- Huxley vs Orwell — buy Amusing Ourselves to Death if this rings true. The future is here, it’s just not evenly surveilled. (via rone)
- KeyMe — keys in the cloud. (Digital designs as backups for physical objects)
- Motorola Advanced Technology and Products Group — The philosophy behind Motorola ATAP is to create an organization with the same level of appetite for technology advancement as DARPA, but with a consumer focus. It is a pretty interesting place to be. And they hired the excellent Johnny Chung Lee.
- Internet Credit Union — Internet Archive starts a Credit Union. Can’t wait to see memes on debit cards.
ENTRIES TAGGED "privacy"
Huxley Beat Orwell?, Cloud Keys, Motorola's DARPA, and Internet Archive Credit Union
Ant-Sized Computers, Digital Manufacturing, Dictatorship of Data, and Mobile Shielding
- Ant-Sized Computers (MIT TR) — The KL02 chip, made by Freescale, is shorter on each side than most ants are long and crams in memory, RAM, a processor, and more.
- Some Thoughts on Digital Manufacturing (Nick Pinkston) — Whenever I see someone make a “new” 3D printer that’s just a derivative of the RepRap or MakerBot – I could care less. Only new processes, great interfaces or super-low price points get my attention anymore. FormLabs being a great example of all three – which is why they were a massive hit. If you’re looking for problems: make a cheap laser cutter, CNC mill, or pick-n-place machine. See the Othermill.
- The Dictatorship of Data (MIT TR) — Robert McNamara epitomizes the hyper-rational executive led astray by numbers. (via Wolfgang Blau)
- A Field Test of Mobile Phone Shielding Devices (PDF) — masters thesis comparing various high-tech fabric-type shielding devices. Alas, tin-foil helmets weren’t investigated. (via Udhay Shankar)
Backbone Stack, Automating Card Games, Ozzie on PRISM, and Stuff that Matters
- Our Backbone Stack (Pamela Fox) — fascinating glimpse into the tech used and why.
- Automating Card Games Using OpenCV and Python — My vision for an automated version of the game was simple. Players sit across a table on which the cards are laid out. My program would take a picture of the cards and recognize them. It would then generate valid expression that yielded 24, and then project the answer on to the table.
- Ray Ozzie on PRISM — posted on Hacker News (!). In particular, in this world where “SaaS” and “software eats everything” and “cloud computing” and “big data” are inevitable and already pervasive, it pains me to see how 3rd Party Doctrine may now already be being leveraged to effectively gut the intent of U.S. citizens’ Fourth Amendment rights. Don’t we need a common-sense refresh to the wording of our laws and potentially our constitution as it pertains to how we now rely upon 3rd parties? It makes zero sense in a “services age” where granting third parties limited rights to our private information is so basic and fundamental to how we think, work, conduct and enjoy life. (via Alex Dong)
- Larry Brilliant’s Commencement Speech (HufPo) — speaking to med grads, he’s full of purpose and vision and meaning for their lives. His story is amazing. I wish more CS grads were inspired to work on stuff that matters, and cautioned about adding their great minds to the legion trying to solve the problem of connecting you with brands you love.
Open Source BigTable, Robots Lost, Changing the World, Secrecy Binge
- Accumulo — NSA’s BigTable implementation, released as an Apache project.
- How the Robots Lost (Business Week) — the decline of high-frequency trading profits (basically, markets worked and imbalances in speed and knowledge have been corrected). Notable for the regulators getting access to the technology that the traders had: Last fall the SEC said it would pay Tradeworx, a high-frequency trading firm, $2.5 million to use its data collection system as the basic platform for a new surveillance operation. Code-named Midas (Market Information Data Analytics System), it scours the market for data from all 13 public exchanges. Midas went live in February. The SEC can now detect anomalous situations in the market, such as a trader spamming an exchange with thousands of fake orders, before they show up on blogs like Nanex and ZeroHedge. If Midas sees something odd, Berman’s team can look at trading data on a deeper level, millisecond by millisecond.
- PRISM: Surprised? (Danny O’Brien) — I really don’t agree with the people who think “We don’t have the collective will”, as though there’s some magical way things got done in the past when everyone was in accord and surprised all the time. It’s always hard work to change the world. Endless, dull hard work. Ten years later, when you’ve freed the slaves or beat the Nazis everyone is like “WHY CAN’T IT BE AS EASY TO CHANGE THIS AS THAT WAS, BACK IN THE GOOD OLD DAYS. I GUESS WE’RE ALL JUST SHEEPLE THESE DAYS.”
- What We Don’t Know About Spying on Citizens is Scarier Than What We Do Know (Bruce Schneier) — The U.S. government is on a secrecy binge. It overclassifies more information than ever. And we learn, again and again, that our government regularly classifies things not because they need to be secret, but because their release would be embarrassing. Open source BigTable implementation: free. Data gathering operation around it: $20M/year. Irony in having the extent of authoritarian Big Brother government secrecy questioned just as a whistleblower’s military trial is held “off the record”: priceless.
Inside NASDAQ's Failbook, SimAustralia, Distraction Attraction, and Big Brother Says "Wash Your Hands!"
- Facebook IPO Tech Post-Mortem (PDF) — SEC’s analysis of the failures that led to the NASDAQ kicking Facebook’s IPO in the NADSAQ. (via Quartz)
- Run That Town — SimCity for real cities, from the Australian Bureau of Statistics and using real census data. No mention of whether you can make your citizens shout “Aussie Aussie Aussie, Oi Oi Oi!” after three cans of lager at an Aussie Rules game. (via John Birmingham)
- Maintaining Focus (The Atlantic) — excellent Linda Stone interview. We may think that kids have a natural fascination with phones. Really, children have a fascination with what-ever Mom and Dad find fascinating. If they are fascinated by the flowers coming up in the yard, that’s what the children are going to find fascinating. And if Mom and Dad can’t put down the device with the screen, the child is going to think, That’s where it’s all at, that’s where I need to be! I interviewed kids between the ages of 7 and 12 about this. They said things like “My mom should make eye contact with me when she talks to me” and “I used to watch TV with my dad, but now he has his iPad, and I watch by myself.”
- Networked Motion Sensors in Hospital Bathrooms (NY Times) — At North Shore University Hospital on Long Island, motion sensors, like those used for burglar alarms, go off every time someone enters an intensive care room. The sensor triggers a video camera, which transmits its images halfway around the world to India, where workers are checking to see if doctors and nurses are performing a critical procedure: washing their hands. [...] the video monitoring program, run by a company called Arrowsight, has been adapted from the meat industry, where cameras track whether workers who skin animals — the hide can contaminate the meat — wash their hands, knives and electric cutters.
New Kinect, Surveillance of Things, How to Criticise, and Compensating for Population
- XBox One Kinect Controller (Guardian) — the new Kinect controller can detect gaze, heartbeat, and the buttons on your shirt.
- Surveillance and the Internet of Things (Bruce Schneier) — Lots has been written about the “Internet of Things” and how it will change society for the better. It’s true that it will make a lot of wonderful things possible, but the “Internet of Things” will also allow for an even greater amount of surveillance than there is today. The Internet of Things gives the governments and corporations that follow our every move something they don’t yet have: eyes and ears.
- Daniel Dennett’s Intuition Pumps (extract) — How to compose a successful critical commentary: 1. Attempt to re-express your target’s position so clearly, vividly and fairly that your target says: “Thanks, I wish I’d thought of putting it that way.” 2. List any points of agreement (especially if they are not matters of general or widespread agreement). 3. Mention anything you have learned from your target.4. Only then are you permitted to say so much as a word of rebuttal or criticism.
- New Data Science Toolkit Out (Pete Warden) — with population data to let you compensate for population in your heatmaps. No more “gosh, EVERYTHING is more prevalent where there are lots of people!” meaningless charts.
Internet Filter Creep, Innovating in E-Mail/Gmail, Connected Devices Business Strategy, and Ecology Recapitulates Photography
- Australian Filter Scope Creep — The Federal Government has confirmed its financial regulator has started requiring Australian Internet service providers to block websites suspected of providing fraudulent financial opportunities, in a move which appears to also open the door for other government agencies to unilaterally block sites they deem questionable in their own portfolios.
- Embedding Actions in Gmail — after years of benign neglect, it’s good to see Gmail worked on again. We’ve said for years that email’s a fertile ground for doing stuff better, and Google seem to have the religion. (see Send Money with Gmail for more).
- What Keeps Me Up at Night (Matt Webb) — Matt’s building a business around connected devices. Here he explains why the category could be owned by any of the big players. In times like this I remember Howard Aiken’s advice: Don’t worry about people stealing your ideas. If it is original you will have to ram it down their throats.
- Image Texture Predicts Avian Density and Species Richness (PLOSone) — Surprisingly and interestingly, remotely sensed vegetation structure measures (i.e., image texture) were often better predictors of avian density and species richness than field-measured vegetation structure, and thus show promise as a valuable tool for mapping habitat quality and characterizing biodiversity across broad areas.
Privacy: Gone in 150ms, Pen-Testing Tablet, Low-Level in Lua, and Metaphor Identification Shootout
- Behind the Banner — visualization of what happens in the 150ms when the cabal of data vultures decide which ad to show you. They pass around your data as enthusiastically as a pipe at a Grateful Dead concert, and you’ve just as much chance of getting it back. (via John Battelle)
- pwnpad — Nexus 7 with Android and Ubuntu, high-gain USB bluetooth, ethernet adapter, and a gorgeous suite of security tools. (via Kyle Young)
- Terra — a simple, statically-typed, compiled language with manual memory management [...] designed from the beginning to interoperate with Lua. Terra functions are first-class Lua values created using the terra keyword. When needed they are JIT-compiled to machine code. (via Hacker News)
- Metaphor Identification in Large Texts Corpora (PLOSone) — The paper presents the most comprehensive study of metaphor identification in terms of scope of metaphorical phrases and annotated corpora size. Algorithms’ performance in identifying linguistic phrases as metaphorical or literal has been compared to human judgment. Overall, the algorithms outperform the state-of-the-art algorithm with 71% precision and 27% averaged improvement in prediction over the base-rate of metaphors in the corpus.
Bitcoin Bundle, HTML Escaping, Open as in Gongkai, and Glass Reflections
- The Well Deserved Fortune of Satoshi Nakamoto — I can’t assure with 100% certainty that the all the black dots are owned by Satoshi, but almost all are owned by a single entity, and that entity began mining right from block 1, and with the same performance as the genesis block. It can be identified by constant slope segments that occasionally restart. Also this entity is the only entity that has shown complete trust in Bitcoin, since it hasn’t spend any coins (as last as the eye can see). I estimate at eyesight that Satoshi fortune is around 1M Bitcoins, or 100M USD at current exchange rate. Author’s credible. (via Hacker News)
- Houdini (Github) — C library for escaping and unescaping UTF-8-encoded HTML, according to OWASP guidelines.
- The $12 Gongkai Phone (Bunnie Huang) — gongkai isn’t a totally lawless free-for-all. It’s a network of ideas, spread peer-to-peer, with certain rules to enforce sharing and to prevent leeching. It’s very different from Western IP concepts, but I’m trying to have an open mind about it.
- Jan Chipchase on Google Glass (All Things D) — Any idiot can collect data. The real issue is how to collect data in such a way that meets both moral and legal obligations and still delivers some form of value. An interesting observation, one of many within this overview of the usability and third-party user experience of Google Glass-like UIs.