- Sparkey — Spotify’s open-sourced simple constant key/value storage library, for read-heavy systems with infrequent large bulk inserts.
- The Truth of Fact, The Truth of Feeling (Ted Chiang) — story about what happens when lifelogs become searchable. Now with Remem, finding the exact moment has become easy, and lifelogs that previously lay all but ignored are now being scrutinized as if they were crime scenes, thickly strewn with evidence for use in domestic squabbles. (via BoingBoing)
- Algorithms Magnifying Misbehaviour (The Guardian) — when the training set embodies biases, the machine will exhibit biases too.
- Lego Robot That Strips DRM Off Ebooks (BoingBoing) — so. damn. cool. If it had been controlled by a C64, Cory would have hit every one of my geek erogenous zones with this find.
ENTRIES TAGGED "quantified self"
Constant KV Store, Google Me, Learned Bias, and DRM-Stripping Lego Robot
Software Archive, Self-Tracking, Provisioning, and Python Ciphers
- Computer Software Archive (Jason Scott) — The Internet Archive is the largest collection of historical software online in the world. Find me someone bigger. Through these terabytes (!) of software, the whole of the software landscape of the last 50 years is settling in. (And documentation and magazines and …). Wow.
- 7 in 10 Doctors Have a Self-Tracking Patient — the most common ways of sharing data with a doctor, according to the physicians, were writing it out by hand or giving the doctor a paper printout. (via Richard MacManus)
- opsmezzo — open-sourced provisioning tools from the Nodejitsu team. (via Nuno Job)
- Hacking Secret Ciphers with Python — teaches complete beginners how to program in the Python programming language. The book features the source code to several ciphers and hacking programs for these ciphers. The programs include the Caesar cipher, transposition cipher, simple substitution cipher, multiplicative & affine ciphers, Vigenere cipher, and hacking programs for each of these ciphers. The final chapters cover the modern RSA cipher and public key cryptography.
Responding to Chinese Hacks, Quantified Self Gadget, Maker's Amazing Life, and Syrian Rebel DIY Hackery
- Administration Strategy on Mitigating the Theft of US Trade Secrets (Whitehouse, PDF) — the Chinese attacks on Facebook, NYT, and other large organisations are provoking policy responses. WSJ covers it nicely. What is this starting? (via Alex Howard)
- BodyMedia FitLink — can use this to gather caloric expenditure and sleep restfulness. (via Jonathan Brewer)
- Bend Not Break — she had an amazing life but this caught my eye in the Make review: In China, she told me, making and craftsmanship are highly revered, and under Mao, factory jobs were prized. Her experience working in Mao’s factories planted a seed in her mind that sprouted when she sought to create her own company. Rather than launch another internet-based business as was the rage at the time, she wanted to connect software to the physical world. (via Makezine)
- DIY Weapons of the Syrian Rebels (The Atlantic) — if WWII France had had X-Box controllers, they’d have been releasing remote controlled homebrew deathmobiles too.
Civil Drones, Fencing the Public Domain, Quantified Spy, and Data Daemons for Fun and Metrics
- Helping Drones Play Nice With Other Aviation — The U.S. airspace is quickly being filled with simultaneously flying drones. To such an extent, unmanned aircraft could soon become a nightmare for the ATC controllers. The ADS-B will improve Predator B’s crew situational awareness making the drone capable to operate more freely and safely in domestic and international airspace in accordance with civilian air traffic and airspace rules and regulations.
- Reclaiming NZ’s Digitised Heritage — Out of a sample of 100 books: 50% of NZ Heritage Books (published before 1890) have been digitised; 90% of digitised texts are fully accessible; 98% of accessible texts are downloadable; Despite all works being in the public domain, only one did not have any licencing restrictions applied to its use. Most groups who digitise then go on to put restrictions around their use. [T]here are also many instances where arbitrary restrictions are being applied to the detriment of the public good.
- Self-Spy (GitHub) — Log everything you do on the computer, for statistics, future reference and all-around fun!
- statsd (GitHub) — Etsy’s data-gathering daemon, written up in an excellent blog post.
Windows 8 Web Theme, Taxing Mobile Payments, Digital Divide and Digital Service Delivery, and Consequences of Internet of Things
- BootMetro (github) — website templates with a Metro (Windows 8) look. (via Hacker News)
- Kenya’s Treasury to tax M-Pesa — 10% tax on mobile money-transfer systems. M-Pesa is the largest mobile money transfer service provider in Kenya, with more than 14 million subscribers. [...] It is estimated that M-Pesa reports some 2 million transactions per day. [...] the value of money transferred through mobile platforms jumped by 41 per cent in the first six months of 2012. Neer mind fighting you, you know you’re winning when they tax you! (via Evgeny Mozorov)
- Digital Divide and Fibre Rollout — As the group of non-users gets smaller, they are likely to become more seriously disadvantaged. The NBN – and high-speed broadband more generally – will drive a wave of new applications across most areas of life, transforming Australia’s service economy in fundamental ways. Those who are not connected in 2015 may be fewer, but they will be missing out on far more – in education, health, government, commerce, communication and entertainment. The costs will also fall on service providers forced to keep supplying expensive physical and face-to-face services to this declining number of people. This will be particularly significant in remote communities, where health consultations and evacuations by flying doctors, nurses and allied health professionals could potentially be reduced through e-health diagnostics, and where Centrelink still regularly sends teams out to communities. As gov2 expands and services move online, connectivity disadvantages are compounded. (via Ellen Strickland)
- Smart Body Smart World (Forrester) — take note of these two consequences of Internet of Things and Quantified Self: Verticals fuse: “Health and wellness” is not its own silo, but is connected to our finances, our shopping habits, our relationships. As bodies get connected, everyone is in the body business. Retail disperses: All retailers become computing retailers, and computing-specific retailers like Best Buy go the way of Blockbuster. You wouldn’t buy a smart toothbrush at a specialty CE store; you’d be more likely to buy it in the channel that solves the rest of your hygiene needs. (via Internet of Things)
No Augmenting Money, Cat CV, Quantified Mind, and Hackable Bio
- Bank of England Complains About AR Bank Notes — After downloading the free Blippar app on iPhone or Android, customers were able to ‘blipp’ any ten-pound note in circulation by opening the app and holding their phone over the note. An animated Queen, and other members of the Royal Family, then appeared on the screen and voiced opinions on the latest football matters.
- Quantified Mind — battery of cognitive tests, so you can track performance over time and measure the effect of interventions (coffee, diet, exercise, whatever). (via Sara Winge)
- Jellyfish Made From Rat Cells (Nature) — an artificial jellyfish using silicone and muscle cells from a rat’s heart. The synthetic creature, dubbed a medusoid, looks like a flower with eight petals. When placed in an electric field, it pulses and swims exactly like its living counterpart. Very cool, but the bit that caught my eye was: the team built the medusoid as a way of understanding the “fundamental laws of muscular pumps”. It is an engineer’s approach to basic science: prove that you have identified the right principles by building something with them.
Dr. Nadav Aharony used phone sensors to explore personal behaviors and community trends.
It’s clear at this point that the smartphone revolution has very little to do with the phone function in these devices. Rather, it’s the unique mix of sensors, always-on connectivity and mass consumer adoption that’s shaping business and culture.
Dr. Nadav Aharony (@nadavaha) tapped into this mix when he was working on a “social MRI” study in MIT’s Media Lab. Aharony, who recently joined us as part of our ongoing foo interview series, described his vision of the social MRI:
“If you think about it, the three things you take with you when you go out of your home are your keys, your wallet and your phone, so our phones are always with us. In aggregate, we can use the phones in many people’s pockets as a virtual imaging chamber. So, one aspect of the social MRI is this virtual imaging chamber that is collecting tens or hundreds of signals at the same time from members of the community.” [Discussed at 1:16]
Aharony’s work focused on 150 participants (about 75 families) that were given phones for 15 months. During that time, more than one million hours of “continuous sensing data” was gathered with the participants’ consent. The data was acquired and scrubbed under MIT’s ethics guidelines, and for extra measure, Aharony included his own data in the dataset.
Collecting the data was just the beginning. Parsing that information and creating experiments based on emerging signals is where the applications of a social MRI became significant.