"numbers" entries

Four short links: 12 January 2016

Four short links: 12 January 2016

Civilian Drone Market, Things Learned, Playful Things, and Bottom-up CS

  1. Overview of the Civilian Drone Market (DIY Drones) — Six categories: toy quadcopters; FPV/racing; consumer camera drones; prosumer camera drones; consumers, industrial, agricultural, NGO and Research drones; winged and VTOL drones.
  2. 52 Things I Learned in 2015 — very high strike rate of “interesting!”
  3. How to Turn Complicated Things into Playful Things (Tom Whitwell) — Children are the apex players, at the top of the hierarchy. Only when they’re absent will adults play. […] You know when play is working, because the room gets noisy.
  4. Bottom Up Computer ScienceA free, online book designed to teach computer science from the bottom end up. Topics covered include binary and binary logic, operating systems internals, toolchain fundamentals, and system library fundamentals.
Comment
Four short links: 25 December 2015

Four short links: 25 December 2015

Bad Data, Breakout Startups, Drone Economics, and Graph Signs

  1. Bad Data Guide (Quartz) — An exhaustive reference to problems seen in real-world data along with suggestions on how to resolve them.
  2. Breakout List — companies where all the action is happening. Read alongside Startup L Jackson’s “How to Get Rich in Tech, Guaranteed.”
  3. The Economics of Drone DeliveryThe analysis is still mostly speculative. Keeney imagines that 6,000 operators who earn $50,000 per year will operate 30,000 to 40,000 drones. Each drone will make 30 deliveries per day. Her analysis ignores depreciation and questions like: ‘How will drones avoid airplanes and deliver packages in Manhattan?’ And there’s another core issue: $12.92 is the price UPS charges to consumers, but its actual marginal cost of delivering one more package along a route they are delivering to already is probably closer to $2. When push comes to shove, will drones be able to compete? (via Chris Anderson)
  4. 7 Ways Your Data is Telling You It’s a GraphNetwork, tree, taxonomy, ancestry, structure – if people are using those words to talk about an organizational chart or reporting structure, they’re telling you that data and the relationships between that data are important.
Comment
Four short links: 9 December 2015

Four short links: 9 December 2015

Graph Book, Data APIs, Mobile Commerce Numbers, and Phone Labs

  1. Networks, Crowds, and Markets — network theory (graph analysis), small worlds, network effects, power laws, markets, voting, property rights, and more. A book that came out of a Cornell course by ACM-lauded Jon Kleinberg.
  2. Qua framework for building data APIs. From a government department, no less. (via Nelson Minar)
  3. Three Most Common M-Commerce Questions Answered (Facebook) — When we examined basket sizes on an m-site versus an app, we found people spend 43 cents in app to every $1 spent on m-site. (via Alex Dong)
  4. Phonelabs — science labs with mobile phones. All open sourced for maximum spread.
Comments: 2
Four short links: 1 December 2015

Four short links: 1 December 2015

Radical Candour, Historical Social Network, Compliance Opportunities, and Mobile Numbers

  1. Radical Candour: The Surprising Secret to Being a Good Boss — this, every word, this. “Caring personally makes it much easier to do the next thing you have to do as a good boss, which is being willing to piss people off.”
  2. Six Degrees of Francis Baconrecreates the British early modern social network to trace the personal relationships among figures like Bacon, Shakespeare, Isaac Newton, and many others. (via CMU)
  3. Last Bus Startup Standing (TechCrunch) — Vahabzadeh stressed that a key point of Chariot’s survival has been that the company has been above-board with the law from day one. “They haven’t cowboy-ed it,” said San Francisco supervisor Scott Wiener, a mass transit advocate who recently pushed for a master subway plan for the city. “They’ve been good about taking feedback and making sure they’re complying with the law. I’m a fan and think that private transportation options and rideshares have a significant role to play in making us a transit-first city.”
  4. Mobile App Developers are Sufferingthe top 20 app publishers, representing less than 0.005% of all apps, earn 60% of all app store revenue. The article posits causes of the particularly extreme power law.
Comment
Four short links: 3 November 2015

Four short links: 3 November 2015

Quantum Architectures, Gig Economy Size, Networking Truths, and Twitter's Decay

  1. Australians Invent Architecture for Full-Scale Quantum Computer (IEEE) — still research paper, so I’ll believe it when it can glitch Hangouts just like a real computer.
  2. How Big is the Gig Economy? (Medium) — this is one example in which the Labor Department and Bureau of Labor Statistics really have shirked their responsibility to try and assess the size and growth of this dynamic shift to our economy.
  3. The Twelve Networking Truths — RFC1925 is channeling the epigram-leaking protagonist of Robert Heinlein’s Time Enough for Love. It is easier to move a problem around (for example, by moving the problem to a different part of the overall network architecture) than it is to solve it. This is true for most areas of life: generally easier to make it someone else’s problem than to solve it.
  4. The Decay of Twitter (The Atlantic) — In other words, on Twitter, people say things that they think of as ephemeral and chatty. Their utterances are then treated as unequivocal political statements by people outside the conversation. Because there’s a kind of sensationalistic value in interpreting someone’s chattiness in partisan terms, tweets “are taken up as magnum opi to be leapt upon and eviscerated, not only by ideological opponents or threatened employers but by in-network peers.”
Comment
Four short links: 9 October 2015

Four short links: 9 October 2015

Page Loads, Data Engines, Small Groups, and Political Misperception

  1. Ludicrously Fast Page Loads: A Guide for Full-Stack Devs (Nate Berkopec) — steps slowly through the steps of page loading using Chrome Developer Tools’ timeline. Very easy to follow.
  2. Specialised and Hybrid Data Management and Processing Engines (Ben Lorica) — wrap-up of data engines uncovered at Strata + Hadoop World NYC 2015.
  3. Power of Small Groups (Matt Webb) — Matt’s joined a small Slack community of like-minded friends. There’s a space where articles written or edited by members automatically show up. I like that. I caught myself thinking: it’d be nice to have Last.FM here, too, and Dopplr. Nothing that requires much effort. Let’s also pull in Instagram. Automatic stuff so I can see what people are doing, and people can see what I’m doing. Just for this group. Back to those original intentions. Ambient awareness, togetherness. cf Clay Shirky’s situated software. Everything useful from 2004 will be rebuilt once the fetish for scale passes.
  4. Asymmetric Misperceptions (PDF) — research into the systematic mismatch between how politicians think their constituents feel on issues, and how the constituents actually feel. Our findings underscore doubts that policymakers perceive opinion accurately: politicians maintain systematic misperceptions about constituents’ views, typically erring by over 10 percentage points, and entire groups of politicians maintain even more severe collective misperceptions. A second, post-election survey finds the electoral process fails to ameliorate these misperceptions.
Comment
Four short links: 30 September 2015

Four short links: 30 September 2015

Homebrew Bioweapons, Drone Strikes, Git Security, and Integrity Boost

  1. Homebrew Bioweapons Not Imminent Threat — you need a safe facility, lab instruments, base strain, design and execution skills, and testing. None of these are easy until the Amazon-Google cloud wars finally cause them to move into “bioweapons as a service.”
  2. Apple Removes App That Tracks Drone Strikes“there are certain concepts that we decide not to move forward with, and this is one,” says Apple. (via BoingBoing)
  3. gitroba command line tool that can help organizations and security professionals find such sensitive information. The tool will iterate over all public organization and member repositories and match filenames against a range of patterns for files, that typically contain sensitive or dangerous information.
  4. How Much is a Leader’s Integrity Worth?Kiel found that high-integrity CEOs had a multi-year return of 9.4%, while low-integrity CEOs had a yield of just 1.9%. What’s more, employee engagement was 26% higher in organizations led by high-integrity CEOs. (via Neelan Choksi)
Comment
Four short links: 25 September 2015

Four short links: 25 September 2015

Predicting Policing, Assaulting Advertising, Compliance Ratings, and $9 Computer

  1. Police Program Aims to Pinpoint Those Most Likely to Commit Crimes (NYT) — John S. Hollywood, a senior operations researcher at the RAND Corporation, said that in the limited number of studies undertaken to measure the efficacy of predictive policing, the improvement in forecasting crimes had been only 5% or 10% better than regular policing methods.
  2. Apple’s Assault on Advertising and Google (Calacanis) — Google wants to be proud of their legacy, and tricking people into clicking ads and selling our profiles to advertisers is an awesome business – but a horrible legacy for Larry and Sergey. Read beside the Bloomberg piece on click fraud and the future isn’t too rosy for advertising. If the ad bubble bursts, how much of the Web will it take with it?
  3. China Is Building The Mother Of All Reputation Systems To Monitor Citizen BehaviorThe document talks about the “construction of credibility” — the ability to give and take away credits — across more than 30 areas of life, from energy saving to advertising.
  4. $9 Computer Hardware (Makezine) — open hardware project, with open source software. The board’s spec is a 1GHz R8 ARM processor with 512MB of RAM, 4GB of NAND storage, and Wi-Fi and Bluetooth built in.
Comment
Four short links: 17 September 2015

Four short links: 17 September 2015

Google's Code, China's Pledge, MD5's Cracks, and Toyota's Robotics Hire

  1. Google’s 2 Billion Lines of Code (Wired) — 85TB, 45,000 changes/day in Google’s DVCS “Piper.” They’re looking at Mercurial.
  2. China Extracting Pledge of Compliance from US Firms (NY Times) — The letter also asks the American companies to ensure their products are “secure and controllable,” a catchphrase that industry groups said could be used to force companies to build so-called back doors — which allow third-party access to systems — provide encryption keys or even hand over source code.
  3. MD5 To Be Considered Harmful Some Day (Adrian Colyer) — walkthrough of Dan Kaminsky’s paper on the growing number of cracks in MD5.
  4. Toyota’s Robot Car Plans (IEEE Spectrum) — Toyota hired the former head of DARPA’s Robotics Challenge. Pratt explained that a U.S. $50 million R&D collaboration with MIT and Stanford is just the beginning of a large and ambitious program whose goal is developing intelligent vehicles that can make roads safer and robot helpers that can improve people’s lives at home.
Comment
Four short links: 8 September 2015

Four short links: 8 September 2015

Serverless Microservers, Data Privacy, NAS Security, and Mobile Advertising

  1. Microservices Without the Servers (Amazon) — By “serverless,” we mean no explicit infrastructure required, as in: no servers, no deployments onto servers, no installed software of any kind. We’ll use only managed cloud services and a laptop. The diagram below illustrates the high-level components and their connections: a Lambda function as the compute (“backend”) and a mobile app that connects directly to it, plus Amazon API Gateway to provide an HTTP endpoint for a static Amazon S3-hosted website.
  2. Privacy vs Data Science — claims Apple is having trouble recruiting top-class machine learning talent because of the strict privacy-driven limits on data retention (Siri data: 6 months, Maps: 15 minutes). As a consequence, Apple’s smartphones attempt to crunch a great deal of user data locally rather than in the cloud.
  3. NAS Backdoors — firmware in some Seagate NAS drives is very vulnerable. It’s unclear whether these are Seagate-added, or came with third-party bundled software. Coming soon to lightbulbs, doors, thermostats, and all your favorite inanimate objects. (via BetaNews)
  4. Most Consumers Wouldn’t Pay Publishers What It Would Take to Replace Mobile Ad Income — they didn’t talk to this consumer.
Comment