"social software" entries

Four short links: 12 January 2015

Four short links: 12 January 2015

Designed-In Outrage, Continuous Data Processing, Lisp Processors, and Anomaly Detection

  1. The Toxoplasma of RageIt’s in activists’ interests to destroy their own causes by focusing on the most controversial cases and principles, the ones that muddy the waters and make people oppose them out of spite. And it’s in the media’s interest to help them and egg them on.
  2. Samza: LinkedIn’s Stream-Processing EngineSamza’s goal is to provide a lightweight framework for continuous data processing. Unlike batch processing systems such as Hadoop, which typically has high-latency responses (sometimes hours), Samza continuously computes results as data arrives, which makes sub-second response times possible.
  3. Design of LISP-Based Processors (PDF) — 1979 MIT AI Lab memo on design of hardware specifically for Lisp. Legendary subtitle! LAMBDA: The Ultimate Opcode.
  4. rAnomalyDetection — Twitter’s R package for detecting anomalies in time-series data. (via Twitter Engineering blog)
Comment
Four short links: 8 January 2015

Four short links: 8 January 2015

Social Strangers, Code Analysis, Bogus Copyright, and Developer Podcasts

  1. Jane Jacobs on Strangers (Nina Simon) — Many of us live in towns where we rarely have the opportunity for this kind of anonymous, safe, positive social contact. This is a problem. It means we smile less at strangers. We take care of each other less. We fear it opens up a social contract for too much more. There’s an analogous gap in online social media, where it feels like there are all too few social contract-building public Internet spaces.
  2. PANDAan open-source Platform for Architecture-Neutral Dynamic Analysis. It is built upon the QEMU whole system emulator, so analyses have access to all code executing in the guest and all data. PANDA adds the ability to record and replay executions, enabling iterative, deep, whole system analyses. Further, the replay log files are compact and shareable, allowing for repeatable experiments.
  3. Ford Using Copyright Against Third-Party Repair Tool Company (EFF) — Ford claims that it owns a copyright on this list of parts, the “FFData file,” and thus can keep competitors from including it in their diagnostic tools.
  4. The Ultimate List of Developer Podcasts — what it says on the label.
Comment: 1
Four short links: 2 January 2015

Four short links: 2 January 2015

Privacy Philosophy, Bitcoin Risks, Modelling Emotion, and Opinion Formation

  1. Google’s Philosopher — interesting take on privacy. Now that the mining and manipulation of personal information has spread to almost all aspects of life, for instance, one of the most common such questions is, “Who owns your data?” According to Floridi, it’s a misguided query. Your personal information, he argues, should be considered as much a part of you as, say, your left arm. “Anything done to your information,” he has written, “is done to you, not to your belongings.” Identity theft and invasions of privacy thus become more akin to kidnapping than stealing or trespassing. Informational privacy is “a fundamental and inalienable right,” he argues, one that can’t be overridden by concerns about national security, say, or public safety. “Any society (even a utopian one) in which no informational privacy is possible,” he has written, “is one in which no personal identity can be maintained.”
  2. S-1 for a Bitcoin Trust (SEC) — always interesting to read through the risks list to see what’s there and what’s not.
  3. Computationally Modelling Human Emotion (ACM) — our work seeks to create true synergies between computational and psychological approaches to understanding emotion. We are not satisfied simply to show our models “fit” human data but rather seek to show they are generative in the sense of producing new insights or novel predictions that can inform understanding. From this perspective, computational models are simply theories, albeit more concrete ones that afford a level of hypothesis generation and experimentation difficult to achieve through traditional theories.
  4. Opinion Formation Models on a Gradient (PLoSONE) — Many opinion formation models embedded in two-dimensional space have only one stable solution, namely complete consensus, in particular when they implement deterministic rules. In reality, however, deterministic social behavior and perfect agreement are rare – at least one small village of indomitable Gauls always holds out against the Romans. […] In this article we tackle the open question: can opinion dynamics, with or without a stochastic element, fundamentally alter percolation properties such as the clusters’ fractal dimensions or the cluster size distribution? We show that in many cases we retrieve the scaling laws of independent percolation. Moreover, we also give one example where a slight change of the dynamic rules leads to a radically different scaling behavior.
Comment
Four short links: 18 December 2014

Four short links: 18 December 2014

Manufacturer Rootkits, Dangerous Dongle, Physical Visualisation, and Cryptoed Comms

  1. Popular Chinese Android Smartphone Backdoored By ManufacturerCoolpad is the third largest smartphone builder in China, and ranks sixth worldwide with 3.7 percent global market share. It trails only Lenovo and Xiaomi in China and is the leader of China’s 4G market with 16 percent market share. Coolpad outsells Samsung and Apple in China, and has said it plans to expand globally with a goal of 60 million phones worldwide. For now, its high-end Halo Dazen phones are the only ones containing the backdoor, Palo Alto said. Backdoor enabled installation of other apps, dial numbers, send messages, and report back to the mothership. The manufacturer even ran the command-and-control nodes for the malware.
  2. USB Driveby — dongle that plugs into USB, and tries to root the box. Specifically, when you normally plug in a mouse or keyboard into a machine, no authorization is required to begin using them. The devices can simply begin typing and clicking. We exploit this fact by sending arbitrary keystrokes meant to launch specific applications (via Spotlight/Alfred/Quicksilver), permanently evade a local firewall (Little Snitch), install a reverse shell in crontab, and even modify DNS settings without any additional permissions.
  3. Physical Data Visualisationsa chronological list of physical visualizations and related artifacts. (via Flowing Data)
  4. Dissentan anonymous communication substrate intended primarily for applications built on a broadcast communication model: for example, bulletin boards, wikis, auctions, or voting. Users of an online group obtain cryptographic guarantees of sender and receiver anonymity, message integrity, disruption resistance, proportionality, and location hiding. And a pony.
Comment
Four short links: 21 November 2014

Four short links: 21 November 2014

Power Assist, Changing Minds, Inside Index, and Poop History

  1. Wearable Power Assist Device Goes on Sale in Japan (WSJ, Paywall) — The Muscle Suit, which weighs 5.5 kilograms (12 pounds), can be worn knapsack-style and uses a mouthpiece as its control. Unlike other similar suits that rely on motors, it uses specially designed rubber tubes and compressed air as the source of its power. The Muscle Suit can help users pick up everyday loads with about a third of the usual effort. […] will sell for about ¥600,000 ($5,190), and is also available for rent at about ¥30,000 to ¥50,000 per month. Prof. Kobayashi said he expected the venture would ship 5,000 of them in 2015. (via Robot Economics)
  2. Debunking Handbook — techniques for helping people to change their beliefs (hint: showing them data rarely does it). (via Tom Stafford)
  3. Building a Complete Tweet Index (Twitter) — engineering behind the massive searchable Tweet collection: indexes roughly half a trillion documents and serves queries with an average latency of under 100ms.
  4. History of the Poop Emoji (Fast Company) — In Japanese, emoji are more like characters than random animated emoticons.
Comment: 1
Four short links: 20 November 2014

Four short links: 20 November 2014

Postmortems, Cloud Triggers, IoT Desires, and Barbie Can Code

  1. The Infinite Hows (John Allspaw) — when finding ways to improve systems to prevent errors, the process of diagnosis should be focused on the systems and less on the people. (aka “human error” is the result of a preceding systems error.) (aka “design for failure.”)
  2. Amazon Lambda — triggers in the cloud.
  3. Enchanted Objects (PNG) — organizing the Internet of Thing by human desires. (via Designing the Enchanted Future)
  4. Barbie Remixed (PDF) — brilliant remix of a book that missed the mark into one that hits the bullseye.
Comment
Four short links: 10 November 2014

Four short links: 10 November 2014

Metascience, Bio Fab, Real-time Emoji, and Phone Library

  1. Metascience Could Rescue the Replication Crisis (Nature) — Metascience, the science of science, uses rigorous methods to examine how scientific practices influence the validity of scientific conclusions. (via Ed Yong)
  2. OpenTrons (Kickstarter) — 3d-printer style frame for micropipetting, magnetic micro-bead washes, and photography. Open source and kickstarterated. (via Evil Mad Scientist)
  3. Emoji Tracker — real-time emoji use across Twitter. (via Chris Aniszczyk)
  4. libphonenumber — open source Google’s common Java, C++ and Javascript library for parsing, formatting, storing and validating international phone numbers. The Java version is optimized for running on smartphones, and is used by the Android framework since 4.0 (Ice Cream Sandwich).
Comment
Four short links: 30 October 2014

Four short links: 30 October 2014

Security and Privacy, ISP Measurement, Github for Education, and Mobile Numbers

  1. A Critique of the Balancing Metaphor in Privacy and SecurityThe arguments presented by this paper are built on two underlying assertions. The first is that the assessment of surveillance measures often entails a judgement of whether any loss in privacy is legitimised by a justifiable increase in security. However, one fundamental difference between privacy and security is that privacy has two attainable end-states (absolute privacy through to the absolute absence of privacy), whereas security has only one attainable end-state (while the absolute absence of security is attainable, absolute security is a desired yet unobtainable goal). The second assertion, which builds upon the first, holds that because absolute security is desirable, new security interventions will continuously be developed, each potentially trading a small measure of privacy for a small rise in security. When assessed individually each intervention may constitute a justifiable trade-off. However, when combined together, these interventions will ultimately reduce privacy to zero. (via Alistair Croll)
  2. ISP Interconnection and its Impact on Consumer Internet Performance (Measurement Lab) — In researching our report, we found clear evidence that interconnection between major U.S. access ISPs (AT&T, Comcast, CenturyLink, Time Warner Cable, and Verizon) and transit ISPs Cogent, Level 3, and potentially XO was correlated directly with degraded consumer performance throughout 2013 and into 2014 (in some cases, ongoing as of publication). Degraded performance was most pronounced during peak use hours, which points to insufficient capacity and congestion as a causal factor. Further, by noting patterns of performance degradation for access/transit ISP pairs that were synchronized across locations, we were able to conclude that in many cases degradation was not the result of major infrastructure failures at any specific point in a network, but rather connected with the business relationships between ISPs.
  3. The Emergence of Github as Collaborative Platform for Education (PDF) — We argue that GitHub can support much of what traditional learning systems do, as well as go beyond them by supporting collaborative activities.
  4. Mobile is Eating the World (A16Z) — mobile becoming truly ubiquitous, bringing opportunities to use the construct “X is eating Y.”
Comment
Four short links: 27 October 2014

Four short links: 27 October 2014

Maker Education, Content Moderators, New Microscopy, and Hardware Emulation in LaTeX

  1. Progressive Education and the Maker Movement (PDF) — Gary Stager paper on how constructivist education (learning happens best via experience) and the Maker movement need each other. (via Paula Hogg)
  2. Content Moderation (Wired) — “content moderators” are the people paid to weed out beheadings, pornography, etc. from photo and video sites. By at least one estimate, the number of content moderators scrubbing the world’s social media sites, mobile apps, and cloud storage services runs to “well over 100,000”—that is, about twice the total head count of Google and nearly 14 times that of Facebook.
  3. Amazing New Microscope (National Geographic) — Lattice light sheet microscopy takes amazing movies, completely with Matrix-can freeze-and-rotate, from the recipient of this year’s Nobel Prize for Chemistry.
  4. avremu — an AVR (the chip inside the Arduino) emulator written in LaTeX. Yes, LaTeX.
Comment
Four short links: 29 September 2014

Four short links: 29 September 2014

Feedback Surprises, Ownership Changes, Teaching Lessons, and 3D Retail

  1. How Community Feedback Shapes Behaviour (PDF) — Not only do authors of negatively-evaluated content contribute more, but also their future posts are of lower quality, and are perceived by the community as such. Moreover, these authors are more likely to subsequently evaluate their fellow users negatively, percolating these effects through the community. In contrast, positive feedback does not carry similar effects, and neither encourages rewarded authors to write more, nor improves the quality of their posts. Interestingly, the authors that receive no feedback are most likely to leave a community. Furthermore, a structural analysis of the voter network reveals that evaluations polarize the community the most when positive and negative votes are equally split.
  2. When Everything Works Like Your Cell Phone (The Atlantic) — our relationship to ownership is about to undergo a wild transformation.
  3. Teaching Me Softly — article of anecdotes drawing parallels between case studies in machine learning and things we know about human learning.
  4. SuperAwesome Me (3D Print) — Walmart to install 3d scanning booths and 3d printers so you can put your own head on a Hasbro action figure. Hasbro have the religion: they also paired with Shapeways for superfanart.com. (via John Battelle)
Comment