- Norbert Weiner (The Atlantic) — His fears for the future stemmed from two fundamental convictions: We humans can’t resist selfishly misusing the powers our machines give us, to the detriment of our fellow humans and the planet; and there’s a good chance we couldn’t control our machines even if we wanted to, because they already move too fast and because increasingly we’re building them to make decisions on their own. To believe otherwise, Wiener repeatedly warned, represents a dangerous, potentially fatal, lack of humility.
- Open Ephys — open source/open hardware tools for neuro research. (via IEEE)
- Startups Selling Resistance to Surveillance (Inc) — growing breed of tools working on securing their customers’ communications from interception by competitors and states.
ENTRIES TAGGED "security"
Think your IT staff can protect you better than major cloud providers? Think again.
I just ran across Katie Fehrenbacher’s article in GigaOm that made a point I’ve been arguing (perhaps not strongly enough) for years. When you start talking to people about “the cloud,” you frequently run into a knee-jerk reaction: “Of course, the cloud isn’t secure.”
I have no idea what IT professionals who say stuff like this mean. Are they thinking about the stuff they post on Facebook? Or are they thinking about the data they’ve stored on Amazon? For me, the bottom line is: would I rather trust Amazon’s security staff, or would I rather trust some guy with some security cert that I’ve never heard of, but whom the HR department says is “qualified”? Read more…
Our New Robot Overlords, Open Neuro, Anti-Surveillance Software, and LG's TV Made of Evil and Tears
Right to Mine, Summarising Microblogs, C Sucks for Stats, and Scanning Logfiles
- UK Copyright Law Permits Researchers to Data Mine — changes mean Copyright holders can require researchers to pay to access their content but cannot then restrict text or data mining for non-commercial purposes thereafter, under the new rules. However, researchers that use the text or data they have mined for anything other than a non-commercial purpose will be said to have infringed copyright, unless the activity has the consent of rights holders. In addition, the sale of the text or data mined by researchers is prohibited. The derivative works will be very interesting: if university mines the journals, finds new possibility for a Thing, is verified experimentally, is that Thing the university’s to license commercially for profit?
- Efficient Online Summary of Microblogging Streams (PDF) — research paper. The algorithm we propose uses a word graph, along with optimization techniques such as decaying windows and pruning. It outperforms the baseline in terms of summary quality, as well as time and memory efficiency.
- Statistical Shortcomings in Standard Math Libraries — or “Why C Derivatives Are Not Popular With Statistical Scientists”. The following mathematical functions are necessary for implementing any rudimentary statistics application; and yet they are general enough to have many applications beyond statistics. I hereby propose adding them to the standard C math library and to the libraries which inherit from it. For purposes of future discussion, I will refer to these functions as the Elusive Eight.
- fail2ban — open source tool that scans logfiles for signs of malice, and triggers actions (e.g., iptables updates).
Trusting Code, Deep Pi, Docker DevOps, and Secure Database
- Trusting Browser Code (Tim Bray) — on the fundamental weakness of the ‘net as manifest in the browser.
- Deep Learning in the Raspberry Pi (Pete Warden) — $30 now gets you a computer you can run deep learning algorithms on. Awesome.
- Announcing Docker Hub and Official Repositories — as Docker went 1.0 and people rave about how they use it, comes this. They’re thinking hard about “integrating into the build ship run loop”, which aligns well with DevOps-enabling tool use.
- Apple’s Secure Database for Users (Ian Waring) — excellent breakdown of how Apple have gone out of their way to make their cloud database product safe and robust. They may be slow to “the cloud” but they have decades of experience having users as customers instead of products.
Ethical UX, Personal Robots, Sharter URLs, and Magical Devices
- Ethics and UX Design (Slideshare) –We are the thieves of time. This excellent talk challenges you (via Aristotle) to understand what a good life is, and whether you’re designing to bring it about. (via Keith Bolland)
- Pepper Personal Robot — Japan’s lead in consumer-facing robotics is impressive. If this had been developed by an American company, it’d either have a Lua scripting interface or twin machine guns for autonomous death.
- shrturl — spoof, edit, rewrite, and general evil up webpages, hidden behind an URL shortening service.
- Lessons for Building Magical Devices (First Round Review) — The most interesting devices I’ve seen take elements of the physical world and expose them to software.[...] If you buy a Tesla Model S today, the behavior of the car six months from now could be radically different because software can reshape the capability of the hardware continuously, exceeding the speed of customer demand.
Open Autopilot, Record Robot Sales, NSA Myths Busted, and Informative Errors
- beaglepilot (Github) — open source open hardware autopilot for Beagleboard. (via DIY Drones)
- IFR Robot Sales Charts (PDF) — 2013: all-time high of 179,000 industrial robots sold and growth continues in 2014. (via Robohub)
- The Top 5 Claims That Defenders of the NSA Have to Stop Making to Remain Credible (EFF) — great Mythbusting.
- Netflix’s New Error Message — instead of “buffering”, they point the finger at the carrier between them and the customer who is to blame for slow performance. Genius!
Targeted Breakage, Driverless Cars, BitCoin Bigness, and IoT Approaching
- Maciej Ceglowski on Our Internet — If you haven’t already read this because someone pushed it into your hands, read it now. If these vast databases are valuable enough, it doesn’t matter who they belong to. The government will always find a way to query them. Who pays for the servers is just an implementation detail.
- Design Changes Possible With Robot Cars (Brad Templeton) — While a nice windshield may be good for visibility for forward-facing passengers, there is no need to have a large unobstructed view for safety. The windshield can be reinforced with bars, for example, allowing it to be much stronger in the case of impacts, notably impacts with animals. Other than for passenger comfort, the windshield barely has to be there at all. On behalf of everyone who has ever driven in Australia at dusk … I for one welcome our new robot chauffeurs. (via The Atlantic)
- Bitcoin Set to Overtake Paypal Transaction Volumes — “In the next one or two years, Bitcoin can surpass the dollar transaction volumes of other established payment companies including Discover, and even American Express, MasterCard, and Visa,” said SmartMetric CEO Chaya Hendrick. (via Hamish McEwan)
- 1 in 5 Americans Has Their Physical Environment on the Internet (Quartz) — One in five adult American internet users already has a device at home that connects the physical environment to the internet, according to a Forrester Research report (paywall) out last week.
Funnel Tool, Security Tools, Inside Mac Malware, and Everything is Broken
- EventHub — open source funnel/cohort/a-b analysis tool.
- Mantra — a collection of free/open source security tools, integrated into a browser (Firefox or Chromium).
- Reverse Engineering Mac Malware (PDF) — fascinating to see how it’s shipped, bundled, packaged, and distributed.
- Everything is Broken (Quinn Norton) — Computers have gotten incredibly complex, while people have remained the same gray mud with pretensions of Godhood. Today’s required read, because everything is broken and it’s the defining characteristic of this age of software. We have built computers in our image: our cancerous STD-addled diabetic alcoholic lead-sniffing telomere-decaying bacteria- and virus-addled image.
Surveillance Devices, Economic Apologies, Logo Trends, and Block Chain API
- Your Coffee Machine is Watching You (Mary Beard) — the future of surveillance isn’t more CCTV cameras, it’s every device ratting you out, all the time.
- Economics of Apologies — apologies work to restore relationships but are costly for the apologiser.
- Logo Trends — Dimension and detail are necessarily removed so that these logos read properly on mobile screens. Designs have become more and more flat. Surfaces are plain and defined by mono-weight lines. Great examples.
- Chain — the Block Chain API for developers.