shop imp kerr
nswd

technology

‘Marx, frantically scratching the Obama 2008 bumpersticker off his bike with a key.’ –Malcolm Harris

542.jpg

Traditional newspapers that move online are about to lose the war against pure players and aggregators. Armed with the conviction their intellectual superiority makes them immune to digital modernity, newspapers neglected today’s internet driving forces: relying on technology to build audiences and the ability to coalesce a community over any range of subjects — even the most mundane ones. […]

On one side, legacy medias: Great franchises who grew on strong values, such as “pristine” journalism, independence, storytelling, fact-checking, solid editing, respect for the copyright… Along the way, they made their share of mistakes, but, overall, the result is great. After all, at the height of the Fourth Estate’s power, the population was better informed than today’s Facebook cherry-pickers.  Now, this (aging) fraternity faces a new generation of media people who build their fiefdom on a completely different set of values. For instance, the notion of copyright has become exceedingly elastic. A few months ago, Flipboard began to aggregate contents from French news organizations, taking large excerpts — roughly capturing the essence of a story — along with a token link back to the original content. […]

On July 5th, The Wall Street Journal runs an editorial piece about Mitt Romney’s position on Obamacare. The rather dull and generic “Romney’s Tax Confusion” title for this 1000 words article attracted a remarkable 938 comments.

But look at what the Huffington Post did: a 500 words treatment including a 300 words article, plus a 200 words excerpt of the WSJ opinion and a link back (completely useless). But, unlike the Journal, the HuffPo ran a much sexier headline :

Wall Street Journal: Mitt Romney Is ‘Squandering’ Candidacy With Health Care Tax Snafu

A choice of words that takes in account all Search Engine Optimization (SEO) prerequisites, using high yield words such as “Squandering”, “Snafu”, in conjunction with much sought-after topics such as “Romney” and “Health Care”. Altogether, this guarantees a nice blip on Google’s radar — and a considerable audience : 7000+ comments (7x more than the original), 600 Facebook shares, etc.

HuffPo’s editors took no chance: the headline they picked is algorithm-designed to yield the best results in Google.

{ Monday Note | Continue reading }

image { Aleksandra Waliszewska }

His free hand graciously wrote tiny signs in air

5.jpg

The FBI and national cybercrime agencies are warning people traveling abroad to be wary of shady scammers planting malware via insecure hotel Internet connections.

The Internet Crime Complaint Center notes that malware perpetrators are masking their cybercrime weapons as popup software updates travelers see when setting up their Internet connections.

{ Laptop | Continue reading }

And targets of lamb and crannocks of corn and oblong eggs

33.jpg

A group of scientists from MIT and the University of British Columbia have created “mini-factories” that can be programmed to produce different types of proteins and, when implanted into living cells, it should distribute those proteins throughout the body. The scientists have initially triggered these “factories” into action through the use of a laser light to relay the message of which proteins to produce.

The medical functions of this technology is nearly endless in treating and perhaps curing numerous diseases, from diabetes to cancer.

{ GizmoCrazed | Continue reading }

When you want something, all the universe conspires in helping you to achieve it

42.jpg

Legal action conducted by organisations deemed to be “patent trolls” cost US companies an estimated $US29 billion during 2011.

The study suggested that during 2011, 2150 companies mounted a total 5842 defences in US cases against intellectual property companies that owned and licensed patents without producing any related goods of their own.

{ IT News | Continue reading }

pzoing!

58.jpg

{ Scientists create Wi-Fi that can transmit seven Blu-ray movies per second }

images { 1 | 2 }

‘I know who I am.’ –Mickey Rourke in Angel Heart, 1987

226.jpg

In some cases, the electronic information being gathered is used for illegal purposes, such as electronic identity theft. In other cases, the information is gathered for lawful purposes but is extremely annoying to users, such as when targeted and aggressive marketing tactics are used. Users are growing uncomfortable with the amount of information marketers possess today about them and many feel it is an invasion of their privacy even if the marketing is currently considered to be lawful. Moreover, even legitimate and lawful enterprises that collect confidential information about a user runs the risk of having an intruder penetrate their databases and acquiring the information for subsequent unlawful purposes. […]

Assignee: Apple Inc. (Cupertino, CA)
Filed: October 21, 2011

Techniques to pollute electronic profiling

Techniques to pollute electronic profiling are provided. A cloned identity is created for a principal. Areas of interest are assigned to the cloned identity, where a number of the areas of interest are divergent from true interests of the principal. One or more actions are automatically processed in response to the assigned areas of interest. The actions appear to network eavesdroppers to be associated with the principal and not with the cloned identity. […]

The invention claimed is:

1. A device-implemented method, comprising: cloning, by a device, an identity for a principal to form a cloned identity; configuring, by the device, areas of interest to be associated with the cloned identity, the areas of interest are divergent from true areas of interest for a true identity for the principal; and automatically processing actions associated with the areas of interest for the cloned identity over a network to pollute information gathered by eavesdroppers performing dataveillance on the principal and refraining from processing the actions when the principal is detected as being logged onto the network and also refraining from processing the actions when the principal is unlikely to be logged onto the network.

{ United States Patent | Continue reading }

‘Nothing, not all the armies of the world, can stop an idea whose time has come.’ –Victor Hugo

224.jpg

What causes some photos, videos, and Twitter posts to spread across the internet like wildfire while others fall by the wayside? The answer may have little to do with the quality of the information. What goes viral may be completely arbitrary, according to a controversial new study of online social networks. […]

The team built a computer simulation designed to mimic Twitter. In the simulation, each tweet or message was assigned the same value and retweets were performed at random. Despite this, some tweets became incredibly popular and were persistently reposted, while others were quickly forgotten.

{ New Scientist | Continue reading }

Something has gone terribly wrong in the relationship between media companies and their customers

336.jpg

Google+ is functioning exactly as intended. […]

Google Plus is no longer attempting to be a social networking site as its primary focus.

Nobody uses it anywhere near the magnitude of Facebook, and Google is very aware of that. I’m told by people familiar with the situation that even internally the employees laugh at it as a social networking site, and almost everyone has a profile that they never even use past the first two days of experimentation.

But eventually, as indicated by the Google Plus links everywhere, Google Plus will be everything. Every YouTube account is really the video section of Google Plus. Search is just querying the Internet via Google Plus. GMail accounts are Google Plus recipients, and so on.

{ Silicon News | Continue reading }

‘Many a man fails to become a thinker only because his memory is too good.’ –Nietzsche

4.jpg

NASA has lost data from some of its earliest missions to the moon because the machines used to read the tapes were scrapped and cannot be rebuilt. A wise librarian will wish to keep in working order a few antique computers that can read such ancient technologies as CDs and USB thumb-drives. […]

Conscientious institutions already make copies of some web pages, e-books and other digital material, and shift the data to new hardware every five year. […]

Mistakes 30 years ago mean that much of the early digital age is already a closed book (or no book at all) to historians.

{ The Economist | Continue reading }

image { Larry Sultan and Mike Mandel }

Of the moon invisible in incipent lunation, approaching perigee

534.jpg

{ The two lower curves in beige and green show the instantaneous luminosity measured by the two largest detectors operating on the Large Hadron Collider (LHC), CMS and ATLAS. […] I called the LHC control room to find out what was happening. “Oh, those dips?”, casually answered the operator on shift. “That’s because the moon is nearly full and I periodically have to adjust the proton beam orbits.” | Quantum Diaries | Continue reading }

‘La mode, c’est ce qui se démode.’ –Roland Barthes

4t.jpg

Researchers have found a way to predict a news story’s popularity — with an astounding 84 percent accuracy.

{ The Atlantic | full story }

images { Twitter Batman | New Twitter bird }

In sleep she went to him. Innocence in the moon.

{ Spanish company creates a bed that makes itself }

Steady on. He’s from beyant Boyne water. The northeast corner.

53.jpg

There are billions upon billions of ad and spending dollars in our phones, waiting to be snatched up. Why can’t big, cynical corporations capture them? […]

We thought they were like laptops with different screens. We were, Gassée writes, very wrong.

{ IT World | Continue reading }

image { Karin }

unrelated { Raunchy dance routine a PR nightmare for Microsoft: “The words MICRO and SOFT don’t apply to my penis.” | GeekWire }

[Malcolm Gladwell,] ‘or the enthusiasm which takes off its coat.’ –Nietzsche

{ History Will Revere Bill Gates, Forget Steve Jobs }

Every time someone checks in on Foursquare, I just assume it’s a requirement of their parole officer

233.jpg

Free services in exchange for personal information. That’s the “privacy bargain” we all strike on the Web. It could be the worst deal ever. […]

Why do we seem to value privacy so little? In part, it’s because we are told to. Facebook has more than once overridden its users’ privacy preferences, replacing them with new default settings. […]

Even if you read the fine print, human beings are awful at pricing out the net present value of a decision whose consequences are far in the future. […] The risks increase as we disclose more, something that the design of our social media conditions us to do. […]

Imagine if your browser loaded only cookies that it thought were useful to you, rather than dozens from ad networks you never intended to interact with. […] There’s a business opportunity for a company that wants to supply arms to the rebels instead of the empire.

{ Technology Review | Continue reading }

photo { Leonard Freed }

The general character of the world, on the other hand, is to all eternity chaos

25.jpg

What’s, in a way, missing in today’s world is more biology of the Internet. More people like Nils Barricelli to go out and look at what’s going on, not from a business or what’s legal point of view, but just to observe what’s going on.

Many of these things we read about in the front page of the newspaper every day, about what’s proper or improper, or ethical or unethical, really concern this issue of autonomous self-replicating codes. What happens if you subscribe to a service and then as part of that service, unbeknownst to you, a piece of self-replicating code inhabits your machine, and it goes out and does something else? Who is responsible for that? And we’re in an increasingly gray zone as to where that’s going.

The most virulent codes, of course, are parasitic, just as viruses are. They’re codes that go out and do things, particularly codes that go out and gather money. Which is essentially what these things like cookies do. They are small strings of code that go out and gather valuable bits of information, and they come back and sell it to somebody. It’s a very interesting situation. You would have thought this was inconceivable 20 or 30 years ago. Yet, you probably wouldn’t have to go … well, we’re in New York, not San Francisco, but in San Francisco, you wouldn’t have to go five blocks to find five or 10 companies whose income is based on exactly that premise. And doing very well at it. […]

In 1945 we actually did create a new universe. This is a universe of numbers with a life of their own, that we only see in terms of what those numbers can do for us. Can they record this interview? Can they play our music? Can they order our books on Amazon? If you cross the mirror in the other direction, there really is a universe of self-reproducing digital code. When I last checked, it was growing by five trillion bits per second. And that’s not just a metaphor for something else. It actually is. It’s a physical reality. […]

The best example of this is what we call the flash crash of May 6th, two years ago, when suddenly, the whole system started behaving unpredictably. Large amounts of money were lost in milliseconds, and then the money came back, and we quietly (although the SEC held an investigation) swept it under the rug and just said, “well, it recovered. Things are okay.” But nobody knows what happened, or most of us don’t know. […]

What’s the driver today? You want one word? It’s advertising. And, you may think advertising is very trivial, and of no real importance, but I think it’s the driver. If you look at what most of these codes are doing, they’re trying to get the audience, trying to deliver the audience. The money is flowing as advertising.

{ George Dyson/Edge | Continue reading }

‘Although rivaled closely by SATAN PUT THE DINO BONES THERE, QUENTIN.’ –Malcolm Harris

451.jpg

Worst Companies At Protecting User Privacy: Skype, Verizon, Yahoo!, At&T, Apple, Microsoft.

{ Main Device | full story }

photos { Marlo Pascual | Sean and Seng }

The continuation of policy by other means

234.jpg

From his first months in office, President Obama secretly ordered increasingly sophisticated attacks on the computer systems that run Iran’s main nuclear enrichment facilities, significantly expanding America’s first sustained use of cyberweapons, according to participants in the program.

Mr. Obama decided to accelerate the attacks — begun in the Bush administration and code-named Olympic Games — even after an element of the program accidentally became public in the summer of 2010 because of a programming error that allowed it to escape Iran’s Natanz plant and sent it around the world on the Internet. Computer security experts who began studying the worm, which had been developed by the United States and Israel, gave it a name: Stuxnet. […]

It appears to be the first time the United States has repeatedly used cyberweapons to cripple another country’s infrastructure, achieving, with computer code, what until then could be accomplished only by bombing a country or sending in agents to plant explosives. The code itself is 50 times as big as the typical computer worm, Carey Nachenberg, a vice president of Symantec, one of the many groups that have dissected the code, said at a symposium at Stanford University in April. Those forensic investigations into the inner workings of the code, while picking apart how it worked, came to no conclusions about who was responsible.

A similar process is now under way to figure out the origins of another cyberweapon called Flame that was recently discovered to have attacked the computers of Iranian officials, sweeping up information from those machines. But the computer code appears to be at least five years old, and American officials say that it was not part of Olympic Games. They have declined to say whether the United States was responsible for the Flame attack.

Soon the two countries had developed a complex worm that the Americans called “the bug.” But the bug needed to be tested. So, under enormous secrecy, the United States began building replicas of Iran’s P-1 centrifuges. […] Those first small-scale tests were surprisingly successful: the bug invaded the computers, lurking for days or weeks, before sending instructions to speed them up or slow them down so suddenly that their delicate parts, spinning at supersonic speeds, self-destructed. After several false starts, it worked. One day, toward the end of Mr. Bush’s term, the rubble of a centrifuge was spread out on the conference table in the Situation Room, proof of the potential power of a cyberweapon. The worm was declared ready to test against the real target: Iran’s underground enrichment plant. […]

The first attacks were small, and when the centrifuges began spinning out of control in 2008, the Iranians were mystified about the cause, according to intercepts that the United States later picked up. “The thinking was that the Iranians would blame bad parts, or bad engineering, or just incompetence,” one of the architects of the early attack said.

The Iranians were confused partly because no two attacks were exactly alike. Moreover, the code would lurk inside the plant for weeks, recording normal operations; when it attacked, it sent signals to the Natanz control room indicating that everything downstairs was operating normally. “This may have been the most brilliant part of the code,” one American official said.

But by the time Mr. Bush left office, no wholesale destruction had been accomplished. Meeting with Mr. Obama in the White House days before his inauguration, Mr. Bush urged him to preserve two classified programs, Olympic Games and the drone program in Pakistan. Mr. Obama took Mr. Bush’s advice. […]

An error in the code, they said, had led it to spread to an engineer’s computer when it was hooked up to the centrifuges. […] It began replicating itself all around the world. Suddenly, the code was exposed. […] Within a week, another version of the bug brought down just under 1,000 centrifuges. Olympic Games was still on. […]

American cyberattacks are not limited to Iran.

{ NY Times | Continue reading }

photo { Donovan Wylie }

The tattoo on your face tells me all I need to know about your unemployment issues

45.jpg

Science-fiction writers once imagined a galactic currency that would grease the wheels of commerce from here to Alpha Centauri. In fact, however, we are tending in precisely the other direction, toward a burgeoning number of ever more specialized currencies. These will circulate electronically, by means of the mobile phones that are increasingly part of the dress of every person on the planet.

Seemingly everywhere you look, you can see the emergence of this pattern in what futurologists call the weak signals [PDF] of change. These are the changes that will be seen, a generation from now, to have foreshadowed a technological revolution. […]

In Japan and Korea, mobile phones have been used for payments for a decade, and the technology is now a standard feature there in handsets. In March, one out of six Japanese users bought something in a shop using a mobile. People also use the system to pay bills and transit fares; businesses use it to funnel loyalty rewards to customers. At first, the number of retailers accepting the new technology remained flat; once about a third of consumers were using it, though, things started to take off, producing the “hockey stick” adoption curve that we technologists love.

What’s happening in Africa is even more astonishing. Kenya is now home to the world’s most expansive mobile payments scheme, M-Pesa. […] A third of Kenya’s gross domestic product now flows through M-Pesa. […]

The rest of the world is starting to move. […] In France, mobile phone operators and banks have gotten together to launch a system for mobile proximity payments, which lets a chip-­bearing platform transfer money when held close to the reader. In Germany, meanwhile, the mobile phone operators have decided to ignore the banks and go it alone. In the United States, Google is working with Sprint and MasterCard to launch Google Wallet. […]

Cash’s indirect costs are huge. […] In the United States 18 to 19 percent of total reportable income is hidden from federal tax men, a shortfall of about US $500 billion. […]

In the Netherlands, there are commercial streets that are cash free. […] In Sweden the labor unions want to remove cash from shops and banks because it is their members who get beaten and shot in robberies; the government wants to reduce the burden of police work.

{ IEEE | Continue reading }

photo { Marc Chaumeil }

‘Idleness is the beginning of all psychology.’ –Nietzsche

5.jpg

HorrendousRex
No one seems to have mentioned it, so I’ll point out that this looks like an M4 Carbine with iron sights, without any magazine inserted (and I have to imagine no bullet round chambered, either).
It appears to have no attachments besides the iron sights, which I thought is surprising as I thought that the foregrip and picatinny rail and ACOG scope were standard attachments for the IDF. I would imagine this is because she is a new recruit (mentioned elsewhere in the thread). [Edit: Apparently no M4 attachments are standard in the IDF, they are either soldier-purchased or disbursed for relevant combat roles.]
The gun might also be the M4A1 automatic variant of the M4, but without any modifications I don’t really know how to tell. [Apparently it might also be a short-barreled variant of the M16 - but isn’t that what an M4 is?]
The umbrella stands belong to “Carlsberg” pale lager, a product of the Carlsberg Group. Their motto is “Probably the best beer in the world”, but it is not the best beer in the world.
I’m having trouble identifying the bikinis but the girl with the gun seems to be wearing a mismatched set, as is often the fashion.
The ass is good.

voodoopredatordrones
you just Sherlocked that picture…for no apparent reason

lampkyter
If he really Sherlocked it he would have told us something like how many times she’s had sex.

imatosserama
I can’t definitively say how many times, or if, she has had sex. What I can say is that it is unlikely that either of the two had orgasmed earlier that day.
Look at the way they hold their hips. When a woman orgasms, there is an involuntary relaxation of several of the hip muscles. The hips are carried in a way that looks relaxed and comfortable, rather unlike the somewhat stiff postures we see here. This effect usually lasts for several hours.
Of course, they could have had sex. Quite a lot, even. But it seems unlikely that they reached an orgasm that day. I could be wrong. But it seems unlikely. A more definite conclusion could be reached if we had a video of them walking.
Edit for proof: http://www.ncbi.nlm.nih.gov/pubmed/18637995

{ reddit | Continue reading }



kerrrocket.svg