"ubicomp" entries

Four short links: 25 November 2015

Four short links: 25 November 2015

Faking Magstripes, Embedded Database, Another Embedded Database, Multicamera Array

  1. magspoofa portable device that can spoof/emulate any magnetic stripe or credit card “wirelessly,” even on standard magstripe readers.
  2. LittleD — open source relational database for embedded devices and sensors nodes.
  3. iondb — open source key-value datastore for resource constrained systems.
  4. Stanford Multicamera Array — 128 cameras, reconfigurable. If the cameras are packed close together, then the system effectively functions as a single-center-of-projection synthetic camera, which we can configure to provide unprecedented performance along one or more imaging dimensions, such as resolution, signal-to-noise ratio, dynamic range, depth of field, frame rate, or spectral sensitivity. If the cameras are placed farther apart, then the system functions as a multiple-center-of-projection camera, and the data it captures is called a light field. Of particular interest to us are novel methods for estimating 3D scene geometry from the dense imagery captured by the array, and novel ways to construct multi-perspective panoramas from light fields, whether captured by this array or not. Finally, if the cameras are placed at an intermediate spacing, then the system functions as a single camera with a large synthetic aperture, which allows us to see through partially occluding environments like foliage or crowds.
Four short links: 9 October 2014

Four short links: 9 October 2014

API Docs, Top Trends, Byzantine Fault Tolerance, and Devops in Practice

  1. dashoffline access to API documentation. Useful for those long-haul flights without wifi …
  2. Gartner’s Top Trends for 2015 — ubicomp, IoT, 3d printing, pervasive analytics, context, smart machines, cloud computing, software-defined everything, web-scale IT, and security. Still not the year of the Linux desktop.
  3. Byzantine Fault Tolerance — Wikipedia’s readable introduction to the basic challenge in distributed systems.
  4. Move Fast, Break Nothing (Zach Holman) — Gartner talks about “web-scale IT”, but I think the processes and tools for putting code into product (devops) are far more transformative than the technology that scales the product delivery.
Four short links: 16 July 2014

Four short links: 16 July 2014

Distributed Systems Design 101, Patent Trolls, Intel's Half a Billion from IoT, and Google's Project Zero.

  1. Inside bit.ly’s Distributed Systems — this is a 101 for modern web distributed systems design.
  2. Patent Trolls are Now 67% of New Patent Lawsuits in USA (WaPo) — data from PwC.
  3. Intel Made Half a Billion from Internet of Things Last Year (Quartz) — half a billion here, half a billion there, pretty soon it adds up to real money.
  4. Google’s Project Zero (Wired) — G pays a team to attack common software and report the bugs to the manufacturer. Interesting hypothesis about how the numbers inbalance between Every Russian 14 Year Old and this small team doesn’t matter: modern hacker exploits often chain together a series of hackable flaws to defeat a computer’s defenses. Kill one of those bugs and the entire exploit fails. That means Project Zero may be able to nix entire collections of exploits by finding and patching flaws in a small part of an operating system, like the “sandbox” that’s meant to limit an application’s access to the rest of the computer. ”On certain attack surfaces, we’re optimistic we can fix the bugs faster than they’re being introduced,” Hawkes says. “If you funnel your research into these limited areas, you increase the chances of bug collisions.”
Four short links: 26 February 2014

Four short links: 26 February 2014

Library Box, Data-Driven Racial Profiling, Internet of Washing Machines, and Nokia's IoT R&D

  1. Librarybox 2.0fork of PirateBox for the TP-Link MR 3020, customized for educational, library, and other needs. Wifi hotspot with free and anonymous file sharing. v2 adds mesh networking and more. (via BoingBoing)
  2. Chicago PD’s Using Big Data to Justify Racial Profiling (Cory Doctorow) — The CPD refuses to share the names of the people on its secret watchlist, nor will it disclose the algorithm that put it there. […] Asserting that you’re doing science but you can’t explain how you’re doing it is a nonsense on its face. Spot on.
  3. Cloudwash (BERG) — very good mockup of how and why your washing machine might be connected to the net and bound to your mobile phone. No face on it, though. They’re losing their touch.
  4. What’s Left of Nokia to Bet on Internet of Things (MIT Technology Review) — With the devices division gone, the Advanced Technologies business will cut licensing deals and perform advanced R&D with partners, with around 600 people around the globe, mainly in Silicon Valley and Finland. Hopefully will not devolve into being a patent troll. […] “We are now talking about the idea of a programmable world. […] If you believe in such a vision, as I do, then a lot of our technological assets will help in the future evolution of this world: global connectivity, our expertise in radio connectivity, materials, imaging and sensing technologies.”
Four short links: 24 February 2014

Four short links: 24 February 2014

Your Brain on Code, Internet of Compromised Things, Waiting for Wearables, and A/B Illusions

  1. Understanding Understanding Source Code with Functional Magnetic Resonance Imaging (PDF) — we observed 17 participants inside an fMRI scanner while they were comprehending short source-code snippets, which we contrasted with locating syntax error. We found a clear, distinct activation pattern of five brain regions, which are related to working memory, attention, and language processing. I’m wary of fMRI studies but welcome more studies that try to identify what we do when we code. (Or, in this case, identify syntax errors—if they wanted to observe real programming, they’d watch subjects creating syntax errors) (via Slashdot)
  2. Oobleck Security (O’Reilly Radar) — if you missed or skimmed this, go back and reread it. The future will be defined by the objects that turn on us. 50s scifi was so close but instead of human-shaped positronic robots, it’ll be our cars, HVAC systems, light bulbs, and TVs. Reminds me of the excellent Old Paint by Megan Lindholm.
  3. Google Readying Android Watch — just as Samsung moves away from Android for smart watches and I buy me and my wife a Pebble watch each for our anniversary. Watches are in the same space as Goggles and other wearables: solutions hunting for a problem, a use case, a killer tap. “OK Google, show me offers from brands I love near me” isn’t it (and is a low-lying operating system function anyway, not a userland command).
  4. Most Winning A/B Test Results are Illusory (PDF) — Statisticians have known for almost a hundred years how to ensure that experimenters don’t get misled by their experiments […] I’ll show how these methods ensure equally robust results when applied to A/B testing.
Four short links: 30 December 2013

Four short links: 30 December 2013

Pattern Recognition, MicroSD Vulnerability, Security Talks, and IoT List

  1. tooldiaga collection of methods for statistical pattern recognition. Implemented in C.
  2. Hacking MicroSD Cards (Bunnie Huang) — In my explorations of the electronics markets in China, I’ve seen shop keepers burning firmware on cards that “expand” the capacity of the card — in other words, they load a firmware that reports the capacity of a card is much larger than the actual available storage. The fact that this is possible at the point of sale means that most likely, the update mechanism is not secured. MicroSD cards come with embedded microcontrollers whose firmware can be exploited.
  3. 30c3 — recordings from the 30th Chaos Communication Congress.
  4. IOT Companies, Products, Devices, and Software by Sector (Mike Nicholls) — astonishing amount of work in the space, especially given this list is inevitably incomplete.
Four short links: 25 December 2013

Four short links: 25 December 2013

Netflix Culture, Science Longreads, Open Source SPDY, and Internet of Invisible Buttons

  1. Inside Netflix’s HR (HBR) — Which idea in the culture deck was the hardest sell with employees? “Adequate performance gets a generous severance package.” It’s a pretty blunt statement of our hunger for excellence. They talk about how those conversations play out in practice.
  2. Top Science Longreads for 2013 (Ed Yong) — for your Christmas reading.
  3. CocoaSPDY — open source library for SPDY (fast HTTP replacement, supported in Chrome) for iOS and OS X.
  4. The Internet of Things Will Replace the Web — invisible buttons loaded with anticipatory actions keyed from mined sensor data. And we’ll complain it’s slow and doesn’t know that I don’t like The Beatles before my coffee and who wrote this crap anyway?
Four short links: 26 October 2012

Four short links: 26 October 2012

Windows 8 Web Theme, Taxing Mobile Payments, Digital Divide and Digital Service Delivery, and Consequences of Internet of Things

  1. BootMetro (github) — website templates with a Metro (Windows 8) look. (via Hacker News)
  2. Kenya’s Treasury to tax M-Pesa — 10% tax on mobile money-transfer systems. M-Pesa is the largest mobile money transfer service provider in Kenya, with more than 14 million subscribers. […] It is estimated that M-Pesa reports some 2 million transactions per day. […] the value of money transferred through mobile platforms jumped by 41 per cent in the first six months of 2012. Neer mind fighting you, you know you’re winning when they tax you! (via Evgeny Mozorov)
  3. Digital Divide and Fibre RolloutAs the group of non-users gets smaller, they are likely to become more seriously disadvantaged. The NBN – and high-speed broadband more generally – will drive a wave of new applications across most areas of life, transforming Australia’s service economy in fundamental ways. Those who are not connected in 2015 may be fewer, but they will be missing out on far more – in education, health, government, commerce, communication and entertainment. The costs will also fall on service providers forced to keep supplying expensive physical and face-to-face services to this declining number of people. This will be particularly significant in remote communities, where health consultations and evacuations by flying doctors, nurses and allied health professionals could potentially be reduced through e-health diagnostics, and where Centrelink still regularly sends teams out to communities. As gov2 expands and services move online, connectivity disadvantages are compounded. (via Ellen Strickland)
  4. Smart Body Smart World (Forrester) — take note of these two consequences of Internet of Things and Quantified Self: Verticals fuse: “Health and wellness” is not its own silo, but is connected to our finances, our shopping habits, our relationships. As bodies get connected, everyone is in the body business. Retail disperses: All retailers become computing retailers, and computing-specific retailers like Best Buy go the way of Blockbuster. You wouldn’t buy a smart toothbrush at a specialty CE store; you’d be more likely to buy it in the channel that solves the rest of your hygiene needs. (via Internet of Things)
Four short links: 31 August 2012

Four short links: 31 August 2012

Code Typing Tutor,

  1. typing.io — a typing tutor for code.
  2. Sheep to Warn Shepherds of Wolf Attack by SMSaround 10 sheep were each equipped with a heart monitor before being targeted by a pair of Wolfdogs—both of which were muzzled. (via Beta Knowledge)
    You Have a New Follower
  3. New Species Found on Flickr (NPR) — Guek had noticed the insect while hiking the jungles of Malaysia, taken the photos, and then watched it fly away. I just love the idea of entomologists bringing up richly-coloured hi-res shots of insects from Flickr. Can’t figure out whether to parody as porn fetish or as if they were using movie tech (“can we enhance that?”)
  4. Position Correcting Tools for 2D Digital Fabricationin our approach, the user coarsely positions a frame containing the tool in an approximation of the desired path, while the device tracks the frame’s location and adjusts the position of the tool within the frame to correct the user’s positioning error in real time. Because the automatic positioning need only cover the range of the human’s positioning error, this frame can be small and inexpensive, and because the human has unlimited range, such a frame can be used to precisely position tools over an unlimited range.
Four short links: 1 August 2012

Four short links: 1 August 2012

Chinese Hackers, Edible Sensors, Quantum Physics

  1. China Hackers Hit EU Point Man and DC (Bloomberg) — wow. The extent to which EU and US government and business computer systems have been penetrated is astonishing. Stolen information is flowing out of the networks of law firms, investment banks, oil companies, drug makers, and high technology manufacturers in such significant quantities that intelligence officials now say it could cause long-term harm to U.S. and European economies. (via Gady Epstein)
  2. Digestible Microchips (Nature) — The sand-particle sized sensor consists of a minute silicon chip containing trace amounts of magnesium and copper. When swallowed, it generates a slight voltage in response to digestive juices, which conveys a signal to the surface of a person’s skin where a patch then relays the information to a mobile phone belonging to a healthcare-provider. (via Sara Winge)
  3. Quantum Mechanics Make Simple(r) — clever way to avoid the brain pain of quantum mechanics and leap straight to the “oh!”. [N]ature is described not by probabilities (which are always nonnegative), but by numbers called amplitudes that can be positive, negative, or even complex. […] In the usual “hierarchy of sciences”—with biology at the top, then chemistry, then physics, then math—quantum mechanics sits at a level between math and physics that I don’t know a good name for. Basically, quantum mechanics is the operating system that other physical theories run on as application software (with the exception of general relativity, which hasn’t yet been successfully ported to this particular OS). (via Hacker News)
  4. Selectively De-Animating Video — SIGGRAPH talk showing how to keep some things still in a video. Check out the teaser video with samples: ZOMG. I note that Maneesh Agrawala was involved: I’m a fan of his from Line Drive maps and 3D exploded views, but his entire paper list is worth reading. Wow. (via Greg Borenstein)