Experience with Rules-Based Programming for Distributed Concurrent Fault-Tolerant Code (A Paper a Day) — To demonstrate applicability outside of the RAMCloud system, the team also re-wrote the Hadoop Map-Reduce job scheduler (which uses a traditional event-based state machine approach) using rules. The original code has three state machines containing 34 states with 163 different transitions, about 2,250 lines of code in total. The rules-based re-implementation required 19 rules in 3 tasks with a total of 117 lines of code and comments. Rules-based systems are powerful and underused.
OpenFace — open source face recognition software using deep neural networks.
Berkeley’s Intro-to-AI Materials — We designed these projects with three goals in mind. The projects allow students to visualize the results of the techniques they implement. They also contain code examples and clear directions, but do not force students to wade through undue amounts of scaffolding. Finally, Pac-Man provides a challenging problem environment that demands creative solutions; real-world AI problems are challenging, and Pac-Man is, too.
You Can’t Destroy a Village to Save It (EFF) — EFF have a clever compromise for W3C’s proposal for DRM on the Web. [T]he W3C could have its cake and eat it, too. It could adopt a rule that requires members who help make DRM standards to promise not to sue people who report bugs in tools that conform to those standards, nor could they sue people just for making a standards-based tool that connected to theirs. They could make DRM, but only if they made sure that they took steps to stop that DRM from being used to attack the open Web. I hope the W3C take it.
Copyright Law Shouldn’t Keep Me From Fixing a Tractor (Slate) — When a farmer friend of mine wanted to know if there was a way to tweak the copyrighted software of his broken tractor, I knew it was going to be rough. The only way to get around the DMCA’s restriction on software tinkering is to ask the Copyright Office for an exemption at the Section 1201 Rulemaking, an arduous proceeding that takes place just once every three years.
License to Drive — I have difficulty viewing No Drive Day as imminent. We’re maybe 95% there, but that last 5% will be a lengthy slog.
Open Source Firmware for Toy Drones — The Eachine H8 is a typical-looking mini-quadcopter of the kind that sell for under $20.[…] takes you through a step-by-step guide to re-flashing the device with a custom firmware to enable acrobatics, or simply to tweak the throttle-to-engine-speed mapping for the quad. (via DIY Drones)
Mobile Web vs. Native Apps or Why You Want Both (Luke Wroblewski) — The Web is for audience reach and native apps are for rich experiences. Both are strategic. Both are valuable. So when it comes to mobile, it’s not Web vs. Native. It’s both. The graphs are impressive.
Is Caffeine a Cognitive Enhancer? (PDF) — Two general mechanisms may account for most of the observed effects of caffeine on performance: (1) an indirect, non-specific ‘arousal’ or ‘processing resources’ factor, presumably explaining why the effects of caffeine are generally most pronounced when task performance is sustained or degraded under suboptimal conditions; and (2) a more direct and specific ‘perceptual-motor’ speed or efficiency factor that may explain why, under optimal conditions, some aspects of human performance and information processing, in particular those related to sensation, perception, motor preparation, and execution, are more sensitive to caffeine effects than those related to cognition, memory, and learning. See also Smith 2005‘s caffeine led to a more positive mood and improved performance on a number of tasks. Different effects of caffeine were seen depending on the person’s level of arousal. Linear effects of caffeine dose were also observed. This is evidence against the argument that behavioral changes due to caffeine are merely the reversal of negative effects of a long period of caffeine abstinence. (via cogsci.stackexchange.com)
On Stars and Thinking Things Through (Courtney Johnston) — Matt (to my eyes, anyway) doesn’t have a singular ‘thing’: he has this kind of spangly web of interests and skills that coalesces around a line of enquiry and results in the making or doing of a thing, and these things in turn become part of that web and generate further experiments and thinking. Seconded.
Human-like Robot — and just like a real woman, the first paragraphs about the robot focus on soft skin and flowing brunette hair not how well she does her job. Progress!
Distributed Reactive Programming (A Paper a Day) — this week’s focus on reactive programming has been eye-opening for me. I find the implementation details less interesting than the simple notion that we can define different consistency models for reactive programs and reason about them.
Attacking HTTP/2 Implementations — Our talk focused on threats, attack vectors, and vulnerabilities found during the course of our research. Two Firefox, two Apache Traffic Server (ATS), and four Node-http2 vulnerabilities will be discussed alongside the release of the first public HTTP/2 fuzzer. We showed how these bugs were found, their root cause, why they occur, and how to trigger them.
The Autonomous Winter is Coming — The future of any given manufacturer will be determined by how successfully they manage their brands in a market split between Mobility customers and Driving customers.
Medium’s Stack — interesting use of Protocol Buffers: We help our people work with data by treating the schemas as the spec, rigorously documenting messages and fields and publishing generated documentation from the .proto files.
Bacterial Materials (Wired UK) — Showing a prototype worn by dancers, Yao demonstrated how bacteria-powered clothing can respond to the body’s needs. She has, in effect, created living clothes, ones that react in real time to heat and sweat mapping with tiny vents that would curl open or flatten closed as exertion levels demanded.
Robots to the Rescue (NSF) — one 20-minute drone flight generated upwards of 800 photographs, each of which took at least one minute to inspect. This article is five lessons learned in the field of disaster robotics, and they’re all doozies.
Trying to Replace Multiple Systems with One Can Lead to None (IEEE) — check out that final graph, it’s a doozy. It’s a graph of x against time, from various “this project is great, it will replace x systems with 1″ claims about a single project. Software projects should come with giant warning labels: “most fail, you are about to set your money on fire. Are you sure? [Y/N/Abort/Restart]”
Signals from Velocity New York — “If your company is creating a diversity plan and you’ve actually gone and counted people,” Liles said, “you’ve already lost.” If you’re motivated to count, then know you’ve already lost. You want to know by how much.
25 Women in Robotics You Need to Know About — The DARPA Robotics Challenge (DRC) Finals 2015 were similarly lacking; of the 444 robot builders representing 24 robot entrants, only 23 builders were women (though some of the most successful teams at the DRC had female team members). Given how multidisciplinary the field is, and how many different skills are required, we need to celebrate women who are achieving greatness in robotics until we are seeing more parity. Great list.
Awesome AWS — A curated list of awesome Amazon Web Services (AWS) libraries, open source repos, guides, blogs, and other resources.
The Web Authentication Arms Race — Cryptography can only be used to transfer existing trust or secrecy across time or space; if the attacker impersonates the defender before the user establishes anything, it becomes impossible for the user to tell which party is legitimate. This sentence, made in solid gold Yes.