"immersive" entries

Four short links: 20 April 2016

Four short links: 20 April 2016

Explaining Classifier Predictions, Formatting Currency, Questioning Magic Leap, and Curing Slack Addiction

  1. Why Should I Trust You?: Explaining the Predictions of Any Classifier (PDF) — LIME, a novel explanation technique that explains the predictions of any classifier in an interpretable and faithful manner, by learning an interpretable model locally around the prediction. Torkington’s Second Law: there’s no problem with machine learning that more machine learning can’t fix.
  2. How Etsy Formats Currency — I’m saving this one because it chafes every time I do it, and I do it wrong every time.
  3. Magic Leap in Wired — massive story by Kevin Kelly on the glories of Magic Leap, which The Verge noted still left a lot of open questions, such as “what the hell IS Magic Leap’s technology” and “why does everyone who works for Magic Leap sound like they’re on acid when they talk about the technology?” Everyone who wants their pixel-free glorious VR to be true is crossing fingers hoping it’s not another Theranos. The bit that stuck from the Wired piece was People remember VR experiences not as a memory of something they saw but as something that happened to them.
  4. Curing Our Slack Addiction — an interesting counterpoint to the “in the future everyone will be on 15,000 Slacks” Slack-maximalist view. For AgileBits, it distracted, facilitated, and rewarded distracting behaviour, ultimately becoming a drain rather than an accelerant.

(more…)

Four short links: 12 April 2016

Four short links: 12 April 2016

Driverless Car Governance, Robots Conference, AR/VR Business Models, and Google SRE Book

  1. Robust and Transparent Governance is Key to Building Trust in Driverless Cars (Robohub) — I was just talking through this with my cousin. Who makes decisions and how accountable are they for them?
  2. We Robot Conference Roundup — videos of talks on How to Engage the Public on the Ethics and Governance of Lethal Autonomous Weapons and other subjects. (You had my attention at “lethal autonomous weapons.”)
  3. The Reality of AR/VR Business Models (TechCrunch) — list of potential revenue streams and superficial analysis of what they might look like in practice: hardware, e-commerce, advertising, mobile data/voice, in-app purchases, subscriptions, enterprise/b2b, and premium apps.
  4. Notes on Google’s SRE Book — said book published by O’Reilly, I’m chuffed to say. SRE = Site Reliability Engineer = the DevOps magicians who make uptime at scale possible.
Four short links: 28 March 2016

Four short links: 28 March 2016

Holoportation, Filter Your Bot, Curriculum for the Future, and Randomized Control Trials for Policy

  1. Holoportation (YouTube) — video of teleconferencing with the Hololens. I hope my avatar wears more pants than I do.
  2. Wordfilter — package to filter out slurs and the kinds of things you don’t want your bot saying on Twitter. (via How Not to Make a Racist Bot)
  3. Curriculum For the Future (iTunes) — in game form, you get to figure out how to sell your preferred curriculum (“maker!”) to the parents and politicians who care about different things. Similar game mechanic to Win the White House from Sandra Day O’Connor’s iCivics.
  4. Test, Learn, Adapt: Developing Public Policy with Randomized Controlled Trials (PDF) — 2012 paper from the UK Cabinet Office talking about running real randomized control trials of policy. (I’d like to be part of one that looks at better health care!)
Four short links: 8 March 2016

Four short links: 8 March 2016

Neural Nets on Encrypted Data, IoT VR Prototype, Group Chat Considered Harmful, and Haptic Hardware

  1. Neutral Nets on Encrypted Data (Paper a Day) — By using a technique known as homohorphic encryption, it’s possible to perform operations on encrypted data, producing an encrypted result, and then decrypt the result to give back the desired answer. By combining homohorphic encryption with a specially designed neural network that can operate within the constraints of the operations supported, the authors of CryptoNet are able to build an end-to-end system whereby a client can encrypt their data, send it to a cloud service that makes a prediction based on that data – all the while having no idea what the data means, or what the output prediction means – and return an encrypted prediction to the client, which can then decrypt it to recover the prediction. As well as making this possible, another significant challenge the authors had to overcome was making it practical, as homohorphic encryption can be expensive.
  2. VR for IoT Prototype (YouTube) — a VR prototype created for displaying sensor data and video streaming in real time from IoT sensors/camera devices designed for rail or the transportation industry.
  3. Is Group Chat Making You Sweat? (Jason Fried) — all excellent points. Our attention and focus are the scarce and precious resources of the 21st century.
  4. How Devices Provide Haptic Feedback — good intro to what’s happening in your hardware.
Four short links: 22 February 2016

Four short links: 22 February 2016

Immersive Flood, Human Jobs, Anonymous Security, and Chrome Speed

  1. Facebook Creates Social VR Team (FT) — Facebook said that users had uploaded 20,000 videos in VR-friendly 360-degree format. At same time as HTC Vive VR Headset price is announced, LG 360 VR is announced, the new Samsung handsets come with a Gear VR headset, and Samsung’s Gear 360 camera is announced. There’s a heap of immersive hardware coming.
  2. AAAI-16 Panel on Future of Work (Tech Republic) — “It’s hard to argue that there will be new jobs for humans,” said Vardi. “It’s a vacuous promise.”
  3. Security Without Identification (PDF) — a David Chaum paper from 1985. Digital pseudonyms, handheld signing devices, Current systems emphasize the one-sided security of organizations attempting to protect themselves from individuals; the new approach allows all parties to protect their own interests. The new approach relies on individuals keeping secret keys from organizations and organizations devising other secret keys that are kept from individuals. During transactions, parties use these keys to provide each other with specially coded confirmation of the transaction details, which can be used as evidence.
  4. Killing Slow Chrome Tabs (Medium) — There is one not-so-well known tool in Chrome, that allows you to analyse how much resources the individual tabs consume. It is called Task Manager and you can find it in Menu > More Tools > Task Manager.