Kernelmag's Jeff Keacher documents connecting his old Macintosh Plus to the World Wibe Web, courtesy of a Raspberry Pi and a bunch of software to remove all those pesky <div>s and such. [more inside]
James Mickens (previously) gives a talk at Monitorama 2014 about distributed computing and security.
Each week, the Internet Archive's tumblr account is completely transformed by a digital resident along a theme of their choosing. [more inside]
DevArt: An exhibition of art created with code - skywriting quadcopter drones programmed with c++, room dividers reimagined as 3D screens for psychedelic projections, using raspberry pi to rename WiFi networks as lines of poetry. They are collaborating with the Barbican in London for the Digital Revolution exhibition and are currently seeking an emerging creative coder to be funded to present at the exhibition alongside world-class interactive artists Zach Lieberman, Karsten Schmidt, and the duo of Varvara Guljajeva & Mar Canet.
Ars Technica reports on malicious extensions on the Chrome web browser, which install advertising-based malware that hijack links and inject ad content. Further speech recognition exploits (source) leave open the opportunity for malicious sites to record sound captured by the user's web browser without permission.
I’m trying to build a jigsaw puzzle. I wish I could show you what it will be, but the picture isn’t on the box. But I can show you some of the pieces that snapped into place this year, and try to share a context for why they mattered so much to me.Bret Victor discusses scientific thinking and computing from a deeply humane perspective through the eyes of Douglas Engelbart, Alan key and other great thinkers of our time.
"In 1967, The Public Interest, then a leading venue for highbrow policy debate, published a provocative essay by Paul Baran, one of the fathers of the data transmission method known as packet switching [and agent of RAND]. Titled “The Future Computer Utility," the essay speculated that someday a few big, centralized computers would provide 'information processing … the same way one now buys electricity. Highly sensitive personal and important business information will be stored in many of the contemplated systems … At present, nothing more than trust—or, at best, a lack of technical sophistication—stands in the way of a would-be eavesdropper.' To read Baran’s essay (just one of the many on utility computing published at the time) is to realize that our contemporary privacy problem is not contemporary. It’s not just a consequence of Mark Zuckerberg’s selling his soul and our profiles to the NSA. The problem was recognized early on, and little was done about it... It’s not enough for a website to prompt us to decide who should see our data. Instead it should reawaken our own imaginations. Designed right, sites would not nudge citizens to either guard or share their private information but would reveal the hidden political dimensions to various acts of information sharing." -- MIT Technology Review on The Real Privacy Problem
Douglas Hofstadter, the Pulitzer Prize–winning author of Gödel, Escher, Bach, thinks we've lost sight of what artificial intelligence really means. His stubborn quest to replicate the human mind.
The data analysis group that used Facebook and set top TV data to help Barack Obama win the latest election is taking its talents to the private sector. (SL NYTimes)
Unleashing Genetic Algorithms on the iOS 7 Icon - In the pursuit of something just a bit tighter than Marc Edwards' superellipse approximation, Mike Swanson applies genetic algorithms to the task of making a better button-making script.
Mechanical Marvels: Clockwork Dreams Detailed and thoughtful exploration of clockwork and automata as a phenomenon in the 17th Century and their development into machines that could imitate human activity - eventually leading to the famous Mechanical Turk (eventually exposed as fake) and the truly astounding "Silver Swan" built by John Joseph Merlin. (Definitely not a fake) [more inside]
"I am a master at sullying my own name and, all things considered, being associated with the worst software on the planet ranks way down the pole." John McAfee (previously) answers questions about his latest shenanigans
As Microsoft prepares to retire its unfashionable Hotmail in favor of Outlook.com this summer, let's remember the viral marketing revolution that Hotmail invented. Journey back seventeen years to Hotmail's origins, the birth of the dot.com millionaire, and the boozy optimism of a pre-crash web industry in full-growth mode (Wired, December 1998) .
NASA will send you an email or text alert when the International Space Station is visible from your area. IBM scientists have recently made significant advances in nanotechnology. A mathematician thought a poorly-encrypted headhunting email from Google was testing him, but he had actually discovered a major security hole. All of this found via The Brief: A Daily Briefing of Technology News Worth Caring About from MeFi's own nostrich. [via mefi projects]
"Of all the things the Internet was expected to become, it is safe to say that a seed for the proliferation of backup diesel generators was not one of them." Power, Pollution and the Internet [sl NY Times]
John Goerzen, an IT development manager in Kansas and a developer for Debian, has been teaching his two sons, ages five and two, respectively, how to use Linux. [more inside]
Happy 100th birthday, Alan Turing! 2012 is the Alan Turing Year, with celebratory academic events around the world all year. BBC News has a set of (brief) appreciations, including one in which two of Turing's colleagues share memories. Google has an interactive Doodle of a Turing Machine today (that article has some explanation and links to a useful video if the doodle's confusing). [more inside]
The Hacker Shelf is nice crowd-sourced guide to (legally) free books on various computational and mathematical subjects. The topics page gives you an idea of the breadth of material available.
Bret Victor (previously, previouslier) shows off some mindblowing tools he's created to demonstrate not only great insights in user experience, but also his philosophy: "Inventing on Principle"
Con Artist Starred in Sting That Cost Google Millions - The government's case also contained potentially embarrassing allegations that top Google executives, including co-founder Larry Page, were told about legal problems with the drug ads. [more inside]
The holiday season isn't always relaxing for those in the computing security field. 2011's Chaos Communication Congress brought many gifts in the form of vulnerability disclosures, including: malicious documents that infect HP printers, remote control vulnerabilities in prison lock systems, and denial-of-service attacks against Web servers written in just about every scripting language.
On November 22, 2011, TEDxBrussels held an all day event whose theme was: "A Day in the Deep Future." Speakers were asked to try and contemplate what life will be like for mankind in 50 years. Overview. [more inside]
The History and Future of Computing an interactive timeline from the New York Times which crowdsources predictions. [more inside]
Malaysia is proposing a Computing Professionals Bill, based on the Registration of Engineers Act [.PDF] which makes it mandatory for all practicing "computing professionals" to be registered with a government body. Dealing in the IT industry, including sending “proposals, plans, designs, drawings, schemes, reports, studies or others to be determined by the Board to any person or authority in Malaysia” without being registered will incur a fine not exceeding RM20,000 (~US$6380) or 6 months in jail. Malaysian IT professionals and geeks are up in arms, and similarities have been drawn to Nigeria's law on computing professionals.
Security researchers at North Carolina State University led by Xuxian Jiang (who had previously discovered 12 malicious Android applications sold through Google's Android Market) have uncovered holes in how the permissions-based security model is enforced on numerous Android devices. Called "leaks", these vulnerabilities allow new and existing malicious applications to eavesdrop on calls, track the user's location, install applications, send SMS messages, delete data from the device, and more. (via)
OpenCPU provides a RESTful interface to the popular open-source statistical package R, enabling the user to perform calculations and create publication-quality or web-embeddable visualizations via standard web requests.
Logging out of Facebook is not enough - Nik Cubrilovic demonstrates how, even after logging out, Facebook tracks every page you visit on sites that integrate Facebook services [via]
Father Roberto Busa, whose work to analyze and index the writings of St. Thomas Aquinas led to the foundation of the discipline now known as the digital humanities, has died at the age of 97.
Over the past 30 years, designer, writer and Principal Researcher for Microsoft Research Bill Buxton has collected input and interactive devices whose designs he found "interesting, useful or important. In the process, he has assembled a good collection of the history of pen computing, pointing devices, touch technologies, as well as an illustration of the nature of how new technologies emerge." This week, he unveiled his collection at the Computer-Human Interaction conference in Vancouver, British Columbia. An extensive gallery has been posted online with images and notes at The Buxton Collection. [more inside]
Facebook's Open Compute Project aims to share with the public the social network's efficiency design improvements to its compute nodes. [ via ]
The Sinclair ZX81 is 30 years old today. The ZX81 was a hugely successful low-cost home computer produced by Sinclair Research and manufactured by Timex in Dundee, Scotland. The ZX81 came with 1 KB of on-board memory, for extra gaming power Sinclair produced a 16 KB add-on memory module and a thermal printer.
Apple’s Tablet Computer History - A collection of beautiful prototype designs for some of Apple's early tablet computers from the 1980s and 90s, including the famed Newton [ related | via ]
Chasing Pirates: Inside Microsoft’s War Room - From the special thread that Chinese factories counterfeit in mile-long spools that adorns software authenticity stickers, to near-perfect bootleg discs leaving microscopic evidence of their factory origins, to Mexican and Russian gangsters who are dealt with very carefully, the NYT covers Microsoft's multi-pronged, international war on piracy.
Exact String Matching Algorithms - Source code for Boyer-Moore, Horspool and other string-matching algorithms, along with visualizations of their operation
“When it comes to user privacy, SSL is the elephant in the room.” Meet Firesheep: a Firefox plugin that sniffs out unencrypted HTTP sessions on your network segment and lets you impersonate any of the users found. Eric Butler unveiled it today at Toorcon 12, a San Diego conference on computing security, and it demonstrates what amounts to a gaping hole in the Web security model.
"[T]he most important decisions you make are not the things you do – but the things that you decide not to do."
"He’s a minimalist and constantly reducing things to their simplest level. It’s not simplistic. It’s simplified. Steve is a systems designer. He simplifies complexity." John Sculley On Steve Jobs, The Full Interview [via]
Do you like manuals? Do you like Wikis? Do you like open source software? Check out FLOSS Manuals for wiki-fied manuals for popular and fun open source software, including PureData, Inkscape, Blender, Ardour, among others. Taking a page from programmers, the group endorses "book sprints", where creative writers, editors and artists work closely together to complete an online book in a short, intense burst of effort.
Meet Meet Eater, a plant that sustains itself through Facebook interaction. This project was created by designer and artist Bashkim Isai as a university project to explore the idea of "affectionate computing" and currently sits at digital hub The Edge in Brisbane, Australia. Meet Eater has a good sense of humour, but also perhaps a drinking problem.
"Without the participation of Microsoft, these criminal cases against human rights defenders and journalists would simply not be able to occur"
Russia Uses Microsoft to Suppress Dissent - Adding to its long-running series on corruption and abuse in post-Communist Russia, the New York Times has reported on Russian authorities using the pretext of software piracy to seize computers from journalists and political dissidents critical of current policies. In a surprising twist, lawyers representing Microsoft have been found working with Russian police, despite reporters and NGOs providing evidence of legitimate software purchases. An official response to the NYT piece suggests impostors claim to represent Microsoft in Russia, and notes the company's offer of free software licenses to these and similar groups.