"UI" entries

Four short links: 5 February 2016

Four short links: 5 February 2016

Signed Filesystem, Smart Mirror, Deep Learning Tuts, and CLI: Miami

  1. Introducing the Keybase Filesystem — love that crypto is making its way into the filesystem.
  2. DIY Smart Bathroom Mirror — finally, someone is building this science-fiction future! (via BoingBoing)
  3. tensorflow tutorials — for budding deep learners.
  4. clmystery — a command-line murder mystery.
Comment
Four short links: 28 December 2015

Four short links: 28 December 2015

Bitcoin Software Choke, IoT Chokes, Dynabook History, and Fault Tree Analysis

  1. Core Bitcoin Devs LeaveAccording to a press release put out by Company 0 LLC, formed by former bitcoin developers, there are a few external entities that fund the actual development of the bitcoin cryptocurrency, forming a power-group that is in sole command of the direction the currency takes. These developers say that this group limits outside input in the currency’s governance, cherry-picks only options favorable for their own interests, and generally ignores the developers’ and community’s best interests.
  2. Internet of Proprietary Things — wonderfully accessible list of things we don’t have: Because companies can enforce anti-competitive behavior this way, there’s a litany of things that just don’t exist, even though they would make life easier for consumers in significant ways. You can’t have custom software for your cochlear implant, or your programmable thermostat, or your computer-enabled Barbie doll. An auto-repair shop can’t design a better diagnostic system that interfaces with a car’s computers. Capturing all the value you create, versus creating more value than you capture.
  3. Tracing the Dynabooka historical study of the Dynabook project and vision, which began as a blue-sky project to define personal and educational computing at Xerox PARC in the 1970s. It traces the idea through the three intervening decades, noting the transformations that occur as the vision and its artifacts meet varying contexts. (via Bret Victor)
  4. Fault Tree Analysis (FTA): Concepts and Applications (PDF) — 194 slides from NASA. (via Mara Tam)
Comment
Four short links: 3 December 2015

Four short links: 3 December 2015

Touchable Holograms, Cloud Vision API, State of Computer Security, and Product Prioritization

  1. Japanese Scientists Create Touchable Holograms (Reuters) — Using femtosecond laser technology, the researchers developed ‘Fairy Lights, a system that can fire high-frequency laser pulses that last one millionth of one billionth of a second. The pulses respond to human touch, so that – when interrupted – the hologram’s pixels can be manipulated in mid-air.
  2. Google Cloud Vision APIclassifies images into thousands of categories (e.g., “boat,” “lion,” “Eiffel Tower”), detects faces with associated emotions, and recognizes printed words in many languages.
  3. Not Even Close: The State of Computer Security (Vimeo) — hilarious James Mickens talk with the best description ever.
  4. 20 Product Prioritization Techniques: A Map and Guided Tour — excellent collection of techniques for ordering possible product work.
Comment
Four short links: 19 October 2015

Four short links: 19 October 2015

Academic Robot Kit, Countertop Biolab, Generous Interfaces, and Universal Design

  1. Open Academic Robot KitA common set of parts, specifications, and software to catalyse the design, construction, dissemination, and re-use of robots in an academic and research environment. (via Robohub)
  2. Amino: Desktop Bioengineering for Everyone (Indiegogo) — a counter-top sized biolab that enables anyone to grow living cells to create new and interesting things – like fragrances, flavours, materials, medicine, and more.
  3. Generous Interfaces for Digital Cultural Collections (Mitchell Whitelaw) — Decades of digitisation have made a wealth of digital cultural material available online. Yet search — the dominant interface to these collections — is incapable of representing this abundance. Search is ungenerous: it withholds information, and demands a query. This paper argues for a more generous alternative: rich, browsable interfaces that reveal the scale and complexity of digital heritage collections. (via Courtney Johnston)
  4. The Universal Design (Christine Dodrill) — there need to be five basic primitives in your application: State – What is true now? What was true? What happened in the past? What is the persistent view of the world? Events – What is being changed? How will it be routed? Policy – Can a given event be promoted into a series of actions? Actions – What is the outcome of the policy? Mechanism – How should an event be taken in and an action put out? […] All you need is a command queue feeding into a thread pool which feeds out into a transaction queue which modifies state. And with that you can explain everything from VMWare to Google.
Comment
Four short links: 20 August 2015

Four short links: 20 August 2015

Automata Class, Low-UI Wearables, Broken Science, and Understandable Eigenvectors

  • Stanford Automata — Stanford course covers finite automata, context-free grammars, Turing machines, undecidable problems, and intractable problems (NP-completeness).
  • Oura — very nice wearable, with no UI to worry about. Put it on, and it’s on. (via Fast Company)
  • Science Isn’t Brokenit’s just a hell of a lot harder than we give it credit for. Beautifully written (and interactively illustrated) description of why science is easy to get wrong.
  • Eigenvectors in Plain English — absolutely the easiest to understand explanation I’ve ever read. It’s a miracle. (And I crashed and burned in linear algebra when matrices were used, so if *I* can get it …)
    Comment
    Four short links: 11 August 2015

    Four short links: 11 August 2015

    Real-time Sports Analytics, UI Regression Testing, AI vs. Charity, and Google's Data Pipeline Model

    1. Denver Broncos Testing In-Game Analytics — their newly hired director of analytics working with the coach. With Tanney nearby, Kubiak can receive a quick report on the statistical probabilities of almost any situation. Say that you have fourth-and-3 from the opponent’s 45-yard-line with four minutes to go. Do the large-sample-size percentages make the risk-reward ratio acceptable enough to go for it? Tanney’s analytics can provide insight to aid Kubiak’s decision-making. (via Flowing Data)
    2. Visual Review (GitHub) — Apache-licensed productive and human-friendly workflow for testing and reviewing your Web application’s layout for any regressions.
    3. Effective Altruism / Global AI (Vox) — fear of AI-run-amok (“existential risks”) contaminating a charity movement.
    4. The Dataflow Model (PDF) — Google Research paper presenting a model aimed at ease of use in building practical, massive-scale data processing pipelines.
    Comment
    Four short links: 3 August 2015

    Four short links: 3 August 2015

    Engineering Management, Smartphone Holograms, Multi-Protocol Server, and Collaborative CS

    1. A Conversation with Michael LoppMy job is to my get myself out of a job. I’m aggressively pushing things I think I could be really good at and should actually maybe own to someone else who’s gonna get a B at it, but they’re gonna get the opportunity to go do that. […] Delegation is helping someone else to learn. I’m all about the humans. If I don’t have happy, productive, growing engineers, I have exactly no job. That investment in the growth, in the happiness, the engineers being productive, that’s like my primary job.
    2. 3D Hologram Projector for Smartphone (BoingBoing) — is in hardware hack stage now, but OKYOUWIN maybe it’s the future.
    3. serve2dserve2 allows you to serve multiple protocols on a single socket. Example handlers include proxy, HTTP, TLS (through which HTTPS is handled), ECHO and DISCARD. More can easily be added, as long as the protocol sends some data that can be recognized. The proxy handler allows you to redirect the connection to external services, such as OpenSSH or Nginx, in case you don’t want or can’t use a Go implementation.
    4. GitXivIn recent years, a highly interesting pattern has emerged: Computer scientists release new research findings on arXiv and just days later, developers release an open-source implementation on GitHub. This pattern is immensely powerful. One could call it collaborative open computer science (COCS). GitXiv is a space to share collaborative open computer science projects. Countless Github and arXiv links are floating around the Web. It’s hard to keep track of these gems. GitXiv attempts to solve this problem by offering a collaboratively curated feed of projects. Each project is conveniently presented as arXiv + Github + Links + Discussion
    Comment
    Four short links: 20 July 2015

    Four short links: 20 July 2015

    Less Spam, Down on Dropdowns, Questioning Provable Security, and Crafting Packets

    1. Spam Under Half of Email (PDF) — Symantec report: There is good news this month on the email-based front of the threat landscape. According to our metrics, the overall spam rate has dropped to 49.7%. This is the first time this rate has fallen below 50% of email for over a decade. The last time Symantec recorded a similar spam rate was clear back in September of 2003.
    2. Dropdowns Should be the UI of Last Resort (Luke Wroblewski) — Well-designed forms make use of the most appropriate input control for each question they ask. Sometimes that’s a stepper, a radio group, or even a dropdown menu. But because they are hard to navigate, hide options by default, don’t support hierarchies, and only enable selection not editing, dropdowns shouldn’t be the first UI control you reach for. In today’s software designs, they often are. So instead, consider other input controls first and save the dropdown as a last resort.
    3. Another Look at Provable SecurityIn our time, one of the dominant paradigms in cryptographic research goes by the name “provable security.” This is the notion that the best (or, some would say, the only) way to have confidence in the security of a cryptographic protocol is to have a mathematically rigorous theorem that establishes some sort of guarantee of security (defined in a suitable way) under certain conditions and given certain assumptions. The purpose of this website is to encourage the emergence of a more skeptical and less credulous attitude toward this notion and to contribute to a process of critical analysis of the positive and negative features of the “provable security” paradigm.
    4. Pig (github) — a Linux packet crafting tool. You can use Pig to test your IDS/IPS among other stuffs.
    Comment
    Four short links: 10 July 2015

    Four short links: 10 July 2015

    King Rat Brain, Emojactions, Dead Eye, and Cloud Value

    1. Computer of Wired-Together Rat Brains — this is ALL THE AMAZING. a Brainet that allows three monkeys connected at the brain to control a virtual arm on screen across three axes. […] Nicolelis said that, essentially, he created a “classic artificial neural network using brains.” In that sense, it’s not artificial at all. (via Slashdot)
    2. Reactions — Slack turns emoji into first-class interactions. Genius!
    3. Pixar’s Scientific MethodIf you turn your head without moving your eyes first, it looks like you’re dead. Now there’s your uncanny valley.
    4. AWS CodePipeline — latest in Amazon’s build-out of cloud tools. Interchangeable commodity platforms regaining lockin via higher-order less-interchangeable tooling for deployment, config, monitoring, etc.
    Comment
    Four short links: 7 July 2015

    Four short links: 7 July 2015

    SCIP Berkeley Style, Regular Failures, Web Material Design, and Javascript Breakouts

    1. CS 61AS — Berkeley self-directed Structure and Interpretation of Computer Programs course.
    2. Harbingers of Failure (PDF) — We show that some customers, whom we call ‘Harbingers’ of failure, systematically purchase new products that flop. Their early adoption of a new product is a strong signal that a product will fail – the more they buy, the less likely the product will succeed. Firms can identify these customers either through past purchases of new products that failed, or through past purchases of existing products that few other customers purchase.
    3. Google Material Design LiteA library of Material Design components in CSS, JS, and HTML.
    4. Breakoutsvarious implementations of the classic game Breakout in numerous different [Javascript] engines.
    Comment