Brain Modem — a tiny sensor that travels through blood vessels, lodges in the brain and records neural activity. The “stentrode” (stent + electrode) is the size of a paperclip, and Melbourne researchers (funded by DARPA) have made the first successful animal trials.
Robots in American Law — This article closely examines a half century of case law involving robots. […] The first set highlights the role of robots as the objects of American law. Among other issues, courts have had to decide whether robots represent something “animate” for purposes of import tariffs, whether robots can “perform” as that term is understood in the context of a state tax on performance halls, and whether a salvage team “possesses” a shipwreck it visits with an unmanned submarine. (via BoingBoing)
Shmoocon 2016 Videos (Internet Archive) — videos of the talks from an astonishingly good security conference.
TipTalk — Samsung watchstrap that is the smart device … put your finger in your ear to hear the call. You had me at put my finger in my ear. (via WaPo)
Ecorithms — Leslie Valiant at Harvard broadened the concept of an algorithm into an “ecorithm,” which is a learning algorithm that “runs” on any system capable of interacting with its physical environment. Algorithms apply to computational systems, but ecorithms can apply to biological organisms or entire species. The concept draws a computational equivalence between the way that individuals learn and the way that entire ecosystems evolve. In both cases, ecorithms describe adaptive behavior in a mechanistic way.
Dataflow/Beam vs Spark (Google Cloud) — To highlight the distinguishing features of the Dataflow model, we’ll be comparing code side-by-side with Spark code snippets. Spark has had a huge and positive impact on the industry thanks to doing a number of things much better than other systems had done before. But Dataflow holds distinct advantages in programming model flexibility, power, and expressiveness, particularly in the out-of-order processing and real-time session management arenas.
Is Caffeine a Cognitive Enhancer? (PDF) — Two general mechanisms may account for most of the observed effects of caffeine on performance: (1) an indirect, non-specific ‘arousal’ or ‘processing resources’ factor, presumably explaining why the effects of caffeine are generally most pronounced when task performance is sustained or degraded under suboptimal conditions; and (2) a more direct and specific ‘perceptual-motor’ speed or efficiency factor that may explain why, under optimal conditions, some aspects of human performance and information processing, in particular those related to sensation, perception, motor preparation, and execution, are more sensitive to caffeine effects than those related to cognition, memory, and learning. See also Smith 2005‘s caffeine led to a more positive mood and improved performance on a number of tasks. Different effects of caffeine were seen depending on the person’s level of arousal. Linear effects of caffeine dose were also observed. This is evidence against the argument that behavioral changes due to caffeine are merely the reversal of negative effects of a long period of caffeine abstinence. (via cogsci.stackexchange.com)
On Stars and Thinking Things Through (Courtney Johnston) — Matt (to my eyes, anyway) doesn’t have a singular ‘thing’: he has this kind of spangly web of interests and skills that coalesces around a line of enquiry and results in the making or doing of a thing, and these things in turn become part of that web and generate further experiments and thinking. Seconded.
Human-like Robot — and just like a real woman, the first paragraphs about the robot focus on soft skin and flowing brunette hair not how well she does her job. Progress!
2015 CCC Videos — collected talks from the 32nd Chaos Computer Congress conference.
An Integrated Bayesian Approach for Effective Multi-Truth Discovery (PDF) — Integrating data from multiple sources has been increasingly becoming commonplace in both Web and the emerging Internet of Things (IoT) applications to support collective intelligence and collaborative decision-making. Unfortunately, it is not unusual that the information about a single item comes from different sources, which might be noisy, out-of-date, or even erroneous. It is therefore of paramount importance to resolve such conflicts among the data and to find out which piece of information is more reliable.
A Psychological Exploration of Engagement in Geek Culture — Seven studies (N = 2354) develop the Geek Culture Engagement Scale (GCES) to quantify geek engagement and assess its relationships to theoretically relevant personality and individual differences variables. These studies present evidence that individuals may engage in geek culture in order to maintain narcissistic self-views (the great fantasy migration hypothesis), to fulfill belongingness needs (the belongingness hypothesis), and to satisfy needs for creative expression (the need for engagement hypothesis). Geek engagement is found to be associated with elevated grandiose narcissism, extraversion, openness to experience, depression, and subjective well-being across multiple samples.
The Wild Wild East (The Economist) — Fung Retailing Limited, a related firm, has over 3,000 outlets, a third of them in China. Victor Fung, its honorary chairman, sees the era of mass production giving way to one of mass customization. Markets are fragmenting and smartphones are empowering consumers to get “directly involved in what they buy, where it is made and how they buy it.” Zhao Xiande of CEIBS in Shanghai points to Red Collar, a firm that used simply to make and export garments. Now it lets customers the world over design their own shirts online and makes them to order. Another outfit, Home Koo, offers custom-built furniture online.
Motivation for a Monolithic Codebase (YouTube) — interesting talk about Google’s codebase, the first time I know of that Google’s strategy for source code management was discussed in public.
Comcast (Github) — Comcast is a tool designed to simulate common network problems like latency, bandwidth restrictions, and dropped/reordered/corrupted packets. On BSD-derived systems such as OSX, we use tools like ipfw and pfctl to inject failure. On Linux, we use iptables and tc. Comcast is merely a thin wrapper around these controls.
The UX Reader — This ebook is a collection of the most popular articles from our [MailChimp] UX Newsletter, along with some exclusive content.
Bad Assumptions — Apple lost more money to currency fluctuations than Google makes in a quarter.
Lost Lessons from an 8-bit BASIC — The little language that fueled the home computer revolution has been long buried beneath an avalanche of derision, or at least disregarded as a relic from primitive times. That’s too bad, because while the language itself has serious shortcomings, the overall 8-bit BASIC experience has high points that are worth remembering.
The Chess Master and the Computer (Garry Kasparov) — Increasingly, a move isn’t good or bad because it looks that way or because it hasn’t been done that way before. It’s simply good if it works and bad if it doesn’t. Although we still require a strong measure of intuition and logic to play well, humans today are starting to play more like computers. (via Alexis Madrigal)
Docker Misconceptions — This is not impossible and can all be done – several large companies are already using Docker in production, but it’s definitely non-trivial. This will change as the ecosystem around Docker matures (via Flynn, Docker container hosting, etc), but currently if you’re going to attempt using Docker seriously in production, you need to be pretty skilled at systems management and orchestration.