UK Copyright Law Permits Researchers to Data Mine — changes mean Copyright holders can require researchers to pay to access their content but cannot then restrict text or data mining for non-commercial purposes thereafter, under the new rules. However, researchers that use the text or data they have mined for anything other than a non-commercial purpose will be said to have infringed copyright, unless the activity has the consent of rights holders. In addition, the sale of the text or data mined by researchers is prohibited. The derivative works will be very interesting: if university mines the journals, finds new possibility for a Thing, is verified experimentally, is that Thing the university’s to license commercially for profit?
Efficient Online Summary of Microblogging Streams (PDF) — research paper. The algorithm we propose uses a word graph, along with optimization techniques such as decaying windows and pruning. It outperforms the baseline in terms of summary quality, as well as time and memory efficiency.
Statistical Shortcomings in Standard Math Libraries — or “Why C Derivatives Are Not Popular With Statistical Scientists”. The following mathematical functions are necessary for implementing any rudimentary statistics application; and yet they are general enough to have many applications beyond statistics. I hereby propose adding them to the standard C math library and to the libraries which inherit from it. For purposes of future discussion, I will refer to these functions as the Elusive Eight.
fail2ban — open source tool that scans logfiles for signs of malice, and triggers actions (e.g., iptables updates).
Apple’s Secure Database for Users (Ian Waring) — excellent breakdown of how Apple have gone out of their way to make their cloud database product safe and robust. They may be slow to “the cloud” but they have decades of experience having users as customers instead of products.
Ethics and UX Design (Slideshare) –We are the thieves of time. This excellent talk challenges you (via Aristotle) to understand what a good life is, and whether you’re designing to bring it about. (via Keith Bolland)
Pepper Personal Robot — Japan’s lead in consumer-facing robotics is impressive. If this had been developed by an American company, it’d either have a Lua scripting interface or twin machine guns for autonomous death.
shrturl — spoof, edit, rewrite, and general evil up webpages, hidden behind an URL shortening service.
Lessons for Building Magical Devices (First Round Review) — The most interesting devices I’ve seen take elements of the physical world and expose them to software.[...] If you buy a Tesla Model S today, the behavior of the car six months from now could be radically different because software can reshape the capability of the hardware continuously, exceeding the speed of customer demand.
End-to-End PGP in Gmail — Google releases an open source Chrome extension to enable end-to-end OpenPGP on top of gmail. This is a good thing. As noted FSF developer Ben Franklin wrote: Those who would give up awkward key signing parties to purchase temporary convenience deserve neither.
Maciej Ceglowski on Our Internet — If you haven’t already read this because someone pushed it into your hands, read it now. If these vast databases are valuable enough, it doesn’t matter who they belong to. The government will always find a way to query them. Who pays for the servers is just an implementation detail.
Design Changes Possible With Robot Cars (Brad Templeton) — While a nice windshield may be good for visibility for forward-facing passengers, there is no need to have a large unobstructed view for safety. The windshield can be reinforced with bars, for example, allowing it to be much stronger in the case of impacts, notably impacts with animals. Other than for passenger comfort, the windshield barely has to be there at all. On behalf of everyone who has ever driven in Australia at dusk … I for one welcome our new robot chauffeurs. (via The Atlantic)
Everything is Broken (Quinn Norton) — Computers have gotten incredibly complex, while people have remained the same gray mud with pretensions of Godhood. Today’s required read, because everything is broken and it’s the defining characteristic of this age of software. We have built computers in our image: our cancerous STD-addled diabetic alcoholic lead-sniffing telomere-decaying bacteria- and virus-addled image.
Logo Trends — Dimension and detail are necessarily removed so that these logos read properly on mobile screens. Designs have become more and more flat. Surfaces are plain and defined by mono-weight lines. Great examples.
Mozilla’s Winter of Security — Students who have to perform a semester project as part of their university curriculum can apply to one of the MWOS project. Projects are guided by a Mozilla Adviser, and a University Professor. Students are graded by their University, based on success criteria identified at the beginning of the project. Mozilla Advisers allocate up to 2 hours each week to their students, typically on video-conference, to discuss progress and roadblocks.
The Financial Future of Game Developers (Raph Koster) — Today, a console is really just a hardware front end to a digital publisher/distribution network/storefront. [...] Any structure that depends solely on blockbusters is not long for this world, because there is a significant component of luck in what drives popularity, so every release is literally a gamble. [...] The median game uploaded to the App Store makes zero dollars. It starts great and just gets better. Koster is on fire! He scores again! GOOOOOOOOOOOOOOOAL!