nswd

technology

Rain on your college-ass disco dorm

21.jpg

“Amazon is not too big to fail,” Bezos said, in a recording of the meeting that CNBC has heard. “In fact, I predict one day Amazon will fail. Amazon will go bankrupt. If you look at large companies, their lifespans tend to be 30-plus years, not a hundred-plus years.”

{ CNBC | Continue reading }

‘This is the curse of our age, even the strangest aberrations are no cure for boredom.’ –Stendhal

66.jpg

Because more and more young people are constantly presented with the opportunity to access information and connect to others via their smartphones, they report to be in a state of permanent alertness. In the current study, we define such a state as smartphone vigilance, an awareness that one can always get connected to others in combination with a permanent readiness to respond to incoming smartphone notifications. We hypothesized that constantly resisting the urge to interact with their phones draws on response inhibition, and hence interferes with students’ ability to inhibit prepotent responses in a concurrent task. […]

Results show that the mere visibility of a smartphone is sufficient to experience vigilance and distraction, and that this is enhanced when students receive notifications. Curiously enough, these strong experiences were unrelated to stop-signal task performance. These findings raise new questions about when and how smartphones can impact performance.

{ PsyArXiv | Continue reading }

Mr. Ingberg described the vodka, made with melted snow from the French Alps, as “very tasty” and “smooth and round,” but added, “It’s difficult to attribute a taste to wheat-based vodka.”

imp-kerr-illusion.jpg

Machine-vision systems can match humans at recognizing faces and can even create realistic synthetic faces. But researchers have discovered that the same systems cannot recognize optical illusions, which means they also can’t create new ones.

{ Technology Review | Continue reading }

‘A fun thing to do at parties is stay home and masturbate.’ –Eden Dranger

24.jpg

In April 2018, the servers of the popular video game “Fortnite” crashed for 24 hr. During this period, Pornhub (a popular pornographic website) analyzed trends in pornography access, finding that: (a) the percentage of gamers accessing Pornhub increased by 10% and (b) the searches of pornographic videos using the key term “Fortnite” increased by 60%.

{ Journal of Behavioral Addictions | Continue reading }

related { How Fortnite became the most important video game on the planet }

update { Online divorce service says ‘Fortnite addiction’ cited in 200 divorces }

pochoir, brush and india ink { Roy Lichtenstein, Hand Loading Gun, 1961 }

‘One’s destination is never a place, but a new way of seeing things.’ —Henry Miller

55.jpg

We investigated the association between sexy-selfie prevalence and income inequality. […] Among 5,567 US cities and 1,622 US counties, areas with relatively more sexy selfies were more economically unequal. […] We investigated and confirmed that economically unequal (but not gender-oppressive) areas in the United States also had greater aggregate sales in goods and services related to female physical appearance enhancement (beauty salons and women’s clothing).

{ Proceedings of the National Academy of Sciences | Continue reading }

“Selfies” (self-taken photos) are a common self-presentation strategy on social media. This study experimentally tested whether taking and posting selfies, with and without photo-retouching, elicits changes to mood and body image among young women. […] Women who took and posted selfies to social media reported feeling more anxious, less confident, and less physically attractive afterwards compared to those in the control group. Harmful effects of selfies were found even when participants could retake and retouch their selfies.

{ Body Image | Continue reading }

When young children during their early development for the first time get their head around the fact that the reflection in the mirror is them, they are struck with a terrifying realization: All at once it dawns on them that this is how they present themselves to the world – and that the world might be repulsed by the sight. Animals, it seems, are not able to make that discovery. […] Hearing a recording of one’s own voice for the first time produces a similarly uncanny sensation.

{ Rolf Degen | Continue reading }

there shall be no more Kates and Nells

221.jpg

Coding theorists are concerned with two things. Firstly and most importantly they are concerned with the private lives of two people called Alice and Bob. In theory papers, whenever a coding theorist wants to describe a transaction between two parties he doesn’t call then A and B. No. For some longstanding traditional reason he calls them Alice and Bob.

Now there are hundreds of papers written about Alice and Bob. Over the years Alice and Bob have tried to defraud insurance companies, they’ve played poker for high stakes by mail, and they’ve exchanged secret messages over tapped telephones.

If we put together all the little details from here and there, snippets from lots of papers, we get a fascinating picture of their lives. This may be the first time a definitive biography of Alice and Bob has been give

In papers written by American authors Bob is frequently selling stock to speculators. From the number of stock market deals Bob is involved in we infer that he is probably a stockbroker. However from his concern about eavesdropping he is probably active in some subversive enterprise as well. And from the number of times Alice tries to buy stock from him we infer she is probably a speculator. Alice is also concerned that her financial dealings with Bob are not brought to the attention of her husband. So Bob is a subversive stockbroker and Alice is a two-timing speculator.

But Alice has a number of serious problems. She and Bob only get to talk by telephone or by electronic mail. In the country where they live the telephone service is very expensive. And Alice and Bob are cheapskates. So the first thing Alice must do is MINIMIZE THE COST OF THE PHONE CALL.

{ John Gordon, The Alice and Bob After Dinner Speech, 1984 | Continue reading }

acrylic, fluorescent acrylic, and roll-a-tex on canvas { Peter Halley, Laws of Rock, 2008 }

‘Diane Keaton comes in and said, “Hi kids, how are you?”…I’m going to tell her off once and for all, what a big phony-baloney she is.’ –Andy Warhol

3.gif

We’d all like to be a little happier.

The problem is that much of what determines happiness is outside of our control. Some of us are genetically predisposed to see the world through rose-colored glasses, while others have a generally negative outlook. Bad things happen, to us and in the world. People can be unkind, and jobs can be tedious.

But we do have some control over how we spend our leisure time. That’s one reason why it’s worth asking which leisure time activities are linked to happiness, and which aren’t.

In a new analysis of 1 million U.S. teens, my co-authors and I looked at how teens were spending their free time and which activities correlated with happiness, and which didn’t.

[…]

Every year, teens are asked about their general happiness, in addition to how they spend their time. We found that teens who spent more time seeing their friends in person, exercising, playing sports, attending religious services, reading or even doing homework were happier. However, teens who spent more time on the internet, playing computer games, on social media, texting, using video chat or watching TV were less happy.

In other words, every activity that didn’t involve a screen was linked to more happiness, and every activity that involved a screen was linked to less happiness. The differences were considerable: Teens who spent more than five hours a day online were twice as likely to be unhappy as those who spent less than an hour a day.

Of course, it might be that unhappy people seek out screen activities. However, a growing number of studies show that most of the causation goes from screen use to unhappiness, not the other way around. […]

A similar trend might be occurring for adults: My co-authors and I previously found that adults over age 30 were less happy than they were 15 years ago, and that adults were having sex less frequently.

{ Quartz | Continue reading }

Drawing on the past well-being literature, the authors propose that a person’s chronic happiness level is governed by 3 major factors: a genetically determined set point for happiness, happiness-relevant circumstantial factors, and happiness-relevant activities and practices.

{ Review of General Psychology | PDF }

Three Billboards is a good damn movie. I give it two billboards up!

2.jpg

Here, we present a method that estimates socioeconomic characteristics of regions spanning 200 US cities by using 50 million images of street scenes gathered with Google Street View cars.

Using deep learning-based computer vision techniques, we determined the make, model, and year of all motor vehicles encountered in particular neighborhoods.

Data from this census of motor vehicles, which enumerated 22 million automobiles in total (8% of all automobiles in the United States), were used to accurately estimate income, race, education, and voting patterns at the zip code and precinct level.

The resulting associations are surprisingly simple and powerful. For instance, if the number of sedans encountered during a drive through a city is higher than the number of pickup trucks, the city is likely to vote for a Democrat during the next presidential election (88% chance); otherwise, it is likely to vote Republican (82%).

{ PNAS | PDF }

photo { Tod Papageorge }

What am I doing? I’m talking to an empty telephone.

210.jpg

An assassination market is a prediction market where any party can place a bet (using anonymous electronic money and pseudonymous remailers) on the date of death of a given individual, and collect a payoff if they “guess” the date accurately. This would incentivise assassination of individuals because the assassin, knowing when the action would take place, could profit by making an accurate bet on the time of the subject’s death. Because the payoff is for accurately picking the date rather than performing the action of the assassin, it is substantially more difficult to assign criminal liability for the assassination.

{ Wikipedia | Continue reading }

no master how mustered, mind never mend

221.jpg

Brothers Vincenzo and Giacomo Barbato named their clothing brand “Steve Jobs” in 2012 after learning that Apple had not trademarked his name. […]

The Barbatos designed a logo that resembles Apple’s own, choosing the letter “J” with a bite taken out of the side. Apple, of course, sued the two brothers for using Jobs’ name and a logo that mimics the Apple logo. In 2014, the European Union’s Intellectual Property Office ruled in favor of the Barbatos and rejected Apple’s trademark opposition. […]

While the Barbatos currently produce bags, t-shirts, jeans, and other clothing and fashion items […] they plan to produce electronic devices under the Steve Jobs brand.

{ Mac Rumors | Continue reading }

art { Left: Ellsworth Kelly, Nine Squares, 1977 | Right: Damien Hirst, Myristyl Acetate, 2005 }

The sun never sets

22.jpg

Ross McNutt is an Air Force Academy graduate, physicist, and MIT-trained astronautical engineer who in 2004 founded the Air Force’s Center for Rapid Product Development. The Pentagon asked him if he could develop something to figure out who was planting the roadside bombs that were killing and maiming American soldiers in Iraq. In 2006 he gave the military Angel Fire, a wide-area, live-feed surveillance system that could cast an unblinking eye on an entire city.

The system was built around an assembly of four to six commercially available industrial imaging cameras, synchronized and positioned at different angles, then attached to the bottom of a plane. As the plane flew, computers stabilized the images from the cameras, stitched them together and transmitted them to the ground at a rate of one per second. This produced a searchable, constantly updating photographic map that was stored on hard drives. His elevator pitch was irresistible: “Imagine Google Earth with TiVo capability.” […]

If a roadside bomb exploded while the camera was in the air, analysts could zoom in to the exact location of the explosion and rewind to the moment of detonation. Keeping their eyes on that spot, they could further rewind the footage to see a vehicle, for example, that had stopped at that location to plant the bomb. Then they could backtrack to see where the vehicle had come from, marking all of the addresses it had visited. They also could fast-forward to see where the driver went after planting the bomb—perhaps a residence, or a rebel hideout, or a stash house of explosives. More than merely identifying an enemy, the technology could identify an enemy network. […]

McNutt retired from the military in 2007 and modified the technology for commercial development. […] His first customer was José Reyes Ferriz, the mayor of Ciudad Juárez, in northern Mexico. In 2009 a war between the Sinaloa and Juárez drug cartels had turned his border town into the most deadly city on earth. […]

Within the first hour of operations, his cameras witnessed two murders. “A 9-millimeter casing was all the evidence they’d had,” McNutt says. By tracking the assailants’ vehicles, McNutt’s small team of analysts helped police identify the headquarters of a cartel kill squad and pinpoint a separate cartel building where the murderers got paid for the hit.

The technology led to dozens of arrests and confessions, McNutt says, but within a few months the city ran out of money to continue paying for the service.

{ Bloomberg | Continue reading | Radiolab }

photo { William Eggleston, Untitled (Two Girls Walking), 1970-73 }

It was put in the newses what he did, nicies and priers, the King fierceas Humphrey, with illysus distilling, exploits and all

24.jpg

The Food and Drug Administration has approved the first digital pill for the US which tracks if patients have taken their medication. The pill called Abilify MyCite, is fitted with a tiny ingestible sensor that communicates with a patch worn by the patient — the patch then transmits medication data to a smartphone app which the patient can voluntarily upload to a database for their doctor and other authorized persons to see. Abilify is a drug that treats schizophrenia, bipolar disorder, and is an add-on treatment for depression.

{ The Verge | Continue reading }

photo { Bruce Davidson, Subway platform in Brooklyn, 1980 }

Where the sun doesn’t shine

21.jpg

ML is short for machine learning, referring to computer algorithms that can learn to perform particular tasks on their own by analyzing data. AutoML, in turn, is a machine-learning algorithm that learns to build other machine-learning algorithms.

With it, Google may soon find a way to create A.I. technology that can partly take the humans out of building the A.I. systems that many believe are the future of the technology industry. […]

The tech industry is promising everything from smartphone apps that can recognize faces to cars that can drive on their own. But by some estimates, only 10,000 people worldwide have the education, experience and talent needed to build the complex and sometimes mysterious mathematical algorithms that will drive this new breed of artificial intelligence.

The world’s largest tech businesses, including Google, Facebook and Microsoft, sometimes pay millions of dollars a year to A.I. experts, effectively cornering the market for this hard-to-find talent. The shortage isn’t going away anytime soon, just because mastering these skills takes years of work. […]

Eventually, the Google project will help companies build systems with artificial intelligence even if they don’t have extensive expertise.

{ NY Times | Continue reading }

art { Ellsworth Kelly, Concorde I (state), 1981-82 }

I lie about my zodiac sign and watch people break down the person I’m not

2.jpg

In what appears to be the first successful hack of a software program using DNA, researchers say malware they incorporated into a genetic molecule allowed them to take control of a computer used to analyze it. […]

To carry out the hack, researchers encoded malicious software in a short stretch of DNA they purchased online. They then used it to gain “full control” over a computer that tried to process the genetic data after it was read by a DNA sequencing machine.  

The researchers warn that hackers could one day use faked blood or spit samples to gain access to university computers, steal information from police forensics labs, or infect genome files shared by scientists.  

{ Technology Review | Continue reading }

When that hark from the air said it was Captain Finsen

22.jpg

The travel booking systems used by millions of people every day are woefully insecure and lack modern authentication methods. This allows attackers to easily modify other people’s reservations, cancel their flights and even use the refunds to book tickets for themselves.

{ Computer World | Continue reading }

related { By posting a picture of your boarding pass online, you may be giving away more information than you think }

‘How good bad music and bad reasons sound when we march against an enemy.’ –Nietzsche

23.jpg

Google Brain has created two artificial intelligences that evolved their own cryptographic algorithm to protect their messages from a third AI, which was trying to evolve its own method to crack the AI-generated crypto. The study was a success: the first two AIs learnt how to communicate securely from scratch.

{ Ars Technica | Continue reading }

images { American Apparel ad, Vice magazine, 2008 | Richard Prince, Untitled, 2012-14 }

unrelated { This Year, You Can Wear A ‘Vagina Mask’ For Halloween | Thanks Tim }

I can’t feel you anymore, I can’t even touch the books you’ve read

3.jpg

If you were at work last Friday, you might have noticed that you couldn’t get on Twitter, Spotify, [Amazon, Tumblr, Reddit, Netflix…]. The sites themselves were fine, but users across the country lost access due to a large-scale attack on Dyn, a company whose servers provide infrastructure and routing services for the internet’s top destinations.

{ Bloomberg | Continue reading }

Allison Nixon, director of research at Flashpoint, said the botnet used in today’s ongoing attack is built on the backs of hacked IoT devices — mainly compromised digital video recorders (DVRs) and IP cameras made by a Chinese hi-tech company called XiongMai Technologies. The components that XiongMai makes are sold downstream to vendors who then use it in their own products.

“It’s remarkable that virtually an entire company’s product line has just been turned into a botnet that is now attacking the United States,” Nixon said.

{ Brian Krebs | Continue reading }

related { Chinese Firm Behind Friday’s Internet Outage Threatens Western Accusers With Lawsuits }

related { Last month the Exploratorium was the target of a cyberattack. This is an account of what we think happened and how we dealt with it. }

‘The press, the machine, the railway, the telegraph are premises whose thousand-year conclusion no one has yet dared to draw.’ —Nietzsche

22.jpg

We fail to see that a computer that is a hundred times more accurate than a human, and a million times faster, will make 10,000 times as many mistakes.

{ The Guardian | Continue reading }

related { Robots Will Replace Doctors, Lawyers, and Other Professionals }

art { electropollock | video }

‘Genius presupposes some disorder.’—Diderot

657.jpg

Someone Is Learning How to Take Down the Internet

Recently, some of the major companies that provide the basic infrastructure that makes the Internet work have seen an increase in DDoS attacks against them. Moreover, they have seen a certain profile of attacks. These attacks are significantly larger than the ones they’re used to seeing. They last longer. They’re more sophisticated. And they look like probing. One week, the attack would start at a particular level of attack and slowly ramp up before stopping. The next week, it would start at that higher point and continue. And so on, along those lines, as if the attacker were looking for the exact point of failure. […]

We don’t know where the attacks come from. The data I see suggests China, an assessment shared by the people I spoke with. On the other hand, it’s possible to disguise the country of origin for these sorts of attacks. The NSA, which has more surveillance in the Internet backbone than everyone else combined, probably has a better idea, but unless the US decides to make an international incident over this, we won’t see any attribution.

{ Bruce Schneier | Continue reading }

polaroid photograph { Andy Warhol, Grapes, 1981 }

One umbrella, were it no bigger than a fairy mushroom, is worth ten such stopgaps

2.jpg

{ Not using smartphones can improve productivity by 26%, says study }



kerrrocket.svg