If you haven’t seen the documentary, The Internet’s Own Boy – go watch it. Reminders of Aaron’s spirit are everywhere and just today, while searching for something else, I came across this post from Alex Stamos, Chief Information Security Officer at Yahoo.
If I had taken the stand as planned and had been asked by the prosecutor whether Aaron’s actions were “wrong”, I would probably have replied that what Aaron did would better be described as “inconsiderate”. In the same way it is inconsiderate to write a check at the supermarket while a dozen people queue up behind you or to check out every book at the library needed for a History 101 paper. It is inconsiderate to download lots of files on shared wifi or to spider Wikipedia too quickly, but none of these actions should lead to a young person being hounded for years and haunted by the possibility of a 35 year sentence.
John Gruber posted one of the most thorough estimates of what he thinks might be the price of the other two Apple Watch models. In anticipation of the flurry of counter-estimates, I thought I’d keep a running table showing what other pundits are putting down as their best guess and update it as I get new estimates via Google Alerts.
But no need to keep others from joining in on the fun. What’s your best guess for the price of the gold Apple Watch Edition?
How much money was the company bought for?
Microsoft acquired Mojang for a smooth 2.5 BILLION dollars.
– Mojang blog post
I love you. All of you. Thank you for turning Minecraft into what it has become, but there are too many of you, and I can’t be responsible for something this big. In one sense, it belongs to Microsoft now. In a much bigger sense, it’s belonged to all of you for a long time, and that will never change.
Under the terms of the agreement, Microsoft will acquire Mojang for $2.5 billion. Microsoft expects the acquisition to be break-even in FY15 on a GAAP basis. Subject to customary closing conditions and any regulatory review, the acquisition is expected to close in late 2014.
– Microsoft Press Release
I really should read Joi Ito’s blog more. He has a fascinating post about a recent trip to Shenzhen where he visited the back alley electronic component markets and observes an ecosystem teeming with activity, rapidly iterating on designs in a way that I’m sure makes Silicon Valley rate of evolution feel glacial.
However, the more interesting phones were the phones that weren’t like anything that existed anywhere else. Keychains, boom boxes, little cars, shiny ones, blinky ones – it was an explosion of every possible iteration on phones that you could imagine. Many were designed by the so-called Shanzhai pirates who started by mostly making knockoffs of existing phones, but had become agile innovation shops for all kind of new ideas because of the proximity to the manufacturing ecosystem. They had access to the factories, but more importantly, they had access to the trade skills (and secrets) of all of the big brand phone manufacturers whose schematics could be found for sale in shops. These schematics and the engineers in the factories knew the state of the art and could apply this know-how to their own scrappy designs that could be more experimental and crazy. In fact many new technologies had been invented by these “pirates” such as the dual sim card phone.
While intellectual property seems to be mostly ignored, tradecraft and trade secrets seem to be shared selectively in a complex network of family, friends and trusted colleagues. This feels a lot like open source, but it’s not. The pivot from piracy to staking out intellectual property rights isn’t a new thing. The United States blatantly stole book copyright until it developed it’s own publishing very early in US history. The Japanese copied US auto companies until it found itself in a leadership position. It feels like Shenzhen is also at this critical point where a country/ecosystem goes from follower to leader.
Love this! Use technology to turn ordinary, functional objects into something that’s fun and interactive. Urban environments offer so many opportunities to shine a spotlight on individuals which can make someone’s day.
Also, the obligatory “making of” video below.
It’s all part of an advertising campaign for the Smart car, a brand that promotes “urban joy” and safety.
Joseph Smarr’s blog post, Turns out we still need Plaxo (or something like it) had me digging through my archives for some screenshots taken from an old prototype I worked on a few years back. The concept was simple and combined the double opt-in privacy features you get from Facebook with the simplicity of a phone address book.
The story starts with two phones, Boris’ on the left and Sarah’s on the right. The owner of the phone has a public card they can edit (outlined in yellow). By tapping on it, they can add whatever information they feel comfortable sharing to the public. Updating this info on your phone copies it up to the public directory. On it you see a photo, name, and latest status.
Boris decides he wants to search for Sarah. He begins to type and the list of matching entries narrows until Sarah’s entry is highlighted.
Tapping on Sarah’s entry, Boris can view Sarah’s public card. This info is stored on a server, tied to her phone number. Think of it as the white pages in the cloud, like a DNS record for people, matching IP addresses to domain names.
Boris has the option to save the public contact record to his local phone book. This action sends a notification to Sarah (it says “New Contact” below Boris’ name as a status) that Boris has saved her public card to his phone book. It’s like a Facebook friend request but more functional.
Tapping on Boris’ name in the list view, Sarah can pull up Boris’ contact card. Because Boris has already saved Sarah’s card to his phone, Sarah has the rights to view Boris’ full contact card with additional information such as his phone number and email address. Sarah has the option to Accept or Decline Boris’ connection request.
Sarah accepts Boris’ connection request so now Boris has access to Sarah’s full contact card and “unlocks” additional information on Sarah’s profile such as her phone number and email address.
Now that both Sarah and Boris have saved the other’s contact card to their phone, they unlock private information that is only available to their connections. The act of saving a contact card can be either via the look-up method above or even by calling someone and that person saving the phone number from their call log to their address book.
Later, if Sarah wants to “pull back” her contact details from Boris’ phone, all she has to do is delete Boris’ contact card from her address book. Once she does so, her contact card on Boris’ phone reverts back to its public profile.
There are many versions of this type of system. As Joseph mentioned, Facebook offers this if you look at the About section on anyone’s profile. Google+ also allows you to manage access to private information based on which circle you save someone to. Even Plaxo had the concept of Work & Home card and you could chose who had access to what.
My point is that no one manages their personal contact details as part of a social network. The only way you’re going to get people to keep their data current is if their card is in front of them every day as part of their daily interaction with people.
Every time you call or text someone using the system above, you’re going to leave a link to your public calling card on their phone. As people interact with your card, they are going to be unlocking additional details that will help build their connection with you. Let’s say your work address or busy/free space on your calendar is part of that additional information that gets unlocked. You’re going to want to keep this information accurate.
There are all sorts of holes you can poke into such a system. For example, I can write my profile to look like some celebrity and save a bunch of people to my phone book and hope to dupe someone into counter-saving my profile to their phone and thus revealing their private information. To counter this, maybe you need to verify people’s names with a text message with a link or code that ties their name to their phone number.
Also, once someone unlocks your profile, there is no real way to take it back as they can take a screenshot and save that info as a photo.
Yes, there are holes but as a start what do you think. Is it intuitive? Does it make sense? The concept of your phone number as the equivalent of an IP address tied to a directory that contains further details is attractive. If we can get over the fact that a phone number isn’t really private and should be used as one-half of a key opens up many possibilities.
Digital Music News put together a visual showing the mix of revenue streams for music over the past 30 years. CDs, which represented only 0.5% in 1983 grew to the dominant medium in 2003 when it was 95.5% of revenue.
In 2004 downloads appear on the scene (or begin to be counted) at 1.5% and are, in 2013 more than the CD with both downloads and streaming/subscription revenues eating away at CD market share.
In 15 minutes, CPG Grey’s Humans Need Not Apply paints a bleak picture for anyone who thinks that the coming robot revolution will free everyone up for more creative pursuits. Trouble is, poetry and painting don’t pay the rent.
Transportation, driving things & people from point A to point B employs millions of people today. What will happen to these people when self-driving transport is perfected? In the Great Depression 25% of the workforce was out of work and unable to feed itself. Pointing to a list of the jobs in danger of automation Grey argues,
This list above is 45% of the workforce. Just what we’ve talked about today, the stuff that already works, can push us over that number pretty soon. And given that even our modern technological wonderland new kinds of work are not a significant portion of the economy, this is a big problem.
This is not something that will happen sometime in the future, this is something that’s already happening. Amazon’s Robot Army was mobilized two years ago. It’s a re-occurring theme, robots taking over and turning against their maker. Coming soon to a theater near you in October, Autómata.
Building an AI system that excels at a particular task — even a mundane one such as recognizing breeds of dogs — is hard, manual work. Even so-called “self-learning” systems need lots of human tuning at every other step in the process. Making disparate systems work together to provide any sort of human-like concept of reality would be even harder still.
Before AI systems can communicate with each other and learn, we’ll need standards. As long as creation of standards remain in the hands of human-based, quasi-governmental international organizations that take ages to agree on anything, we’re safe
I had such a great time at Burning Man last year. It was my first time and my brother-in-law graciously gave up his ticket so that my sister to take me. Mie is a veteran and was the perfect guide in every way. She knew what to bring and where to go but also knew me enough to let me wander around, explore, and take it all in at my own pace, re-living the event through my eyes.
I am not nearly as invested in the burner community as she is but it makes me sad to read the latest headlines about how it’s collapsing under its own popularity. Burning Man Jumps the Shark is the cover story in this week’s Bay Guardian and the New York Times writes about tech elite hiring “sherpas” to set things up and clean up afterwards.
When I saw a Delorean at a Grateful Dead show I knew it was the beginning of the end. The clean, aluminum lines of the gull-wing doors stood out in stark contrast to the ramshamble chaos of everything around it.
You can’t push out the grime and sweat. It’s an integral part of the experience. Through it you come together and are reborn as part of the tribe.
Eating sushi in an air conditioned yurt is doing it wrong. Maybe it’s time for another funeral?