1,019 Matching Annotations
  1. Dec 2015
    1. IPCC: Solar & biomass produce 3.5 - 21 times more carbon emissions (eq.) per kilowatt-hour than nuclear & wind.

      Is this right? If so, that's disappointing for solar. But it shows wind as lower CO2 than nuclear. (And the chart doesn't show fossil fuels. Is solar favorable compared to them?)

    1. A personal API builds on the domain concept—students store information on their site, whether it’s class assignments, financial aid information or personal blogs, and then decide how they want to share that data with other applications and services. The idea is to give students autonomy in how they develop and manage their digital identities at the university and well into their professional lives
    1. Zach Holman on remote work. Tech companies need to start accepting remote workers, or they're going to have more trouble finding people. To use remote workers successfully, you have to put priority on asynchronous communication for everyone. Otherwise, the remote people get left out of the loop.

    1. On Monday evening, for the first time in aerospace history, a rocket took off vertically from its launchpad, pierced the boundary of space and deposited its second stage into orbit, and returned intact to Earth, landing upright not far from where its journey began.

      https://www.youtube.com/watch?v=1B6oiLNyKKI SpaceX Falcon 9 first stage vertical landing

    1. We feel the pernicious practical effects of lengthy copyright terms every day. For example, a study last year of books on Amazon showed that books published after the critical public domain cut-off date of 1923 are available at a dramatically lower rate than books from even an entire century before. The result is a "missing 20th century" in the history of books.
    1. When faced by a dangerous competitor, people tend to look for escape hatches or silver bullets. There aren't any. You have to face them head on, and make your product better than theirs, or die trying.

    1. The core set of functionality we've tried to capture in the HTML5 video compositor is the timing and synchronisation of the playback of videos and other media sources. The library allows you to cut together two separate videos near seamlessly, synchronise the playback of multiple videos in parallel and manage the pre-loading of videos in a just-in-time fashion.

      The BBC is open sourcing their experimental HTML5 Video Compositor. "This is an experimental JavaScript library for playing back dynamically modifiable edit decision lists (EDLs), and applying WebGL shader based effects."

      https://github.com/bbc/html5-video-compositor

    1. But he just continued on his way. She had to say, “That’s her book” three or four times before he finally took it in. And then, as if in a nineteenth-century novel, he went ashen. That I was indeed the author of the very important book it turned out he hadn’t read, just read about in the New York Times Book Review a few months earlier, so confused the neat categories into which his world was sorted that he was stunned speechless — for a moment, before he began holding forth again. Being women, we were politely out of earshot before we started laughing, and we’ve never really stopped.
    1. And though I was grateful to James for calling them out, I wasn’t even challenging anyone’s access to making money. I just made humorous remarks about some books and some dead writers’ characters. These guys were apparently so upset and so convinced that the existence of my opinions and voice menaced others’ rights. Guys: censorship is when the authorities repress a work of art, not when someone dislikes it.
    2. art can also help us fail at empathy if it sequesters us in the Boring Old Fortress of Magnificent Me.

      Art is powerful. It shapes minds. It thereby shapes the world -- or keeps it the same -- for good or evil.

    1. The fact that professionals prefer anecdotes from people like us over concerted efforts to understand a demographic as a whole is shameful. More importantly, it’s downright dangerous. It shapes what the tech industry builds and invests in, what gets promoted by journalists, and what gets legitimized by institutions of power. This is precisely why and how the tech industry is complicit in the increasing structural inequality that is plaguing our society.

      Danah Boyd points out that people in the tech industry are far too quick to think of themselves as "typical", and ignore millions of Americans and billions of people who have little in common with them.

    1. In this context, it made sense for Debbie Wasserman Schultz and the DNC to suspend the Sanders campaign’s access to the data until it could determine the extent of the damage, and the degree to which the Clinton campaign’s private data had been compromised. As it turns out the ethical breach by Sanders operatives was massive, but the actual data discovery was limited.
    1. The DNC rents access to its master voter list to campaigns, which augment the data with their own information. The firewalls are supposed to block campaigns from spying on their rivals.

      An audit released by the Clinton campaign showed the breach was more extensive than the Sanders campaign described, with at least 24 occasions when the Sanders campaign "saved" lists of Clinton data, from four different users.

      Josh Uretsky, the Sanders campaign staffer fired for accessing the voter file, told MSNBC that his intent was to document and understand the scope of the problem so it could be reported. "To my knowledge, we did not export any records or voter file data that were based on those scores,” he said.

    1. Congress on Friday adopted a $1.15 trillion spending package that included a controversial cybersecurity measure that only passed because it was slipped into the US government's budget legislation. House Speaker Paul Ryan, a Republican of Wisconsin, inserted the Cybersecurity Information Sharing Act (CISA) into the Omnibus Appropriations Bill—which includes some $620 billion in tax breaks for business and low-income wage earners. Ryan's move was a bid to prevent lawmakers from putting a procedural hold on the CISA bill and block it from a vote. Because CISA was tucked into the government's overall spending package on Wednesday, it had to pass or the government likely would have had to cease operating next week.

      House 316-113<br> Senate 65-33

      The Verge "This morning, Congress passed the Cybersecurity Information Sharing Act of 2015, attached as the 14th rider to an omnibus budget bill. The bill is expected to be signed into law by the president later today."

      Techdirt 15 Dec

      1. Allows data to be shared directly with the NSA and DOD, rather than first having to go through DHS.
      2. Removes restrictions on using the data for surveillance activities.
      3. Removes limitation on using the data for cybersecurity purposes, and allows it to be used for investigating other crimes -- making it likely that the DEA and others will abuse CISA.
      4. Removes the requirement to "scrub" the data of personal information unrelated to a cybersecurity threat before sharing the data.

      ACLU

    1. The Division of Teaching and Learning Technologies at University of Mary Washington is hiring an Online Learning and LMS Specialist.

      We are looking for an innovative, pedagogically-engaged individual who will collaborate with faculty to harness the potential of our current LMS, Canvas, in online and hybrid learning environments. We are especially interested in someone that can think with and beyond the LMS, helping UMW explore ethical approaches to online learning and intersections between Canvas and the Domain of One’s Own initiative spearheaded by DTLT.

    1. Today, DNC Chair Rep. Debbie Wasserman Schultz issued the following statement:   “The Sanders campaign has now complied with the DNC’s request to provide the information that we have requested of them. Based on this information, we are restoring the Sanders campaign’s access to the voter file, but will continue to investigate to ensure that the data that was inappropriately accessed has been deleted and is no longer in possession of the Sanders campaign. The Sanders campaign has agreed to fully cooperate with the continuing DNC investigation of this breach. The fact that data was accessed inappropriately is completely unacceptable, and the DNC expects each campaign to operate with integrity going forward with respect to the voter file.

      https://www.youtube.com/watch?v=R7m-nnl7LSQ

      https://twitter.com/DWStweets/status/678083696390512640<br> https://twitter.com/DWStweets/status/678083869661360128

      This smells. I want to see a 3rd-party investigation.<br> And I think DWS should resign as DNC chair.<br> (On the other hand...)<br> https://twitter.com/JudyReardon/status/678045914435596288<br> "Jeff Weaver keeps on saying Sanders staff who accessed Clinton data<br> were young staffers. Josh Uretsky is 39 and has a Ph.D."

    1. Thirdly, rather incredibly, the leadership of the DNC has used this incident to shut down our ability to access our own information, information which is the lifeblood of any campaign. This is the information about our supporters, our volunteers, the lists of people we intend to contact in Iowa, New Hampshire and elsewhere. This is information that we have worked hard to obtain. It is our information, not the DNCs.

      Bernie Sanders says the Democratic National Committee is denying his campaign access to their own data, after failing to keep the data that belonged to different campaigns separate.

      https://twitter.com/TheDemocrats<br> https://twitter.com/DWStweets<br> Congresswoman Debbie Wasserman Schultz<br> Chair of the Democratic National Committee

    1. The Book of Human Emotions, Tiffany Watt Smith

      Emotions are not just biological, but cultural. Different societies have unique concepts for combinations of feelings in particular circumstances.

      If you know a word for an emotion, you can more easily recognize it, control it -- and perhaps feel it more intensely.

      Emotions and how they are valued also varies across time as well as space. Sadness was valued in Renaissance Europe: they felt it made you closer to God. Today we value happiness, and we may value it too much. Emodiversity is the idea that feeling a wide range of emotions is good for you mentally and physically.

    1. Whatever our intentions, the truth is that we can inadvertently widen inequality in the course of making money, even though we claim to support equality and justice when giving it away. And while our end-of-year giving might support worthy organizations, we must also ask if these financial donations contribute to larger social change.In other words, “giving back” is necessary, but not sufficient. We should seek to bring about lasting, systemic change, even if that change might adversely affect us. We must bend each act of generosity toward justice.

      -- Darren Walker, president of the Ford Foundation

    1. Manhattan district attorney Cyrus R. Vance Jr. says that law enforcement agencies want Google and Apple to return to systems without full-disk encryption -- those before iOS 8 and Android Lollipop -- which they could unlock in compliance with a warrant.

      He says that's all they're asking. If that's true, they should be speaking out loudly against mass surveillance and FBI demands for backdoors.

    1. THE INTERCEPT HAS OBTAINED a secret, internal U.S. government catalogue of dozens of cellphone surveillance devices used by the military and by intelligence agencies.

      MANY OF THE DEVICES in the catalogue, including the Stingrays and dirt boxes, are cell-site simulators, which operate by mimicking the towers of major telecom companies like Verizon, AT&T, and T-Mobile.

      Today nearly 60 law enforcement agencies in 23 states are known to possess a Stingray or some form of cell-site simulator, though experts believe that number likely underrepresents the real total. In some jurisdictions, police use cell-site simulators regularly. The Baltimore Police Department, for example, has used Stingrays more than 4,300 times since 2007.

      “The same grant programs that paid for local law enforcement agencies across the country to buy armored personnel carriers and drones have paid for Stingrays,” said Soghoian.

      Police cite the war on terror as their reason for purchasing surveillance equipment. But they use it for domestic cases, including minor ones.

      “The full extent of the secrecy surrounding cell-site simulators is completely unjustified and unlawful,” said EFF’s Lynch. “No police officer or detective should be allowed to withhold information from a court or criminal defendant about how the officer conducted an investigation.”

    1. Australian Tax Office transparency report.

      The data contains the total income, taxable income and tax payable of more than 1,500 public and foreign private entities for the 2013-14 income year. The companies each have a total income of $100 million or more. Cells containing a dash (-) represent "an amount of zero or less". The report only contains individual companies, not groups of companies.

    1. Negotiated in secret and tucked in legislation thousands of pages long, Congress is about to pass an awful surveillance bill under the guise of “cybersecurity” that could open the door to the NSA acquiring much more private information of Americans.
    1. And the latest is that it's getting worse. Not only is Congress looking to include it in the end of year omnibus bill -- basically a "must pass" bill -- to make sure it gets passed, but it's clearly dropping all pretense that CISA isn't about surveillance. Here's what we're hearing from people involved in the latest negotiations. The latest version of CISA that they're looking to put into the omnibus:
    1. Representatives of the White House seemed to listen attentively, but shared little about their thoughts. They maintained that President Obama’s position has not changed in the last few months. While they seemed well aware of our concerns about the technical infeasibility of inserting backdoors, they didn’t necessarily share them. That worried us a great deal.
    1. As part of EFF’s 25th Anniversary celebrations, we are releasing “Pwning Tomorrow: Stories from the Electronic Frontier,” an anthology of speculative fiction from more than 20 authors, including Bruce Sterling, Lauren Beukes, Cory Doctorow, and Charlie Jane Anders. To get the ebook, you can make an optional contribution to support EFF’s work, or you can download it at no cost. We're releasing the ebook under a Creative Commons Attribution-NonCommercial-No Derivatives 4.0 International license, which permits sharing among users. 
    1. Under our Affordable Access Initiative, Microsoft is providing grants to commercial entities for scalable solutions that enable people in underserved communities to access the Internet and use cloud services.

    1. We believe that openness and transparency are core values of science. For a long time, technological obstacles existed preventing transparency from being the norm. With the advent of the internet, however, these obstacles have largely disappeared. The promise of open research can finally be realized, but this will require a cultural change in science. The power to create that change lies in the peer-review process.

      We suggest that beginning January 1, 2017, reviewers make open practices a pre-condition for more comprehensive review. This is already in reviewers’ power; to drive the change, all that is needed is for reviewers to collectively agree that the time for change has come.

    1. If you've ever felt bad about working a very low-status job, or looked down on someone else for it, this might change your attitude.

      • It's ironic that many low-wage jobs are jobs that many people couldn't tolerate.
      • These days, one should be embarrassed to admit working for Wall Street, the NSA, or Congress.
      • Our government is full of people who should be mopping floors and wiping tables instead.
      • The military shouldn't be the only obvious opportunity for working-class kids.
    1. Huge follower counts on YouTube and social media DO NOT easily translate to income. And those followers expect you to be "real" -- so they are hostile to advertising and sponsored content.

      Do you own a business? It might pay to offer a salary to the producers of a YouTube channel that reaches your target audience -- in exchange for low-profile "brought to you by" links and mentions that won't offend that audience.

      https://twitter.com/JBUshow<br> https://twitter.com/gabydunn

    1. Omidyar Network, established in 2004 by eBay founder Pierre Omidyar, is funding a company called eCurrency Mint, eCM, for a technology that will allow central banks to issue digital currency called cryptocomplex cash. They have been working with 30 central banks, and two of them are about to announce deployment.

    1. My solution to the problem posed by the incompatibility of depression and social media didn’t aim to change anyone’s life but my own. Yet maybe it was no less radical: Ruthlessly dispose of all fake intimacy and superficial interactions and focus what little energy I had on real connection. Take my feeble attention span and put it into the equivalent of an incubator. Learn to consider myself a worthy human being without the positive reinforcement of Twitter favs.
    2. Professor Heuser thought for a moment. “That’s only indirectly related to social media,” she finally said. “People suffering from depression are incredibly creative at convincing themselves they are losers. But we live in a world that’s hyper-communicative — not really communicative, but narcissistic. Everybody is always ‘sharing’ something, only that it isn’t really sharing, it’s posting something to a wall in the hope that as many people as possible will come past and ‘like’ it. The purpose is to feed our narcissism. It is a many-voiced monologue, a cacophony. Everybody is posting something, but we aren’t talking to each other.”

      During depression, you are likely to find your own past happiness hard to tolerate. It may be worse if that "happiness" was a put-on.

    3. However, the positive feeling that usually follows — your organism can’t mount that response anymore. That’s a classic symptom of depression. You can’t feel joy or connection to others anymore.” And because my brain knows what joy used to feel like, she explained, its absence, that emptiness, is experienced subconsciously as painful. The fact that I found it so hard to resist the lure of said dopamine release was also easy to explain, she said: “Will has to do with energy. And depression is characterised precisely by a lack of energy.”

      Social media may or may not be a contributing cause of depression. But it is generally not good for someone who is already depressed.

    1. Some of the reasons we need to keep the Internet free and open:

      • free and open education
      • spreading of good ideas
      • participatory democracy
      • cooperation and collaboration
      • diversification of news sources
      • connections among citizens everywhere

      (This article already has 324 responses.)

    1. this week’s announcement by Google that a machine made by a Canadian company, D-Wave Systems, which is marketed as “the world’s first commercial quantum computer”, had shown spectacular speed gains over conventional computers. “For a specific, carefully crafted proof-of-concept problem,” Google’s Hartmut Neven reported, “we achieved a 100-million-fold speed-up.”
    1. Missouri’s legislature, noting excessive reliance on traffic tickets, put a low cap on the portion a community could raise of its budget from this source. So now 40 percent of Pagedale’s tickets are for non-traffic offenses. Since 2010, such tickets have increased 495 percent. In 2013, the city collected $356,601 in fines and fees.
    1. Take the net neutrality law in Europe. It's terrible, but people are happy and go like "it could be worse.” That is absolutely not the right attitude. Facebook brings the internet to Africa and poor countries, but they’re only giving limited access to their own services and make money off of poor people. And getting government grants to do that, because they do PR well.

      Interview with Peter Sunde, co-founder of file-sharing site The Pirate Bay. (He was incarcerated for one year after they were convicted of assisting copyright infringement.) "We have already lost." he says. "Well, we don't have an open Internet. We haven't had an open Internet for a long time."

      I'm not as pessimistic. But we are too complacent. A free Internet will contribute to a free society and democracy. A closed Internet will contribute to oppression and plutocracy. We need to fight the tendency toward devices that give the user little control. We need more open source hardware, nonprofit maker spaces, and cooperatives. We need to work on alternative Internets.

    1. Populism has both positive and negative definitions.

      The positive sense is synonymous with democracy -- the belief that government should be for and by the people.

      The negative sense is the tool of demagogues -- appealing to fears and prejudices. An ideology that "pits a virtuous and homogeneous people against a set of elites and dangerous 'others' who are together depicted as depriving (or attempting to deprive) the sovereign people of their rights, values, prosperity, identity, and voice" (Daniele Albertazzi and Duncan McDonnell)

    2. And there really is no other good word for Trump’s rhetoric, and the behavior of many of his followers, than “fascistic.” So it’s only somewhat natural that Trump’s right-wing populism would be mistaken for fascism – they are, after all, not just kissing cousins, but more akin to siblings. Not every right-wing populist is a fascist, but every fascist is a right-wing populist.
    3. The thing about right-wing populism is that it’s manifestly self-defeating: those who stand to primarily benefit from this ideology are the wealthy, which is why they so willingly underwrite it. It might, in fact, more accurately be called "sucker populism."

      This accelerated hard with Ronald Reagan. The theory that lower taxes and deregulation will be good for everyone sounds sensible. But the wealthy don't care about the common welfare. They only care about amassing more wealth and power.

    4. Right-wing populism is essentially predicated on what today we might call the psychology of celebrity-worship: convincing working-class schlubs that they too can someday become rich and famous -- because when they do, would they want to be taxed heavily? It's all about dangling that lottery carrot out there for the poor stiffs who were never any good at math to begin with, and more than eager to delude themselves about their chances of hitting the jackpot.
    5. It is by small steps of incremental meanness and viciousness that we lose our humanity. The Nazis, in the end, embodied the ascension of utter demonic inhumanity, but they didn't get that way overnight. They got that way through, day after day, attacking and demonizing and urging the elimination of those they deemed their enemies.

      He is commenting on "They Thought They Were Free: The Germans 1933-1945" by Milton Mayer

    6. What Trump is doing, by exploiting the strands of right-wing populism in the country, is making the large and growing body of proto-fascists in America larger and even more vicious – that is, he is creating the conditions that could easily lead to a genuine and potentially irrevocable outbreak of fascism.
    1. Birdly explains why they've dropped their mobile apps. It is not enough for a mobile app to be useful and easy to use.

      For people to use a mobile app, it has to be something they use every day. It should take advantage of the device's main functions: sound, camera, and geolocation.

      We spent so much time updating our app to comply with the latest OS released by Apple or Google, debugging the app, developing new features, ensuring our UI was well-integrated in the global OS

    1. Pronunciations for hexadecimal numbers:<br> 0xB3 "bibbity-three"<br> 0xF5 "fleventy-five"<br> 0xDB "dickety-bee"

      BZARG is the work of Tim Babb, who lives in the San Francisco Bay Area, and is Lighting Optimization Lead for Pixar Animation Studios.

      This blog focuses primarily on graphics, physics, programming, and probably some philosophy and fiction

    1. OpenAI is a non-profit artificial intelligence research company. Our goal is to advance digital intelligence in the way that is most likely to benefit humanity as a whole, unconstrained by a need to generate financial return.
    1. When Bernie Sanders talks about a 'revolution' in America, he's talking about getting millions of people deeply involved in the political process. I think he's also talking about getting millions of people personally involved, in their communities, in building solutions that don't need government involvement, such as volunteer-based tutoring, mentoring and learning organizations.
    1. Edward R. O'Neill

      • When someone asks for help solving a problem, they've probably already thought about it to the point of frustration.
      • They need a fresh perspective.
      • They may not have a clear idea what the problem is.
      • They may have defined the problem incorrectly.
      • Problem solving often requires periods of mind-wandering -- forgetting about the problem, and letting the mind make free connections.
      • They may be so focused on the problem that they aren't allowing their mind to wander.
      • One way to help them is by "leading them to positive, hopeful, self-focused daydreams about their goals."
    1. Specifically, the study’s authors found two types of information skills that correlated with maximum ideation power: idea scouting and idea connecting. Idea scouts are good at identifying external ideas from diverse experts and resources on Twitter, and they convert weak ties to strong ties, including in offline face to face conversations. Idea connectors are good at identifying business opportunities from the Twitter ideas they discover; they curate and direct those ideas to the best business stakeholders across their organizations.
    2. The more diverse your network of friends on Twitter, the more innovative your ideas tend to be. That’s the conclusion of a five-year study of hundreds of people across five companies, in industries ranging from technology to food production to higher education.
    1. "There has always been a tension in the intelligence community between the intel side that wants to exploit the information from social media and the operational or the policy community that wants to do something to shut it down," Mike Flynn, who directed the Defense Intelligence Agency from 2012 to 2014
    1. To be very, very clear: Donald Trump is a bigot. He is a racist. He is an Islamophobe and a xenophobe. He profits off the hatred and stigmatization of traditionally oppressed groups in American society. That makes him, and his European peers, and racists in other eras in American history, a threat to crucial values of equality and fair treatment, and a threat to the actual human beings he's targeting and demonizing.
    2. So if Donald Trump isn't a fascist, what is he? Well, he's a right-wing populist. And while fascists are rare in 2015, right-wing populists are not. In fact, it's kind of weird that America hasn't had a real one before now. The UK has the UK Independence Party (UKIP); France has Marine Le Pen and the Front National; Germany has Alternative for Germany (AfD) and the anti-Muslim Pegida movement; Sweden has the Sweden Democrats; the Netherlands has the Party for Freedom and its leader, Geert Wilders.
    3. Of course, many fringe fascists themselves like Donald Trump and view him as the best they're going to get on a national scale. They argue he's sparking a big spike in activity around and interest in white nationalism. "Demoralization has been the biggest enemy and Trump is changing all that," Stormfront founder Don Black told Politico recently. But that does not make Trump himself a fascist.
    4. Griffin, who is a professor of history and political theory at Oxford Brookes University, puts it best: "You can be a total xenophobic racist male chauvinist bastard and still not be a fascist."

      Don't forget "narcissistic blowhard dunce".

    5. To be blunt: Donald Trump is not a fascist. "Fascism" has been an all-purpose insult for many years now, but it has a real definition, and according to scholars of historical fascism, Trump doesn't qualify. Rather, he's a right-wing populist, or perhaps an "apartheid liberal" in the words of Roger Griffin, author of The Nature of Fascism.

      Good article on the definition of fascism.

      Quotes from scholars:

      • The Nature of Fascism, Roger Griffin
      • The Anatomy of Fascism, Robert Paxton
      • Fascism: Comparison and Definition, Stanley Payne
      • A History of Fascism, 1914-1945, Stanley Payne

      And historical fascists:

      • Reflections on Violence, Georges Sorel
      • The Doctrine of Fascism, Benito Mussolini
    1. (With the possible exception of legitimate charity nonprofit organizations) Never work "for exposure", and never work cheap. If you're going to work free, then work for yourself, doing what you want to do, how you want to do it.

    1. Reality Editor is an iOS app for programming and controlling Internet-enabled devices. It was created at MIT with their Open Hybrid platform. http://openhybrid.org/

    1. Trump's embrace of racism, anti-Mexican immigrant bigotry and Islamophobia is largely opportunistic. My only hesitation in calling it cynical is that I think Trump may be the type who, once he finds something convenient to say, then starts to believe it.
    1. In addition to the improved performance, Big Sur is far more versatile and efficient than the off-the-shelf solutions in our previous generation. While many high-performance computing systems require special cooling and other unique infrastructure to operate, we have optimized these new servers for thermal and power efficiency, allowing us to operate them even in our own free-air cooled, Open Compute standard data centers.

      Facebook's Open Compute Project releases open-source hardware designs created with energy efficiency and ease of maintenance as priorities.

    2. Big Sur is our newest Open Rack-compatible hardware designed for AI computing at a large scale. In collaboration with partners, we've built Big Sur to incorporate eight high-performance GPUs
    1. Mozilla's Firefox OS is just the latest in a long list of mobile operating systems that have struggled to get the attention of consumers, who have typically shied away from upstarts often characterized by a weak selection of apps available. That hard-luck list includes Microsoft's Windows Phone, Samsung's Tizen, Jolla's Sailfish OS, Canonical's Ubuntu, Hewlett-Packard's WebOS and BlackBerry's BlackBerry OS.
    2. "We are definitely working with a good number of partners who desire a non-Android OS to power their mobile devices," Acadine founder and Chief Executive Li Gong told CNET. He declined to detail discussions but said, "We are now the frontrunner in terms of choice in this space."

      Hong Kong-based startup Acadine Technologies may take over development of Firefox OS, as H5OS.

    1. Donald Trump is not the problem. He's a symptom

      The problem is an economic and social desperation that makes his base incredibly dangerous

    1. Apple CEO Tim Cook has repeatedly and strongly criticized those in government who have demanded backdoors, explaining: “You can’t have a back door in the software because you can’t have a back door that’s only for the good guys.” And a representative of many of the large tech companies recently remarked: “Weakening security with the aim of advancing security simply does not make sense.” Eighty-five percent of cybersecurity experts recently surveyed by Politico called backdoors “a bad idea”. (We know, for example, the NSA in particular loves to prey on foreign phone companies’ backdoors.)
    1. To Muslim Americans: What you’re hearing from Trump and other Republicans is absolutely, unequivocally wrong. It’s inconsistent with our values as a nation — a nation which you are helping to build. This is your country too. I’m proud to be your fellow American. And many, many other Americans feel the same way.
    1. Daniel Bassill offers advice on building a culture of ongoing learning and personal networking within a nonprofit organization. This helps you keep volunteers involved, attract new volunteers, and develop partnerships with other organizations.

    1. Hiding the names of universities during the hiring process is just part of a larger strategy by Deloitte to seek a more diverse workforce. They have teamed up with the UK-based consulting company Rare to incorporate a new screening process called “contextualisation” that seeks to judge an applicant’s performance in the context in which they achieved it.
    2. One of Britain’s largest companies no longer wants its recruiters and hiring managers to know where its applicants went to college, school or university. “We are calling it school and university-blind interviewing,” Deloitte’s Head of UK Resourcing Victoria Lawes, said in an interview with LinkedIn. “What we really want to do is ensure that, whoever is recruiting isn’t consciously or unconsciously favoring a person who attended a certain school or university.”
    1. The Red programming language is based on Rebol (a Lisp-like interpreted language), but can compile binaries for several platforms. It is extremely lightweight. It covers the full range of programming tasks, from embedded systems to scripting. It's very young: they are working on a GUI library. http://www.red-lang.org/

    1. Earlier today, the candidate currently leading in the polls for the Republican presidential nomination called for a "total and complete shutdown of Muslims entering the United States." That was, of course, Donald Trump. As Jeffrey Goldberg just tweeted, "Donald Trump is now an actual threat to national security. He's providing jihadists ammunition for their campaign to demonize the US."

      Arianna Huffington announces that the Huffington Post will continue covering Donald Trump's campaign -- while clearly pointing out who he is. Several links to past HP stories are included. (I'm not going to start reading the HP, but I do like this editorial.)

    1. sensible copyright policies face huge practical barriers, in large part because few are willing to challenge the default assumption of copyright law that every time a copy is made the rightsholder's permission is required. That assumption makes no sense in the digital age, but it's hugely difficult to dislodge

      The efforts of publishers and music companies to prohibit "piracy" today are analogous to trying to prohibit the sharing of books, photocopies, records, and mix-tapes in the pre-Internet era.

      The world is changing fast. Get used to it. Adapt. Quit trying to alter reality with legislation.

    1. A group of 19 civil liberties organizations from across the political spectrum this morning issued a letter to the White House and Congress urging lawmakers to oppose the final “conferenced” version of a dangerous cyber bill that experts say will dramatically expand government surveillance while failing to make us safer from cyber attacks.
    1. The TPP (Trans-Pacific Partnership) is a trade deal that was negotiated in secret -- under the constant influence of corporations. Guess who it benefits.

      This page lists ways the TPP harms various individuals, in terms of digital rights. (I'm sure there are other drawbacks, to workers, the economy, and the environment.)

    1. Of course, if you take my idea and use it to make money then my business will suffer and I will have less incentive to have ideas in the future. We need a period of protection for ideas to ensure that creators keep coming up with them because they are vital to our culture. It is, more than anything, part of what makes use human. But for exactly that reason protection periods should also be kept as short as possible. Once that period has expired, others should be free to reuse, rethink and remix those concepts and incorporate them into their own ideas.

      Copyright laws are of less benefit to creators than to corporations who market their work, giving them a meager share of the profit. If Disney no longer had a lock on material that should be public domain by now, maybe they'd have to employ more creators. And maybe someone else would make a decent Mickey Mouse cartoon -- which I don't think they've done since the 1940s.

    2. News outlets have seen their content atomized and readers can now get their news from sites that bring together links to articles from a range of sources. Some providers argue that these aggregators should pay for the privilege of linking to them.

      This notion of "link copyright" or "link tax" is a shameful example of childish greed. Instead, maybe you should be forced to pay the linker for each visitor who follows a link to your site. No? It's earning you ad revenue and introducing new customers.

      If you don't want your content linked:

      • don't put it on the Web, or
      • put it behind a paywall
    1. Warning signs of cyber crime The following behaviours may indicate a young person is at risk of getting involved in cyber crime: Is your child spending all of their time online? Are they interested in coding? Do they have independent learning material on computing?

      gasp INDEPENDENT LEARNING MATERIAL!!!<br> sob We tried so hard to raise junior to be a good boy.

    1. The Senate’s recently passed bill, known as the Cybersecurity Information Sharing Act (CISA), is expected to serve as the basis for the finished language. The compromise text will also likely include elements from a bill that originated in the House Intelligence Committee, observers said.This completed product would mostly sideline the privacy advocate-preferred bill from the House Homeland Security Committee. They believe the Homeland Security bill includes the strongest provisions to protect people’s sensitive data from falling into the NSA's hands.Specifically, the Homeland Security bill would give the greatest role to the Department of Homeland Security (DHS) for collecting cyber threat data from the private sector and disseminating it throughout the government.It’s believed the DHS is best suited to scrub data sets of personal information.

      It seems necessary to encourage -- or force -- industrial and financial firms to share information with the government about hacks and attempted hacks. But that should not be used as license to transfer and collect customer metadata,

    1. "It makes zero sense to lock up this information forever," said Jeremiah Grossman, who founded cybersecurity firm WhiteHat Security. "Certainly there are past breaches that the public should know about, is entitled to know about, and that others can learn from."

      I used to think the most fanciful thing about the movie "War Games" was not the A.I., but the defense computer connected to a public network. But if industrial control systems can be reached by the Internet or other public lines -- then maybe the government is that stupid.

    1. Standards based learning and “rigorous” testing are not going to be successful in elementary school, unless your goal is to get children to hate education at a very early age.

      Which reminds me that many people hold the belief that kids are supposed to hate school to some degree -- especially class time. That's warped, folks.

    2. Elementary school should be about exploration, and exposure to vast amounts of very well-written books. Writing should be an opportunity to capture observations and imagination in a tangible form. Elementary education should include learning about history through storytelling, art, and music.

      Actually, this also applies to high school and college.

      I usually enjoyed school, and liked all of my grade school teachers and most of my high school teachers. But if I magically became a child again, I would insist on spending most of my day in the public library, or browsing the Web, or doing something of my own choice.

    1. The problem is that the idea that women are not as good is so deeply embedded in the mind of so many people in positions of power, that it is not even recognized. It’s a belief system that leads one to automatically and without awareness, connect “women” with “lower standards” and “woman as good as a man” with “the exception.”And its cumulative effects are profound. It’s why women must be 2.5 times as good as men to be considered equally competent. It’s why holding blind auditions for orchestras increase women’s chances of advancing to final rounds by 50%.
    1. In addition, the high sociability, and cooperative nature, of human economic systems, entailed selection pressure for a quality still poorly defined: emotional intelligence [vi]. This is linked, not only to qualities for successful interaction with other people and qualities such as impulse control, but also to some of the “dark triad” traits that have been identified in the research on human psychology: narcissistic, manipulative (subclinical psychopath), and Machiavellian tendencies.

      -- Helga Vierich (in the comments)

    2. Corporate businesses are owned by absentee shareholders who do not participate in managing the enterprises or doing the work. Everyone -- from the CEO down to the office janitor -- works as an "employee" of the corporation. The collective resources of the corporation ensure the collective security of the myriad owners and employees.<br> ...<br> Yet Rand wants to style opulently renumerated corporate managers as rugged entrepreneurs who did all the work themselves. What about the hundreds, thousands of employees who contribute to the collective effort that builds and maintains a "big business"?

      When they moved to Galt's Gulch, did the titans mine their own ore and refine metals in their personal backyard foundries? Build their own airplanes from tree leaves and chewing gum like McGiver? Dig oil wells with their bare hands and crack gasoline over an open fire?

      -- Derryl Hermanutz (in the comments)

    3. I am all for individual life, and individual liberty - those are my highest values. In that I align well with Ayn Rand.Where we part company is in how those values are best served.

      I am clear that cooperation is the most powerful way to serve those values. And I am clear that Axelrod demonstrated that raw cooperation is always vulnerable to cheating, and requires secondary strategies to prevent cheats from dominating and destroying the cooperative. Arguably, many of those who control the flows of capital in today's world can be characterised as using cheating strategies to do so, however lawful those strategies happen to be."

      -- Ted Howard (in the comments)

    4. Taggart and Reardon made their fortunes in the railroad and steel sectors, industries that received massive public subsidies. In the exaggerated black-and-white world that Rand creates, taxation and public accountability over private industry amounts to collectivist tyranny.

      -- Eric Michael Johnson (in the comments)

    5. in 100 percent of LPA societies—ranging from the Andaman Islanders of the Indian Ocean archipelago to the Inuit of Northern Alaska—generosity or altruism is always favored toward relatives and nonrelatives alike, with sharing and cooperation being the most cited moral values. Of course, this does not mean that everyone in these societies always follow these values.

      LPA (Late-Pleistocene Appropriate) - hunter-gatherers

      What makes these violations of moral rules so instructive is how societies choose to deal with them. Ultimately, it all comes down to gossip.

      "Gossip" is central to reputations, group decisions, and fear of ostracism.

      "Moral Origins: The Evolution of Virtue, Altruism, and Shame", Christopher Boehm

    1. The San Bernardino shootings are also being cited by some Republicans, including presidential candidate Sen. Marco Rubio, as a reason to reinstate the warrantless bulk collection of domestic telephone data — the one program that was shut down by Congress after NSA whistleblower Edward Snowden revealed a massive, secret surveillance dragnet. An Associated Press story on Saturday added fuel to the fire when it claimed that as a result of the shutdown, the government could no longer access historical call records by the San Bernardino couple. But as Emptywheel blogger Marcy Wheeler amply explained, the FBI has plenty of other ways of getting the information.
    1. If we upgraded to competitive wholesale publicly-overseen fiber optic networks all over the country, we could leave the cable industry and its ongoing destructive shenanigans behind. (Without expensive upgrades, the cable guys can’t provide the upload capacity that fiber can.) Yes, it would be initially expensive to do this. But so was the railroad system. So were the highways.
    2. There are so many ways for the local cable monopolies to turn dials in their direction the way things are set up now. They can start charging more for peak-hour usage, so they never have to upgrade their physical facilities. They can start charging more for interconnection of Lane 2 with other networks. They can zero-rate a bazillion other services they provide and bundle them with their own “public internet” offerings. They can charge separately for their proprietary WiFi services nationwide — the new bottled water, the thing we ought to have access to in abundance for free.They can do all of this because most U.S. households have only a single choice of operator for download speeds greater than 25 Mbps. It’s even worse for speeds over 50 Mbps 
    3. Networks are built to meet peak demands. Comcast has already made this investment. No “power user” is having any effect on anyone else’s download experience within Comcast’s Lane 2 — there’s plenty of capacity. (The Netflix/Comcast fracas last year made this eminently clear: as soon as Netflix paid up, presto, Netflix subscribers weren’t faced with a spinning wheel.)
    4. Earlier this month, Comcast announced that it would be launching a $15 per month streaming pay TV service — cleverly named Stream TV — that wouldn’t count against the 300GB data plans (that number is the cap) it had already introduced in several states.
    5. It begins by announcing a data cap that’s set high enough to affect only a small percentage of current users who routinely hit it. Justify it by saying you’re only targeting the “hogs” who gobble up everybody else’s bandwidth. Say you’ll charge for data usage that exceeds that cap. Then sit back and wait. Eventually, increased usage by more Americans will bring millions into the fold. And presto: without lifting a finger, dominant players can charge more people more per month — on every side of every transaction, content sources as well as consumers — without expanding their facilities, much less upgrading to the communications capacity we need.
    1. In Application Shell Architecture, the shell is served up by the Service Worker and then the content is delivered—often cached by the Service Worker—dynamically from its source through API requests.

      "Progressive Web Apps", an idea for better mobile performance using HTML5 Service Workers.

    1. In open education we have generally focused on the rights that individuals have to remix content, while not providing or using publishing tools that make it easy to fork content in ways that make sense to non-programming communities. Wikity attempts to apply the tools and logic of forking to WordPress, the world's most popular web content platform. Content published in Wikity is easily forked to new sites while maintaining an attribution trail and keeping track of past versions.

      Mike Caulfield is working on WordPress software to make Federated Wiki concepts accessible to a wider audience. http://wikity.cc/ is the most recent result.

    1. The supermarket giant, which has been selling CDs for decades, will stock a small selection of classic albums as well as a few new titles by the likes of Coldplay and George Ezra. LPs by The Beatles, Radiohead, Bruce Springsteen, Bob Marley and Elvis Presley be available, priced between £12 and £20.
    1. The National Security Letter (NSL) is a potent surveillance tool that allows the government to acquire a wide swath of private information—all without a warrant. Federal investigators issue tens of thousands of them each year to banks, ISPs, car dealers, insurance companies, doctors, and you name it. The letters don't need a judge's signature and come with a gag to the recipient, forbidding the disclosure of the NSL to the public or the target.
    1. Pixar Animation co-founder Ed Catmull has warned that virtual reality technology may not be the revolution in storytelling that some of its evangelists have claimed. “It’s not storytelling. People have been trying to do [virtual reality] storytelling for 40 years. They haven’t succeeded. Why is that? Because we know that if they succeed then people would jump on it.”

      What? Who says VR has to be "just wandering around in a world"? You don't have to give the viewer full mobility, or any mobility. You can put their point of view where you want, and disallow interaction with the scenery -- which makes the experience precisely a 3D immersive motion picture. And I'm sure scripted stories can be told while giving the viewer some interaction with characters, and much freedom to move around -- that's just trickier. You'd plan for all the characters in various locations to push the story in a particular direction, or one of several directions, regardless of what the viewer does. The more you let the viewer affect events, the more it becomes a game, rather than a story.

    1. We find ourselves at a decisive moment. This is the time to recognize that the very existence of our massive knowledge commons is an act of collective civil disobedience. It is the time to emerge from hiding and put our names behind this act of resistance. You may feel isolated, but there are many of us. The anger, desperation and fear of losing our library infrastructures, voiced across the internet, tell us that. This is the time for us custodians, being dogs, humans or cyborgs, with our names, nicknames and pseudonyms, to raise our voices. Share this letter - read it in public - leave it in the printer. Share your writing - digitize a book - upload your files. Don't let our knowledge be crushed. Care for the libraries - care for the metadata - care for the backup. Water the flowers - clean the volcanoes.
    2. In Elsevier's case against Sci-Hub and Library Genesis, the judge said: "simply making copyrighted content available for free via a foreign website, disserves the public interest"

      The copyrighted material in question is academic research, much of which is paid for by public funds. This judge is confusing "public" with "publishing companies". How much has the academic journal scam cost the public?

    1. For me the interesting part of Stiegler’s work is the idea that it is technics that invents human beings; it is technics that constitutes the human.

      We make the tools. Then the tools make us.

      "Careful With That Axe, Eugene" -- Pink Floyd

    2. All technologies create cultures of use around themselves; they create new techniques and new ways of doing things that were unthinkable prior to the technology.
    3. If we look back to the beginnings of the university in ancient Greece, there was a struggle even then against a new technology – writing. Plato thought this new-fangled device would ‘implant forgetfulness in [men’s] souls’; it would destroy their memory. People in his day were taught to memorise thousands of lines of poetry and long speeches as part of rhetoric, the art of ‘enchanting the soul’. He thought writing was an artificial memory that would eat away at our natural skills.

      Memorization of poetry and epic stories is rare in Western culture today. But musicians, comedians, and stage actors work largely by memory What are we missing, if anything? Verbatim memorization of long texts might be nothing more than a waste of brain power. Or if memorization is worthwhile, then books and computers can be used toward that goal, with advantages over oral transmission.

    4. Tertiary education must adapt to the technological changes that are occurring at the moment, from the way that courses are written and delivered to the way that students are assessed. This is not just because we will ‘lose’ students, but because what we teach will become irrelevant.
    5. Most mobile applications incorporating location-based services (LBS) are about finding information, which is like the first phase of the web discussed above. I think we’ll be seeing a second phase soon, where location and community converge, which will be really really interesting. For a while there on the web it didn’t matter where you were from, and in a way this will make location important again.
    6. Over the last five years in particular I think the shift in usage has been dramatic; the web is not just a place you go to find information, to do your banking and shopping; it is a place to actively create and publish fragments of your life, to develop a virtual persona in a virtual community, to build stories and objects and then share them.
    7. In the early 90’s I was convinced that the internet was going to revolutionise literature, art and even education. Many writers and artists were at that time. This initial period of excitement tends to happen with the introduction of every new communications technology – radio, TV, computing, and now mobile devices.

      To some degree, the Internet already has revolutionized literature, art, education -- and government and international relations. It's just a slower revolution than some might have hoped. Written language and the printing press are comparable. Telegraph, telephone, movies, radio, and TV rarely approached their potential to accomplish something beyond business or commercial entertainment.

    8. It’s a useful term if you work in marketing, PR or business development – but I think academics and media students should be more critical. The idea of Media Studies 2.0 is quite funny; is that where the students collaboratively write the course material and give the lectures to each other? Love it.
    9. The term "Web 2.0" is useful to describe some recent trends, but we need to remember it’s a marketing term. It was coined by the online publishers O’Reilly Media to describe a whole grab-bag of different applications and business models.
    10. Mobile users have a constant low-level awareness of their device; the possibility that communication may arrive at any instant inhabits their awareness. It’s like you’re expecting a visitor sometime or have a pot slowly boiling in the other room, your attention is split.
    11. So for the first time in history, we have a citizenry who are in perpetual contact with the network, who are able to send and receive images wherever they are, who are never ‘offline’ unless they choose to be. If there is any kind of news event, a natural disaster or celebrity sighting for example, then someone is usually there with a camera in their pocket to capture it; perpetual surveillance.
    1. https://www.fbo.gov/ (Federal Business Opportunities) is the hub for all US government contracting documents, including RFPs (Requests for Proposals), RFIs (Requests for Information), and announcements of awarded contracts. This EFF page explains how this site is a good tool for journalists.

    1. The EFF calls on Americans to urge Congress to oppose the TPP (Trans-Pacific Partnership), a trade deal negotiated entirely in secret. This page provides a form that makes it easy to email your representatives.

    1. legal changes often lead to negative outcomes. New laws can limit use, introduce new payments or make open licensing incompatible with the given legal system. In such cases, OER advocates need to take a stance in defense of the existing rules.
    2. not all of the resources needed for education will be openly licensed — for example, modern education requires use of cultural resources that are in copyright and will never be openly licensed. We therefore need good and balanced rules allowing educators acting in the public interest to use these resources.
    3. the development of OER provides proof for the need of strong user rights in education. By looking at effects of successful OER projects we can describe a future educational reality, in which institutions, educators, and students benefit from a more liberal copyright law. Part of the success of Wikipedia as an education tool is the fact that no one accessing the site, or copying it for students, needs to worry: “Is this legal?”
    1. We compare our assembly to a recently published one for the same species and do not find support for massive horizontal gene transfer. Additional analyses of the genome are ongoing.

      They are contradicting another study that claimed that a certain species of tardigrade had about 17.5 percent of its DNA borrowed from other organisms through horizontal gene transfer. http://www.sciencealert.com/the-tardigrade-genome-has-been-sequenced-and-it-has-the-most-foreign-dna-of-any-animal

    1. after revealing his wife, Priscilla Chan, had given birth to their first child, Max, Zuckerberg announced the creation of a charity organization called the Chan Zuckerberg Initiative. The couple have pledged to give away 99% of their Facebook shares in their lifetime, currently worth about $45bn. The charity, which has “the mission of advancing human potential and promoting equality”, will be administered by the CEO himself and is already on track to be worth a potential $3bn by 2018.
  2. Nov 2015
    1. Removing the VR goggles, the adrenaline continues to course through me. I have only been inside the Project Syria immersive for a few minutes, but the effect is dramatic. It was commissioned for the 2014 World Economic Forum in Davos to give politicians an insight into everyday life in Syria. And it works.
    1. The effectiveness of infographics, or any other form of communication, can be measured in terms of whether people:

      • pay attention to it
      • understand it
      • remember it later

      Titles are important. Ideally, the title should concisely state the main point you want people to grasp.

      Recall of both labels and data can be improved by using redundancy -- text as well as images. For example:

      • flags in addition to country names
      • proportional bubbles in addition to numbers.
    1. Strong arguments for abandoning icon fonts in favor of SVG icons, with plenty of links to supporting material.<br> Tyler Sticka

      Font Awesome is an SVG and CSS icon library designed for Bootstrap.

    1. Elinor Ostrom shared the 2009 Nobel Prize in Economics for her work on governance of the commons -- finite resources shared by a community. She studied such communities, and derived eight principles, which are summarized on this page and on Wikipedia.

      Elinor Ostrom

    1. The Wall Street Journal reports that Google will be merging Chrome OS into Android, to be released sometime in 2017. Chrome OS runs on netbooks and provides most of its applications through the Web browser. As a result, it is a very secure system -- unlike Android, which has been quite vulnerable. Chrome OS will continue to exist as open source software, but Google will focus on extending Android to run on laptops.

    1. Some practitioners of open education have been dismayed at the recent emphasis on "free textbooks", which implies that cost-cutting is the main goal of openness. But it should not be forgotten that for many teachers and students, open textbooks provide an introduction to broader open practices.

    1. Businesses need to be more careful to avoid revealing customers' personal information. And they should record calls, and watch them collectively over time for signs of suspicious activity.

      The harasser in this article tricked customer service representatives into giving him private details about his victims. Starting with whatever information he could find online (a birthdate, the name of a pet) he would call repeatedly until he succeeded in getting other details -- which would make him still more convincing, so he could get more details.

      In one case, he pretended to be a company technician for ISP Cox Communications. They didn't have a procedure to verify the ID of their own technicians?

      Social engineering)

    2. "swatting" - making a hoax call to a police department to trick them into sending a SWAT team to someone's home, business, or school. Apparently, this is not as hard as it should be. The hoaxer typically claims to be, or to know of, a gunman or bomber at the target address. They may say they have hostages, and threaten to kill police officers.

      The article is about one Canadian teenager who duped US police departments into sending SWAT teams to people's homes around 40 times.

    3. Only four years old, Twitch already has 100 million viewers who consume 20 billion minutes of gaming every month. According to one 2014 study, Twitch is the fourth-­most-­visited site on the Internet during peak traffic periods, after Netflix, Google and Apple and above Facebook and Amazon. (Amazon bought Twitch in 2014 for about $1 billion, all of it cash.) And there is money in it for the gamers themselves, called ‘‘streamers’’: Fans can subscribe to channels for extra access, or they can send donations of any amount. Streamers with modest followings can make respectable incomes — hundreds or thousands of dollars a month — and the very top streamers are getting rich.

      (This is entirely peripheral to the subject of the article. I am making note of it because I have barely heard of Twitch until recently.)

    1. "Our nation's leaders need to speak out against this type of anti-Muslim hate. The American Muslim community is a small minority and we by ourselves, we can't push back against the tide of anti-Muslim sentiment," said Hooper. "What we're seeing is the end result of the mainstreaming of Islamophobia by leading public officials, such as Ben Carson and Donald Trump.

      Incidents of discrimination and harassment against Muslims have increased since the attacks in Paris on November 13th. It has received little or no attention in the mainstream press.

      talkingpointsmemo.com "The leader of a group of armed anti-Muslim protesters in Texas posted the addresses of dozens of local Muslims and 'Muslim sympathizer(s)' to Facebook on Tuesday."

    1. The key lesson of the post-9/11 abuses — from Guantanamo to torture to the invasion of Iraq — is that we must not allow military and intelligence officials to exploit the fear of terrorism to manipulate public opinion. Rather than blindly believe their assertions, we must test those claims for accuracy.
    2. In sum, Snowden did not tell the terrorists anything they did not already know. The terrorists have known for years that the U.S. government is trying to monitor their communications.What the Snowden disclosures actually revealed to the world was that the U.S. government is monitoring the Internet communications and activities of everyone else: hundreds of millions of innocent people under the largest program of suspicionless mass surveillance ever created, a program that multiple federal judges have ruled is illegal and unconstitutional.
    3. Bodies were still lying in the streets of Paris when CIA operatives began exploiting the resulting fear and anger to advance long-standing political agendas. They and their congressional allies instantly attempted to heap blame for the atrocity not on Islamic State but on several preexisting adversaries: Internet encryption, Silicon Valley's privacy policies and Edward Snowden.
    1. With over 36 million visitors each month, the San Francisco-based platform-capitalist company Academia.edu is hugely popular with researchers. Its founder and CEO Richard Price maintains it is the ‘largest social-publishing network for scientists’, and ‘larger than all its competitors put together’. Yet posting on Academia.edu is far from being ethically and politically equivalent to using an institutional open access repository, which is how it is often understood by academics. Academia.edu’s financial rationale rests on the ability of the venture-capital-funded professional entrepreneurs who run it to monetize the data flows generated by researchers. Academia.edu can thus be seen to have a parasitical relationship to a public education system from which state funding is steadily being withdrawn.

      Includes links to related articles.

    1. Bureaucratic cultures tend to discourage people from speaking candidly. Lack of candor can be a deterrent to success, before it ever reaches the level of outright lies. Lack of candor means:

      • outright lies (saying something you know to be false)
      • self-deception (believing what you want to believe)
      • deliberate omissions of facts
      • thinking one thing, but saying something different
      • having an idea that may be of value, but saying nothing
      • being called upon to give an honest opinion, but deciding to say what is easier, or what you think others want to hear
      • obscure jargon, or meaningless platitudes that give the impression everything is going fine or great. (This is a big red flag when it appears in corporate reports.)

      "Investing Between the Lines: How to Make Smarter Decisions by Decoding CEO Communications", L.J. Rittenhouse (recommended by Warren Buffet in his 2012 Shareholder Letter)

      Truth-Telling: Confronting the Reality of the Lack of Candor Inside Organizations We need to build cultures where "opposing views are debated and more effective solutions and innovations are created." -- Lynn Harris

    1. The four freedoms don’t limit us as creators — they open possibilities for us as creators and consumers. When you apply them to software, you get Linux, Webkit/Chrome, and WordPress. When you apply them to medicine, you get the Open Genomics Engine, which is accelerating cancer research and bringing us closer to personalized treatment. When you apply them to companies, you get radically geographically distributed, results-based organizations like Automattic. When you apply them to events you get TEDx, Barcamp, and WordCamp. When you apply them to knowledge, you get Wikipedia.
    2. as of December 2013, 21% of websites are powered by WordPress. One-fifth of the web is built with a tool that anyone can use, change, or improve, whenever and however they want (even more when you count other open source projects
    3. B2 was ultimately abandoned by its creator. If I’d been using it under a proprietary license, that would have been the end — for me, and all its other users. But because we had freedoms 2 and 3, Mike Little and I were able to use the software as a foundation
    4. I’ve spent a third of my life building software based on Stallman’s four freedoms, and I’ve been astonished by the results. WordPress wouldn’t be here if it weren’t for those freedoms, and it couldn’t have evolved the way it has. WordPress was based on a program called B2/cafelog that predated it by two years. I was using B2 because it had freedoms 0 and 1
    1. The Free Software Foundation's definition of free software, originally expressed by Richard Stallman. It is free as in free speech, not as in free beer. Software offered for a fee can still be free. A program is free software if the users have four essential freedoms:

      0. Run the program as you wish, for any purpose.<br> 1. Study the source code, and change it as you please.<br> 2. Copy and distribute the original program.<br> 3. Copy and distribute modified versions.

    1. "Freedom River" (1971), a cartoon parable narrated by Orson Welles. Cute, and its message is more pressing today. But they should have included a bit about how much of the nation was built by people who were here first, and others who were enslaved.

      https://www.youtube.com/watch?v=ABKLirW24LE<br> Open Culture has a background story.

    1. In this rush to blame a field that is largely unknowable to the public and therefore at once alluring and terrifying, little attention has been paid to facts: The Paris terrorists did not use encryption, but coordinated over SMS, one of the easiest to monitor methods of digital communication. They were still not caught, indicating a failure in human intelligence and not in a capacity for digital surveillance.
    2. The call for backdoors is nothing new. During my career in the private sector, I’ve seen requests to backdoor encryption software so as to please potential investors, and have seen people in the field who appeared to stand for secure software balk under the excuse of “if that’s what the customer wants,” even if it results in irreparable security weaknesses. I’ve had well-intentioned intelligence officers ask me informally, out of honest curiosity, why it is that I would refuse to insert backdoors. The issue is that cryptography depends on a set of mathematical relationships that cannot be subverted selectively. They either hold completely or not at all. It’s not something that we’re not smart enough to do; it’s something that’s mathematically impossible to do. I cannot backdoor software specifically to spy on jihadists without this backdoor applying to every single member of society relying on my software.
    3. When you make a credit card payment or log into Facebook, you’re using the same fundamental encryption that, in another continent, an activist could be using to organize a protest against a failed regime.<br> ...<br> If a terrorist is suspected of using a Toyota as a car bomb, it’s not reasonable to expect Toyota to start screening who it sells cars to, or to stop selling cars altogether.<br> ...<br> The brouhaha that has ensued from the press has been extreme. ... A Wired article, like many alongside it, finds an Arabic PDF guide on encryption and immediately attributes it as an “ISIS encryption training manual” even though it was written years ago by Gaza activists with no affiliation to any jihadist group.

    1. All new Dell laptops and desktops shipped since August 2015 contain a serious security vulnerability that exposes users to online eavesdropping and malware attacks.

      "At issue is a root certificate installed on newer Dell computers that also includes the private cryptographic key for that certificate. Clever attackers can use this key from Dell to sign phony browser security certificates for any HTTPS-protected site."

    1. In the wake of the cowardly terrorist attacks in Paris, many politicians, intelligence officials and pundits are predictably calling for a return to discredited policies of the past that would weaken Americans’ security, violate their privacy and do little or nothing to protect us from terrorists.

      Senator Ron Wyden of Oregon takes the position in favor of strong encryption, and against mass surveillance, with links to supporting articles.

    1. As dishonest as the “debate” over encryption has been, the dark descension of the Republican party into outright racism and cynically playing off the irrational fears of the public over the Syrian refugee crisis has been worse. We now know the attackers weren’t Syrian and weren’t even refugees. It was a cruel rumor or hoax that one was thought to have come through Europe with a Syrian passport system, but that was cleared up days ago. But in the world of Republican primaries, who cares about facts?
    2. as of Tuesday, it was clear that American and/or French intelligence agencies had seven of the eight identified attackers on their radar prior to the attacks. The attackers used Facebook to communicate. The one phone found on the scene showed the terrorists had coordinated over unencrypted SMS text messages – just about the easiest form of communication to wiretap that exists today. (The supposed ringleader even did an interview in Isis’s English magazine in February bragging that he was already in Europe ready to attack.)
    1. user innovation toolkit - a product malleable enough to let users adapt it to their own needs.

      Trello is a project management tool that provides boards, lists, and cards. The cards represent tasks or items, and move across columns on the board as they progress to a new stage of development. No particular method is prescribed. The individual or team decides how to use Trello, and the method is likely to evolve. Different projects may require different methods.

      Trello has an API to allow automation and customization. After agreeing on how to use the board, different team members might use the API to build interfaces that work best for them.

    1. Without feedback, there are three options: I can believe, without evidence, that I am an awesome programmer.  I can believe, without evidence, that I am a terrible programmer and quit to go do something else.  Or finally, I can believe, without evidence, that I am a terrible programmer somehow successfully pretending to be an awesome programmer.

      This is a thoughtful, eloquent article. My main takeaway is that perfection is delusional, but good teamwork will overcome flaws and help everyone improve continually. All of these points are forms of feedback, or prerequisites to good feedback.

      • treat coworkers with respect
      • clear, open, honest communication
      • 3 code reviews before release
      • style guidelines
      • pair programming
      • unit tests
      • manual testing
      • user experience surveys
      • user experience analytics
    1. "You will have a pair of sunglasses, and you can switch it from glasses mode, to VR mode as you wish. The VR will expand to fill your field of vision, or you can watch it in a little window.” This device of the future will not only bring virtual reality into our everyday lives, according to Urbach, but also destroy the primary way we use many other electronics. “You’ll be done with any other screen,” he says. “You won’t need it. It will be generated on a surface in the air. Put your finger over your palm, it’s a phone. Your desk becomes a laptop. "The resolution two generations from now will give you a 4K experience, so you probably won’t go to a movie theater. Why would you buy a wall-sized TV?”

      Interview with OTOY founder and CEO Jules Urbach. https://twitter.com/julesurbach

    1. BitSource would like to hire a second class of coders at the beginning of the new year. He, Parrish, and Hall want to fill up their buildings, create an incubator for entrepreneurs, a makerspace for craftsmen, and, someday, if they play their cards incredibly well, a bonafide Pikeville tech scene. You know, make Bloomberg in his smart suit eat crow for once.

      https://www.bitsourceky.com/ https://twitter.com/bitsourceky BitSource - agile software and web development. Pikeville, Kentucky Founders Rusty Justice and M. Lynn Parrish

    2. Outsiders have never gotten Appalachia — or else, they get the version they want: the one with the meth and Mountain Dew mouth, the incest, the painkillers, the welfare, all captured by journalists parachuting in for their regular dose of poverty porn. They find the toothless guy, the trailers with shotguns racked up on the wall and the yard strewn with diapers and beer cans, and they film some dude saying weird shit in a backcountry accent that needs subtitles to comprehend, they give it an ominous title like “A Hidden America: Children of the Mountains,” and they leave. You bet people here have a chip on their shoulder. It’s not that stuff like that doesn’t exist—but if the world always insisted on zooming in on your warts, you’d be resentful, too.
    1. 80 percent of those transactions are mere speculation, where bitcoin is traded as a commodity in search of a profit. That 20 percent figure is actually much higher than in previous years, but Coinbase hopes to push it higher still. This morning, in an effort to nudge bitcoin toward the mainstream, the company unveiled the country’s first bitcoin debit card. It’s called the Shift Card, and it lets you spend bitcoin at any merchant—both online and off—that accepts an ordinary VISA card.
    2. The more people who use bitcoin, the more useful it becomes—the closer we get to a place where we can send money across the Internet as easily as we send texts or emails.
    1. “Many random number generators in use today are not very good. There is a tendency for people to avoid learning anything about such subroutines; quite often we find that some old method that is comparatively unsatisfactory has blindly been passed down from one programmer to another, and today’s users have no understanding of its limitations.”— Donald Knuth; The Art of Computer Programming, Volume 2.

      Mike Malone examines JavaScript's Math.random() in v8, argues that the algorithm used should be replaced, and suggests alternatives.

    1. Arabic translator Alice Guthrie investigates 'Daesh', the new name for ISIS recently adopted by several world leaders because it delegitimises the group's activities. But how can a new name undermine a terrorist organisation? And why do the English-speaking media find the name so difficult to understand?
    1. Northern Virginia Community College’s Extended Learning Institute (ELI) and open courseware provider Lumen Learning announced a collaboration to publish 24 online college courses for two complete degree programs. All courses were developed for zero student cost using open educational resources (OER)
    1. PC gaming has enthusiastically embraced crowdfunding. On Kickstarter, video games (most of of which PC games) is the highest-funded category
    2. Another form of video game remixing happens on broadcasting sites like Twitch, where you can watch live videos of people playing games (while they chat with the audience — the end result is an interesting mix between video games and talk radio).
    3. Remixing books is popular on services like Wattpad where users write fanfiction inspired by books, celebrities, movies, etc. From a legal perspective, some fanfiction could be seen as copyright or trademark infringement. From a business perspective, the book industry would be smart to learn from the PC gaming business. Instead of fighting over pieces of a shrinking pie, try to grow the pie by getting more people to read and write books.
    4. In the gaming world, “mods” are user created versions of games or elements of games. Steam has about 4500 games but about 400 million pieces of user-generated content. Dota itself was originally a user-created mod of another game, Warcraft 3.Contrast this to the music industry, which relies on litigation to aggressively stifle remixing and experimentation.
    5. PC games are so popular they can also make money from live events. Live gaming competitions have become huge: over 32M people watched the League of Legends championship this year, almost double the number of people who watched the NBA finals.
    6. The types of games on Steam vary widely, as do the business models. The most popular game, Dota 2, is free. It makes money selling in-app items, mostly “cosmetic items” that alter the appearance of characters.
    7. if the future is already here, where can I find it? There is no easy answer, but history shows there are characteristic patterns. For example, it’s often useful to look at what the smartest people work on in their free time, or things that are growing rapidly but widely dismissed as toys.
    8. Today, billions of people carry internet-connected supercomputers in their pockets, the largest knowledge repository in the world is a massive crowdsourced encyclopedia, and a social network is one of the 10 most valuable companies in the world. Ten years ago, someone who predicted these things would have seemed crazy.
    1. TPOT is a Python tool that automatically creates and optimizes machine learning pipelines using genetic programming. Think of TPOT as your “Data Science Assistant”: TPOT will automate the most tedious part of machine learning by intelligently exploring thousands of possible pipelines, then recommending the pipelines that work best for your data.

      https://github.com/rhiever/tpot TPOT (Tree-based Pipeline Optimization Tool) Built on numpy, scipy, pandas, scikit-learn, and deap.

    1. And I also read this call to action by a (seemingly of French origin Muslim convert?) journalist who calls for Muslims to react after such violent attacks. To lead the fight against what we Muslims consider a hijacking of the message of Islam rather than distance ourselves from it. Because yeah – my natural reaction every time is “they don’t represent me. I don’t need to defend this because it doesn’t represent me”.  But in reality, for people who don’t know me or people like me, the violent ones speak louder than me.
    2. Because the sad thing about empathy is that we are more likely to be empathetic toward people who remind us of ourselves. Where it is easier to imagine ourselves in their shoes. On a second level, we are more likely to empathize with a group of people of whom we know some personally (or at least we know of/about them) because in reality I deeply believe that most people are good. And so if you know enough people of a certain category, most of them will be good. When we don’t know anyone from a certain category we are likely to dehumanize them
    1. Another provision of the proposed Investigatory Powers Bill is that internet service providers (ISPs) must retain a record of all the websites you visit (more specifically, all the IP addresses you connect to) for one year. This appears to be another measure to weaken privacy while strengthening security – but in fact, it is harmful to both privacy and security. In order to maintain a record of every website you have visited in the last year, the ISP must store that information somewhere accessible. Information that is stored somewhere accessible will sooner or later be stolen by attackers.
    2. I’ll say it again, to be absolutely clear: any mechanism that can allow law enforcement legitimate access to data can inevitably be abused by hostile foreign intelligence services, and even technically sophisticated individuals, to break into systems and gain unauthorised access to the same data.
    3. If the law enforcement services can remotely break into the device of a suspect, then sooner or later criminals will find ways to use the same mechanism to break into devices and steal or destroy your personal data.
    4. Any method that provides exceptional access immediately exposes the system to attacks by malicious parties, rendering the protection of encryption essentially worthless. Exceptional access would probably require that government departments have some kind of master keys that allowed them to decrypt any communication if required. Those master keys would obviously have to be kept extremely secret: if they were to become public, the entire security infrastructure of the internet would crumble into dust. How good are government agencies at keeping secrets?
    1. In the latest version of Known, we shipped experimental support for Accelerated Mobile Pages. This is an answer to something called Facebook Instant Pages, which caches website content inside a mobile app so it can be displayed immediately. While Instant Pages content must be negotiated with Facebook, anyone can publish AMP content. So far, so good.Unfortunately, AMP redefines the HTML standard with some custom tags. That’s not great. It also requires that we load JavaScript from a specific source, which radically centralizes website content. We assume this is a shim until these features are more widely supported, so we can live with that. What’s less impressive is that AMP whitelists ad networks that participating pages can be a part of. If you’re not generating ad revenue from one of A9, AdReactor, AdSense, AdTech or Doubleclick and want to have your websites load swiftly inside social mobile apps, you’re out of luck.
    1. Reclaim Hosting, Known, and Brigham Young University are working on an interface for student domains that will provide easy cross-posting to several social media sites, and easy viewing of those posts among peers in groups. The students will still be able to install whatever other server software they need.

    1. In a delightful book, Founding Grammars: How Early America’s War Over Words Shaped Today’s Language (St Martin’s Press, 309 pages, $27.99), Rosemarie Ostler traces an arc that keeps repeating itself: A writer offers advice about language, his followers and schoolteachers convert the advice into dogma, and the public plumps for easy-to-follow rules, however bogus, over nuances and judgments.
    1. Worse is that Mark Zuckerberg proves not to be a fan of links, or hyperlinks. On Facebook, he doesn’t encourage you to link. On Instagram, he has simply forbidden them. He is quashing the hyperlink, thereby killing the interconnected, decentralized, outward network of text known as the World Wide Web.Facebook likes you to stay within it. Videos are now embedded in Facebook, and soon the outside articles will be embedded, too, with its Instant Articles project. Mr. Zuckerberg’s vision is of an insular space that gets all our attention — and he gets to sell it to advertisers.
    1. Blockchains can also implement business rules, such as transactions that take place only if two or more parties endorse them, or if another transaction has been completed first.
    2. Blockchains are also the latest example of the unexpected fruits of cryptography. Mathematical scrambling is used to boil down an original piece of information into a code, known as a hash. Any attempt to tamper with any part of the blockchain is apparent immediately—because the new hash will not match the old ones. In this way a science that keeps information secret (vital for encrypting messages and online shopping and banking) is, paradoxically, also a tool for open dealing.