nswd



technology

After application of the acid test to 5427 anal, axillary, pectoral and pubic hairs, I declare her to be virgo intacta

34.jpg

{ This paper presents a new approach on nipple detection for adult con- tent recognition. […] This method first locates the potential nipple-like region by using Adaboost algorithm for fast processing speed. It is followed by a nipple detec- tion using the information of shape and skin color relation between nipple and non-nipple region. […] The experiments show that our method performs well for nipple detec- tion in adult images. | Institute for Infocomm Research | PDF }

To give an appearance of solidity to pure wind

impkerr-gemini.jpg

The tension between experience for its own sake and experience we pursue just to put on Facebook is reaching its breaking point. That breaking point is called Snapchat. […]

The temporary photograph’s abbreviated lifespan changes how it is made and seen, and what it comes to mean. Snaps could be likened to other temporary art such as ice sculptures or decay art (e.g., Yoko Ono’s famous rotting apple) that takes seriously the process of disappearance, or the One Hour Photo project from 2010 that has as its premise to “project a photograph for one hour, then ensure that it will never be seen again.” However, whatever changes in the aesthetics of photographic vision Snapchat is effecting are difficult to assess, given that no one really knows what its self-deleting photos collectively look like. In many ways, this is exactly the point.

{ Nathan Jurgenson/TNI | Continue reading }

Vaseline, sir? Orange flower?

222.jpg

In the real world, lending a book to a friend or selling your used music collection isn’t exactly groundbreaking. In the digital world, it’s patentable.

Amazon.com has been awarded what appears to be a broad patent on a “secondary market for digital objects” — a system for users to sell, trade and loan digital objects including audio files, eBooks, movies, apps, and pretty much anything else.

The patent, originally filed in 2009 and granted on Jan. 29, covers transferring digital goods among users, setting limits on transfers and usage, charging an associated fee, and other elements of a marketplace for “used” digital goods.

{ GW | Continue reading }

The secret to happiness is low expectations

36.jpg

A number of Instagram’s 90 million active users are in a confused panic after being locked out of their accounts over the weekend, and several seem to believe they’ve been hacked. […]

Your account has been secured and requires account validation. Please login to Instagram.com from your desktop computer to validate your identify.

The desktop validation process then requires the user to upload a photograph of a government-issued photo ID by February 1 — a puzzling requirement for many thread participants, who worried that a hacker was attempting to gain access to their personal information. Which is not the case.

“Instagram occasionally removes accounts due to violation of terms and, depending on the violation, may ask people to upload IDs for verification purposes,” a Facebook spokesperson told CNET. […]

Instagram, like Facebook, requires that its users are at least 13.

{ CNET | Continue reading }

‘The addition of Madagascar bourbon vanilla in this morning’s pancakes –> wildly successful results.’ –Colleen Nika

325.jpg

At a 2010 tech conference, Siri co-founder Tom Gruber demonstrated the app’s reach: Telling the assistant, “I’d like a romantic place for Italian food near my office,” yielded an answer that seamlessly combined facts from Citysearch, Gayot, Yelp, Yahoo! Local, AllMenus.com, Google Maps, BooRah and OpenTable.

As conceived by its creators, Siri was supposed to be a “do engine,” something that would allow people to hold conversations with the Internet. While a search engine used stilted keywords to create lists of links, a do engine could carry a conversation, then decide and act. Had one too many drinks? The ability to coordinate a Google search for a ride home might elude you, but a do engine could translate a muttered, “I’m drunk take me home,” into a command to send a car service to your location. The startup’s goal was not to build a better search engine, but to pioneer an entirely new paradigm for accessing the Internet, one that would let artificially intelligent agents summon the answers people needed, rather than pull relevant resources for humans to consult on their own. If the search engine defined the second generation of the web, Siri’s co-founders were confident the do engine would define the third.

This Siri — the Siri of the past — offers a glimpse at what the Siri of the future may provide. […] Where we now see Siri as a footnote to the iPhone’s legacy, some day soon the iPhone may be remembered as a footnote to Siri.

{ Huffington Post | Continue reading }

Not wholly for the smooth caress

418.jpg

Analysts and observers who are content with cliches characterize Facebook as sitting on a treasure trove of potentially valuable data about its users, which is true enough. The cliched view is that what’s valuable about that data is names associated with locations associated with jobs associated with social networks, in a very granular way. That’s not it. That data can be mined easily from a variety of sources and has been mined relentlessly for years, before social media was even an idea. If an advertiser or company or candidate wants to find “professors who live in the 19081 area code who vote Democratic and shop at Trader Joe’s in Media” they can buy that information from many vendors. If that were all Facebook was holding, it wouldn’t have any distinctive wares, even imagined, to hock. All it could do is offer them at a bargain rate. […]

What Facebook is holding is a type of largely unique data that is the collaborative product of its users and its interface. […]

So what of the other unique information Facebook holds, a record of everything I’ve “liked”? Surely that’s information worth having (and thus worth paying Facebook for) for anyone desperate to sell me products, persuade me to join a cause, or motivate me to make a donation? Not really (or not much), for two reasons. First, because existing sources of social and demographic data are generally good enough to target potential customers. If you know who the registered Democrats with graduate-level education making more than $75,000 a year are in Delaware County Pennsylvania, you have a very good understanding of their likely buying habits and of the causes to which they are likely to donate. If you’re selling something that has a much more granular target market, it’s almost certainly more efficient and cheaper to use a more traditional media strategy or to rely on social networks to sell it for you simply because they’re interested in it. If you’re the budget-photography company YongNuo, you don’t need spend money to mine my Facebook likes and posts to see I’m interested in moving into studio-based strobist photography: existing networks of hobbyists and professionals are sufficient to acquaint me with your products. If you’re trying to sell a Minecraft pendant necklace, your potential customers are going to do a fine job of notifying each other about your product. […]

Social media that have no business model except trying to monetize the information that users provide to them will, sooner or later, be required to breach trust and demolish whatever is useful in their service, to come back again and again with new interfaces and terms of service that lie or conceal or divert.

{ Timothy Burke | Continue reading }

Rescue of fallen women Magdalen asylum

215.jpg

321.jpg

{ Actual Facebook Graph Searches }

‘Insanity in individuals is rare–but in groups […] it is the rule.’ –Nietzsche

233.jpg

Reviews on Amazon are becoming attack weapons, intended to sink new books as soon as they are published.

In the biggest, most overt and most successful of these campaigns, a group of Michael Jackson fans used Facebook and Twitter to solicit negative reviews of a new biography of the singer. They bombarded Amazon with dozens of one-star takedowns, succeeded in getting several favorable notices erased and even took credit for Amazon’s briefly removing the book from sale.

“Books used to die by being ignored, but now they can be killed — and perhaps unjustly killed,” said Trevor Pinch, a Cornell sociologist who has studied Amazon reviews. “In theory, a very good book could be killed by a group of people for malicious reasons.”

{ NY Times | Continue reading }

‘Temporality, finitude–that is what it is all about.’ –Kierkegaard

2453.jpg

I once tried to talk somebody out of pursuing a mail-order bride, a young Filipino who for a relatively modest fee would agree to move to Spokane, Wash., and start a new life with a complete stranger. Among the many questions raised by this half-baked plan was: How could you marry someone you had never met?

The case of Manti Te’o, the Notre Dame linebacker and finalist for college football’s highest honor, and his fake dead girlfriend takes this question to a whole new level. How can someone claim to have fallen in love with a woman he never met?

The answer, in part, is what’s wrong with love and courtship for a generation that values digital encounters over the more complicated messiness of real human interaction. As my colleague Alex Williams reported in a widely discussed piece a few days ago, screen time may be more important than face time for many 20- and 30-somethings. “Dating culture has evolved to a cycle of text messages, each one requiring the code-breaking skills of a cold war spy to interpret,” said Shani Silver, 30, in the story.

Technology, with its promise of both faux-intimacy and a protective sense of removal, does not alone explain the bizarre and still unfolding story of Te’o, who claimed that the love of his life died of leukemia last September after also suffering from a serious car crash. […] Te’o never actually met his phantom lover. Never. No face time. The entire relationship was electronic. And yet she was likely to become his wife, according to Te’o’s father. […]

The woman either existed, and then died, or didn’t exist, and therefore couldn’t have died at such a young and tender age. […] The digital girlfriend, Te’o said in an interview last October, two months before he found out the fraud, “was the most beautiful girl I ever met. Not because of her physical beauty, but the beauty of her character and who she is.” […] There was a picture, from their online encounters, of a lovely woman, a Stanford student, supposedly. There was a voice, from telephone conversations, of someone as well. And that someone finally called him up in early December and said the whole thing was a hoax perpetuated by an acquaintance in California, according to Deadspin, which broke the story.

“The pain was real,” said Swarbrick. “The grief was real. The affection was real. That’s the nature of this sad, cruel game.” No, that’s the nature of people who develop relationships through a screen. […]

To fall in love requires a bit of unpredictable human interaction. You have to laugh with a person, test their limits, go back and forth, touch them, reveal something true about yourself. You have to show some vulnerability, some give and take. At the very least, you have to make eye contact. It’s easier to substitute texting, tweeting or Facebook posting for these basic rituals of love and friendship because the digital route offers protection. How can you get dumped when you were never really involved?

{ NY Times | Continue reading | Thanks Rob }

art { General Idea, Artist’s Conception: Miss General Idea 1971, 1971 }

‘I googled “google” trying to explore my love of large numbers.’ –Malcolm Harris

29.jpg

Google agrees. “Along with many in the industry, we feel passwords and simple bearer tokens such as cookies are no longer sufficient to keep users safe,” Grosse and Upadhyay write in their paper.
Thus, they’re experimenting with new ways to replace the password, including a tiny Yubico cryptographic card that — when slid into a USB (Universal Serial Bus) reader — can automatically log a web surfer into Google. They’ve had to modify Google’s web browser to work with these cards, but there’s no software download and once the browser support is there, they’re easy to use. You log into the website, plug in the USB stick and then register it with a single mouse click.

They see a future where you authenticate one device — your smartphone or something like a Yubico key — and then use that almost like a car key, to fire up your web mail and online accounts.

In the future, they’d like things to get even easier, perhaps connecting to the computer via wireless technology.

{ Wired | Continue reading }

photo { Yasuhiro Ishimoto, Children at Halloween, Chicago, 1952 }

He said my openwork sleeves were too cold for the rain

{ Brazilian site that builds fake girlfriend profiles on Facebook for 3, 7 or 30 days depending on your chosen plan }

Tossed to fat lips his chalice, drank off his tiny chalice, sucking the last fat violet syrupy drops

2332.jpg

China has been running the world’s largest and most successful eugenics program for more than thirty years, driving China’s ever-faster rise as the global superpower. […] Chinese eugenics will quickly become even more effective, given its massive investment in genomic research on human mental and physical traits. BGI-Shenzhen employs more than 4,000 researchers. It has far more “next-generation” DNA sequencers that anywhere else in the world, and is sequencing more than 50,000 genomes per year. It recently acquired the California firm Complete Genomics to become a major rival to Illumina.

[…]

A new kind of misplaced worries is likely to become more and more common. The ever-accelerating current scientific and technological revolution results in a flow of problems and opportunities that presents unprecedented cognitive and decisional challenges. Our capacity to anticipate these problems and opportunities is swamped by their number, novelty, speed of arrival, and complexity.

[…]

If we have a million photos, we tend to value each one less than if we only had ten. The internet forces a general devaluation of the written word: a global deflation in the average word’s value on many axes. As each word tends to get less reading-time and attention and to be worth less money at the consumer end, it naturally tends to absorb less writing-time and editorial attention on the production side. Gradually, as the time invested by the average writer and the average reader in the average sentence falls, society’s ability to communicate in writing decays. And this threat to our capacity to read and write is a slow-motion body-blow to science, scholarship, the arts—to nearly everything, in fact, that is distinctively human, that muskrats and dolphins can’t do just as well or better.

[…]

I know that my own perception of time has been changed by technology. If I go from using a fast computer or web connection to using even a slightly slower one, processes that take just a second or two longer—waking the machine from sleep, launching an application, opening a web page—seem almost intolerably slow. Never before have I been so aware of, and annoyed by, the passage of mere seconds. […] As we experience faster flows of information online, we become, in other words, less patient people. But it’s not just a network effect. The phenomenon is amplified by the constant buzz of Facebook, Twitter, texting, and social networking in general. Society’s “activity rhythm” has never been so harried. Impatience is a contagion spread from gadget to gadget.

{ What Should We Be Worried About? | Edge }

Hokypoky penny a lump

w2.jpg

Infiniti Poker, like several other new online gambling sites, plans to accept Bitcoin when it launches later this month. […]

Developed in 2009 by a mysterious programmer known as Satoshi Nakamoto, Bitcoins behave much like any currency. Their value—currently about $13 per Bitcoin—is determined by demand. Transactions are handled through a decentralized peer-to-peer network similar to BitTorrent, the protocol for sharing films and music over the Internet. An assortment of merchants around the globe accept Bitcoin; it’s also the currency used on online black markets such as Silk Road, which processes an estimated $1.2 million a month in sales of illegal drugs, according to Nicolas Christin, the associate director of Carnegie Mellon’s Information Networking Institute.

Individuals can buy and sell Bitcoins using global currencies through such online exchanges as Mt. Gox. There’s even a service facilitated by BitInstant, a payment-processing company, that allows you to purchase the virtual currency for cash at 700,000 U.S. locations, including participating Wal-Mart, Duane Reade, and 7-Eleven stores. Once users have Bitcoins, they store them on their computers or mobile devices in files known as Bitcoin wallets or in cloud-based “e-wallets.”

Hajduk says Infiniti Poker will accept credit cards, wire transfers, and other payment options, but players in the U.S. will be able to play only using Bitcoins. He originally included the currency not to get around U.S. law but to reduce the time it takes to cash players out. Bank transactions can take up to 12 weeks; players who use Bitcoin can get a payout in a matter of hours, he says.

{ Businessweek | Continue reading }

Hate is sadness with the accompanying idea of an external cause

310.jpg

Guns should know where they are and if another gun is nearby. Global positioning systems can meet most of the need, refining a gun’s location to the building level, even within buildings. Control of the gun would remain in the hand of the person carrying it, but the ability to fire multiple shots in crowded areas or when no other guns are present would be limited by software that understands where the gun is being used.

Guns should also be designed to sense where they are being aimed. Artificial vision and optical sensing technology can be adapted from military and medical communities. Sensory data can be used by built-in software to disable firing if the gun is pointed at a child or someone holding a child.

Building software into guns need not affect gun owners’ desire to protect their homes. Trigger control software could be relaxed when the gun is at home or in a car, while other safety features stay on to prevent accidental discharges. Guns used by the police would be exempt from such controls.

{ Jeremy Shane/CNN | Continue reading }

It’s all in the wrist

47.jpg

Software developed by the FBI and Ernst & Young has revealed the most common words used in email conversations among employees engaged in corporate fraud.

The software, which was developed using the knowledge gained from real life corporate fraud investigations, pinpoints and tracks common fraud phrases like “cover up”, “write off”, “failed investment”, “off the books”, “nobody will find out” and “grey area”.

Expressions such as “special fees” and “friendly payments” are most common in bribery cases, while fears of getting caught are shown in phrases such as “no inspection” and “do not volunteer information”.

{ Computer World | Continue reading }

War! War! The tympanum.

9.jpg

The Internet sells itself as an improved content-delivery service, giving you whatever you want, whenever you want—by no small coincidence is its premiere streaming-music site called Pandora—but there is an increasingly clear downside to opening the on-demand box. We no longer feel compelled to “own” music, because it has no scarcity value. Music has become ether, navigable by desire, or impulse, and so the need to patronize musicians, whom we were previously cowed into compensating by a protectorate of record labels, becomes not only optional, but indistinct.

We assume musicians are taken care of, because their music is getting to us, and in that way, they have succeeded—they have communicated, and they may even be famous as Joanna Newsom—but they will never profit, because neither they nor their ostensible parent labels control the medium by which we increasingly receive and interpret their work. To the extent their fame is driven and/or sustained online, artists are subservient to the Internet, and must engage with that audience on its terms, begging for donations—tithing—or prostituting themselves via cost-denominated signed copies, telephone calls, personal concerts and personalized songs.

{ Shallow Rewards | Continue reading }

art { Vincent van Gogh, Peasant Burning Weeds, 1883 }

The bloody mongrel let a grouse out of him would give you the creeps

36.jpg

{ 1. Kevin Systrom, co-founder and CEO of Instagram | 2 }

Bread, the staff of life, earn your bread

6.jpg

In this article, we discuss […] the design of modular consumer products, whose parts and components could be re-used for the design of other products.

Initiatives like OpenStructures, Grid Beam, and Contraptor combine the modularity of systems like LEGO, Meccano and Erector with the collaborative power of digital success stories like Wikipedia, Linux or WordPress.

An economy based on the concept of re-use would not only bring important advantages in terms of sustainability, but would also save consumers money, speed up innovation, and take manufacturing out of the hands of multinationals.

{ Low-tech Magazine | Continue reading }

I’m sorry, I wasn’t listening

f.jpg

Slowly, but surely, robots (and virtual ’bots that exist only as software) are taking over our jobs; according to one back-of-the-envelope projection, in ninety years “70 percent of today’s occupations will likewise be replaced by automation.” […]

If history repeats itself, robots will replace our current jobs, but, says Kelly, we’ll have new jobs, that we can scarcely imagine:

In the coming years robot-driven cars and trucks will become ubiquitous; this automation will spawn the new human occupation of trip optimizer, a person who tweaks the traffic system for optimal energy and time usage. Routine robosurgery will necessitate the new skills of keeping machines sterile. When automatic self-tracking of all your activities becomes the normal thing to do, a new breed of professional analysts will arise to help you make sense of the data.

Well, maybe. Or maybe the professional analysts will be robots (or least computer programs), and ditto for the trip optimizers and sterilizers.

{ The New Yorker | Continue reading }

But those who are done to death in sleep cannot know the manner of their quell unless their Creator endow their souls with that knowledge in the life to come

38.jpg

{‘Instagram’s suicide note.’ | Instagram is changing its terms of use in January }



kerrrocket.svg