magspoof — a portable device that can spoof/emulate any magnetic stripe or credit card “wirelessly,” even on standard magstripe readers.
LittleD — open source relational database for embedded devices and sensors nodes.
iondb — open source key-value datastore for resource constrained systems.
Stanford Multicamera Array — 128 cameras, reconfigurable. If the cameras are packed close together, then the system effectively functions as a single-center-of-projection synthetic camera, which we can configure to provide unprecedented performance along one or more imaging dimensions, such as resolution, signal-to-noise ratio, dynamic range, depth of field, frame rate, or spectral sensitivity. If the cameras are placed farther apart, then the system functions as a multiple-center-of-projection camera, and the data it captures is called a light field. Of particular interest to us are novel methods for estimating 3D scene geometry from the dense imagery captured by the array, and novel ways to construct multi-perspective panoramas from light fields, whether captured by this array or not. Finally, if the cameras are placed at an intermediate spacing, then the system functions as a single camera with a large synthetic aperture, which allows us to see through partially occluding environments like foliage or crowds.
dash — offline access to API documentation. Useful for those long-haul flights without wifi …
Gartner’s Top Trends for 2015 — ubicomp, IoT, 3d printing, pervasive analytics, context, smart machines, cloud computing, software-defined everything, web-scale IT, and security. Still not the year of the Linux desktop.
Move Fast, Break Nothing (Zach Holman) — Gartner talks about “web-scale IT”, but I think the processes and tools for putting code into product (devops) are far more transformative than the technology that scales the product delivery.
Google’s Project Zero (Wired) — G pays a team to attack common software and report the bugs to the manufacturer. Interesting hypothesis about how the numbers inbalance between Every Russian 14 Year Old and this small team doesn’t matter: modern hacker exploits often chain together a series of hackable flaws to defeat a computer’s defenses. Kill one of those bugs and the entire exploit fails. That means Project Zero may be able to nix entire collections of exploits by finding and patching flaws in a small part of an operating system, like the “sandbox” that’s meant to limit an application’s access to the rest of the computer. ”On certain attack surfaces, we’re optimistic we can fix the bugs faster than they’re being introduced,” Hawkes says. “If you funnel your research into these limited areas, you increase the chances of bug collisions.”
Librarybox 2.0 — fork of PirateBox for the TP-Link MR 3020, customized for educational, library, and other needs. Wifi hotspot with free and anonymous file sharing. v2 adds mesh networking and more. (via BoingBoing)
Chicago PD’s Using Big Data to Justify Racial Profiling (Cory Doctorow) — The CPD refuses to share the names of the people on its secret watchlist, nor will it disclose the algorithm that put it there. […] Asserting that you’re doing science but you can’t explain how you’re doing it is a nonsense on its face. Spot on.
Cloudwash (BERG) — very good mockup of how and why your washing machine might be connected to the net and bound to your mobile phone. No face on it, though. They’re losing their touch.
What’s Left of Nokia to Bet on Internet of Things (MIT Technology Review) — With the devices division gone, the Advanced Technologies business will cut licensing deals and perform advanced R&D with partners, with around 600 people around the globe, mainly in Silicon Valley and Finland. Hopefully will not devolve into being a patent troll. […] “We are now talking about the idea of a programmable world. […] If you believe in such a vision, as I do, then a lot of our technological assets will help in the future evolution of this world: global connectivity, our expertise in radio connectivity, materials, imaging and sensing technologies.”
Understanding Understanding Source Code with Functional Magnetic Resonance Imaging (PDF) — we observed 17 participants inside an fMRI scanner while they were comprehending short source-code snippets, which we contrasted with locating syntax error. We found a clear, distinct activation pattern of five brain regions, which are related to working memory, attention, and language processing. I’m wary of fMRI studies but welcome more studies that try to identify what we do when we code. (Or, in this case, identify syntax errors—if they wanted to observe real programming, they’d watch subjects creating syntax errors) (via Slashdot)
Oobleck Security (O’Reilly Radar) — if you missed or skimmed this, go back and reread it. The future will be defined by the objects that turn on us. 50s scifi was so close but instead of human-shaped positronic robots, it’ll be our cars, HVAC systems, light bulbs, and TVs. Reminds me of the excellent Old Paint by Megan Lindholm.
Most Winning A/B Test Results are Illusory (PDF) — Statisticians have known for almost a hundred years how to ensure that experimenters don’t get misled by their experiments […] I’ll show how these methods ensure equally robust results when applied to A/B testing.
tooldiag — a collection of methods for statistical pattern recognition. Implemented in C.
Hacking MicroSD Cards (Bunnie Huang) — In my explorations of the electronics markets in China, I’ve seen shop keepers burning firmware on cards that “expand” the capacity of the card — in other words, they load a firmware that reports the capacity of a card is much larger than the actual available storage. The fact that this is possible at the point of sale means that most likely, the update mechanism is not secured. MicroSD cards come with embedded microcontrollers whose firmware can be exploited.
30c3 — recordings from the 30th Chaos Communication Congress.
Inside Netflix’s HR (HBR) — Which idea in the culture deck was the hardest sell with employees? “Adequate performance gets a generous severance package.” It’s a pretty blunt statement of our hunger for excellence. They talk about how those conversations play out in practice.
CocoaSPDY — open source library for SPDY (fast HTTP replacement, supported in Chrome) for iOS and OS X.
The Internet of Things Will Replace the Web — invisible buttons loaded with anticipatory actions keyed from mined sensor data. And we’ll complain it’s slow and doesn’t know that I don’t like The Beatles before my coffee and who wrote this crap anyway?
Kenya’s Treasury to tax M-Pesa — 10% tax on mobile money-transfer systems. M-Pesa is the largest mobile money transfer service provider in Kenya, with more than 14 million subscribers. […] It is estimated that M-Pesa reports some 2 million transactions per day. […] the value of money transferred through mobile platforms jumped by 41 per cent in the first six months of 2012. Neer mind fighting you, you know you’re winning when they tax you! (via Evgeny Mozorov)
Digital Divide and Fibre Rollout — As the group of non-users gets smaller, they are likely to become more seriously disadvantaged. The NBN – and high-speed broadband more generally – will drive a wave of new applications across most areas of life, transforming Australia’s service economy in fundamental ways. Those who are not connected in 2015 may be fewer, but they will be missing out on far more – in education, health, government, commerce, communication and entertainment. The costs will also fall on service providers forced to keep supplying expensive physical and face-to-face services to this declining number of people. This will be particularly significant in remote communities, where health consultations and evacuations by flying doctors, nurses and allied health professionals could potentially be reduced through e-health diagnostics, and where Centrelink still regularly sends teams out to communities. As gov2 expands and services move online, connectivity disadvantages are compounded. (via Ellen Strickland)
Smart Body Smart World (Forrester) — take note of these two consequences of Internet of Things and Quantified Self: Verticals fuse: “Health and wellness” is not its own silo, but is connected to our finances, our shopping habits, our relationships. As bodies get connected, everyone is in the body business. Retail disperses: All retailers become computing retailers, and computing-specific retailers like Best Buy go the way of Blockbuster. You wouldn’t buy a smart toothbrush at a specialty CE store; you’d be more likely to buy it in the channel that solves the rest of your hygiene needs. (via Internet of Things)
New Species Found on Flickr (NPR) — Guek had noticed the insect while hiking the jungles of Malaysia, taken the photos, and then watched it fly away. I just love the idea of entomologists bringing up richly-coloured hi-res shots of insects from Flickr. Can’t figure out whether to parody as porn fetish or as if they were using movie tech (“can we enhance that?”)
Position Correcting Tools for 2D Digital Fabrication — in our approach, the user coarsely positions a frame containing the tool in an approximation of the desired path, while the device tracks the frame’s location and adjusts the position of the tool within the frame to correct the user’s positioning error in real time. Because the automatic positioning need only cover the range of the human’s positioning error, this frame can be small and inexpensive, and because the human has unlimited range, such a frame can be used to precisely position tools over an unlimited range.
China Hackers Hit EU Point Man and DC (Bloomberg) — wow. The extent to which EU and US government and business computer systems have been penetrated is astonishing. Stolen information is flowing out of the networks of law firms, investment banks, oil companies, drug makers, and high technology manufacturers in such significant quantities that intelligence officials now say it could cause long-term harm to U.S. and European economies. (via Gady Epstein)
Digestible Microchips (Nature) — The sand-particle sized sensor consists of a minute silicon chip containing trace amounts of magnesium and copper. When swallowed, it generates a slight voltage in response to digestive juices, which conveys a signal to the surface of a person’s skin where a patch then relays the information to a mobile phone belonging to a healthcare-provider. (via Sara Winge)
Quantum Mechanics Make Simple(r) — clever way to avoid the brain pain of quantum mechanics and leap straight to the “oh!”. [N]ature is described not by probabilities (which are always nonnegative), but by numbers called amplitudes that can be positive, negative, or even complex. […] In the usual “hierarchy of sciences”—with biology at the top, then chemistry, then physics, then math—quantum mechanics sits at a level between math and physics that I don’t know a good name for. Basically, quantum mechanics is the operating system that other physical theories run on as application software (with the exception of general relativity, which hasn’t yet been successfully ported to this particular OS). (via Hacker News)