‘Nothing is so useless as a general maxim.’ —Thomas Macaulay
“you only have 100k because of ur url.”
“uh no i had 93k before i got this url so excuse u.”
art { Ellsworth Kelly, Diagonal lines, 1951 | James Marshall, Untitled 7, 2015 }
“you only have 100k because of ur url.”
“uh no i had 93k before i got this url so excuse u.”
art { Ellsworth Kelly, Diagonal lines, 1951 | James Marshall, Untitled 7, 2015 }
Please notice how the Director of the NSA, unlike the vociferous FBI director, has been relatively silent. With a budget on the order of $10 billion at its disposal the NSA almost certainly has something equivalent to what the courts have asked Apple to create. The NSA probably doesn’t want to give its bypass tool to the FBI and blow its operational advantage.
They’re like, “The internet is public.” A lot of things are public, but it doesn’t mean they’re for you. For instance, you can walk down the street and you can look into all of your neighbors’ windows should they have chanced not to draw the curtains. If you really lean in, you can listen to all kinds of conversations that are too quiet for you to just overhear. You can do all kinds of things in public that you should not do. Are you walking down the street, interrupting random twosomes or threesomes of people to add your two fucking sentences? You’re not, so why are you on my Twitter? Why are you talking to me?
photo { Leah Schrager }
Experts say fakes have become one of the most vexing problems in the art market. […]
Two years ago, the center, known for its work in bioengineering, encryption and nanotechnology, set about developing a way to infuse paintings, sculptures and other artworks with complex molecules of DNA created in the lab. […]
The new approach, in its formative stage, would implant synthetic DNA, not the personal DNA of the artists, because of privacy issues and because a person’s DNA could conceivably be stolen and embedded, thus undermining the authority of such a marking protocol.
The developers said the bioengineered DNA would be unique to each item and provide an encrypted link between the art and a database that would hold the consensus of authoritative information about the work. The DNA details could be read by a scanner available to anyone in the art industry wanting to verify an object.
installation { Yayoi Kusama, The obliteration room, 2002-present }
Artificial-intelligence researchers have long struggled to make computers perform a task that is simple for humans: picking out one person’s speech when multiple people nearby are talking simultaneously.
It is called the ‘cocktail-party problem’. Typical approaches to solving it have either involved systems with multiple microphones, which distinguish speakers based on their position in a room, or complex artificial-intelligence algorithms that try to separate different voices on a recording.
But the latest invention is a simple 3D-printed device that can pinpoint the origin of a sound without the need for any sophisticated electronics.
photos { 1 | 2. Yo-landi Visser photographed by Pierre Debusschere }
By definition, exponential growth means the thing that comes next will be equal in importance to everything that came before. […]
this exponential growth has given us terrible habits. One of them is to discount the present.
An experimental algorithm out of Facebook’s artificial intelligence lab can recognise people in photographs even when it can’t see their faces. Instead it looks for other unique characteristics like your hairdo, clothing, body shape and pose. […]
The final algorithm was able to recognise individual people’s identities with 83 per cent accuracy.
{ NewScientist | Continue reading }
California-based company Face First is rolling out a system for retailers that it says will “boost sales by recognising high-value customers each time they shop” and send “alerts when known litigious individuals enter any of your locations.”
“What facial recognition allows is a world without anonymity,” says Bedoya. “You walk into a car dealership and the salesman knows your name and how much you make.”
Another company, called Churchix is marketing facial recognition systems for churches. Once the faces of a church’s membership have been added to a database, the system tracks their attendance automatically. It also claims to be able to discern demographic data about the entire congregation, including age and gender.
photo { Aaron McElroy }
The future is always stranger than we expect: mobile phones and the Internet, not flying cars. […]
“We’re not funding Mother Teresa. We’re funding imperial, will-to-power people who want to crush their competition. Companies can only have a big impact on the world if they get big.” […]
The dirty secret of the trade is that the bottom three-quarters of venture firms didn’t beat the Nasdaq for the past five years. […] The truth is that most V.C.s subsist entirely on fees, which they compound by raising a new fund every three years. Returns are kept hidden by nondisclosure agreements, and so V.C.s routinely overstate them, both to encourage investment and to attract entrepreneurs. […]
“We live in a financial age, not a technological age.”
Participants were 152 students (88 women, 64 men; average age 19.7) at a “mid-sized university in the northeastern US.” […]
Texting during class was not acceptable, but 84.7% had done this. Texting in the shower is unacceptable and 34% have done this. Texting during the Pledge of Allegiance is unacceptable and 11.3% have done it. Texting while having sex is unacceptable and 7.4% have done it. Talking to a friend and texting another at the same time is unacceptable and between 79% and 84% have done it. Texting one person in whom you are romantically interested while on a date with someone else is unacceptable and 21.5% have done it. Breaking up by text is unacceptable and 26% have done it. Sending text messages while at a funeral is unacceptable and 10.1% have done it. Texting during a job interview is unacceptable and 2.7% have done it. Fighting with some via text is unacceptable and 66% have done it. Sexting is unacceptable and 42% have done it.
photo { Danny Lyon, New Year’s Eve on the subway, 1966 }
unrelated { Kids can’t tell the difference between journalism and advertising }
{ IEEE | full story | Thanks Tim! }
Snapchat, the photo-messaging app raising cash at a $15 billion valuation, probably isn’t actually worth more than Clorox or Campbell Soup. So where did investors come up with that enormous headline number?
Here’s the secret to how Silicon Valley calculates the value of its hottest companies: The numbers are sort of made-up. For the most mature startups, investors agree to grant higher valuations, which help the companies with recruitment and building credibility, in exchange for guarantees that they’ll get their money back first if the company goes public or sells. They can also negotiate to receive additional free shares if a subsequent round’s valuation is less favorable. Interviews with more than a dozen founders, venture capitalists, and the attorneys who draw up investment contracts reveal the most common financial provisions used in private-market technology deals today. […]
Billion-dollar companies join a club of “unicorns,” a term used to explain how rare they are. But there are more than 50 of them now. There’s a new buzzword, “decacorn,” for those over $10 billion, which includes Airbnb, Dropbox, Pinterest, Snapchat, and Uber. It’s a made-up word based on a creature that doesn’t exist.
The ’sex selfie stick’ lets you FaceTime the inside of a vagina
The device offers the unprecedented opportunity to be on the phone with someone’s genitals.
Google started testing their cars on public roads back in 2009, long before any regulations were even dreamed of. An examination of the California Vehicle Code indicated there was nothing in there prohibiting testing.
For testing purposes, Google has a trained safety driver sitting behind the wheel, ready to take it at any moment. Any attempt to take the wheel or use the pedals disables the automatic systems and the safety driver is in control. The safety drivers took special driving safety courses and were instructed to take control if they have any doubt about safe operation. For example, if a vehicle is not braking as expected when approaching a cross walk, take the controls immediately, do not wait to see if it will detect the pedestrians and stop.
The safety drivers are accompanied by a second person in the passenger seat. Known as the software operator, this person monitors diagnostic screens showing what the system is perceiving and planning, and tells the safety driver if something appeared to be going wrong. The software operator is also an extra set of eyes on the road from time to time.
Many other developers have taken this approach, and some of the regulations written have coded something similar to it into law.
This style of testing makes sense if you consider how we train teen-agers to drive. We allow them to get behind the wheel with almost no skill at all, and a driving instructor sits in the passenger seat. While not required, professional driving instructors tend to have their own brake pedal, and know how and when to grab the wheel if need be. They let the student learn and make minor mistakes, and correct the major ones.
The law doesn’t require that, of course. After taking a simple written test, a teen is allowed to drive with a learner’s permit as long as almost any licenced adult is in the car with them. While it varies from country to country, we let these young drivers get full solo licences after only a fairly simple written test and a short road test which covers only a tiny fraction of situations we will encounter on the road. They then get their paperwork and become the most dangerous drivers on the road.
In contrast, robocar testing procedures have been much more strict, with more oversight by highly trained supervisors. With regulations, there have been requirements for high insurance bonds and special permits to go even further. Both software systems and teens will make mistakes, but the reality is the teens are more dangerous.
related { Will You Need a New License to Operate a Self-Driving Car? }
Facebook will soon be able to ID you in any photo
The intention is not to invade the privacy of Facebook’s more than 1.3 billion active users, insists Yann LeCun, a computer scientist at New York University in New York City who directs Facebook’s artificial intelligence research, but rather to protect it. Once DeepFace identifies your face in one of the 400 million new photos that users upload every day, “you will get an alert from Facebook telling you that you appear in the picture,” he explains. “You can then choose to blur out your face from the picture to protect your privacy.” Many people, however, are troubled by the prospect of being identified at all—especially in strangers’ photographs. Facebook is already using the system, although its face-tagging system only reveals to you the identities of your “friends.”
related { Bust detection algorithm }
photo { Rachel Roze }
Who prefers anonymous self-expression online? […] Favoring anonymity was positively correlated with both grandiosity, a component of narcissism, and low self-esteem. In addition, users with stronger anonymity preference tended to be younger, highly trusting, having strong ties to online communities while having few offline friends.
[TheJosh]
If I go every other day I will be at the gym 4-5 times a week, is that over training?
I typically work out for 60-90 minutes, I push my self and raise the weight each week.[…]
steviekm3
That makes no sense. There are only 7 days in a week. If you go every other day that is 3.5 times a week.TheJosh
Monday, Wednesday, Friday, Sunday. That is 4 days.
How do you go 3.5 times? Do a half workout or something? lolJustin-27
7x in 2 weeks = 3.5 times a week, genius.
And yeah, 3x a week, full body workouts are good.TheJosh
I never said anything about going exactly 7 times, like I said, if I go every other day, that is 4 DAYS A WEEK. How hard is that to comprehend?
Week 1 - Sunday, Tuesday, Thursday, Saturday
Week 2 - Monday, Wednesday, Friday, Sunday.
8 DAYS IN 2 WEEKS
In your terms,
8x in 2 weeks = 4 times a week, genius.
All Muscle and No Brains? lolsteviekm3
You double counted Sunday - that is 2 weeks plus 1 day.
Did you fail grade 2 math ?
PLUS your old post said 4 or 5 times a week. Now you just neglect to mention the 5.
Grow up and admit when you are wrong. Believe me you will get a a lot further in life this way.TheJosh
Are you retarded?
Maybe you should look at a calander, I didn’t double count sunday, my two weeks started and ended on sunday, exactly 14 days.
What don’t you understand?
EDIT - Here is a Calender, I made little dots for each day so you could comprehend.Justin-27
Dude THAT IS 15 DAYS!!!!!! You can’t have a week go Sun-Sat, then Sun-Sun. Look at the damn pic you posted, count the days what do they equal?!?!?! FIFTEEN!
I was right, 3.5 x a week, and so was the first guy to post it, and you my bright friend are el wrongo.[…]
TheJosh
There is 7 days in a week, if you workout every other day, you work out 4 days a week, how hard is that to ****ing comprehend?!
Ill do it out in 4 weeks for you, maybe it will make more sense?
Week 1 - Sunday, Tuesday, Thursday, Saturday
Week 2 - Monday, Wednesday, Friday, Sunday
Week 3 - Tuesday, Thursday, Saturday, Monday
Week 4 - Wednesday, Friday, Sunday, Tuesday
Week 5 - Thursday, Saturday, Monday, Wednesday
Week 6 - Friday, Sunday, Tuesday, Thursday
No matter how you look at it, if you workout every other day, you work out 4 times a week.
[…]
A week is sunday-sunday.
I think you just don’t know how to count, it’s alright, I won’t tell anyone. lol
Sunday-Saturday is only 6 days, do you have 6 days weeks where you live?Justin-27
Yes, you workout 4x the first week, then 3 the next.
I’m right, you’re a effing moron.
[…]
Sun-Sat is only 6 days?!
Sunday ONE
Monday TWO
Tuesday THREE
Wednesday FOUR
Thursday FIVE
Friday SIX
Saturday SEVEN
Arizona public schools=FAIL
The Random Darknet Shopper is an automated online shopping bot which we provide with a budget of $100 in Bitcoins per week. Once a week the bot goes on shopping spree in the deep web where it randomly choses and purchases one item and has it mailed to us.
The NSA’s inspector general last year detailed 12 cases of “intentional misuse” of intelligence authorities from 2003 to 2013 […] Those cases included a member of a U.S. military intelligence unit who violated policy by obtaining the communications of his wife, who was stationed in another country. After a military proceeding, the violator was punished by a reduction in rank, 45 days of extra duty and forfeiture of half of his pay for two months, according to the letter. In a 2003 case, a civilian employee ordered intelligence collection “of the telephone number of his foreign-national girlfriend without an authorized purpose for approximately one month” to determine whether she was being faithful to him, according to the letter. The employee retired before an investigation could be completed.
photo { Olivia Locher, Lucifer Rising, 2014 }
This report describes the details and type of operations carried out by an organized criminal group that focuses on financial industry, such as banks and payment providers, retail industry and news, media and PR companies. […] The organized criminal group backbone are citizens of both Russian and Ukrainian origin. […]
The average sum of theft in the Russian territory and in the post-Soviet space is $2 million per incident. […] To date the total amount of theft is over 1 billion rubles (about 25 million dollars), most of it has been stolen in the second half of 2014. […]
The key is that fraud occurs within the corporate network using internal payment gateways and internal banking systems. Thus money is stolen from the banks and payment systems, and not from their customers. While this is their main and most lucra- tive activity, the gang has also ventured into other areas including the compromise of media groups and other organizations for industrial espionage and likely a trading advantage on the stock market. […]
The average time from the moment of penetration into the financial institutions internal network till successful theft is 42 days.
As a result of access to internal bank networks the attackers also managed to gain access to ATM management infrastructure and infect those systems with their own malicious software that further allows theft from the banks ATM systems on the attackers command. […]
The main steps of the attack progression are the following ones:
1. Primary infection of an ordinary employee computer.
2. Getting a password of a user with administra- tive rights on some computers. For example, a password of a technical support engineer.
3. Gaining legitimate access to one server.
4. Compromising the domain administrator password from the server.
5. Gaining access to the domain controller and compromising of all active domain accounts.
6. Gaining access to e-mail and workflow servers.
7. Gaining access to server and banking system administrator workstations.
8. Installing the software to monitor activity of interesting system operators. Usually photo and video recording was used.
9. Configuring remote access to servers of inter- est including firewall configuration changes.