ENTRIES TAGGED "privacy"

Four short links: 13 August 2013

Four short links: 13 August 2013

Retro Hackery, Etsy Ops, Distributed Identity, and lolcoders

  1. How Things Work: Summer Games Edition — admire the real craftsmanship in those early games. This has a great description of using raster interrupts to extend the number of sprites, and how and why double-buffering was expensive in terms of memory.
  2. IAMA: Etsy Ops Team (Reddit) — the Etsy ops team does an IAMA on Reddit. Everything from uptime to this sage advice about fluid data: A nice 18 year old Glenfiddich scales extremely well, especially if used in an active active configuration with a glass in each hand. The part of Scotland where Glenfiddich is located also benefits from near-permanent exposure to the Cloud (several clouds in fact). (via Nelson Minar)
  3. Who Learns What When You Log Into Facebook (Tim Bray) — nice breakdown of who learns what and how, part of Tim’s work raising the qualify of conversation about online federated identity.
  4. lolcommits — takes a photo of the programmer on each git commit. (via Nelson Minar)
Comment |
Four short links: 5 July 2013

Four short links: 5 July 2013

Tracking Bitcoin, Gaming Deflation, Bloat-Aware Design, and Mapping Entity Relationships

  1. Quantitative Analysis of the Full Bitcoin Transaction Graph (PDF) — We analyzed all these large transactions by following in detail the way these sums were accumulated and the way they were dispersed, and realized that almost all these large transactions were descendants of a single transaction which was carried out in November 2010. Finally, we noted that the subgraph which contains these large transactions along with their neighborhood has many strange looking structures which could be an attempt to conceal the existence and relationship between these transactions, but such an attempt can be foiled by following the money trail in a succinctly persistent way. (via Alex Dong)
  2. Majority of Gamers Today Can’t Finish Level 1 of Super Mario Bros — Nintendo test, and the President of Nintendo said in a talk, We watched the replay videos of how the gamers performed and saw that many did not understand simple concepts like bottomless pits. Around 70 percent died to the first Goomba. Another 50 percent died twice. Many thought the coins were enemies and tried to avoid them. Also, most of them did not use the run button. There were many other depressing things we noted but I can not remember them at the moment. (via Beta Knowledge)
  3. Bloat-Aware Design for Big Data Applications (PDF) — (1) merging and organizing related small data record objects into few large objects (e.g., byte buffers) instead of representing them explicitly as one-object-per-record, and (2) manipulating data by directly accessing buffers (e.g., at the byte chunk level as opposed to the object level). The central goal of this design paradigm is to bound the number of objects in the application, instead of making it grow proportionally with the cardinality of the input data. (via Ben Lorica)
  4. Poderopedia (Github) — originally designed for investigative journalists, the open src software allows you to create and manage entity profile pages that include: short bio or summary, sheet of connections, long newsworthy profiles, maps of connections of an entity, documents related to the entity, sources of all the information and news river with external news about the entity. See the announcement and website.
Comment: 1 |
Four short links: 28 June 2013

Four short links: 28 June 2013

Huxley Beat Orwell?, Cloud Keys, Motorola's DARPA, and Internet Archive Credit Union

  1. Huxley vs Orwellbuy Amusing Ourselves to Death if this rings true. The future is here, it’s just not evenly surveilled. (via rone)
  2. KeyMe — keys in the cloud. (Digital designs as backups for physical objects)
  3. Motorola Advanced Technology and Products GroupThe philosophy behind Motorola ATAP is to create an organization with the same level of appetite for technology advancement as DARPA, but with a consumer focus. It is a pretty interesting place to be. And they hired the excellent Johnny Chung Lee.
  4. Internet Credit Union — Internet Archive starts a Credit Union. Can’t wait to see memes on debit cards.
Comment |
Four short links: 21 June 2013

Four short links: 21 June 2013

Ant-Sized Computers, Digital Manufacturing, Dictatorship of Data, and Mobile Shielding

  1. Ant-Sized Computers (MIT TR) — The KL02 chip, made by Freescale, is shorter on each side than most ants are long and crams in memory, RAM, a processor, and more.
  2. Some Thoughts on Digital Manufacturing (Nick Pinkston) — Whenever I see someone make a “new” 3D printer that’s just a derivative of the RepRap or MakerBot – I could care less. Only new processes, great interfaces or super-low price points get my attention anymore. FormLabs being a great example of all three – which is why they were a massive hit. If you’re looking for problems: make a cheap laser cutter, CNC mill, or pick-n-place machine. See the Othermill.
  3. The Dictatorship of Data (MIT TR) — Robert McNamara epitomizes the hyper-rational executive led astray by numbers. (via Wolfgang Blau)
  4. A Field Test of Mobile Phone Shielding Devices (PDF) — masters thesis comparing various high-tech fabric-type shielding devices. Alas, tin-foil helmets weren’t investigated. (via Udhay Shankar)
Comment |
Four short links: 18 June 2013

Four short links: 18 June 2013

Backbone Stack, Automating Card Games, Ozzie on PRISM, and Stuff that Matters

  1. Our Backbone Stack (Pamela Fox) — fascinating glimpse into the tech used and why.
  2. Automating Card Games Using OpenCV and PythonMy vision for an automated version of the game was simple. Players sit across a table on which the cards are laid out. My program would take a picture of the cards and recognize them. It would then generate valid expression that yielded 24, and then project the answer on to the table.
  3. Ray Ozzie on PRISM — posted on Hacker News (!). In particular, in this world where “SaaS” and “software eats everything” and “cloud computing” and “big data” are inevitable and already pervasive, it pains me to see how 3rd Party Doctrine may now already be being leveraged to effectively gut the intent of U.S. citizens’ Fourth Amendment rights. Don’t we need a common-sense refresh to the wording of our laws and potentially our constitution as it pertains to how we now rely upon 3rd parties? It makes zero sense in a “services age” where granting third parties limited rights to our private information is so basic and fundamental to how we think, work, conduct and enjoy life. (via Alex Dong)
  4. Larry Brilliant’s Commencement Speech (HufPo) — speaking to med grads, he’s full of purpose and vision and meaning for their lives. His story is amazing. I wish more CS grads were inspired to work on stuff that matters, and cautioned about adding their great minds to the legion trying to solve the problem of connecting you with brands you love.
Comments: 2 |
Four short links: 7 June 2013

Four short links: 7 June 2013

Open Source BigTable, Robots Lost, Changing the World, Secrecy Binge

  1. Accumulo — NSA’s BigTable implementation, released as an Apache project.
  2. How the Robots Lost (Business Week) — the decline of high-frequency trading profits (basically, markets worked and imbalances in speed and knowledge have been corrected). Notable for the regulators getting access to the technology that the traders had: Last fall the SEC said it would pay Tradeworx, a high-frequency trading firm, $2.5 million to use its data collection system as the basic platform for a new surveillance operation. Code-named Midas (Market Information Data Analytics System), it scours the market for data from all 13 public exchanges. Midas went live in February. The SEC can now detect anomalous situations in the market, such as a trader spamming an exchange with thousands of fake orders, before they show up on blogs like Nanex and ZeroHedge. If Midas sees something odd, Berman’s team can look at trading data on a deeper level, millisecond by millisecond.
  3. PRISM: Surprised? (Danny O’Brien) — I really don’t agree with the people who think “We don’t have the collective will”, as though there’s some magical way things got done in the past when everyone was in accord and surprised all the time. It’s always hard work to change the world. Endless, dull hard work. Ten years later, when you’ve freed the slaves or beat the Nazis everyone is like “WHY CAN’T IT BE AS EASY TO CHANGE THIS AS THAT WAS, BACK IN THE GOOD OLD DAYS. I GUESS WE’RE ALL JUST SHEEPLE THESE DAYS.”
  4. What We Don’t Know About Spying on Citizens is Scarier Than What We Do Know (Bruce Schneier) — The U.S. government is on a secrecy binge. It overclassifies more information than ever. And we learn, again and again, that our government regularly classifies things not because they need to be secret, but because their release would be embarrassing. Open source BigTable implementation: free. Data gathering operation around it: $20M/year. Irony in having the extent of authoritarian Big Brother government secrecy questioned just as a whistleblower’s military trial is held “off the record”: priceless.
Comment |
Four short links: 30 May 2013

Four short links: 30 May 2013

Inside NASDAQ's Failbook, SimAustralia, Distraction Attraction, and Big Brother Says "Wash Your Hands!"

  1. Facebook IPO Tech Post-Mortem (PDF) — SEC’s analysis of the failures that led to the NASDAQ kicking Facebook’s IPO in the NADSAQ. (via Quartz)
  2. Run That Town — SimCity for real cities, from the Australian Bureau of Statistics and using real census data. No mention of whether you can make your citizens shout “Aussie Aussie Aussie, Oi Oi Oi!” after three cans of lager at an Aussie Rules game. (via John Birmingham)
  3. Maintaining Focus (The Atlantic) — excellent Linda Stone interview. We may think that kids have a natural fascination with phones. Really, children have a fascination with what-ever Mom and Dad find fascinating. If they are fascinated by the flowers coming up in the yard, that’s what the children are going to find fascinating. And if Mom and Dad can’t put down the device with the screen, the child is going to think, That’s where it’s all at, that’s where I need to be! I interviewed kids between the ages of 7 and 12 about this. They said things like “My mom should make eye contact with me when she talks to me” and “I used to watch TV with my dad, but now he has his iPad, and I watch by myself.”
  4. Networked Motion Sensors in Hospital Bathrooms (NY Times) — At North Shore University Hospital on Long Island, motion sensors, like those used for burglar alarms, go off every time someone enters an intensive care room. The sensor triggers a video camera, which transmits its images halfway around the world to India, where workers are checking to see if doctors and nurses are performing a critical procedure: washing their hands. [...] the video monitoring program, run by a company called Arrowsight, has been adapted from the meat industry, where cameras track whether workers who skin animals — the hide can contaminate the meat — wash their hands, knives and electric cutters.
Comment |
Four short links: 22 May 2013

Four short links: 22 May 2013

New Kinect, Surveillance of Things, How to Criticise, and Compensating for Population

  1. XBox One Kinect Controller (Guardian) — the new Kinect controller can detect gaze, heartbeat, and the buttons on your shirt.
  2. Surveillance and the Internet of Things (Bruce Schneier) — Lots has been written about the “Internet of Things” and how it will change society for the better. It’s true that it will make a lot of wonderful things possible, but the “Internet of Things” will also allow for an even greater amount of surveillance than there is today. The Internet of Things gives the governments and corporations that follow our every move something they don’t yet have: eyes and ears.
  3. Daniel Dennett’s Intuition Pumps (extract)How to compose a successful critical commentary: 1. Attempt to re-express your target’s position so clearly, vividly and fairly that your target says: “Thanks, I wish I’d thought of putting it that way.” 2. List any points of agreement (especially if they are not matters of general or widespread agreement). 3. Mention anything you have learned from your target.4. Only then are you permitted to say so much as a word of rebuttal or criticism.
  4. New Data Science Toolkit Out (Pete Warden) — with population data to let you compensate for population in your heatmaps. No more “gosh, EVERYTHING is more prevalent where there are lots of people!” meaningless charts.
Comment |
Four short links: 16 May 2013

Four short links: 16 May 2013

Internet Filter Creep, Innovating in E-Mail/Gmail, Connected Devices Business Strategy, and Ecology Recapitulates Photography

  1. Australian Filter Scope CreepThe Federal Government has confirmed its financial regulator has started requiring Australian Internet service providers to block websites suspected of providing fraudulent financial opportunities, in a move which appears to also open the door for other government agencies to unilaterally block sites they deem questionable in their own portfolios.
  2. Embedding Actions in Gmail — after years of benign neglect, it’s good to see Gmail worked on again. We’ve said for years that email’s a fertile ground for doing stuff better, and Google seem to have the religion. (see Send Money with Gmail for more).
  3. What Keeps Me Up at Night (Matt Webb) — Matt’s building a business around connected devices. Here he explains why the category could be owned by any of the big players. In times like this I remember Howard Aiken’s advice: Don’t worry about people stealing your ideas. If it is original you will have to ram it down their throats.
  4. Image Texture Predicts Avian Density and Species Richness (PLOSone) — Surprisingly and interestingly, remotely sensed vegetation structure measures (i.e., image texture) were often better predictors of avian density and species richness than field-measured vegetation structure, and thus show promise as a valuable tool for mapping habitat quality and characterizing biodiversity across broad areas.
Comment |
Four short links: 14 May 2013

Four short links: 14 May 2013

Privacy: Gone in 150ms, Pen-Testing Tablet, Low-Level in Lua, and Metaphor Identification Shootout

  1. Behind the Banner — visualization of what happens in the 150ms when the cabal of data vultures decide which ad to show you. They pass around your data as enthusiastically as a pipe at a Grateful Dead concert, and you’ve just as much chance of getting it back. (via John Battelle)
  2. pwnpad — Nexus 7 with Android and Ubuntu, high-gain USB bluetooth, ethernet adapter, and a gorgeous suite of security tools. (via Kyle Young)
  3. Terraa simple, statically-typed, compiled language with manual memory management [...] designed from the beginning to interoperate with Lua. Terra functions are first-class Lua values created using the terra keyword. When needed they are JIT-compiled to machine code. (via Hacker News)
  4. Metaphor Identification in Large Texts Corpora (PLOSone) — The paper presents the most comprehensive study of metaphor identification in terms of scope of metaphorical phrases and annotated corpora size. Algorithms’ performance in identifying linguistic phrases as metaphorical or literal has been compared to human judgment. Overall, the algorithms outperform the state-of-the-art algorithm with 71% precision and 27% averaged improvement in prediction over the base-rate of metaphors in the corpus.
Comment |