ENTRIES TAGGED "mobile"
R GUI, Drone Regulations, Bitcoin Stats, and Android/iOS Money Shootout
- Deducer — An R Graphical User Interface (GUI) for Everyone.
- Integration of Civil Unmanned Aircraft Systems (UAS) in the National Airspace System (NAS) Roadmap (PDF, FAA) — first pass at regulatory framework for drones. (via Anil Dash)
- Bitcoin Stats — $21MM traded, $15MM of electricity spent mining. Goodness. (via Steve Klabnik)
- iOS vs Android Numbers (Luke Wroblewski) — roundup comparing Android to iOS in recent commerce writeups. More Android handsets, but less revenue per download/impression/etc.
Recognising Hand Gestures, Drone Conference, Stubbornly Open Codes, and Remote Mobile Display
- An Interactive Machine Learning System for Recognizing Hand Gestures (Greg Borenstein) — a mixed-initiative interactive machine learning system for recognizing hand gestures. It attempts to give the user visibility into the classifier’s prediction confidence and control of the conditions under which the system actively requests labeled gestures when its predictions are uncertain. (an exercise for his MIT class)
- First Drone Conference Takes Off (Makezine) — forgive them the puns, Lord, for they know not what they do … uble intendre. Write-up fascinating beyond the headline. Dr. Vijay Kumar of the University of Pennsylvania School of Engineering spoke about socially positive uses for aerial robotics, such as emergency first responders. Dr. Kumar’s work focuses on micro aerial vehicles. He explains that, “size does matter.” As robots get smaller, mass and inertial is reduced. If you halve the mass, the acceleration doubles and the angular acceleration quadruples. This makes for a robot that is fast and responsive, ideal for operating indoors or out, and perfect for search and rescue missions in collapsed buildings or around other hazards.
- Standing Up to Mississippi (Carl Malamud) — yesterday we received a Certified Letter from the Attorney General’s Special Assistant Attorney General demanding that we remove these materials from the Internet and all other electronic or non-electronic media. There was no email address, so I proceeded to prepare a 67-page return reply with Exhibits A-L. I thought folks might be interested in the 7 steps of the production process. Give to his Kickstarter project, folks!
- Open Project (PDF) — A lightweight framework for remote sharing of mobile applications. Sounds like malware but is Google Research project.
Google Play Services, Self-Signed Kernels, Visualising Scientific Papers, and New Microcontroller
- How Google’s Defragging Android (Ars Technica) — Android’s becoming a pudgy microkernel for the Google Play Services layer that’s in userland, closed source, and a way to bypass carriers’ lag for upgrades.
- Booting a Self-Signed Linux Kernel (Greg Kroah-Hartman) — procedures for how to boot a self-signed Linux kernel on a platform so that you do not have to rely on any external signing authority.
- Paperscape — A map of scientific papers from the arXiv.
- Trinket — Adafruit’s latest microcontroller board. Small but perfectly formed.
Mobile Image Cache, Google on Net Neutrality, Future of Programming, and PSD Files in Ruby
- How to Easily Resize and Cache Images for the Mobile Web (Pete Warden) — I set up a server running the excellent ImageProxy open-source project, and then I placed a Cloudfront CDN in front of it to cache the results. (a how-to covering the tricksy bits)
- Google’s Position on Net Neutrality Changes? (Wired) — At issue is Google Fiber’s Terms of Service, which contains a broad prohibition against customers attaching “servers” to its ultrafast 1 Gbps network in Kansas City. Google wants to ban the use of servers because it plans to offer a business class offering in the future. [...] In its response [to a complaint], Google defended its sweeping ban by citing the very ISPs it opposed through the years-long fight for rules that require broadband providers to treat all packets equally.
- The Future of Programming (Bret Victor) — gorgeous slides, fascinating talk, and this advice from Alan Kay: I think the trick with knowledge is to “acquire it, and forget all except the perfume” — because it is noisy and sometimes drowns out one’s own “brain voices”. The perfume part is important because it will help find the knowledge again to help get to the destinations the inner urges pick.
- psd.rb — Ruby code for reading PSD files (MIT licensed).
Security Sensor, Mobile Speed, Rate Limiting, and Self-Assembling Drone
- Canary (IndieGogo) — security sensor with video, motion, temperature, microphone, speaker, accelerometer, and smartphone remote control.
- Page Speed is Only The Beginning — 73% of mobile internet users say they’ve encountered Web pages that are too slow. A 1 second delay can result in a 7% reduction in conversions.
- Rate Limiting and Velocity Checking (Jeff Atwood) — I was shocked how little comprehensive information was out there on rate limiting and velocity checking for software developers, because they are your first and most important line of defense against a broad spectrum of possible attacks. It’s amazing how many attacks you can mitigate or even defeat by instituting basic rate limiting. (via Alex Dong)
- Self-Assembling Multicopter (DIY Drones) — The true accomplishment of this research is that there is not one robot in control – each unit in itself decides what actions to take to keep the group in the air in what’s known as Distributed Flight Array. (via Slashdot)
- Product Strategy Means Saying No — a resource for strength in saying ‘no’ to unplanned features and direction changes. My favourite illustration is for “but my cousin’s neighbour said”. Yes, this.
- git-imerge — incremental merge for git.
- The Paranoid #! Security Guide — Networked-Evil-Maid-Attacks (Attacker steals the actual SED and replaces it with another containing a tojanized OS. On bootup victim enters it’s password which is subsequently send to the attacker via network/local attacker hot-spot. Different method: Replacing a laptop with a similar model [at e.g. airport/hotel etc.] and the attacker’s phone# printed on the bottom of the machine. Victim boots up enters “wrong” password which is send to the attacker via network. Victim discovers that his laptop has been misplaced, calls attacker who now copies the content and gives the “misplaced” laptop back to the owner.)
Mobile Numbers, SSL Best Practices, Free and Open No More, and PRISM Budget
- Mobile Email Numbers (Luke Wroblewski) — 79% use their smartphone for reading email, a higher percentage than those who used it for making calls and in Feb ’12, mobile email overtook webmail client use.
- ProperSSL — a series of best practices for establishing SSL connections between clients and servers.
- How We Are Losing the War for the Free and Open Internet (Sue Gardner) — The internet is evolving into a private-sector space that is primarily accountable to corporate shareholders rather than citizens. It’s constantly trying to sell you stuff. It does whatever it wants with your personal information. And as it begins to be regulated or to regulate itself, it often happens in a clumsy and harmful way, hurting the internet’s ability to function for the benefit of the public.
- The Amazingly Low Cost of PRISM — breaks down costs to store and analyse the data gathered from major Internet companies. Total hardware cost per year for 3.75 EB of data storage: €168M
Ant-Sized Computers, Digital Manufacturing, Dictatorship of Data, and Mobile Shielding
- Ant-Sized Computers (MIT TR) — The KL02 chip, made by Freescale, is shorter on each side than most ants are long and crams in memory, RAM, a processor, and more.
- Some Thoughts on Digital Manufacturing (Nick Pinkston) — Whenever I see someone make a “new” 3D printer that’s just a derivative of the RepRap or MakerBot – I could care less. Only new processes, great interfaces or super-low price points get my attention anymore. FormLabs being a great example of all three – which is why they were a massive hit. If you’re looking for problems: make a cheap laser cutter, CNC mill, or pick-n-place machine. See the Othermill.
- The Dictatorship of Data (MIT TR) — Robert McNamara epitomizes the hyper-rational executive led astray by numbers. (via Wolfgang Blau)
- A Field Test of Mobile Phone Shielding Devices (PDF) — masters thesis comparing various high-tech fabric-type shielding devices. Alas, tin-foil helmets weren’t investigated. (via Udhay Shankar)
Videogame Hyperinflation, Thumbdrive Computing, Distributed Consensus, and Organism Simulation
- Hyperinflation in Diablo 3 — interesting discussion about how video games regulate currency availability, and how Diablo 3 appears to have messed up. several weeks after the game’s debut a source claimed that there were at least 1,000 bots active 24/7 in the Diablo 3 game world, allegedly “harvesting” (producing) 4 million virtual gold per hour. Most of the gold generated by the ruthlessly productive, rapidly adapting bots found its way to third party vendors in a black market which undercut the prices in the sanctioned, in-game auction houses.
- Dell Project Ophelia (PC World) — $100 USB-stick-sized Android computer.
- Call Me Maybe (Kyle Kingsbury) — a series on network partitions. We’re going to learn about distributed consensus, discuss the CAP theorem’s implications, and demonstrate how different databases behave under partition.
- OpenWorm (The Atlantic) — simulating the c. elegans nematode worm in software. OpenWorm isn’t like these other initiatives; it’s a scrappy, open-source project that began with a tweet and that’s coordinated on Google Hangouts by scientists spread from San Diego to Russia. If it succeeds, it will have created a first in executable biology: a simulated animal using the principles of life to exist on a computer.