technology

If you watch a person using the net, you see a kind of immersion: Often they are very oblivious to what is going on around them. But it is a very different kind of attentiveness than reading a book. In the case of a book, the technology of the printed page focuses our attention and encourages a linear type of thinking. In contrast, the internet seizes our attention only to scatter it. We are immersed because there’s a constant barrage of stimuli coming at us and we seem to be very much seduced by that kind of constantly changing patterns of visual and auditorial stimuli. When we become immersed in our gadgets, we are immersed in a series of distractions rather than a sustained, focused type of thinking. (…)
It is important to realize that it is no longer just hyperlinks: You have to think of all aspects of using the internet. There are messages coming at us through email, instant messenger, SMS, tweets etc. We are distracted by everything on the page, the various windows, the many applications running. You have to see the entire picture of how we are being stimulated. If you compare that to the placidity of a printed page, it doesn’t take long to notice that the experience of taking information from a printed page is not only different but almost the opposite from taking in information from a network-connected screen. With a page, you are shielded from distraction. We underestimate how the page encourages focussed thinking – which I don’t think is normal for human beings – whereas the screen indulges our desire to be constantly distracted.
{ Nicholas Carr/The European | Continue reading }
related { Digital Suicide and the Biopolitics of Leaving Facebook }
painting { Joyce Pensato }
ideas, technology | February 3rd, 2012 8:30 am
Facebook users can spread emotions to their online connections just by posting a written message, or status update, that’s positive or negative, says a psychologist who works for the wildly successful social network.
This finding challenges the idea that emotions get passed from one person to another via vocal cues, such as rising or falling tone, or by a listener unconsciously imitating a talker’s body language, said Adam Kramer on January 27 at the annual meeting of the Society for Personality and Social Psychology. Kramer works at Facebook’s headquarters in Palo Alto, Calif.
“It’s time to rethink how emotional contagion works, since vocal cues and mimicry aren’t needed,” Kramer said. “Facebook users’ emotion leaks into the emotional worlds of their friends.”
{ ScienceNews | Continue reading }
psychology, relationships, social networks | January 31st, 2012 12:27 pm

The email might contain “privileged, confidential and/or proprietary information,” they are told. If it landed in their inbox by error, they are strictly prohibited from “any use, distribution, copying or disclosure to another person.” And in such case, “you should destroy this message and kindly notify the sender by reply email.” (…)
Email disclaimers, those wordy notices at the end of emails from lawyers, bankers, analysts, consultants, publicists, tax advisers and even government employees, have become ubiquitous—so much so that many recipients, and even senders, are questioning their purpose. (…)
Emails often now include automatic digital signatures with a sender’s contact information or witty sayings, pleas to save trees and not print them, fancy logos and apologies for grammatical errors spawned by using a touch screen. (…)
Some lawyers say the disclaimers have value, alerting someone who receives confidential, proprietary, or legally privileged information by accident that they don’t have permission to take advantage of it.
Others, including lawyers whose email messages are laden with them, say the disclaimers are for the most part unenforceable. They argue that they don’t create any kind of a contract between sender and recipient merely because they land in the recipient’s inbox.
It’s largely untested whether email disclaimers can hold up in court and at least one ruling on the matter was mixed.
Boilerplate language attached to every email dilutes the intention, some say. For instance, when every message from a sender’s account is tagged with “privileged and confidential,” it might make it difficult to convince a judge that any one email is more private than another.
{ WSJ | Continue reading }
law, technology | January 27th, 2012 9:20 am
economics, technology, uh oh | January 25th, 2012 10:39 am

I missed a great story circulated by my first New York roommates about how our scuzzball landlord is now embroiled in a legal fracas for renting a 1.5 million Tribeca apartment to a guy who runs a basement sex loft out of it offering “flaming massages.” The neighbors are so mad they keep smearing dog feces on the door. I could have lived without this news, but I’m happier now that I have it.
(…)
The messages Facebook hides in an obscure folder labeled “Other.”
{ Slate | Continue reading }
housing, incidents, new york, technology | January 24th, 2012 7:56 am

One small company reinvents a $30 billion market
EagleView uses aerial photography and 3-D modeling to produce on-demand reports for accurate measurements of almost every roof in the country. No ladder, no tape measurers and no perilous, time-consuming estimates.
{ CNN Money | Continue reading }
economics, technology | January 24th, 2012 7:40 am

What can make camping even more enjoyable? Self-cleaning clothes. And I don’t mean jumping into the river with your clothes on, but simply just leaving them out in the sun. At least, that’s what we may be able to do one day with the self-cleaning cotton developed by Chinese researchers. (…)
The team evaluated the self-cleaning properties of the new cotton fibres based on the removal of methyl orange, a dye commonly used in textiles. The dye breaks down with exposure to visible light by a process known as photocatalytic degradation. With just two hours of exposure to visible light, about 70% of the dye was removed from the cotton fibres.
{ Basal Science Clarified | Continue reading }
photo { Coley Brown }
photogs, science, technology | January 23rd, 2012 12:21 pm

Announcing products before they are ready gives the competition time to respond, raises customer expectations, and opens a company up to the carping of critics who are bashing an idea rather than an actual product. Companies that fail to grasp the power of secrecy do so at their peril. (…) Steve Jobs once said that not talking about the inner workings of the company is something he borrowed from Walt Disney. The creator of the original Magic Kingdom felt the magic the public attributed to Disney would be diminished by excessive focus on what went on behind the scenes. (…)
The splendid central cafeteria, Caffe Macs, features separate stations for fresh sushi, salad, and desserts and teems with Apple employees. They pay for their meals, by the way, unlike at Google. (…) “There’s only one free lunch at Apple, and it’s on your first day,” said a former employee. (…)
For new recruits, keeping secrets begins even before they learn which building they’ll be working in. Many employees are hired into so‑called dummy positions, roles that aren’t explained in detail until after they join the company.
{ Fortune | Continue reading }
economics, technology | January 19th, 2012 2:20 pm

I was far from the most active Facebook user I know, but my decision to quit came from a long cold look at just how many hours I’ve devoted to it in the last couple of years, and a strong accompanying feeling that, were I to devote the same amount over the next couple, I would want to put on some spiked gloves and repeatedly punch myself in the nose really hard. No matter how positive you feel about Facebook or Twitter and the ways in which they’ve enhanced your life, it is unlikely that anyone will ever lie on their deathbed and say, “You know what? I’m really glad I spent all that time social networking!” Additionally, I’m starting to write a new book, and attempting to feel more focussed.
{ Tom Cox/Guardian | Continue reading }
bonus [more]:

experience, social networks | January 19th, 2012 10:32 am

Ira Glass OK, I am holding a new iPhone 4S in my hand. This is the one that you can talk to, and it talks back. It’s a program called Siri. So let’s try this. I’m just going to hold it up to the microphone here and push a button. Siri, where do you come from?
Siri Software I, Siri, was designed by Apple in California.
Ira Glass Where were you manufactured?
Siri Software I’m not allowed to say.
Ira Glass Why?
Siri Software Good question. Anything else I can do for you?
(…)
Ira Glass Flip over the phone– right here on the back it’s printed, assembled in China.
(…)
Mike Daisey We think our crap comes from China, right? Kind of a generalized way. China. But it doesn’t come from China. It comes from Shenzhen. It’s a city. It’s a place. (…) We get out to the edge of the core of Shenzhen and we come to the gates. Because 31 years ago, when Deng Xiaoping carved this area off from the rest of China with a big red pen, he said, this will be the special economic zone. And he made a deal with the corporations. He said listen, use our people. Do whatever you want to our people. Just give us a modern China. And the corporations took that deal, and they squeezed and they squeezed. And what they got was the Shenzhen we find today.
And on the other side of the gates it’s the factory zone. And whew, it’s like going from the Eloi to the Morlocks, everything changes. I’ve never seen anything like it. Everything is under construction. Every road has a bypass. Every bypass has a bypass. It’s bypasses all the way down. (…)
We are in a taxi right now in the factory zone. We are driving on our way to Foxconn. Foxconn, a single company, makes a staggering amount of the electronics you use every day. They make electronics for Apple, Dell, Nokia, Panasonic, HP, Samsung, Sony, Lenovo, a third of all of it. That’s Foxconn. And at this plant they make all kinds of things, including MacBook Pros and iPhones and iPads. (…)
The Foxconn plant in Shenzhen has 430,000 workers. That can be a difficult number to conceptualize. I find it’s useful to instead think about how there are more than 20 cafeterias at the plant. And then you just have to understand that workers told me that these cafeterias can hold up to 10,000 people. So now you just need to visualize a cafeteria that seats 10,000 people (…)
I talked to more than 100 people. I met five or six who were underage.
{ WBEZ/This American Life | Continue reading }
asia, economics, technology | January 16th, 2012 3:32 pm

One day in 1945, a man named Percy Spencer was touring one of the laboratories he managed at Raytheon in Waltham, Massachusetts, a supplier of radar technology to the Allied forces. He was standing by a magnetron, a vacuum tube which generates microwaves, to boost the sensitivity of radar, when he felt a strange sensation. Checking his pocket, he found his candy bar had melted. Surprised and intrigued, he sent for a bag of popcorn, and held it up to the magnetron. The popcorn popped. Within a year, Raytheon made a patent application for a microwave oven.
The history of scientific discovery is peppered with breakthroughs that came about by accident. The most momentous was Alexander Fleming’s discovery of penicillin in 1928, prompted when he noticed how a mould that floated into his Petri dish killed off the surrounding bacteria. Spencer and Fleming didn’t just get lucky. Spencer had the nous and the knowledge to turn his observation into innovation; only an expert on bacteria would have been ready to see the significance of Fleming’s stray spore. As Louis Pasteur wrote, “In the field of observation, chance favours only the prepared mind.”
The word that best describes this subtle blend of chance and agency is “serendipity.” (…)
Today’s internet plies us with “relevant” information and screens out the rest. Two different people will receive subtly different results from Google, adjusted for what Google knows about their interests. Newspaper websites are starting to make stories more prominent to you if your friends have liked them on Facebook. We spend our online lives inside what the writer Eli Pariser calls “the filter bubble.”
{ More Intelligent Life | Continue reading }
photo { Luigi Ghirri }
flashback, ideas, technology | January 16th, 2012 3:24 pm

Amy, a 20-year-old brunette at the University of California at Irvine, was on her laptop when she got an IM from a random guy nicknamed mistahxxxrightme, asking her for webcam sex. Out of the blue, like that. Amy told the guy off, but he IM’d again, saying he knew all about her, and to prove it he started describing her dorm room, the color of her walls, the pattern on her sheets, the pictures on her walls. “You have a pink vibrator,” he said. It was like Amy’d slipped into a stalker movie. Then he sent her an image file. Amy watched in horror as the picture materialized on the screen: a shot of her in that very room, naked on the bed, having webcam sex with James.
Mistah X wasn’t done. The hacker fired off a note to James’s ex-girlfriend Carla Gagnon: “nice video I hope you still remember this if you want to chat and find out before I put it online hit me up.” Attached was a video still of her in the nude. Then the hacker contacted James directly, boasting that he had control of his computer, and it became clear this wasn’t about sex: He was toying with them. As Mistah X taunted James, his IMs filling the screen, James called Amy: He had the creep online. What should he do? They talked about calling the cops, but no sooner had James said the words than the hacker reprimanded him. “I know you’re talking to each other right now!” he wrote. James’s throat constricted; how did the stalker know what he was saying? Did he bug his room?
They were powerless. Amy decided to call the cops herself. But the instant she phoned the dispatcher, a message chimed on her screen. It was from the hacker. “I know you just called the police,” he wrote. (…)
The task of hunting him down fell to agents Tanith Rogers and Jeff Kirkpatrick of the FBI’s cyber program in Los Angeles. (…)
Luis Mijangos was an unlikely candidate for the world’s creepiest hacker. He lived at home with his mother, half brother, two sisters—one a schoolgirl, the other a housekeeper—and a perky gray poodle named Petra. It was a lively place, busy with family who gathered to watch soccer and to barbecue on the marigold-lined patio. Mijangos had a small bedroom in front, decorated in the red, white, and green of Mexican soccer souvenirs, along with a picture of Jesus. That’s where he spent most of his time, in front of his laptop—sitting in his wheelchair. (…)
In the early days of cybercrime, hackers had to code their software from scratch, but as he searched the Web, Mijangos found dozens of programs, with names like SpyNet and Poison Ivy, available cheaply, if not free. They allowed him to access someone’s desktop but limited the number of computers he could control simultaneously. Bragging to his peers, Mijangos says he found a way to modify an existing program that supported roughly thirty connections so that it could handle up to 600 computers at once.
{ GQ | Continue reading }
incidents, spy & security, technology | January 16th, 2012 8:16 am

They call it “game transfer phenomenon,” or GTP. In a controversial study, they described a brief mental hiccup during which a person reacts in the real world the way they would in a game. For some people, reality itself seems to temporarily warp. Could this effect be real?
Most of us are gamers now. The stereotype of a guy living in his parents’ basement on a diet of Cheetos and soda is long gone. The average gamer is 34 years old, gainfully employed and around 40 per cent are female. They play, on average, 8 hours a week and not just on consoles; around half of the gaming activity today is on smartphones.
Still, the idea of Angry Birds spilling into reality does sound far-fetched. Indeed, if you read some of the descriptions of GTP, they can seem a little silly. After dropping his sandwich with the buttered side down, for example, one person interviewed said that he “instantly reached” for the “R2″ controller button he had been using to retrieve items within PlayStation games. “My middle finger twitched, trying to reach it,” he told the researchers. (…)
Half accused the researchers of disingenuously formalising idiosyncratic experiences reported by a small sample of 42 - that charge was countered by their subsequent study replicating the findings in 2000 gamers. The other half asked why Griffiths was rebranding a familiar finding. “They said, ‘we’ve known about this for ages’,” he recalls. “It’s called the Tetris effect.”
That term was coined in 1996 to refer to a peculiar effect caused by spending a long time moving the game’s falling blocks into place. Play long enough and you could encounter all sorts of strange hallucinatory residuals: some reported witnessing bathroom tiles trembling, for example, or a floor-to-ceiling bookcase lurching down the wall. In less extreme but far more common cases, people saw moving images at the edge of their visual field when they closed their eyes.
{ New Scientist | Continue reading }
photo { Arthur Tress }
leisure, neurosciences, psychology, technology | January 8th, 2012 12:04 pm

The present-day fate of New England goes back to an argument at the Massachusetts Institute of Technology in the ’50s about that material from which semiconductors, well understood locally from wartime work on radar, were to be manufactured in the years ahead. Dogma held that it would be germanium; silicon crystals would be too difficult to purify to the required degree. Robert Noyce, an MIT-trained physicist, thought otherwise.
When MIT declined to tenure him, Noyce decamped, first to Philadelphia, then to the Shockley Semiconductor Laboratory, in Mountain View, California. Silicon leadership went with him – to Fairchild Semiconductor and Intel, each of which he co-founded, and eventually to Silicon Valley, centered around San Jose, which the two firms spawned. New England never developed a vigorous industry in silicon chips. By the end of the ’70s, savvy venture capitalists had begun migrating to Palo Alto’s Sand Hill Road.
Similarly, when Bill Gates dropped out of Harvard College, in 1975, to found a little software company called Microsoft, he repaired first to Albuquerque, N.M., then to his native Seattle. Plenty of entrepreneurial software development was going on in Cambridge, including the first spreadsheets, but proximity to microprocessor developers in California, Intel in particular, gave Microsoft a decisive edge. Microsoft networking software eventually swallowed whole Massachusetts’ minicomputer industry.
{ Economic Principals | Continue reading }
U.S., economics, technology | January 4th, 2012 6:29 pm

Passwords are a pain to remember. What if a quick wiggle of five fingers on a screen could log you in instead? Or speaking a simple phrase? (…)
Computer scientists in Brooklyn are training their iPads to recognize their owners by the touch of their fingers as they make a caressing gesture. Banks are already using software that recognizes your voice, supplementing the standard PIN.
And after years of predicting its demise, security researchers are renewing their efforts to supplement and perhaps one day obliterate the old-fashioned password. (…)
The research arm of the Defense Department is looking for ways to use cues like a person’s typing quirks to continuously verify identity — in case, say, a soldier’s laptop ends up in enemy hands on the battlefield. In a more ordinary example, Google recently began nudging users to consider a two-step log-in system, combining a password with a code sent to their phones. Google’s latest Android software can unlock a phone when it recognizes the owner’s face or — not so safe — when it is tricked by someone holding up a photograph of the owner’s face.
Still, despite these recent advances, it may be premature to announce the end of passwords, as Bill Gates famously did in 2004, when he said “the password is dead.”
{ NY Times | Continue reading }
“After 10 years of studies, we find that the strengths as well as the consequences of technology are more profound than ever,” said Jeffrey I. Cole, director of the Center for the Digital Future. “At one extreme, we see users with the ability to have constant social connection, unlimited access to information, and unprecedented buying power. At the other extreme, we find extraordinary demands on our time, major concerns about privacy and vital questions about the proliferation of technology – including a range of issues that didn’t exist 10 years ago.
“We believe that America is at a major digital turning point,” said Cole. “Simply, we find tremendous benefits in online technology, but we also pay a personal price for those benefits. The question is: how high a price are we willing to pay?”
{ USC Annenberg | Continue reading }
spy & security, technology | December 31st, 2011 10:25 am

Facebook is planning to sue Mark Zuckerberg. No, not that Mark Zuckerberg, [the founder of Facebook], but an Israeli businessman, formerly named Rotem Guez, who legally changed his name to Mark Zuckerberg in order to support a business that can only make sense in today’s ephemeral market: selling “likes” to companies who, you know, want to feel more “liked” in their online presence.
{ persuasive litigator | Time }
economics, social networks, weirdos | December 23rd, 2011 9:00 am

Robotics is a game-changer in national security. We now find military robots in just about every environment: land, sea, air, and even outer space. They have a full range of form-factors from tiny robots that look like insects to aerial drones with wingspans greater than a Boeing 737 airliner. Some are fixed onto battleships, while others patrol borders in Israel and South Korea; these have fully-auto modes and can make their own targeting and attack decisions. There’s interesting work going on now with micro robots, swarm robots, humanoids, chemical bots, and biological-machine integrations. As you’d expect, military robots have fierce names like: TALON SWORDS, Crusher, BEAR, Big Dog, Predator, Reaper, Harpy, Raven, Global Hawk, Vulture, Switchblade, and so on. But not all are weapons–for instance, BEAR is designed to retrieve wounded soldiers on an active battlefield.
{ The Atlantic | Continue reading }
U.S., robots & ai, spy & security | December 21st, 2011 7:55 am

Coker has come up with a recipe for success called the branded viral movie predictor algorithm. According to the algorithm, the four ingredients required for a video to go viral are congruency, emotive strength, network involvement, and something called “paired meme synergy.”
First, the themes of a video must be congruent with people’s pre-existing knowledge of the brand it is advertising. “For example, Harley Davidson for most people is associated with Freedom, Muscle, Tattoos, and Membership,” Coker explained on his website. Videos that strengthen that association meet with approval, “but as soon as we witness associations with the brand that are inconsistent with our brand knowledge, we feel tension.” In the latter case, few people will share the video, and it will quickly “go extinct.”
Second, only viral-produced videos with strong emotional appeal make the cut, and the more extreme the emotions, the better. Happy and funny videos don’t tend to fare as well as scary or disgusting ones, Coker said
Third, videos must be relevant to a large network of people — college students or office workers, for example.
And last, Coker came up with 16 concepts — known on the Internet as “memes” — that viral-produced videos tend to have, and discovered that videos only go viral if they have the right pairings of these concepts.
For example, the concept he calls Voyeur, which is when a video appears to be someone’s mobile phone footage, works well when combined with Eyes Surprise — unexpectedness. These also work well in combination with Simulation Trigger, which is when “the viewer imagines themselves being friends [with the people in the video] and sharing the same ideals,” he said.
{ LiveScience | Continue reading }
marketing, technology | December 19th, 2011 2:00 pm

The question confronting us today is: who owns the Geosynchronous Orbit?
In recent years, “parking spots” in the geosynchronous orbit have become an increasingly hot commodity. According to the NASA, since the launch of the first television satellite into a geosynchronous orbit in 1964, the number of objects in Earth’s orbit has steadily increased to over 200 new additions per year. This increase was initially fueled by the Cold War, during which space was a prime area of competition between the United States and the Soviet Union. Yet over two decades after the end of the US-Soviet space race, even the global financial crisis that began in 2007 does not seem to have diminished the demand for telecommunications satellites positioned in GSO. This ongoing scramble to place satellites in GSO prompted some developing equatorial countries to assert sovereignty over the outer space “above” their territorial borders, presumably with the hope of extracting rent from the developed countries that circulate their technologies overhead. So far, the international community has rejected this notion, but the legal status of the GSO remains in limbo.
{ SSRN | Continue reading }
photo { Roman Signer }
economics, space, technology, within the world | December 15th, 2011 10:55 am

Apple has lost control of the iPad trademark in China. (…) ProView Technologies, the Taiwanese company that presently controls the iPad trademark, was near bankruptcy until yesterday. Apple has $80 billion in cash.
Do we really think Cupertino will let go of an important trademark in what will eventually be the largest IT market in the world?
{ Robert X. Cringely | Continue reading }
asia, economics, technology | December 9th, 2011 12:55 pm