idea what the data means, or what the output prediction means – and return an encrypted prediction to the client, which can then decrypt it to recover the prediction. As well as making this possible, another significant challenge the authors had to overcome was making it practical, as homohorphic encryption can be expensive.
VR for IoT Prototype (YouTube) — a VR prototype created for displaying sensor data and video streaming in real time from IoT sensors/camera devices designed for rail or the transportation industry.
Security Without Identification (PDF) — a David Chaum paper from 1985. Digital pseudonyms, handheld signing devices, Current systems emphasize the one-sided security of organizations attempting to protect themselves from individuals; the new approach allows all parties to protect their own interests. The new approach relies on individuals keeping secret keys from organizations and organizations devising other secret keys that are kept from individuals. During transactions, parties use these keys to provide each other with specially coded confirmation of the transaction details, which can be used as evidence.
Killing Slow Chrome Tabs (Medium) — There is one not-so-well known tool in Chrome, that allows you to analyse how much resources the individual tabs consume. It is called Task Manager and you can find it in Menu > More Tools > Task Manager.