- Practical HTTP Host Header Attacks — lots of cleverness like So, to persuade a cache to serve our poisoned response to someone else we need to create a disconnect between the host header the cache sees, and the host header the application sees. In the case of the popular caching solution Varnish, this can be achieved using duplicate Host headers. Varnish uses the first host header it sees to identify the request, but Apache concatenates all host headers present and Nginx uses the last host header.
- Madeye — collaborative code editing inside a Google Hangout. (via Andy Baio)
- Too Momentous for the Medium — Whatever you now find weird, ugly, uncomfortable and nasty about a new medium will surely become its signature. CD distortion, the jitteriness of digital video, the crap sound of 8-bit – all of these will be cherished and emulated as soon as they can be avoided. It’s the sound of failure: so much modern art is the sound of things going out of control, of a medium pushing to its limits and breaking apart. The distorted guitar sound is the sound of something too loud for the medium supposed to carry it. The blues singer with the cracked voice is the sound of an emotional cry too powerful for the throat that releases it. The excitement of grainy film, of bleached-out black and white, is the excitement of witnessing events too momentous for the medium assigned to record them. (Brian Eno’s words)
- Where the Happy Talk about Corporate Culture is All Wrong (NY Times) — I think there are two types of happiness in a work culture: Human Resources Happy and High Performance Happy. Fast-growth success has everything to do with the latter and nothing to do with the former. Lazy false opposition, and he describes an asshole-rich workplace that would only please a proctologist. (via Sara Winge)
ENTRIES TAGGED "social software"
Hacking HTTP Host Headers, Collaborative Coding, Glitch is the Overloaded Essence, and Crazy Culture
Electric Monks, Moore's Law's Death Spiral, Trafficking Technology, and Product Management
- Automated Essay Grading To Come to EdX (NY Times) — shortly after we get software that writes stories for us, we get software to read them for us.
- AMD Calls End of Moore’s Law in Ten Years (ComputerWorld) — story based on this video, where Michio Kaku lays out the timeline for Moore’s Law’s wind-down and the spin-up of new technology.
- Addressing Human Trafficking Through Technology (danah boyd) — technologists love to make tech and then assert it’ll help people. Danah’s work on teens and now trafficking steers us to do what works, rather than what is showy or easiest.
- Product Management (Rowan Simpson) — hand this to anyone who asks what product management actually is. Excellent explanation.
Obfuscation, Logging, Copyright, and Control
- The Obfuscation of Culture — Tumblr and LJ users sep ar ate w ords thr ou gh o dd spacin g in o rde r to fo ol sea rc h en g i nes. Chinese users hide political messages in image attachments to seemingly benign posts on Weibo. General Pretraeus communicated solely through draft mode. 4chan scares away the faint of heart with porn. More technically astute groups communicate through obscure messaging systems. (via Beta Knowledge)
- log2viz — an open-source demonstration of the logs-as-data concept for Heroku apps. Log in and select one of your apps to see a live-updating dashboard of its web activity.
- Doctorow at LoC (YouTube) — video of Cory Doctorow’s talk on ebooks, libraries, and copyright at the Library of Congress.
- When TED Lost Control of its Crowd (HBR) — golden case study. You can’t “manage” a crowd—or a community—through transactional exchanges or economic incentives. You need something stronger: shared purpose
Ransom Money, High School CS, Wikipedia Links, and Social Teens
- Adventures in the Ransom Trade — between insurance, protection, and ransoms, Sean Gourley describes it as “one of the more interesting grey markets.” (via Sean Gourley)
- About High School Computer Science Teachers (Selena Deckelmann) — Selena gets an education in the state of high school computer science education.
- Learning From Big Data (Google Research) — the Wikilinks Corpus: 40 million total disambiguated mentions within over 10 million web pages [...] The mentions are found by looking for links to Wikipedia pages where the anchor text of the link closely matches the title of the target Wikipedia page. If we think of each page on Wikipedia as an entity (an idea we’ve discussed before), then the anchor text can be thought of as a mention of the corresponding entity.
- Teens Have Always Gone Where Identity Isn’t — if you look back at one of the first dominant social platforms, AOL Instant Messenger, it looks a lot like the pseudonymous Tumblr and Snapchat of today in many respects. You used an avatar that was not your face. Your screenname was not indexed and not personally identifiable (mine was Goober1310).
Chrome's Speed Tricks, Military's IRC, HTTP's REPL, and Inductive Mice
- High Performance Networking in Google Chrome — far more than you ever wanted to know about how Chrome is so damn fast.
- Tactical Chat — how the military uses IRC to wage war.
- http-console — a REPL loop for HTTP.
- Inductive Charger for Magic Mouse — my biggest bugbear with Bluetooth devices is the incessant appetite for batteries. Huzzah!
Top Chinese Memes, Raising Quality, Retro Browsing, and The Clicks of the Dead
- Top 10 Chinese Internet Memes of 2012 — most are political, unlike Overly Attached Girlfriend.
- Evaporative Cooling — thoughtful piece about the tendency of event quality to trend down unless checked by invisible walls. (via Hacker News)
- What Was It Like to Browse the Web in the 90s? (Quora) — it was awesome, because the alternative was television. Couple of whiny “you won’t believe how hard we had it” posts, from people who obviously believe that everyone in history has been miserable because they don’t have it as good as we do now. And, thus, by extension, we are miserable because we don’t have it as good as future generations of silver-robot-bearing flying-car-driving humans.
- Why Are Dead People Liking Stuff on Facebook? (ReadWrite Web) — a good question.
Future is Burked, P2P Currency, Stuff That Matters, and Avatar Widget
- James Burke at dConstruct — transcription of his talk. EPIC. I love this man and could listen to him all day long. (via Keith Bolland)
- Mechanism Design on Trust Networks (CiteSeerX) — academic paper behind the Ripple Bitcoin-esque open source peer-payment digital currency.
- What If Money Was No Object (YouTube) — about finding your way to stuff that matters, and worth it just for the last lines. (via Rowan Simpson)
- photobooth-js (GitHub) — BSD-licensed html5 widget that allows users to take their avatar pictures on your site.
Relativity Toys, Removing Metrics, Parallel Open Source, and Text Karaoke
- A Slower Speed of Light — game where you control the speed of light and discover the wonders of relativity. (via Andy Baio)
- Facebook Demetricator — removes all statistics and numbers from Facebook’s chrome (“37 people like this” becomes “people like this”). (via Beta Knowledge)
- Rx — Microsoft open sources their library for composing asynchronous and event-based programs using observable sequences and LINQ-style query operators.
- Typing Karaoke — this is awesome. Practice typing to song lyrics. With 8-bit aesthetic for maximum quirk.
DIY Thermal Camera, Watching Trolls Wither, Discovering Dark Social, and Student Mobile Phone Use
- Cheap Thermocam — cheap thermal imaging camera, takes about a minute to capture an image. (via IEEE Spectrum)
- Observations on What’s Getting Downvoted (Ars Technica) — fascinating piece of social work, showing how the community polices (or reacts to) trolls. (via Hacker News)
- Dark Social (The Atlantic) — Just look at that graph. On the one hand, you have all the social networks that you know. They’re about 43.5 percent of our social traffic. On the other, you have this previously unmeasured darknet that’s delivering 56.5 percent of people to individual stories. This is not a niche phenomenon! It’s more than 2.5x Facebook’s impact on the site.
- A Tethered World — All students, across all 56 represented countries, are doing generally the same few things. Facebook and Twitter, above all else, are the predominant tools for all information use among the participants. The predominance of these few tools are creating a homogenizing influence around the world.
Code Typing Tutor,
- typing.io — a typing tutor for code.
- Sheep to Warn Shepherds of Wolf Attack by SMS — around 10 sheep were each equipped with a heart monitor before being targeted by a pair of Wolfdogs—both of which were muzzled. (via Beta Knowledge)
- New Species Found on Flickr (NPR) — Guek had noticed the insect while hiking the jungles of Malaysia, taken the photos, and then watched it fly away. I just love the idea of entomologists bringing up richly-coloured hi-res shots of insects from Flickr. Can’t figure out whether to parody as porn fetish or as if they were using movie tech (“can we enhance that?”)
- Position Correcting Tools for 2D Digital Fabrication — in our approach, the user coarsely positions a frame containing the tool in an approximation of the desired path, while the device tracks the frame’s location and adjusts the position of the tool within the frame to correct the user’s positioning error in real time. Because the automatic positioning need only cover the range of the human’s positioning error, this frame can be small and inexpensive, and because the human has unlimited range, such a frame can be used to precisely position tools over an unlimited range.