- Automated Essay Grading To Come to EdX (NY Times) — shortly after we get software that writes stories for us, we get software to read them for us.
- AMD Calls End of Moore’s Law in Ten Years (ComputerWorld) — story based on this video, where Michio Kaku lays out the timeline for Moore’s Law’s wind-down and the spin-up of new technology.
- Addressing Human Trafficking Through Technology (danah boyd) — technologists love to make tech and then assert it’ll help people. Danah’s work on teens and now trafficking steers us to do what works, rather than what is showy or easiest.
- Product Management (Rowan Simpson) — hand this to anyone who asks what product management actually is. Excellent explanation.
ENTRIES TAGGED "social software"
Electric Monks, Moore's Law's Death Spiral, Trafficking Technology, and Product Management
Obfuscation, Logging, Copyright, and Control
- The Obfuscation of Culture — Tumblr and LJ users sep ar ate w ords thr ou gh o dd spacin g in o rde r to fo ol sea rc h en g i nes. Chinese users hide political messages in image attachments to seemingly benign posts on Weibo. General Pretraeus communicated solely through draft mode. 4chan scares away the faint of heart with porn. More technically astute groups communicate through obscure messaging systems. (via Beta Knowledge)
- log2viz — an open-source demonstration of the logs-as-data concept for Heroku apps. Log in and select one of your apps to see a live-updating dashboard of its web activity.
- Doctorow at LoC (YouTube) — video of Cory Doctorow’s talk on ebooks, libraries, and copyright at the Library of Congress.
- When TED Lost Control of its Crowd (HBR) — golden case study. You can’t “manage” a crowd—or a community—through transactional exchanges or economic incentives. You need something stronger: shared purpose
Ransom Money, High School CS, Wikipedia Links, and Social Teens
- Adventures in the Ransom Trade — between insurance, protection, and ransoms, Sean Gourley describes it as “one of the more interesting grey markets.” (via Sean Gourley)
- About High School Computer Science Teachers (Selena Deckelmann) — Selena gets an education in the state of high school computer science education.
- Learning From Big Data (Google Research) — the Wikilinks Corpus: 40 million total disambiguated mentions within over 10 million web pages [...] The mentions are found by looking for links to Wikipedia pages where the anchor text of the link closely matches the title of the target Wikipedia page. If we think of each page on Wikipedia as an entity (an idea we’ve discussed before), then the anchor text can be thought of as a mention of the corresponding entity.
- Teens Have Always Gone Where Identity Isn’t — if you look back at one of the first dominant social platforms, AOL Instant Messenger, it looks a lot like the pseudonymous Tumblr and Snapchat of today in many respects. You used an avatar that was not your face. Your screenname was not indexed and not personally identifiable (mine was Goober1310).
Chrome's Speed Tricks, Military's IRC, HTTP's REPL, and Inductive Mice
- High Performance Networking in Google Chrome — far more than you ever wanted to know about how Chrome is so damn fast.
- Tactical Chat — how the military uses IRC to wage war.
- http-console — a REPL loop for HTTP.
- Inductive Charger for Magic Mouse — my biggest bugbear with Bluetooth devices is the incessant appetite for batteries. Huzzah!
Top Chinese Memes, Raising Quality, Retro Browsing, and The Clicks of the Dead
- Top 10 Chinese Internet Memes of 2012 — most are political, unlike Overly Attached Girlfriend.
- Evaporative Cooling — thoughtful piece about the tendency of event quality to trend down unless checked by invisible walls. (via Hacker News)
- What Was It Like to Browse the Web in the 90s? (Quora) — it was awesome, because the alternative was television. Couple of whiny “you won’t believe how hard we had it” posts, from people who obviously believe that everyone in history has been miserable because they don’t have it as good as we do now. And, thus, by extension, we are miserable because we don’t have it as good as future generations of silver-robot-bearing flying-car-driving humans.
- Why Are Dead People Liking Stuff on Facebook? (ReadWrite Web) — a good question.
Future is Burked, P2P Currency, Stuff That Matters, and Avatar Widget
- James Burke at dConstruct — transcription of his talk. EPIC. I love this man and could listen to him all day long. (via Keith Bolland)
- Mechanism Design on Trust Networks (CiteSeerX) — academic paper behind the Ripple Bitcoin-esque open source peer-payment digital currency.
- What If Money Was No Object (YouTube) — about finding your way to stuff that matters, and worth it just for the last lines. (via Rowan Simpson)
- photobooth-js (GitHub) — BSD-licensed html5 widget that allows users to take their avatar pictures on your site.
Relativity Toys, Removing Metrics, Parallel Open Source, and Text Karaoke
- A Slower Speed of Light — game where you control the speed of light and discover the wonders of relativity. (via Andy Baio)
- Facebook Demetricator — removes all statistics and numbers from Facebook’s chrome (“37 people like this” becomes “people like this”). (via Beta Knowledge)
- Rx — Microsoft open sources their library for composing asynchronous and event-based programs using observable sequences and LINQ-style query operators.
- Typing Karaoke — this is awesome. Practice typing to song lyrics. With 8-bit aesthetic for maximum quirk.
DIY Thermal Camera, Watching Trolls Wither, Discovering Dark Social, and Student Mobile Phone Use
- Cheap Thermocam — cheap thermal imaging camera, takes about a minute to capture an image. (via IEEE Spectrum)
- Observations on What’s Getting Downvoted (Ars Technica) — fascinating piece of social work, showing how the community polices (or reacts to) trolls. (via Hacker News)
- Dark Social (The Atlantic) — Just look at that graph. On the one hand, you have all the social networks that you know. They’re about 43.5 percent of our social traffic. On the other, you have this previously unmeasured darknet that’s delivering 56.5 percent of people to individual stories. This is not a niche phenomenon! It’s more than 2.5x Facebook’s impact on the site.
- A Tethered World — All students, across all 56 represented countries, are doing generally the same few things. Facebook and Twitter, above all else, are the predominant tools for all information use among the participants. The predominance of these few tools are creating a homogenizing influence around the world.
Code Typing Tutor,
- typing.io — a typing tutor for code.
- Sheep to Warn Shepherds of Wolf Attack by SMS — around 10 sheep were each equipped with a heart monitor before being targeted by a pair of Wolfdogs—both of which were muzzled. (via Beta Knowledge)
- New Species Found on Flickr (NPR) — Guek had noticed the insect while hiking the jungles of Malaysia, taken the photos, and then watched it fly away. I just love the idea of entomologists bringing up richly-coloured hi-res shots of insects from Flickr. Can’t figure out whether to parody as porn fetish or as if they were using movie tech (“can we enhance that?”)
- Position Correcting Tools for 2D Digital Fabrication — in our approach, the user coarsely positions a frame containing the tool in an approximation of the desired path, while the device tracks the frame’s location and adjusts the position of the tool within the frame to correct the user’s positioning error in real time. Because the automatic positioning need only cover the range of the human’s positioning error, this frame can be small and inexpensive, and because the human has unlimited range, such a frame can be used to precisely position tools over an unlimited range.
Twitter Rainbow, Bitcoin Card, SSL/SSH Keys, and Internet Safety
- Uncertain Rainbow — Chris McDowall’s artistic Twitter experiment. Just how important are people to your social software? Described in this blog post.
- 8 Weeks Until BitCoin Debit/Credit Card — with an option to hold the value in BitCoins until it’s used. (Is this the same as denominated in BitCoins?)
- LittleBlackBox (Google Code) — a collection of thousands of private SSL and SSH keys extracted from various embedded devices. These private keys are stored in a database where they are correlated with their public certificates as well as the hardware/firmware that are known to use those private keys. (via Pedram Amini)
- Internet Safety Talking Points — pro-Internet, pro-safety, pro-teaching, anti-isolationism. Very nice.