shop imp kerr
nswd

technology

‘No compulsion in the world is stronger than the urge to edit someone else’s document.’ –H. G. Wells

We’ve learned that Mike Daisey’s story about Apple in China - which we broadcast in January - contained significant fabrications. We’re retracting the story because we can’t vouch for its truth. This is not a story we commissioned. It was an excerpt of Mike Daisey’s acclaimed one-man show “The Agony and the Ecstasy of Steve Jobs,” in which he talks about visiting a factory in China that makes iPhones and other Apple products.

{ This American Life | Continue reading | More: Mike Daisey’s Lies About China }

Take it easy, Gramps! We gotta stay here ’til Evinrude brings us word from the mice.

215.jpg

The extraordinary ability of birds and bats to fly at speed through cluttered environments such as forests has long fascinated humans. It raises an obvious question: how do these creatures do it?

Clearly they must recognise obstacles and exercise the necessary fine control over their movements to avoid collisions while still pursuing their goal. And they must do this at extraordinary speed.

From a conventional command and control point of view, this is a hard task. Object recognition and distance judgement are both hard problems and route planning even tougher.

Even with the vast computing resources that humans have access to, it’s not at all obvious how to tackle this problem. So how flying animals manage it with immobile eyes, fixed focus optics and much more limited data processing is something of a puzzle.

Today, Ken Sebesta and John Baillieul at Boston University reveal how they’ve cracked it. These guys say that flying animals use a relatively simple algorithm to steer through clutter and that this has allowed them to derive a fundamental law that determines the limits of agile flight.

{ The Physics arXiv Blog | Continue reading }

‘Believing in progress does not mean believing that any progress has yet been made.’ –Kafka

The Moving Picture Experts Group (MPEG) is a working group of experts that was formed by ISO and IEC to set standards for audio and video compression and transmission.

It was established in 1988 by the initiative of Hiroshi Yasuda (Nippon Telegraph and Telephone) and Leonardo Chiariglione, who has been from the beginning the Chairman of the group. (…)

The MPEG compression methodology is considered asymmetric as the encoder is more complex than the decoder.

{ Wikipedia | Continue reading }

No one will ever know you, only what you let them see

23.jpg

People using Google’s email service, Gmail, on a relatively new BlackBerry smartphone may have noticed recently that some contacts now have small photos next to their names. They may have been surprised to see them there – after all, these are not photos taken by the BlackBerry itself, and its manufacturer Research In Motion has struck no data-sharing deal with Google.

Those images appear because Google has taken a profile photo users uploaded to Google+, its social network, and incorporated it into their contacts’ Gmail address book.

This is just one example of how Google is increasingly combining the information it holds about its users from its dozens of products, which range from a search engine and maps to Android smartphones, flight checkers and language translation apps.

One line in Google’s privacy policy, which came into force on Thursday, explains how it is able to do this: “If other users already have your email or other information that identifies you, we may show them your publicly visible Google Profile information, such as your name and photo.”

But when, in late January, Google published this new document detailing how it is combining the personal information it holds about its users from its dozens of different products, many privacy advocates, data protection officials and state regulators let their simmering distrust of the internet company boil over. “Google didn’t ask us if we, their customers, minded our data being merged and used in new ways,” said Jim Killock, executive director of the Open Rights Group, a digital activist. “Most people will have no choice but to put up with the change. That is wrong.”

{ FT | Continue reading }

related { How Google—and 104 Other Companies—Are Tracking Me on the Web }

Critique of the Hegelian Dialectic and Philosophy as a Whole

Japanese researchers build a gun capable of stopping speakers in mid-sentence.

{ The Physics arXiv Blog | full story }

If your attack is going really well, it’s an ambush

233.jpg

In this article we explore how online daters use technology to assess and manage the real and perceived risks associated with online dating. (…)

All participants believed that online dating was risky in some manner.

To manage these risks participants used technology in various ways: ways: to assist them in assessing authenticity and compatibility, to limit their self disclosure and exposure, to undertake surveillance of others and to control their online interactions. The participants made pragmatic use of the technologies available to them to minimise the risks, deploying risk management strategies throughout their online dating experiences.

{ International Journal of Emerging Technologies and Society | Continue reading }

photo { Yoshihiro Tatsuki }

‘It’s that time again. I’m changing my privacy policy & terms. This stuff matters. Especially if you ever told me a secret.’ –Tim Geoghegan

And it could have went so many ways, so many ways it can go

31.jpg

How would things change if Google and Bing went down for 24 hours, and there wasn’t a way around the block?

If your first thought is to do your online searches through Yahoo!, you will run into another roadblock. Since 2010, Yahoo! searches are powered by Bing. Can you name any other search engine sites off the top of your head? (…)

Losing search sites is only the tip of the iceberg. Google and Bing also provide extensive services in other areas, one of the most obvious being email—Gmail alone has 350 million users. Blacking out Gmail would certainly affect all these people, but it would also affect everyone trying to reach them.

{ Naked Capitalism | Continue reading }

Last week, I got a notice from Twitter saying the Manhattan District Attorney’s office had subpoenaed my account activity for a three-month period between September and December of last year. On October 1, I was arrested along with 700 or so other people marching across the Brooklyn Bridge as part of an early Occupy Wall Street demonstration. (…)

Why was it Twitter who got subpoenaed even though they’re my words the DA wants to see?

The short answer is: they’re not my words. Not in the legal sense at least. Part of the Twitter user agreement is that the Tweets belong to the company, not to the user. As far as the law is concerned, my online self is an informational aspect of a legal entity named Twitter, not me. That means if someone wants to use my statements against me in court, it’s not me they have to call, it’s that little blue birdie. In this context the term “microblogging” gets some new meaning: Twitter’s users really are unpaid content producers for a giant microblog hosting site.

{ Malcolm Harris/Shareable | Continue reading }

related { Will the Web Break? }

photo { Guy Bourdin }

‘I think someone has stolen our tent.’ –Sherlock Holmes

210.jpg

Facebook’s inventory of data and its revenue from advertising are small potatoes compared to some others. Google took in more than 10 times as much, with an estimated $36.5 billion in advertising revenue in 2011, by analyzing what people sent over Gmail and what they searched on the Web, and then using that data to sell ads. Hundreds of other companies have also staked claims on people’s online data by depositing software called cookies or other tracking mechanisms on people’s computers and in their browsers. If you’ve mentioned anxiety in an e-mail, done a Google search for “stress” or started using an online medical diary that lets you monitor your mood, expect ads for medications and services to treat your anxiety.

Ads that pop up on your screen might seem useful, or at worst, a nuisance. But they are much more than that. The bits and bytes about your life can easily be used against you. Whether you can obtain a job, credit or insurance can be based on your digital doppelgänger — and you may never know why you’ve been turned down.

Material mined online has been used against people battling for child custody or defending themselves in criminal cases. LexisNexis has a product called Accurint for Law Enforcement, which gives government agents information about what people do on social networks. The Internal Revenue Service searches Facebook and MySpace for evidence of tax evaders’ income and whereabouts, and United States Citizenship and Immigration Services has been known to scrutinize photos and posts to confirm family relationships or weed out sham marriages. Employers sometimes decide whether to hire people based on their online profiles, with one study indicating that 70 percent of recruiters and human resource professionals in the United States have rejected candidates based on data found online. A company called Spokeo gathers online data for employers, the public and anyone else who wants it. The company even posts ads urging “HR Recruiters — Click Here Now!” and asking women to submit their boyfriends’ e-mail addresses for an analysis of their online photos and activities to learn “Is He Cheating on You?”

Stereotyping is alive and well in data aggregation. Your application for credit could be declined not on the basis of your own finances or credit history, but on the basis of aggregate data — what other people whose likes and dislikes are similar to yours have done. If guitar players or divorcing couples are more likely to renege on their credit-card bills, then the fact that you’ve looked at guitar ads or sent an e-mail to a divorce lawyer might cause a data aggregator to classify you as less credit-worthy. When an Atlanta man returned from his honeymoon, he found that his credit limit had been lowered to $3,800 from $10,800. The switch was not based on anything he had done but on aggregate data. A letter from the company told him, “Other customers who have used their card at establishments where you recently shopped have a poor repayment history with American Express.” (…)

In 2007 and 2008, the online advertising company NebuAd contracted with six Internet service providers to install hardware on their networks that monitored users’ Internet activities and transmitted that data to NebuAd’s servers for analysis and use in marketing. For an average of six months, NebuAd copied every e-mail, Web search or purchase that some 400,000 people sent over the Internet.

{ NY Times | Continue reading }

Bring me the reaper, bring me the lawyer

28.jpg

Mr. Zuckerberg’s control is based on the structure of Facebook’s shares. Facebook is proposing to go public with a dual-class share structure. Public shareholders will purchase Class A shares that have one vote apiece. Mr. Zuckerberg, Facebook employees and current Facebook investors will hold Class B shares, which have 10 votes apiece. This is a deviation from the one share one vote norm followed by most publicly traded companies.

Eight years after the company’s founding, Mr. Zuckerberg has retained a remarkable percentage of Facebook’s ownership — he currently owns 28.4 percent of the Class B shares.

This alone does not give Mr. Zuckerberg total control over Facebook.

He has also entered into voting agreements with other Class B shareholders, including shares held by the Facebook co-founder Dustin Moskovitz and Facebook’s first president, Sean Parker. These agreements give Mr. Zuckerberg voting control over an additional 30.6 percent of the Class B shares. Mr. Zuckerberg even retains control over about half of these shares if he decides to leave Facebook. Post-I.P.O., he will control at least 57.1 percent of the Class B shares, potentially more if some investors sell their B shares in the offering. This will give him complete voting control over the company.

Mr. Zuckerberg’s consent will be required if the company is sold. Unlike most public companies, Facebook will not have a nominating committee for its directors comprising the independent directors on Facebook’s board. Instead, all of the directors will be selected by the board itself, a group that will be appointed by Mr. Zuckerberg. He can also remove and replace any director at any time.

Nor is this going to change any time soon.

Facebook’s organizing documents dictate that when Class B shares are transferred, they typically will convert into the low-vote Class A shares. It is likely that, over time, Mr. Zuckerberg will hold onto the bulk of his Class B shares as other holders of Class B shares sell off their stakes.
This is the rub of the dual-class shares.

Mr. Zuckerberg can also sell down his shares. But until the Class B shares comprise less than 9.1 percent of the outstanding Facebook shares, the holders of the Class B shares control Facebook.

Given this low threshold, Mr. Zuckerberg, 27, is likely to have enough Class B shares to give him control of the company for a long, long time, despite the fact that he will have a much smaller economic stake. In fact, other shareholders are more likely to sell their Class B shares more quickly than Mr. Zuckerberg, who appears to want to manage Facebook for the long-term.

As a result, his control over Facebook could increase over time.

{ DealBook/NY Times | Continue reading }

Consider the 843 million monthly users and the 450 million daily users. Those sound like enormous numbers — but what do they really mean? (…) If you click on a Like button any given day, you are counted by Facebook as an active user that day.

From the S-1:

Daily Active Users (DAUs). We define a daily active user as a registered Facebook user who logged in and visited Facebook through our website or a mobile device, or took an action to share content or activity with his or her Facebook friends or connections via a third-party website that is integrated with Facebook, on a given day.

All of those people clicking all of those “Like” buttons are counted as active that day, EVEN IF THEY NEVER GO TO FACEBOOK.COM.

Think of what this means in terms of monetizing their “daily users.” If they click a like button but do not go to Facebook that day, they cannot be marketed to, they do not see any advertising, they cannot be sold any goods or services. All they did was take advantage of FB’s extensive infrastructure to tell their FB friends (who may or may not see what they did) that they liked something online. (…)

It helps to explain why Facebook’s valuation may be so greatly exaggerated.

{ Barry Ritholtz | Continue reading }

The slight contretemps claimed her attention but in two twos she set that little matter to rights

22.jpg

If you watch a person using the net, you see a kind of immersion: Often they are very oblivious to what is going on around them. But it is a very different kind of attentiveness than reading a book. In the case of a book, the technology of the printed page focuses our attention and encourages a linear type of thinking. In contrast, the internet seizes our attention only to scatter it. We are immersed because there’s a constant barrage of stimuli coming at us and we seem to be very much seduced by that kind of constantly changing patterns of visual and auditorial stimuli. When we become immersed in our gadgets, we are immersed in a series of distractions rather than a sustained, focused type of thinking. (…)

It is important to realize that it is no longer just hyperlinks: You have to think of all aspects of using the internet. There are messages coming at us through email, instant messenger, SMS, tweets etc. We are distracted by everything on the page, the various windows, the many applications running. You have to see the entire picture of how we are being stimulated. If you compare that to the placidity of a printed page, it doesn’t take long to notice that the experience of taking information from a printed page is not only different but almost the opposite from taking in information from a network-connected screen. With a page, you are shielded from distraction. We underestimate how the page encourages focussed thinking – which I don’t think is normal for human beings – whereas the screen indulges our desire to be constantly distracted.

{ Nicholas Carr/The European | Continue reading }

related { Digital Suicide and the Biopolitics of Leaving Facebook }

painting { Joyce Pensato }

The natives over there are cannibals. They eat liars with the same enthusiasm as they eat honest men.

96.jpg

Facebook users can spread emotions to their online connections just by posting a written message, or status update, that’s positive or negative, says a psychologist who works for the wildly successful social network.

This finding challenges the idea that emotions get passed from one person to another via vocal cues, such as rising or falling tone, or by a listener unconsciously imitating a talker’s body language, said Adam Kramer on January 27 at the annual meeting of the Society for Personality and Social Psychology. Kramer works at Facebook’s headquarters in Palo Alto, Calif.

“It’s time to rethink how emotional contagion works, since vocal cues and mimicry aren’t needed,” Kramer said. “Facebook users’ emotion leaks into the emotional worlds of their friends.”

{ ScienceNews | Continue reading }

‘Sometimes the first duty of intelligent men is the restatement of the obvious.’ –G. Orwell

2j.jpg

The email might contain “privileged, confidential and/or proprietary information,” they are told. If it landed in their inbox by error, they are strictly prohibited from “any use, distribution, copying or disclosure to another person.” And in such case, “you should destroy this message and kindly notify the sender by reply email.” (…)

Email disclaimers, those wordy notices at the end of emails from lawyers, bankers, analysts, consultants, publicists, tax advisers and even government employees, have become ubiquitous—so much so that many recipients, and even senders, are questioning their purpose. (…)

Emails often now include automatic digital signatures with a sender’s contact information or witty sayings, pleas to save trees and not print them, fancy logos and apologies for grammatical errors spawned by using a touch screen. (…)

Some lawyers say the disclaimers have value, alerting someone who receives confidential, proprietary, or legally privileged information by accident that they don’t have permission to take advantage of it.

Others, including lawyers whose email messages are laden with them, say the disclaimers are for the most part unenforceable. They argue that they don’t create any kind of a contract between sender and recipient merely because they land in the recipient’s inbox.

It’s largely untested whether email disclaimers can hold up in court and at least one ruling on the matter was mixed.

Boilerplate language attached to every email dilutes the intention, some say. For instance, when every message from a sender’s account is tagged with “privileged and confidential,” it might make it difficult to convince a judge that any one email is more private than another.

{ WSJ | Continue reading }

He fills gaseous environs with the sound of contracting metal and retro Roland effects that spit battery acid and blue sparks onto the tense, prowling beats

234.jpg

{ Apple sells more phones in a day than people make babies | An hour of video posted every second on YouTube }

image { Robert Mangold, 1/3 Gray-Green Curved Area, 1966 | Guggenheim, until Feb. 8 }

I finally figured out how to make my dick 8 inches long. Fold it in half.

415.jpg

I missed a great story circulated by my first New York roommates about how our scuzzball landlord is now embroiled in a legal fracas for renting a 1.5 million Tribeca apartment to a guy who runs a basement sex loft out of it offering “flaming massages.” The neighbors are so mad they keep smearing dog feces on the door. I could have lived without this news, but I’m happier now that I have it.

(…)

The messages Facebook hides in an obscure folder labeled “Other.”

{ Slate | Continue reading }

Is this it there

228.jpg

One small company reinvents a $30 billion market

EagleView uses aerial photography and 3-D modeling to produce on-demand reports for accurate measurements of almost every roof in the country. No ladder, no tape measurers and no perilous, time-consuming estimates.

{ CNN Money | Continue reading }

Strobe lights make everything sexy, yeah

631.jpg

What can make camping even more enjoyable? Self-cleaning clothes. And I don’t mean jumping into the river with your clothes on, but simply just leaving them out in the sun. At least, that’s what we may be able to do one day with the self-cleaning cotton developed by Chinese researchers. (…)

The team evaluated the self-cleaning properties of the new cotton fibres based on the removal of methyl orange, a dye commonly used in textiles. The dye breaks down with exposure to visible light by a process known as photocatalytic degradation. With just two hours of exposure to visible light, about 70% of the dye was removed from the cotton fibres.

{ Basal Science Clarified | Continue reading }

photo { Coley Brown }

People love it, which is different than saying they have fun. Fun comes and goes.

413.jpg

Announcing products before they are ready gives the competition time to respond, raises customer expectations, and opens a company up to the carping of critics who are bashing an idea rather than an actual product. Companies that fail to grasp the power of secrecy do so at their peril. (…) Steve Jobs once said that not talking about the inner workings of the company is something he borrowed from Walt Disney. The creator of the original Magic Kingdom felt the magic the public attributed to Disney would be diminished by excessive focus on what went on behind the scenes. (…)

The splendid central cafeteria, Caffe Macs, features separate stations for fresh sushi, salad, and desserts and teems with Apple employees. They pay for their meals, by the way, unlike at Google. (…) “There’s only one free lunch at Apple, and it’s on your first day,” said a former employee. (…)

For new recruits, keeping secrets begins even before they learn which building they’ll be working in. Many employees are hired into so‑called dummy positions, roles that aren’t explained in detail until after they join the company.

{ Fortune | Continue reading }

‘Twenty years from now you will be more disappointed by the things you didn’t do than by the ones you did.’ –Mark Twain

15.jpg

I was far from the most active Facebook user I know, but my decision to quit came from a long cold look at just how many hours I’ve devoted to it in the last couple of years, and a strong accompanying feeling that, were I to devote the same amount over the next couple, I would want to put on some spiked gloves and repeatedly punch myself in the nose really hard. No matter how positive you feel about Facebook or Twitter and the ways in which they’ve enhanced your life, it is unlikely that anyone will ever lie on their deathbed and say, “You know what? I’m really glad I spent all that time social networking!” Additionally, I’m starting to write a new book, and attempting to feel more focussed.

{ Tom Cox/Guardian | Continue reading }

bonus [more]:

216.jpg

A pearl in every oyster, a rock in every snowball

61.jpg

Ira Glass OK, I am holding a new iPhone 4S in my hand. This is the one that you can talk to, and it talks back. It’s a program called Siri. So let’s try this. I’m just going to hold it up to the microphone here and push a button. Siri, where do you come from?

Siri Software I, Siri, was designed by Apple in California.

Ira Glass Where were you manufactured?

Siri Software I’m not allowed to say.

Ira Glass Why?

Siri Software Good question. Anything else I can do for you?

(…)

Ira Glass Flip over the phone– right here on the back it’s printed, assembled in China.

(…)

Mike Daisey We think our crap comes from China, right? Kind of a generalized way. China. But it doesn’t come from China. It comes from Shenzhen. It’s a city. It’s a place. (…) We get out to the edge of the core of Shenzhen and we come to the gates. Because 31 years ago, when Deng Xiaoping carved this area off from the rest of China with a big red pen, he said, this will be the special economic zone. And he made a deal with the corporations. He said listen, use our people. Do whatever you want to our people. Just give us a modern China. And the corporations took that deal, and they squeezed and they squeezed. And what they got was the Shenzhen we find today.

And on the other side of the gates it’s the factory zone. And whew, it’s like going from the Eloi to the Morlocks, everything changes. I’ve never seen anything like it. Everything is under construction. Every road has a bypass. Every bypass has a bypass. It’s bypasses all the way down. (…)

We are in a taxi right now in the factory zone. We are driving on our way to Foxconn. Foxconn, a single company, makes a staggering amount of the electronics you use every day. They make electronics for Apple, Dell, Nokia, Panasonic, HP, Samsung, Sony, Lenovo, a third of all of it. That’s Foxconn. And at this plant they make all kinds of things, including MacBook Pros and iPhones and iPads. (…)

The Foxconn plant in Shenzhen has 430,000 workers. That can be a difficult number to conceptualize. I find it’s useful to instead think about how there are more than 20 cafeterias at the plant. And then you just have to understand that workers told me that these cafeterias can hold up to 10,000 people. So now you just need to visualize a cafeteria that seats 10,000 people (…)

I talked to more than 100 people. I met five or six who were underage.

{ WBEZ/This American Life | Continue reading }



kerrrocket.svg