ENTRIES TAGGED "open source"
Client-Server, Total Information Awareness, MSFT Joins OCP, and Tissue Modelling
- Intel On-Device Voice Recognition (Quartz) — interesting because the tension between client-side and server-side functionality is still alive and well. Features migrate from core to edge and back again as cycles, data, algorithms, and responsiveness expectations change.
- Meet Microsoft’s Personal Assistant (Bloomberg) — total information awareness assistant. By Seeing, Hearing, and Knowing All, in the future even elevators will be trying to read our minds. (via The Next Web)
- Microsoft Contributes Cloud Server Designs to Open Compute Project — As part of this effort, Microsoft Open Technologies Inc. is open sourcing the software code we created for the management of hardware operations, such as server diagnostics, power supply and fan control. We would like to help build an open source software community within OCP as well. (via Data Center Knowledge)
- Open Tissue Wiki — open source (ZLib license) generic algorithms and data structures for rapid development of interactive modeling and simulation.
Real Time Exploratory Analytics, Algorithmic Agendas, Disassembly Engine, and Future of Employment
- Druid — open source clustered data store (not key-value store) for real-time exploratory analytics on large datasets.
- It’s Time to Engineer Some Filter Failure (Jon Udell) — Our filters have become so successful that we fail to notice: We don’t control them, They have agendas, and They distort our connections to people and ideas. That idea that algorithms have agendas is worth emphasising. Reality doesn’t have an agenda, but the deployer of a similarity metric has decided what features to look for, what metric they’re optimising, and what to do with the similarity data. These are all choices with an agenda.
- Capstone — open source multi-architecture disassembly engine.
- The Future of Employment (PDF) — We note that this prediction implies a truncation in the current trend towards labour market polarization, with growing employment in high and low-wage occupations, accompanied by a hollowing-out of middle-income jobs. Rather than reducing the demand for middle-income occupations, which has been the pattern over the past decades, our model predicts that computerisation will mainly substitute for low-skill and low-wage jobs in the near future. By contrast, high-skill and high-wage occupations are the least susceptible to computer capital. (via The Atlantic)
Floating Point, Secure Distributed FS, Cloud Robotics, and Domestic Sensors
- What Every Computer Scientist Should Know About Floating Point Arithmetic — in short, “it will hurt you.”
- Ori — a distributed file system built for offline operation and empowers the user with control over synchronization operations and conflict resolution. We provide history through light weight snapshots and allow users to verify the history has not been tampered with. Through the use of replication instances can be resilient and recover damaged data from other nodes.
- RoboEarth — a Cloud Robotics infrastructure, which includes everything needed to close the loop from robot to the cloud and back to the robot. RoboEarth’s World-Wide-Web style database stores knowledge generated by humans – and robots – in a machine-readable format. Data stored in the RoboEarth knowledge base include software components, maps for navigation (e.g., object locations, world models), task knowledge (e.g., action recipes, manipulation strategies), and object recognition models (e.g., images, object models).
- Mother — domestic sensors and an app with an appallingly presumptuous name. (Also, wasn’t “Mother” the name of the ship computer in Alien?) (via BoingBoing)
MSR Open Access, Light Table Open Source, Virality Unleashed, and Holacracy's Founder
- Microsoft Research Adopts Open Access Policy for Publications — +1
- Light Table is Open Source — this matters because these experiments in semantic interactivity inform technical UIs of the future, and the more ubiquitous this code is then the more effect it can have and the sooner we can have the future.
- The Six Things That Make Stories Go Viral Will Amaze and Astound You (New Yorker) — Berger and Milkman found that two features predictably determined an article’s success: how positive its message was and how much it excited its reader. The obvious part is that we develop immunity to things that catch our attention: our brains are well-developed systems for filtering, and the only constant is that advertisers will need novelty.
- The Story of Holacracy’s Founder (Quartz) — background on the interesting flat organisation culture system that’s gaining traction in startups.
Mating Math, Precogs Are Coming, Tor Bad Guys, and Mind Maps
- How a Math Genius Hacked OkCupid to Find True Love (Wired) — if he doesn’t end up working for OK Cupid, productising this as a new service, something is wrong with the world.
- Humin: The App That Uses Context to Enable Better Human Connections (WaPo) — Humin is part of a growing trend of apps and services attempting to use context and anticipation to better serve users. The precogs are coming. I knew it.
- Spoiled Onions — analysis identifying bad actors in the Tor network, Since September 2013, we discovered several malicious or misconfigured exit relays[...]. These exit relays engaged in various attacks such as SSH and HTTPS MitM, HTML injection, and SSL stripping. We also found exit relays which were unintentionally interfering with network traffic because they were subject to DNS censorship.
- My Mind (Github) — a web application for creating and managing Mind maps. It is free to use and you can fork its source code. It is distributed under the terms of the MIT license.
iOS Pentesting, Twitter's Infrastructure, JS Data Sync, and Chromium as C Runtime
- idb (Github) — a tool to simplify some common tasks for iOS pentesting and research: screenshots, logs, plists/databases/caches, app binary decryption/download, etc. (via ShmooCon)
- Twitter Infrastructure — an interview with Raffi Krikorian, VP of Platform Engineering. Details on SOA, deployment schedule, rollouts, and culture. (via Nelson Minar)
- Chromium is the New C Runtime — using Chrome’s open source core as the standard stack of networking, crash report, testing, logging, strings, encryption, concurrency, etc. libraries for C programming.
S3 Consistency, Paper Drone, Face Substitution, and Wearable Options
- s3mper (Github) — Netflix’s library to add consistency checking to S3. (via Netflix tech blog)
- Powerup Smartphone-Controlled Paper Airplane — boggle. You know the future is here when you realise you’re on the Internet of Trivial Things.
- Nine Wearables (Quartz) — a roundup of Glass-inspired wearables, including projecting onto contact lenses which wins today’s “most squicky idea” award.
Tiny Emulator, iBeacon iPwn, Filter Principles, and Steadicam
- 4043-byte 8086 Emulator — manages to implement most of the hardware in a 1980’s era IBM-PC using a few hundred fewer bits than the total number of transistors used to implement the original 8086 CPU. Entry in the obfuscated C contest.
- Hacking the CES Scavenger Hunt — At which point—now you have your own iBeacon hardware—you can just go ahead and set the UUID, Major and Minor numbers of your beacon to each of the CES scavenger hunt beacon identities in turn, and then bring your beacon into range of your cell phone running which should be running the CES mobile app. Once you’ve shown the app all of the beacons, you’ll have “finished” the scavenger hunt and can claim your prize. Of course doing that isn’t legal. It’s called fraud and will probably land you in serious trouble. iBeacons have great possibilities, but with great possibilities come easy hacks when they’re misused.
- Filtering: Seven Principles — JP Rangaswami laying down some basic principles on which filters should be built. 1. Filters should be built such that they are selectable by subscriber, not publisher. I think the basic is: 0: Customers should be able to run their own filters across the information you’re showing them.
- Tremor-Correcting Steadicam — brilliant use of technology. Sensors + microcontrollers + actuators = a genuinely better life. Beats figuring out better algorithms to pimp eyeballs to Brands You Love. (via BoingBoing)
3D Model-to-Printer, GCode Visualizer, AC Power Control, and Public Domain Sadness
- slic3r — converts a digital 3D model into printing instructions for your 3D printer. It cuts the model into horizontal slices (layers), generates toolpaths to fill them and calculates the amount of material to be extruded.
- gCodeViewer — GCode is the “numerical control language” for telling extruders, mills, polishers, etc. where to move to and when. This open source package is a visual GCode visualizer, viewer and analyzer in your own browser! It works on any OS in almost any modern browser (chrome, ff, safari 6, opera, ie10 should work too). All you need to do – is drag your *.gcode file to the designated zone.
- AC Power Control with Arduino — in the video video and the code, we take an in depth look at the hardware for using Arduino interrupts to control AC power through a triac. Using a zero-crossing detector Arduino will detect the pulse then calculate a delay to control the power output to a load.
- What Didn’t Enter the Public Domain Today — a reminder of what the public domain lost because of the Sonny Bono/Disney copyright term extension, timely given there are bad times ahead.
Pattern Recognition, MicroSD Vulnerability, Security Talks, and IoT List
- tooldiag — a collection of methods for statistical pattern recognition. Implemented in C.
- Hacking MicroSD Cards (Bunnie Huang) — In my explorations of the electronics markets in China, I’ve seen shop keepers burning firmware on cards that “expand” the capacity of the card — in other words, they load a firmware that reports the capacity of a card is much larger than the actual available storage. The fact that this is possible at the point of sale means that most likely, the update mechanism is not secured. MicroSD cards come with embedded microcontrollers whose firmware can be exploited.
- 30c3 — recordings from the 30th Chaos Communication Congress.
- IOT Companies, Products, Devices, and Software by Sector (Mike Nicholls) — astonishing amount of work in the space, especially given this list is inevitably incomplete.