# ENTRIES TAGGED "sensor network"

## Four short links: 9 October 2013

### Android Malware Numbers, Open Networking Hardware, Winning with Data, and DIY Pollution Sensor

1. Android Malware Numbers — (Quartz) less than an estimated 0.001% of app installations on Android are able to evade the system’s multi-layered defenses and cause harm to users, based on Google’s analysis of 1.5B downloads and installs.
2. Facebook Operations Chief Reveals Open Networking Plan — long interview about OCP’s network project. The specification that we are working on is essentially a switch that behaves like compute. It starts up, it has a BIOS environment to do its diagnostics and testing, and then it will look for an executable and go find an operating system. You point it to an operating system and that tells it how it will behave and what it is going to run. In that model, you can run traditional network operating systems, or you can run Linux-style implementations, you can run OpenFlow if you want. And on top of that, you can build your protocol sets and applications.
3. How Red Bull Dominates F1 (Quartz) — answer: data, and lots of it.
4. Ground-Level Air Pollution Sensor (Make) — neat sensor project from Make.

## Four short links: 24 September 2013

### Camera Heart Rate, Low Power Location, Quantified Self Radio, and a Multi Sensor

1. Measuring Heart Rate with a Smartphone Camera — not yet realtime, but promising sensor development.
2. iBeaconslow-power, short-distance location monitoring beacons. Any iOS device that supports Bluetooth Low Energy can become an iBeacon, and can detect other iBeacons when they are nearby. Apps can be notified when iBeacons move in and out of range of the device, and can monitor the proximity of iBeacons as their proximity changes over time.
3. Analysis: The Quantified Self (BBC) — radio show on QS. Good introduction for the novice.
4. Tinke — heart rate, blood oxygen, respiration rate, and heart rate variability in a single small sensor that plugs into your iOS device.
Comment |

## Four short links: 23 July 2013

### Security Sensor, Mobile Speed, Rate Limiting, and Self-Assembling Drone

1. Canary (IndieGogo) — security sensor with video, motion, temperature, microphone, speaker, accelerometer, and smartphone remote control.
2. Page Speed is Only The Beginning73% of mobile internet users say they’ve encountered Web pages that are too slow. A 1 second delay can result in a 7% reduction in conversions.
3. Rate Limiting and Velocity Checking (Jeff Atwood) — I was shocked how little comprehensive information was out there on rate limiting and velocity checking for software developers, because they are your first and most important line of defense against a broad spectrum of possible attacks. It’s amazing how many attacks you can mitigate or even defeat by instituting basic rate limiting. (via Alex Dong)
4. Self-Assembling Multicopter (DIY Drones) — The true accomplishment of this research is that there is not one robot in control – each unit in itself decides what actions to take to keep the group in the air in what’s known as Distributed Flight Array. (via Slashdot)
Comment |

## Four short links: 20 May 2013

### Positive Copyright Coalition, Programmable World, Clever Inventors Interviewed, and Weighty Words

1. Our Fair Deal — international coalition (EFF, InternetNZ, Demand Progress, Creative Freedom Foundation, many others) raising awareness and petitioning lawmakers to reject copyright proposals that restrict the open Internet, access to knowledge, economic opportunity and our fundamental rights. (via Susan Chalmers)
2. Welcome to the Programmable World (Wired) — For the Programmable World to reach its full potential, we need to pass through three stages. The first is simply the act of getting more devices onto the network—more sensors, more processors in everyday objects, more wireless hookups to extract data from the processors that already exist. The second is to make those devices rely on one another, coordinating their actions to carry out simple tasks without any human intervention. The third and final stage, once connected things become ubiquitous, is to understand them as a system to be programmed, a bona fide platform that can run software in much the same manner that a computer or smartphone can. (via Sacha Judd)
3. Inventables On The Road (YouTube) — new series where the Inventables folks interview their customers to show awesome projects. We’re trying to demystify the process of digital fabrication, give some visibility to people working on interesting things, and have some fun.
4. Psychological Pitfalls and Lessons of a Designer Founder (Aza Raskin) — You are a founder, which means each word you say lands like an anvil. Even in a very small company, and especially in a larger one, it takes fortitude and courage for a team member to honestly critique your work. The courage required isn’t a one-time cost. It’s incurred every single time. By nature of being a founder, you are used to saying things with charisma and force and you will undoubtedly be excited by your solution and argue for it. This just makes it worse. A final note: it doesn’t matter how nice you are, or how close you are to your team. As a founder, your words are always more powerful than you think.

## Four short links: 25 March 2013

### Analytics vs Learning, Reproducible Science, Ramping up Military Internet Attacks, and Compressed Sensing

1. Analytics for LearningSince doing good learning analytics is hard, we often do easy learning analytics and pretend that they are good instead. But pretending doesn’t make it so. (via Dan Meyer)
2. Reproducible Research — a list of links to related work about reproducible research, reproducible research papers, etc. (via Stijn Debrouwere)
3. Pentagon Deploying 100+ Cyber TeamsThe organization defending military networks — cyber protection forces — will comprise more than 60 teams, a Pentagon official said. The other two organizations — combat mission forces and national mission forces — will conduct offensive operations. I’ll repeat that: offensive operations.
4. Towards Deterministic Compressed Sensing (PDF) — instead of taking lots of data, compressing by throwing some away, can we only take a few samples and reconstruct the original from that? (more mathematically sound than my handwaving explanation). See also Compressed sensing and big data from the Practical Quant. (via Ben Lorica)
Comment |

## Four short links: 30 January 2013

### Cheap Attack Drones, Truth Filters, Where Musicians Make Money, and Dynamic Pricing From Digitized Analogue Signals

1. Chinese Attack UAV (Alibaba) — Small attack UAV is characterized with small size, light weight, convenient carrying, rapid outfield expansion procedure, easy operation and maintenance; the system only needs 2-3 operators to operate, can be carried by surveillance personnel to complete the attack mission. (via BoingBoing)
2. TruthTeller Prototype (Washington Post) — speech-to-text, then matches statements against known facts to identify truth/falsehoods. Still a prototype but I love that, in addition to the Real Time Coupon Specials From Hot Singles Near You mobile advertising lens, there might be a truth lens that technology helps us apply to the world around us.
3. Money from Music: Survey Evidence on Musicians’ Revenue and Lessons About Copyright Incentives — 5,000 American musicians surveyed, For most musicians, copyright does not provide much of a direct financial reward for what they are producing currently. The survey findings are instead consistent with a winner-take-all or superstar model in which copyright motivates musicians through the promise of large rewards in the future in the rare event of wide popularity. This conclusion is not unfamiliar, but this article is the first to support it with empirical evidence on musicians’ revenue. (via TechDirt)
4. Max Levchin’s DLD13 KeynoteI believe the next big wave of opportunities exists in centralized processing of data gathered from primarily analog systems. [...] There is also a neat symmetry to this analog-to-digtail transformation — enabling centralization of unique analog capacities. As soon as the general public is ready for it, many things handled by a human at the edge of consumption will be controlled by the best currently available human at the center of the system, real time sensors bringing the necessary data to them in real time.
Comment |

## Four short links: 3 January 2013

### Historic Social Media, Latency Numbers, Quantified Auto, and I Feel Old

1. Community Memory (Wired) — In the early 1970s, Efrem Lipkin, Mark Szpakowski and Lee Felsenstein set up a series of these terminals around San Francisco and Berkeley, providing access to an electronic bulletin board housed by a XDS-940 mainframe computer. This started out as a social experiment to see if people would be willing to share via computer — a kind of “information flea market,” a “communication system which allows people to make contact with each other on the basis of mutually expressed interest,” according to a brochure from the time. What evolved was a proto-Facebook-Twitter-Yelp-Craigslist-esque database filled with searchable roommate-wanted and for-sale items ads, restaurant recommendations, and, well, status updates, complete with graphics and social commentary. But did it have retargeted ads, promoted tweets, and opt-in messages from partners? I THOUGHT NOT. (via BoingBoing)
2. Latency Numbers Every Programmer Should Know (EECS Berkeley) — exactly that. I was always impressed by Artur Bergman’s familiarity with the speed of packets across switches, RAM cache misses, and HDD mean seek times. Now you can be that impressive person.
3. Feds Requiring Black Boxes in All Vehicles (Wired) — [Q]uestions remain about the black boxes and data. Among them, how long should a black box retain event data, who owns the data, can a motorist turn off the black box and can the authorities get the data without a warrant. This is starting as regulatory compliance, but should be seized as an opportunity to have a quantified self.
4. Average Age of StackExchange Users by Tag (Brian Bondy) — no tag is associated with people who have a mean age over 30. Did I miss the plague that wiped out all the programmers over the age of 30? Or does age bring with it supreme knowledge so that old people like me never have to use StackExchange? Yes, that must be it. *cough*

## Four short links: 4 May 2012

### Statistical Fallacies, Sensors via Microphone, Peak Plastic, and Go Web Framework

1. Common Statistical Fallacies (Flowing Data) — once you know to look for them, you see them everywhere. Or is that confirmation bias?
2. Project HijackHijacking power and bandwidth from the mobile phone’s audio interface.
Creating a cubic-inch peripheral sensor ecosystem for the mobile phone.
3. Peak Plastic — Deb Chachra points out that if we’re running out of oil, that also means that we’re running out of plastic. Compared to fuel and agriculture, plastic is small potatoes. Even though plastics are made on a massive industrial scale, they still account for less than 10% of the world’s oil consumption. So recycling plastic saves plastic and reduces its impact on the environment, but it certainly isn’t going to save us from the end of oil. Peak oil means peak plastic. And that means that much of the physical world around us will have to change. I hadn’t pondered plastics in medicine before. (via BoingBoing)
4. web.go (GitHub) — web framework for the Go programming language.
Comment: 1 |

## Four short links: 29 March 2012

### Tricorder, Microsoft and Open Source, Crime is Freedom's Contra, and Government Cybercrime

1. Tricorder Project — open sourced designs for a tricorder, released as part of the Qualcomm Tricorder X Prize. (via Slashdot)
2. Microsoft’s New Open Sourced Stacks (Miguel de Icaza) — not just open sourced (some of the code had been under MS Permissive License before, now it’s Apache) but developed in public with git: ASP.NET MVC, ASP.NET Web API, ASP.NET Web Pages v2. The Azure SDK is also on github.
3. In An Internet Age, Crime is Essential to Freedom (Donald Clark) — when a criminal asks: “How do I secure payment and store my ill-gotten gains”, somewhere else, a refugee asks: “How can I send funds back to a relative such that they can’t be traced to me”.
4. NSA: China Behind RSA Attacks (Information Week) — I can argue both sides about whether government cloud services are a boon or a curse for remote information thieves. Looking forward to seeing how it plays out.
Comment |

## Four short links: 1 March 2012

### Crowdsourced Monitoring, DIY Neurobio, A Plethora of Memory Stick Computers

1. Crowdsourcing Radiation Data in Japan (Freaklabs) — wardriving pollution detection.
2. Backyard Brains — measuring electrical activity of a neuron in a cockroach leg. Astonishing how much science is within the reach of backyard hackers now. (via BoingBoing)
3. Cotton Candy Stick Pre-Orders — a $200 Android computer on a USB stick, with HDMI out etc. 4. Raspberry Pi Launches —$35 USB+CPU+video+audio ships. Interesting that both of these have come to fruition at the same time. Something is in the air. How will the world change when every memory stick is a computer, not just every phone?
Comment |