- Norbert Weiner (The Atlantic) — His fears for the future stemmed from two fundamental convictions: We humans can’t resist selfishly misusing the powers our machines give us, to the detriment of our fellow humans and the planet; and there’s a good chance we couldn’t control our machines even if we wanted to, because they already move too fast and because increasingly we’re building them to make decisions on their own. To believe otherwise, Wiener repeatedly warned, represents a dangerous, potentially fatal, lack of humility.
- Open Ephys — open source/open hardware tools for neuro research. (via IEEE)
- Startups Selling Resistance to Surveillance (Inc) — growing breed of tools working on securing their customers’ communications from interception by competitors and states.
The technology is at risk of dying off — and that would be a shame.
iBeacons and various BLE technologies have the potential to shake up many established ways of doing business by streamlining interactions. Although there are potentially many uses for iBeacons, much of the initial discussion has focused on retail. (I’ll follow up with some examples of iBeacon applications outside retail in a future post.)
As I described in my initial post in this series, all an iBeacon does is send out advertisement packets. iBeacon transmissions let a receiver perform two tasks: uniquely identify what things they are near and estimate the distance to them. With such a simple protocol, iBeacons cannot:
- Receive anything. (Many iBeacon devices will have two-way Bluetooth interfaces so they can receive configurations, but the iBeacon specification does not require reception.)
- Report on clients they have seen. Wi-Fi based proximity systems use transmissions from mobile devices to uniquely identify visitors to a space. If you take a smartphone into an area covered by a Wi-Fi proximity system, you can be uniquely identified. Because an iBeacon is only a transmitter, it does not receive Bluetooth messages from mobile devices to uniquely identify visitors.