- Talking to Big Machines (Jon Bruner) — “Selfless machines” coordinate across networks and modify their own operation to improve the output of the entire system.
- Docker Security — Containers do not contain and Stop assuming that Docker and the Linux kernel protect you from malware.
- Your Voice Assistant is Mine (PDF) — Through Android Intent mechanism, VoicEmployer triggers Google Voice Search to the foreground, and then plays prepared audio ﬁles (like “call number 1234 5678”) in the background. Google Voice Search can recognize this voice command and execute corresponding operations. With ingenious designs, our GVS-Attack can forge SMS/Email, access privacy information, transmit sensitive data and achieve remote control without any permission.
- escher (GitHub) — choiceless programming and non-Turing coding. Mind: blown.
ENTRIES TAGGED "Internet of Things"
Internet of Things, local energy sources, and online collaboration underlie the Zero Marginal Cost Society.
Selfless Machines, Docker Security, Voice Hacks, and Choiceless Programming
What “design beyond the screen” means for the industrial Internet.
Design beyond the screen is a much broader and more transformative concept than just that, though: it encompasses changes in the relationships between humans and machines and between machines and other machines. Good design beyond the screen makes interaction more fluid and elevates both people and machines to do their best work. The impact of good design beyond the screen could be huge, and could extend well beyond consumer electronics into heavy industry and infrastructure. Read more…
Distributed Systems Design 101, Patent Trolls, Intel's Half a Billion from IoT, and Google's Project Zero.
- Inside bit.ly’s Distributed Systems — this is a 101 for modern web distributed systems design.
- Patent Trolls are Now 67% of New Patent Lawsuits in USA (WaPo) — data from PwC.
- Intel Made Half a Billion from Internet of Things Last Year (Quartz) — half a billion here, half a billion there, pretty soon it adds up to real money.
- Google’s Project Zero (Wired) — G pays a team to attack common software and report the bugs to the manufacturer. Interesting hypothesis about how the numbers inbalance between Every Russian 14 Year Old and this small team doesn’t matter: modern hacker exploits often chain together a series of hackable flaws to defeat a computer’s defenses. Kill one of those bugs and the entire exploit fails. That means Project Zero may be able to nix entire collections of exploits by finding and patching flaws in a small part of an operating system, like the “sandbox” that’s meant to limit an application’s access to the rest of the computer. ”On certain attack surfaces, we’re optimistic we can fix the bugs faster than they’re being introduced,” Hawkes says. “If you funnel your research into these limited areas, you increase the chances of bug collisions.”
Data Brokers, Car Data, Pattern Classification, and Hogwild Deep Learning
- Inside Data Brokers — very readable explanation of the data brokers and how their information is used to track advertising effectiveness.
- Elon, I Want My Data! — Telsa don’t give you access to the data that your cars collects. Bodes poorly for the Internet of Sealed Boxes. (via BoingBoing)
- Pattern Classification (Github) — collection of tutorials and examples for solving and understanding machine learning and pattern classification tasks.
- HOGWILD! (PDF) — the algorithm that Microsoft credit with the success of their Adam deep learning system.
A Suitable Network Topology for Building Automation
This article is part of a series exploring the role of networking in the Internet of Things.
Today we are going to consider the attributes of wireless mesh networking, particularly in the context of our building monitoring and energy application.
A host of new mesh networking technologies came upon the scene in the mid-2000s through start-up ventures such as Millennial Net, Ember, Dust Networks, and others. The mesh network topology is ideally suited to provide broad area coverage for low-power, low-data rate applications found in application areas like industrial automation, home and commercial building automation, medical monitoring, and agriculture.
Curated Code, Hackable Browser, IoT Should Be Open, and Better Treemaps
- Awesome Awesomeness — list of curated collections of frameworks and libraries in various languages that do not suck. They solve the problem of “so, I’m new to (language) and don’t want to kiss a lot of frogs before I find the right tool for a particular task”.
- Breach — a hackable, modular web browser.
- The CompuServe of Things (Phil Windley) — How we build the Internet of Things has far-reaching consequences for the humans who will use—or be used by—it. Will we push forward, connecting things using forests of silos that are reminiscent the online services of the 1980′s, or will we learn the lessons of the Internet and build a true Internet of Things? (via Cory Doctorow)
Go Libraries, Salary Transparency, Printed Houses, and IoT Alliance
- DropBox Opensources Go Libraries — including memcache and a general abstraction for caching layers.
- Transparency with Salaries (NPR) — Atkison has meetings like this all the time. He says it gives him a chance to explain why some employees make more than others — and to explain to employees how they can make more. For a lot of employees, knowing what everyone makes is less exciting than it seems. By moving from negotiation to clear expectations of salary levels, bumps, etc., I can also see it helping the company understand what it values.
- Printing Buildings from Recycled Materials (ComputerWorld) — The printers, supplied by WinSun Decoration Design Engineering, are 20 feet tall, 33 feet wide and 132 feet long. Like their desktop counterparts, the construction-grade WinSun 3D printers use a fused deposition modeling (FDM) technology to deposit materials one layer at a time in a process that’s similar to squeezing frosting from a pastry bag. 10 single-room buildings in a day. (via Slashdot)
- Microsoft Joins Internet-of-Things Alliance (Computerworld) — more vendors joining AllSeen Alliance to agree on the open comms standards for IoT apps and devices. Google/Nest notable by their absence.
Mobile Hacks, Advertising Returns, Solid Writeup, and Predicted Future
- Researchers Find and Decode the Spy Tools Governments Use to Hijack Phones (Wired) — I’m fascinated to learn there’s an Italian company making (and selling) the mobile phone rootkits that governments use.
- On the Near Impossibility of Measuring the Returns on Advertising (PDF) — Statistical evidence from the randomized trials is very weak because the individual-level sales are incredibly volatile relative to the per capita cost of a campaign—a “small” impact on a noisy dependent variable can generate positive returns. (via Slate)
- Reflections on Solid Conference — recap of the conference, great for those of us who couldn’t make it. “Software is eating the world…. Hardware gives it teeth.” – Renee DiResta
- Cybernation: The Silent Conquest (1962) — [When] computers acquire the necessary capabilities…speeded-up data processing and interpretation will be necessary if professional services are to be rendered with any adequacy. Once the computers are in operation, the need for additional professional people may be only moderate [...] There will be a small, almost separate, society of people in rapport with the advanced computers. These cyberneticians will have established a relationship with their machines that cannot be shared with the average man any more than the average man today can understand the problems of molecular biology, nuclear physics, or neuropsychiatry. Indeed, many scholars will not have the capacity to share their knowledge or feeling about this new man-machine relationship. Those with the talent for the work probably will have to develop it from childhood and will be trained as intensively as the classical ballerina. (via Simon Wardley)
The convergence of six factors is creating a climate for mainstream IoT adoption.
The term “Internet of Things” isn’t new. Some say it was coined in 1999 by Kevin Ashton to describe a world where “things,” which can be devices or sensors, are both smart and connected — meaning they have the ability to collect and share data. The data coming from those devices and/or sensors then becomes a kind of currency, which can be combined and analyzed with other types of data to uncover insights that were, until recently, out of reach.
Although technology experts have quoted Moore’s Law, anticipating for decades the evolution of devices with embedded microchips, the proliferation of connected industry devices, and the rise of machine-to-machine communications, today we are seeing that the Internet of Things is at an inflection point. Read more…